Citrix Virtual Apps and Desktop 7.x Linux Virtual Delivery Agent Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-275969 High The version of Virtual Apps and Desktop Linux VDA running on the system must be a supported version.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- LVDA-VD-000005
- Vuln IDs
-
- V-234255
- Rule IDs
-
- SV-234255r960735_rule
Checks: C-37440r612319_chk
Open Citrix Studio, select "Policy Panel", check for Computer Policies. Maximum number of sessions (MaximumNumberOfSessions) policy is "ENABLED" and explicitly applied to Linux Desktop/Application Delivery Groups. If Maximum Number of Sessions policy is "DISABLED" or limit not set to "3", this is a finding.
Fix: F-37405r612320_fix
Open Citrix Studio, select "Policy Panel", check for Computer Policies. Maximum number of sessions (MaximumNumberOfSessions) policy set to "ENABLED" and limit set to "3".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- LVDA-VD-000015
- Vuln IDs
-
- V-234256
- Rule IDs
-
- SV-234256r960741_rule
Checks: C-37441r612322_chk
All timer values are defined in the registration table. Retrieve current value using the following command: /opt/Citrix/VDA/bin/ctxreg, /opt/Citrix/VDA/bin/ctxreg dump |grep MaxIdleTime If MaxIdleTime is not set to "15 minutes" or less, this is a finding.
Fix: F-37406r612323_fix
Set value for Idle Timer /opt/Citrix/VDA/bin/ctxreg update -k "HKLM\System\CurrentControlSet\Control\Citrix\WinStations\cgp" -v "MaxIdleTime" -d "0x0000000F" /opt/Citrix/VDA/bin/ctxreg update -k "HKLM\System\CurrentControlSet\Control\Citrix\WinStations\tcp" -v "MaxIdleTime" -d "0x0000000F" /opt/Citrix/VDA/bin/ctxreg update -k "HKLM\System\CurrentControlSet\Control\Citrix\WinStations\ssl" -v "MaxIdleTime" -d "0x0000000F" where "0x0000000F" is hexadecimal for 15
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- LVDA-VD-000030
- Vuln IDs
-
- V-234257
- Rule IDs
-
- SV-234257r960759_rule
Checks: C-37442r612325_chk
On the Delivery Controller, ensure the SSL encryption has been enabled for the delivery group (HdxSslEnabled:True) and the Delivery Controller uses FQDN of Linux VDA to contact target Linux VDA (DnsResolutionEnabled:True). Execute the following commands in a PowerShell window on the Delivery Controller: # Asnp citrix.* # Get-BrokerAccessPolicyRule –DesktopGroupName ‘<GROUPNAME>’ | format-list HdxSslEnabled Where <GROUPNAME> is the target Delivery Group name. On Linux VDA, check the following: Check if SSL listener is up and running; run following command: # netstat -lptn|grep ctxhdx to see that the ctxhdx process is listening on an SSL port (443, by default). If, on the Delivery Controller, HdxSslEnabled is not set to "true", this is a finding. If, on the Delivery Controller, DnsResolutionEnabled is not set to "true", this is a finding. If, on the Linux VDS, the ctxhdx process is not listening on an SSL port (443 by default, or other approved port), this is a finding.
