Penetration Testing mailing list archives

Re: [PEN-TEST] Citrix (and other remote-terminal madness)


From: "Beauregard, Claude Q" <CQBeauregard () AAAMICHIGAN COM>
Date: Wed, 11 Oct 2000 09:58:46 -0400

I'm not aware of anything unique about the CItrix ICA client that identifies
it to the Citrix server. Has anyone tried to use the VNC client to access a
Citrix server.

Claude

-----Original Message-----
From: Penetration Testers [mailto:PEN-TEST () SECURITYFOCUS COM]On Behalf
Of Jay Mobley
Sent: Tuesday, October 10, 2000 3:38 PM
To: PEN-TEST () SECURITYFOCUS COM
Subject: Re: [PEN-TEST] Citrix (and other remote-terminal madness)


Keep in mind however that while VNC has pleanty of options in the way of
protecting the data that is sent over the wire, its authentication
mechinisms are lacking. Passwords are limited to 8 characters, and there is
no protection against dictionary/brute force attacks, and there is a patch
out for the client that allows you to do just that. By the way.. if anyone
happens to have knowledge of the patch, I never could figure out where the
code went...

-Jay Mobley
Interactive Explorers



-----Original Message-----
From: Dunker, Noah [mailto:NDunker () FISHNETSECURITY COM]
Sent: Tuesday, October 10, 2000 9:03 AM
To: PEN-TEST () SECURITYFOCUS COM
Subject: Re: [PEN-TEST] Citrix (and other remote-terminal madness)


If you're looking for a graphical remote-interface, you might try VNC.  The
Client is cross platform (Even works on MacOS and WinCE).  The server works
on all windows platforms, And source is available for UNIX Platforms, with
binaries available for almost all popular flavors.

It only allows keyboard and mouse.  No file transfers or anything.  On Win*,
there can only one user at a time.  On UNIX, VNC creates extended virtual X
Window System Desktops, so multiple users can be logged into the same server
at the same time...  :0, :1, :2, etc... For silly things like Netscape,
this will probably work fine.  the Windows VNC client even supports "Full
Screen Mode" where "windows" goes into the background, and the remote
machine
seems to be local.  It works okay over a T1, and there have been multible
enhancements to the VNC protocol that allow for encryption, higher levels of
compression, etc... and VNC works great through a VPN or SSH tunnel.

VNC can be grabbed from http://www.uk.research.att.com/vnc/, This version
has no encryption that I know of... Do a search and you can probably find
others...  I typically just shove the protocol through OpenSSH.



-----Original Message-----
From: Peter Van Epp [mailto:vanepp () SFU CA]
Sent: Tuesday, October 10, 2000 10:45 AM
To: PEN-TEST () SECURITYFOCUS COM
Subject: Re: Citrix



On Mon, 9 Oct 2000, Beauregard, Claude Q wrote:

Has anyone done any penetration regarding Citrix and Internet access as
provided by the Citrix servers to internal network resources. Even
though
they are now using 128bit encryption for the client the hole in the
firewall
is there waiting to be exploited.

Can you elaborate what you see as a hole?

Hugo.


        While I'm not the original poster, I was (and to some extent still
am)
looking at this as a way to get "web" access in to a secure network. My
concern is that as I feared the link between the client and server is
apparantly
a full service link (i.e. it allows drive mounting from the server by the
client for instance). The application I'm interested in (and which sounds
like
what this person is doing) is to have the server out on the net, subject to
being broken in to like all NT devices but having nothing except video
commands
going in and key strokes coming out from the secure network. Thus a breakin
on the server doesn't compromise the internal secure network (as long as
confidential data is kept off of the Citrix server at least). The attacker
can
draw obcsene images on a single screen inside the secure network, but likely
(modulo bugs in the video drawing routines on the client side of course)
can't
take over the client machine and compromise the internal network. It looks
to me
from what little I have found out about the Citrix protocol that you would
need an application proxy type firewall to filter out all protocol elements
other than screen draw commands in and key strokes out before you could do
this safely. With things like file system mounting possible I expect that a
compromise of the server could also result in a compromise of the secure
network
that the client is part of by subverting the client.
        This of course may not be possible if the protocol gets unhappy
about not being able to talk to the client except with video drawing
commands.

Peter Van Epp / Operations and Technical Support
Simon Fraser University, Burnaby, B.C. Canada


Current thread: