I should know more monday, but it appears as if Axent has a Gina that is
supposed to work with citrix to do the token based authentication.

If it works I will probably have it installed (and hopefully working) by
tuesday.

David Lang

On Thu, 13 Jul 2000, Frank Knobbe wrote:

> Date: Thu, 13 Jul 2000 19:43:25 -0500
> From: Frank Knobbe <[EMAIL PROTECTED]>
> To: 'David Lang' <[EMAIL PROTECTED]>,
>      Frank Knobbe <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED]
> Subject: RE: Citrx Metaframe/NT4-TSE
> 
> > -----Original Message-----
> > From: David Lang [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, July 13, 2000 5:10 PM
> > 
> > how do you setup Citrix to use two factor authentication?
> > 
> > I am working on this now and after having both microsoft (terminal
> > server) and Citrix reps in they have said that if you really need
> > that sort of security run citrix through a VPN and do the 
> > authentication on the VPN.  
> 
> As of today (at least as far as I know) this your options. Either use
> a VPN or, if you are using/planning to use SecureICA, just open a
> port on the firewall after successful authentication. I think the
> SecureICA (128 bit encryption on the ICA protocol itself) and a port
> opened after token authentication against the firewall is the
> preferred method. A VPN would add overhead on the traffic. Running
> ICA through IPSec performs pretty good, but don't use PPTP. Besides
> the known vulnerabilities, the performance ... well... just plain
> sucks...
> 
> I almost had Vasco rewrite their GINA (graphical logon interface on
> NT) to be compatible with Terminal Server. That GINA is loaded to use
> their tokens, especially the challenge/response based one (with the
> flashing bar code on the screen). Works great on NT WS/S/SEE, however
> under Terminal Server it behaved strangely. If you logged off, the
> prompt wouldn't come back. You actually had to disconnect and perform
> another step. This issue was due to the multi-user additions in the
> GINA under Terminal Server.
> 
> I have not seen another token GINA that worked properly with Terminal
> Server. If someone knows of a token vendor who supports TS, please
> let me know, because that would be the holy grail. In that case you
> could allow ICA connection to the Terminal Server without having to
> authenticate on the firewall first. Without a token, you wouldn't get
> in. This comes especially handy if you serve Terminal Server session
> through a web page. Just open your browser, connect to your server,
> authenticate with token to Citrix and you're in.... This remains a
> dream of mine... sigh.
> 
> > the next best thing they have been able to say is to use the 
> > browser-based
> > version of the client that authenticates to the weeb server 
> > (HTTP or HTTPS
> > are supported) and implement strong authentication on the web
> > server before access is allowed to the citrix URL.  
> 
> Nope. As far as I remember, the client is loaded through the page
> (Active X Control), but still established an ICA protocol session to
> the Terminal Server. In other words, anyone with a client could hit
> the port directly.
> 
> > 1. you are forced to use the browser based client, porrer 
> > performance then
> > the full client from what I have been told.
> 
> Yeah, it's slightly better using the client instead of the web page.
> 
> > 2. I am nervous about letting port 1494 through becouse I don't
> > fully understand how the authentication works between the web
> > server and the citrix serve. The 'correct' way for things to happen
> > is for  the client to connect to the web server, authenticate, then
> > connect to  1494, but what's to stop a hacker from hitting 1494
> > directly and pretend that he has already authenticated?  
> 
> Yup. Though the problem is not that hacker could spoof an active
> session (SecureICA uses keys that are exchanged during setup), but
> rather anyone could get to the Logon Dialog and try
> username/passwords combos. This could result in a DOS is user
> accounts are locked out after failed attempts. Furthermore, someone
> might flood the ICA port, but then again, which port can not be
> flooded...
> 
> > This is assuming that we use the strong encryption option for 
> > citrix or
> > that would also be a problem.
> 
> Highly recommended.
> 
> 
> What firewall do you have in front of the Terminal Server?
> 
> Regards,
> Frank
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to