Home

FreeRDP Configuration Manual - FOSS

image

Contents

1. 25 Chapter 6 Remote Desktop Web Access 6 1 Server Configuration 6 1 1 Windows Server 2008 Launch the Server Manager In the left pane expand Roles right click Remote Desktop services and then click Add Role Services The Add Role Services wizard will appear On the Select Role Services page select Remote Desktop Web Access and click Next You may be asked to install additional required services such as Web Server IIS On the Introduction to Web Server IIS page click Next On the Select Role Services page click Next e On the Confirm Installation Selections page click Install Wait for the installation to complete and then click Close 26 Chapter 7 Terminal Server Gateway 7 1 Server Configuration 7 1 1 Windows Server 2008 Launch the Server Manager In the left pane click Roles In the right pane click Add Roles to launch the Add Roles wizard If the Before you begin page appears click Next On the Server Roles page select Remote Desktop Services and click Next On the Introduction to Remote Desktop Services page click Next On the Select Role Services page select Remote Desktop Session Host and Remote Desktop Gateway and then click Next On the Uninstall and Reinstall Applications for Compatibility page click Next On the Specify Authentication Method for Remote Desktop Session Host select either Require Network Level Authentication or Do not require Network Level Authentication and click Next
2. On the Specify Licensing Mode page select Configure later if you haven t installed licenses yet otherwise select the appropriate mode between Per Device and Per User and click Next On the Select User Groups Allowed Access To This RD Session Host Server page add the necessary user groups and click Next Users from the Administrators group are allowed by default to connect using RDP On the Configure Client Experience page select the features to enable such as Audio and video playback Audio recording redirection and Desktop composition and click Next For testing purposes enabling all features is a good idea On the Choose and Server Authentication Certificate for SSL Encryption 27 page either choose an existing certificate or select Create a self signed certificate for SSL encryption and click Next The SSL certificate for the Terminal Server Gateway is different from the SSL certificate used by the RDP server and can be changed later On the Create Authorization Policies for RD Gateway page select Now and click Next The RD Gateway uses these policies to restrict both the users allowed to connect and the internal network resources that can be accessed On the Select User Groups That Can Connect Through RD Gateway page add necessary user groups and click Next In the Create an RD CAP for RD Gateway page enter a name and select allowed authentication methods between Password and Smart card and click Next In the Create an RD RAP f
3. X 509 CER and click Next In the File to Export page specify a destination file name and path such as gateway cer in the Documents folder and click Next In the Completing the Certificate Export Wizard page click Finish to close the wizard Close the Certificate dialog by clicking OK e Close the Remote Desktop Connection warning dialog by clicking OK The connection sequence will be aborted but the RD Gateway certificate has been saved first The certificate can now be imported in the Trusted Root Certification Authorities store for the client to accept identify the server on the next connection Installing RD Gateway certificate for trust e Double click the RD Gateway certificate gateway cer in Documents from the previous steps The Certificate dialog will appear 29 e In the General tab click Install Certificate The Certificate Import wizard will appear In the Welcome to the Certificate Import Wizard page click Next In the Certificate Store page select Place all certificates in the follow ing store Click Browse to open the Select Certificate Store dialog Select Trusted Root Certification Authorities and click OK Click Next and then Finish in the Completing the Certificate Import Wizard page A Security Warning dialog will appear asking to confirm the installation of the certificate click Yes and then OK Click OK to close the Certificate dialog 30
4. 3 OpenSSL Create an OpenSSL extension file named rdp ext extensions x509v3 x509v3 keyUsage keyEncipherment dataEncipherment extendedKeyUsage serverAuth Create an OpenSSL config file named rdp cfg reg default_bits 2048 distinguished_name req_DN string_mask nombstr reg_DN countryName 1 Country Name 2 letter code countryName_default CA countryName_min 2 countryName_max 2 stateOrProvinceName 2 State or Province Name full name stateDrProvinceName default Quebec localityName 3 Locality Name eg city localityName default Montreal O organizationName 4 Organization Name eg company O organizationName default Awake Coding Consulting Inc organizationalUnitName 5 Organization Unit Name eg section commonName 6 Common Name CA name or FQDN commonName max 64 commonName default awakecoding com emailAddress 7 Email Address eg name FQDN emailAddress max 40 emailAddress default admin awakecoding com Execute the following commands in the directory where rdp ext and rdp cfg are located openssl genrsa out rdp key 2048 openssl req config rdp cfg new key rdp key out rdp csr openssl x509 req days 365 extfile rdp ext signkey rdp key in rdp csr out rdp crt openssl pkcsi2 export inkey rdp key in rdp crt out rdp pfx 2 3 Certificate Conversion Convert from pfx to crt using OpenSSL openssl pkcsi2 in rdp pfx clce
