In <1049409543.15153.6.camel@devinlinux.netilla.com> Devin Heitmueller <dheitmueller@netilla.com> writes: >On Wed, 2003-04-02 at 19:09, Larry Seltzer wrote: >> >>RDP is vulnerable to Man In The Middle attacks >> >> Do you know if ICA (Citrix products) is also vulnerable? > >The ICA Protocol is also vulnerable. They use Diffe-Hellman for key >agreement. But there is no PKI in the protocol to verify the identity >of the server. AFAIK, Citrix' recommendation if you want to guard against this type of attack is to use their Citrix Secure Gateway software, which tunnels the ICA protocol data inside an SSL connection. This uses the normal SSL certificate handshake to verify the identity of the server. Henrik Storner