remote access gateway vulns

1) Our IT department seem of the view that if citrix remote access gateawy requires 2 factor authentication then we are pretty secure? Whats your view on that opinion?

2) If you only publish citrix to the world, are there still other attack vectors on that citrix CAG gateway server that could allow a hacker to gain access to the LAN?

3) Is the view that 2-factor is all thats required very naive?

4) Can you give some examples of other vulns you could find on a citrix CAG server that could still allow an attacker to get unauthorised access to the LAN - and/or compensating cotnrols to block these additional attack vectors?
LVL 4
pma111Asked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Tony JohncockLead Technical ArchitectCommented:
Two factor authentication certainly helps because it relies on something that a user has in their possession and utilises single-use keys of some kind, so unless a keylogger can send the information and it be used within around 30seconds of being entered, it's all but useless.

On it's own though it's not enough - unencrypted traffic could be compromised using a man-in-the-middle attack where the information sent between two computers actually passes through a third, that transparently reads the informatin and prentends to each end point that it is the other. To name but one.

Using technology such as CAGs helps because encryption is usually a requirement.

These devices tend to be incredibly secure because they're some form of Linux based operating system with only the necessary ports open. Linux by its very nature tends to be more secure than Windows, but any OS and any appliance may be vulnerable.

I cannot, though, give any real-world experiences I've seen or even heard of of CAGs being sufficiently compromised to the extent that they give attackers control of systems or even direct access to information.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
pma111Author Commented:
Ok thanks. I was thinking perhaps there may be more running on a citix server than citrix, in which case a vulnerability in "the other" may still provide an attack point?
0
pma111Author Commented:
So citrix is based on linux?
0
Tony JohncockLead Technical ArchitectCommented:
Ah no - if you use the Citrix Secure Gateway, then this installs over Windows and uses IIS, so yes you have a higher attack profile.

However, the Citrix Access Gateway and NetScaler products are hardened, cut-down Linux variants so don't have this issue. These are appliances - physical devices, although the CAG VPX is a virtual appliance and can be installed on the likes of XenServer (virtualisation hypervisor)
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Security

From novice to tech pro — start learning today.