5. domain labl awake local and the preferred DNS server IPv4 address By default this address is 127 0 0 1 but it needs to be changed to the current server s address 192 168 56 10 An alternate DNS server IPv4 address can also be entered Click Next On the Specify IPv4 WINS Server Settings page select WINS is required for applications on this network and enter the current server s address 192 168 56 10 in the Preferred WINS server IP address field Click Next On the Add or Edit DHCP Scopes page click Add and enter the following information in the Add Scope dialog click OK and then Next 20 Scope name lab01 or any descriptive name Starting IP address 192 168 56 101 Ending IP address 192 168 56 254 Subnet type Wired lease duration will be 8 days Leave Activate this scope selected Subnet mask 255 255 255 0 Default gateway optional 192 168 56 1 On the Configure DHCPv6 Stateless Mode page select Disable DHCP v6 stateless mode for this server and click Next On the Authorize DHCP Server page select Use current credentials and click Next On the Introduction to Active Directory Certificate Services page click Next On the Select Role Services page select Certification Authority and click Next e On the Specify Setup Type page select Standalone and click Next e On the Specify CA Type page select Root CA and click Next On the Set Up Private Key page select
6. select the highest functional level such as Windows Server 2008 R2 On the Add Domain Controller Options page leave the DNS server option selected and click Next A dialog box will appear warning that a delegation for the DNS server cannot be created Ignore this warning and click Yes On the Location for Database Log Files and SYSVOL page click Next On the Directory Services Restore Mode Administrator Password enter a password such as Password123 and then click Next On the Summary page review the information and then click Next Op tionally the summary information can be saved to a text file by clicking Export settings Wait for installation to complete You may select Reboot on completion or click Finish manually later In both cases the server needs to be rebooted before continuing further Installing the Active Directory Certificate Services and DHCP Server roles Launch the Server Manager In the left pane click Roles In the right pane click Add Roles to launch the Add Roles wizard If the Before you begin page appears click Next On the Server Roles page select Active Directory Certificate Services and DHCP Server and then click Next On the Introduction to DHCP Server page click Next On the Select Network Connection Bindings page the server s static IP address 192 168 56 10 should be listed and selected by default Click Next to continue On the Specify IPv4 DNS Server Settings page enter the parent
7. 008 Installing the Active Directory Domain Services Role Launch the Server Manager In the left pane click Roles In the right pane click Add Roles to launch the Add Roles wizard If the Before you begin page appears click Next On the Server Roles page select Active Directory Domain Services and click Next On the Introduction to Active Directory Domain Services page click Next If prompted to add features required for the role click Add Required Features On the Confirm Installation Selections page click Install e Wait for the Installation Results page to appear click Close and reboot if necessary to complete the installation process Promoting the server to a domain controller Click Start click Run type dcpromo and then click OK This starts the Active Directory Installation Wizard Click Next On the Operating Systems Compatibility page click Next On the Choose a Deployment Configuration select Create a new domain in a new forest and click Next 19 On the Name the Forest Root Domain page enter a FQDN such as labl awake local and click Next For testing purposes avoid using a name which could potentially conflict with other existing names Using the local suffix is a good way to avoid conflicts On the Set Forest Functional Level page select the desired forest functional level from the list and then click Next If you do not intend to have backwards compatibility in a particular lab environment you may
