The ICA Protocol is also vulnerable. They use Diffe-Hellman for key agreement. But there is no PKI in the protocol to verify the identity of the server. It's harder (because less of ICA has been reversed engineered), but it is possible. On Wed, 2003-04-02 at 19:09, Larry Seltzer wrote: > >>RDP is vulnerable to Man In The Middle attacks (from here on referred to as MITM > attacks). The attack works as follows: > > Do you know if ICA (Citrix products) is also vulnerable? > > LJS -- Devin Heitmueller Senior Software Engineer Netilla Networks Inc