Fix: F-37407r612326_fix
To enable TLS encryption on the Linux VDA, a server certificate must be installed on the Citrix Broker (DDC), each Linux VDA server and root certificates must be installed on each Linux VDA server and client per DoD guidelines. On the Linux VDA, use the enable_vdassl.sh tool to enable (or disable) TLS encryption. The tool is located in the /opt/Citrix/VDA/sbin directory. For information about options available in the tool, run the /opt/Citrix/VDA/sbin/enable_vdassl.sh -help command. To enable TLS 1.2 on Linux VDA OS - # /opt/Citrix/VDA/bin/ctxreg update -k "HKLM\System\CurrentControlSet\Control\Citrix\WinStations\ssl" -v "SSLMinVersion" -d 0x00000004 To enable GOV ciphersuites only: # /opt/Citrix/VDA/bin/ctxreg update -k "HKLM\System\CurrentControlSet\Control\Citrix\WinStations\ssl" -v "SSLCipherSuite" -d 0x00000001 thes restart service # sudo /sbin/service ctxhdx restart [root@ LVDA]# sudo /sbin/service ctxhdx restart
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- LVDA-VD-000270
- Vuln IDs
-
- V-234258
- Rule IDs
-
- SV-234258r960963_rule
Checks: C-37443r612328_chk
Run the following command on a client to disable the CEIP: /opt/Citrix/VDA/bin/ctxreg update -k "HKEY_LOCAL_MACHINE\ SOFTWARE\Citrix\CEIP" -v "CEIPSwitch" -d "1" If CEIPSwitch is not set to "1", this is a finding. Run the following command on a client to disable Google Analytics: /opt/Citrix/VDA/bin/ctxreg update -k "HKEY_LOCAL_MACHINE\ SOFTWARE\Citrix\CEIP" -v "GASwitch" -d "1" If GASwitch is not set to "1", this is a finding.
Fix: F-37408r612329_fix
Set the value of CEIPSwitch to "1" (Disabled). Set the value of GASwitch to "1" (Disabled).
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- LVDA-VD-000275
- Vuln IDs
-
- V-234259
- Rule IDs
-
- SV-234259r1043177_rule
Checks: C-37444r612331_chk
On Delivery Controllers, verify that only approved ports are used. 1. Open a command prompt. 2. Navigate to the Citrix install directory Program Files\Citrix\Broker\Service 3. Enter "BrokerService.exe /Show" to display the currently used ports. If an unapproved port is used, this is a finding.
Fix: F-37409r612332_fix
To change the VDA registration port from the default "80", create the Citrix Machine Policy and update the DDCs, as explained below: 1. Create a new Citrix Machine policy or edit an existing one. 2. Navigate to the Settings tab and select "Control Registration Port". 3. Update the Value to reflect the new port. 4. Select "OK". 5. Restart all desktops and wait until all the desktops report as Unregistered. 6. Update the DDCs VDA registration Port. 7. Restart all desktops and verify that all VDAs register successfully.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-002470
- Version
- LVDA-VD-000970
- Vuln IDs
-
- V-234260
- Rule IDs
-
- SV-234260r961596_rule
Checks: C-37445r612334_chk
Verify the correct server certificate issued by authorized certificate authority is installed on Linux VDA. Navigate to folder /root/myCert/myCA/certs/ and examine certificates. If the certificates are not issued by the DoD or approved CA, this is a finding.
Fix: F-37410r612335_fix
A server certificate must be installed on each Linux VDA server and root certificates must be installed on each Linux VDA server and client. Obtain server certificates in PEM format and root certificates in CRT format from a trusted CA. A server certificate contains the following sections: - Certificate - Unencrypted private key - Intermediate certificates (optional) After obtaining required certificates, customers need to install them as follows: Upload server and CA certificates into Linux VDA server, which will be used in “Step 2: Enable SSL encryption on Linux VDA”. For example, put server.pem (name of server certificate) and myca.crt (name of CA certificate) to folder /root/myCert/myCA/certs/. Download the CA certificate (myca.crt as an example) to client host and import it into system Certificate Store on the “Trusted Root Certification Authorities” folder. Refer to "Importing Trusted CA Certificates into the Windows Certificate Store" for the instructions. Note: Ensure the client host is able to resolve the FQDN of Linux VDA; otherwise, the connection cannot be established.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- LVDA-VD-999999
- Vuln IDs
-
- V-275969
- Rule IDs
-
- SV-275969r1115779_rule
Checks: C-80087r1111764_chk
Virtual Apps and Desktop Linux VDA 7.x is no longer supported by the vendor. If the system is running Virtual Apps and Desktop Linux VDA 7.x, this is a finding.
Fix: F-79992r1111765_fix
Upgrade to a supported version.