8. Create a new private key and click Next On the Configure Cryptography for CA leave the default options and click Next On the Configure CA Name page enter a common name for the CA and click Next This name can be the same as the server name but it is usually changed to clearly identify the name as being a certificate authority In this case we will use LAB1 W2K8R2 CA On the Set Validity Period page click Next On the Configure Certificate Database page click Next On the Confirm Installation Selections page click Install Wait for the Installation Results page to appear click Close and reboot if necessary to complete the installation process Installing the WINS Server feature Launch the Server Manager In the left pane click Features In the right pane click Add Features to launch the Add Features wizard In the Select Features page select WINS Server and then click Next In the Confirm Installation Selections page click Install Wait for the Installation Results page to appear click Close and reboot if necessary to complete the installation process 21 4 1 2 Windows Server 2012 Installing the Active Directory Domain Services Role Launch the Server Manager e At the top right click Manage then click Add Roles and Features to launch the Add Roles and Features wizard If the Before you begin page appears click Next On the Select installation type page select Role based or feature based installation and clic
9. FreeRDP Configuration Manual Marc Andr Moreau Awake Coding Consulting Inc Contents 1 Introduction 4 Ll Gloss 2 it AE Ae RER a dente 4 1 20 References as zum anna ans e point wa Ge eee 4 4 2 Network Tracing 5 2 1 Introduction 12 44 Arcee dd BUS O a na le oo 5 2 2 Certificate Generation 5 2 2019 WinPR suis SADO pe desde Anite de tee MN 5 2 222 Makee sd tod uar iie ie de oR MANN hd IA EE 6 22 3 Openssl a ala a 2S eb Se Ee Se ee EE a 7 2 3 Certificate Conversion 8 2 4 Certificate Installation 9 2 4 1 Terminal Server 10 2 4 1 1 Windows Server 2008 10 DARZ Windows sus a saca min oe a 10 ZA SGAE WAY LU NN Nes dE SAN I A Min nd 11 2 5 Protocol Configuration 11 20 1 TES ss des gr avt ds ni dis ph s 11 2 5 1 1 Disabling TLS 1 1 11 2 5 1 2 Disabling TLS 1 2 12 2 0 21 UDP UTransportes sis e Be oe BE LE A men e eds 12 2 5 3 Compression a msm 4 640220008 ee ees 12 2 94 RDP Security 24 44 3 3 3 3 2 ee Ee ee ar 13 2 5 5 Network Level Authentication 2 6 Packet Capturing 2 6 1 Message Analyzer 2 6 2 Network Monitor 2 6 2 1 Installation i vce 5 a ant 2 6 2520 Capturing wid us a Ne ee 210 3 Wittes hark aaa rt DB RP O e E
10. a 2 6 3 1 Installation 2 6 3 2 Compilation 2 6 3 3 Configuration 2 6 3 4 Capturing la nda GA A 3 Users and Groups 3 1 Adding Users nr La du ee nee d 3 1 1 Windows Server 2008 Sil Local Users sus 7 4 RS SSSR aa es 3 1 1 2 Domain Users Active Directory 4 1 Server Configuration 4 1 1 Windows Server 2008 41 2 Windows Server 2012 4 2 Client Configuration 42 1 Windows 7 and Windows Server 2008 42 2 Windows 8 and Windows Server 2012 Remote Desktop Connection Broker 5 1 Server Configuration 5 1 1 Windows Server 2008 Remote Desktop Web Access 6 1 Server Configuration 6 1 1 Windows Server 2008 17 17 17 17 18 19 19 19 22 23 23 23 25 25 25 7 Terminal Server Gateway 27 7 1 7 2 Server Configuration 27 7 1 1 Windows Server 2008 27 Client Configuration 28 G21 Windows Tacks salar e e de a races te LT AE 28 Chapter 1 Introduction This document specifies various configuration procedures for common RDP de ployment scenarios These instructions should be used as a reference to help RDP developers configure a pr
11. assword fields and then click Next On the DNS Options page there should be a warning saying that a delegation for the DNS server cannot be created This warning can be safely ignored Click Next to continue On the Additional Options page the NetBIOS domain name will be shown for verification For instance the corresponding NetBIOS name for the FQDN lab2 awake local will be LAB2 Click Next to continue 22 On the Paths page click Next On the Review Options page click Next On the Prerequisites Check page click Install Wait for the installation to complete The server will restart automatically 4 2 Client Configuration 4 2 1 Windows 7 and Windows Server 2008 Joining and existing domain e Right click Computer and then click Properties e Under Computer name domain and workgroup settings click Change settings The System Properties dialog will appear In the Computer Name tab click Change The Computer Name Domain Changes will appear Under Member Of select Domain enter the domain name to join labl awake local and click OK A password prompt will appear Authenticate using an account with permission to join the domain and click OK A message box welcoming you to the domain should appear click OK Another message box will inform you that you must restart the computer click OK again A dialog will then ask you to restart the computer now or later In both cases you need to restart t
12. ct the private key file if there is one e Click OK to get back to the SSL Decrypt dialog and click OK again 2 6 3 4 Capturing Capture traffic e Launch Wireshark e On the Capture menu click Interfaces e In the Capture Interfaces dialog click Options besides the interface to capture from If you do not know which interface to choose it is normally the one with the highest amount of traffic as indicated in the Packets column 15 e In the Capture Options dialog type port 3389 in the Capture Filter field The filter may be different depending on the port s used by the server Filtering the capture is optional but helps filtering out packets which are not of interest e Click Start e Perform tasks generating network traffic of interest and click Stop either from the top menu bar or on the Capture menu 16 Chapter 3 Users and Groups 3 1 Adding Users 3 1 1 Windows Server 2008 3 1 1 1 Local Users Launch the Server Manager e In the left pane expand Configuration and then Local Users and Groups Under Local Users and Groups right click Users and click New User The New User dialog will appear Enter a username such as jsmith in the User name field Enter a name such as John Smith in the Full name field Enter a password such as Password123 in the Password and Confirm password fields Unselect User must change password at next logon Optionally select Password never expires
13. e found in winpr tools makecert cli The core of the winpr makecert tool is built as a reusable library which is used by many of the FreeRDP based servers for automatic generation of a self signed certificate when no other certificate was previously installed The flexibility of an open source makecert replacement usable as both a redis tributable excutable or an embeddedable library is such that third parties who implement solutions that have nothing to do with RDP may still want to use it To generate a default self signed RDP certificate use the rdp option winpr makecert rdp Information regarding the generated certificate will be shown The certificate and private key files will be outputted in the current working directory with a name that matches the current machine s hostname In this case my machine s name is system76 so the generated files are system76 crt and system76 key A non default file output name can be specified using the last command line argument winpr makecert rdp server In this case winpr makecert will name the files server crt and server key The files generated by winpr makecert are readily usable by the FreeRDP servers but need to be converted to pfx for usage with the Microsoft RDP server Please consult the section of this manual on certificate conversion to learn how this can be done 2 2 2 MakeCert MakeCert is a tool that is included with the Windows SDK or the Windows DDK that can genera
14. e the certificae The thumbprint should look like a6 ff 13 00 b5 47 85 bf 48 3d 70 74 c8 aa 23 bb 3f 19 cl 71 Configure RDP server to use certificate Launch the Registry Editor regedit exe e In the directory structure browse to the following key HKEY LOCAL _MACHINE System CurrentContr Server WinStations RDP Tcp Right click the RDP Tcp key point to New and click Binary Value Name the new key SSLCertificateSHA1Hash Right click the SSLCertificateSHA1Hash key and click Modify Binary Data In the Edit Binary Data dialog type the thumbprint of the certificate to be used by the RDP server As it is particularly easy to make a mistake in this step double check that you have entered the thumbprint properly and click OK 10 The RDP server should now be configured to use the new certificate 2 4 2 TS Gateway e Launch the Server Manager e In the left pane expand Roles Remote Desktop Services and then RD Gateway Manager e Under RD Gateway Manager right click the current server and click Properties to open the RD Gateway Server Properties dialog In the SSL Certificate tab click Import Certificate to open the Import Certificate dialog From the list of certificates select the one which you want to use and click Import Click OK to close the RD Gateway Server Properties dialog A message box should inform you that the RD Gateway Server server needs to be restarted for the changes to take effect 2 5 Pr
15. easier for testing Click Create to create the user Click Close to close the dialog e Under Local Users and Groups click Users to show the list of users in the right pane e In the right pane right click the user and then click Properties jsmith from the previous example The User Properties dialog will appear Under the Member Of tab click Add The Select Groups dialog will appear In the Enter the object names to select field enter Remote Desktop Users and click Check Names When the text becomes underlined click OK 17 Click OK in the User Properties dialog to close it 3 1 1 2 Domain Users Launch the Server Manager In the left pane expand Roles Active Directory Domain Services and then Active Directory Users and Computers Under Active Directory Users and Computers right click a domain such as labl awake local point to New and click User The New Object User dialog will appear Complete the form and click Next First name John Last name Smith Full name John Smith User logon name jsmith User Logon name pre Windows 2000 jsmith In the Password and Confirm password fields enter a password like Pass word123 Unselect User must change password at next logon select Password never expires and then click Next Click Finish 18 Chapter 4 Active Directory 4 1 Server Configuration 4 1 1 Windows Server 2
16. eshark http www wireshark org If you are using Linux it packages should be available for all major distributions If you choose to build Wireshark from source make sure that you are building with SSL support https connect microsoft com site216 2http technet microsoft com en us library jj649776 aspx 14 2 6 3 2 Compilation This step is only required if the wireshark package that comes with your distri bution is not built with proper SSL support certain versions of openSUSE for instance If this is the case the SSL dissector will lack necessary configuration options Building is straightforward Download and extract the latest wireshark sources Install required build dependencies libpcap devel libgnutls devel Configure with an isolated installation prefix and enable ssl support and then build and install configure prefix opt wireshark with ssl yes make install 2 6 3 3 Configuration Configure SSL dissector Launch Wireshark On the Edit menu click Preferences In the left pane expand Protocols and select SSL In the right pane click Edit besides RSA keys list In the SSL Decrypt dialog click New In the SSL Decrypt New dialog enter the following IP address of the RDP server Port used by the RDP server Protocol dissector to use with decrypted packets When in doubt use the data dissector Full path to the SSL private key file key extension Password used to prote
17. he computer before going further 4 2 2 Windows 8 and Windows Server 2012 Joining and existing domain e Open the System control panel page by pressing WinKey X and clicking System in the menu that appears on the bottom left of the screen e Under Computer name domain and workgroup settings click Change settings The System Properties dialog will appear In the Computer Name tab click Change The Computer Name Domain Changes will appear e Under Member Of select Domain enter the domain name to join lab2 awake local and click OK e A password prompt will appear Authenticate using an account with permission to join the domain and click OK A message box welcoming you to the domain should appear click OK Another message box will inform you that you must restart the computer click OK again 23 e A dialog will then ask you to restart the computer now or later In both cases you need to restart the computer before going further 24 Chapter 5 Remote Desktop Connection Broker 5 1 Server Configuration 5 1 1 Windows Server 2008 Launch the Server Manager In the left pane expand Roles right click Remote Desktop services and then click Add Role Services The Add Role Services wizard will appear e On the Select Role Services page select Remote Desktop Connection Broker and click Next e On the Confirm Installation Selections page click Install Wait for the installation to complete and then click Close
18. ish A message box should indicate that the certificate has been successfully imported and the certificate should now appear in the Personal certificate store 2 4 1 Terminal Server 2 4 1 1 Windows Server 2008 Configure RDP server to use certificate Launch the Server Manager In the left pane expand Roles Remote Desktop Services and then select RD Session Host Configuration In the middle pane right click the connection to configure such as RDP Tcp and select Properties The Connection Properties dialog will appear In the General tab click Select A list of usable certificates will appear select the appropriate one and click OK Click OK to apply the changes and close the Connection Properties dialog 2 4 1 2 Windows 7 Configure certificate permissions Right click on the certificate point to All Tasks and click Manage Private Keys In the Permissions for private keys dialog click Add e In the Select Users or Groups dialog type NETWORK SERVICE and click Check Names Once the NETWORK SERVICE text is underlined click OK e In the Permissions for private keys dialog click OK Obtain certificate thumbprint e Double click on the certificate A Certificate dialog will appear e Select the Details tab and select Thumbprint from the list of fields Th thumbprint will be shown in the bottom text box as a series of hexadecimal numbers Save the thumbprint for later as it is needed to configure the RDP server to us
19. k Next On the Select destination server page leave the Select a server from the server pool option selected select the current server from the Server Pool list and then click Next On the Select server roles page select Active Directory Domain Services If prompted to add required features click Add Features Click Next to continue On the Select features page click Next On the Active Directory Domain Services page click Next On the Confirm installation selections page click Install Wait for the installation to complete and click Close Promoting the server to a domain controller Launch the Server Manager On the top right click Notifications flag icon and then click Promote this server to a domain controller This option is only shown after the installation of the Active Directory Domain Services role and is a post deployment configuration task The Active Directory Domain Services Configuration wizard will appear On the Deployment Configuration page select Add a new forest and enter a FQDN for the domain in the Root domain name field such as lab2 awake local Click Next to continue On the Domain Controller Options page select a Forest functional level and Domain functional level such as Windows Server 2008 R2 Ensure that the functional level you choose is compatible with the rest of your planned infrastructure Leave the Domain Name System DNS server option selected Enter a password in the Password and Confirm p
20. oper test setup to help them in their implementation 1 1 Glossary To be expanded 1 2 References FreeRDP User Manual FreeRDP Developer Manual FreeRDP Testing Manual https github com awakecoding FreeRDP Manuals blob master User FreeRDP User Manual pdf raw true 2https github com awakecoding FreeRDP Manuals blob master Configuration FreeRDP Developer Manual pdf raw true https github com awakecoding FreeRDP Manuals blob master Testing FreeRDP Testing Manual pdf raw true Chapter 2 Network Tracing 2 1 Introduction Network tracing of RDP can be quite a challenge due to a number of factors such as encryption compression and the fact that these protocol features cannot always be disabled or worked around One of the easiest way of decrypting RDP traffic is to configure the server with a self signed certificate for which the private key is known and then use this certificate with a network tracing tool to automatically decrypt the packets 2 2 Certificate Generation The following sections specify how to generate valid certificates that can be used with an RDP server 2 2 1 WinPR For the sake of simplicity a replacement of the commonly used makecert tool has been implemented as part of the WinPR tools as winpr makecert The tool offers the same command line interface as the original makecert and can generate valid RDP certificates In the FreeRDP source tree the winpr makecert executable can b
21. or RD Gateway page enter a name and select Allow users to connect to any computer on the network and click Next Alternatively select Allow users to connect only to computers in the following group to restrict access to a limited set of computers in the internal network On the Introduction to Network Policy and Access Services page click Next On the Select Role Services page leave Network Policy Server selected and click Next On the Introduction to Web Server IIS page click Next On the Select Role Services page leave default options selected and click Next On the Confirm Installation Selections page click Install Wait for the Installation Results page to appear click Close and reboot if necessary to complete the installation process 7 2 Client Configuration 7 2 1 Windows 7 Ensure that both the client and the RD Gateway are on the same network and that the client can connect to the server using its hostname not its IP address In this case the server is called WIN20008R2SP1 The Administrator account is used for both authentication against the gateway and the remote desktop session Configuring Remote Desktop Connection for RD Gateway connection e Launch Remote Desktop Connection mstsc exe e Enter WIN2008R2SP1 in the Computer field and Administrator in the User name field 28 e Click Options at the bottom left of the Remote Desktop Connection window to expand advanced options e In the Advanced tab click Set
22. otocol Configuration Certain protocol features such as encryption and compression can make packet analysis harder 2 5 1 TLS 1 0 Recent versions of Windows like Windows 8 will negotiate TLS 1 2 by default a version of TLS which is not supported by Network Monitor For easier packet decryption it is recommended to force TLS 1 0 to be negotiated by disabling TLS 1 1 and TLS 1 2 on clients that support it 2 5 1 1 Disabling TLS 1 1 HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Control SecurityProviders SCHANNEL Protocols TI Enabled dword 00000000 DisabledByDefault dword 00000001 HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Control SecurityProviders SCHANNEL Protocols Tl Enabled dword 00000000 DisabledByDefault dword 00000001 11 2 5 1 2 Disabling TLS 1 2 HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Control SecurityProviders SCHANNEL Protocols TI Enabled dword 00000000 DisabledByDefault dword 00000001 HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Control SecurityProviders SCHANNEL Protocols Tl Enabled dword 00000000 DisabledByDefault dword 00000001 2 5 2 UDP Transport On Windows 8 and newer disable UDP transport HKEY LOCAL MACHINE SOFTWARE Microsoft Terminal Server Client DisableUDPTransport dword 00000001 2 5 3 Compression To disable compression with mstsc create a rdp file and use the following option compression i 0 With FreeRDP simply do not turn on compression or explicitly tu
23. r command prompt e On the File menu click Add Remove Snap in e In the left pane select Certificates then click Add e When prompted for user account type select Computer account and click Next e In the next dialog leave Local computer as the computer to manage and click Finish e Close the Add or Remove Snap Ins dialog by clicking OK e In the left pane expand Certificates Local Computer e Under Certificates Local Computer expand Personal and then select the Certificates directory e In the right pane you should find your newly generated self signed cer tificate Right click on it point to All Tasks then click Export The Certificate Export Wizard will appear e In the welcome screen click Next e In the Export Private Key screen select Yes export private key and click Next e In the Export File Format screen select Include all certificates in the certification path if possible and Export all extended properties and click Next e In the Password screen enter a password which you will need to use when importing the certificate after it has been exported and then click Next The password is used to protect the private key For testing purposes you may want to use a simple dummy password such as password e In the File to Export screen specify a path and file name for the certificate to be exported Click Next and then Finish A message box should indicate that the certificate has been successfully exported 2 2
24. rn it off either with a rdp file or with the compression command line option If you want to force a specific version of the compression the MaxRdpCompres sionLevel registry key can be used HKEY LOCAL MACHINE SOFTWARE Microsoft Terminal Server Client MaxRdpCompressionLevel dword 00000000 MaxRdpCompressionLevel Protocol Version RDP4 8K RDP5 64K RDP6 64K NCRUSH RDP6 1 XCRUSH RDP8 wo ND MH 12 2 5 4 RDP Security When using RDP security lowering the encryption level may be useful HKEY LOCAL MACHINE SOFTWARE Policies Microsoft Windows NT Terminal Services MinEncryptionLevel dword 00000001 Value Level 0 Low 1 Medium 2 High 2 5 5 Network Level Authentication To disable NLA with mstsc create a rdp file and use the following option enablecredsspsupport i 0 To disable NLA with FreeRDP you can use either the rdp file or the sec nla command line option 2 6 Packet Capturing There are two major packet capturing tools that can be used to capture RDP traffic Network Monitor and Wireshark The former has the advantage of being able to analyze a lot of the protocols of interest but is not supported on non Windows environments The latter is open source and is supported on a wide variety of operating systems but lacks good protocol analyzers for the vast majority of RDP 2 6 1 Message Analyzer Message Analyzer is Microsoft s replacement for the older Network Monitor
25. rts nodes out rdp crt Convert from crt to pfx using OpenSSL openssl pkcsi2 export in rdp crt inkey rdp key nodes out rdp pfx Some tools like Network Monitor s decryption export require a pfx certificate with a password To convert from crt to pfx while adding a password leave the nodes option out openssl pkcs12 export in rdp crt inkey rdp key out rdp pfx 2 4 Certificate Installation Import the certificate Launch MMC as an elevated user can be done from an Administrator command prompt On the File menu click Add Remove Snap in In the left pane select Certificates then click Add When prompted for user account type select Computer account and click Next In the next dialog leave Local computer as the computer to manage and click Finish Close the Add or Remove Snap Ins dialog by clicking OK In the left pane expand Certificates Local Computer Under Certificates Local Computer expand Personal Right click Personal point to All Tasks and click Import The Certificate Import Wizard will appear In the welcome screen click Next In the File to Import screen specify the path to certificate file to import and click Next In the Password screen enter the password that was used to export the certificate select Mark this key as exportable and click Next In the Certificate Store screen select Place all certificates in the following store and select the Personal certificate store Click Next and then Fin
26. te certificates in the pfx file format If you have the Windows DDK installed makecert exe can be found at lt DDK_path gt WinDDK lt version gt bin lt arch gt makecert exe If you have the Windows SDK installed makecert exe can be found at hprogramfiles Microsoft SDKs Windows lt version gt bin makecert exe MakeCert is currently not distributed separately from the Windows DDK or the Windows SDK Since it is a small and stand alone tool it can be easily copied to another machine without the need for installing large software development packages Keeping a copy for later use can therefore save a lot of time when configuring new machines To generate a self signed certificate invoke MakeCert with the following options makecert r pe n CN COMPUTERNAME eku 1 3 6 1 5 5 7 3 1 ss my sr LocalMachine sky COMPUTERNAME expands to the current computer name which is nor mally what you want The name following CN should be the common name of the certificate Choose it wisely because a certificate for which the common name attribute does not match the hostname that the client uses to connect is normally rejected MakeCert generates and import the certificate automatically so do not expect to find a certificate file in the directory from which MakeCert has been executed To get the certificate file you will need to export it from the certificate store e Launch MMC as an elevated user can be done from an Administrato
27. tings in the Connect from anywhere section The RD Gateway Server Settings dialog will appear Under Connection Settings select Use these RD Gateway server settings In the Server name field enter WIN2008R2SP1 and select Ask for password NTLM as the Logon method Unselect the Bypass RD Gateway server for local addresses option to ensure usage of the RD Gateway in a test environment Under Logon settings select Use my RD Gateway credentials for the remote computer Click OK to return to Remote Desktop Connection e Click Connect e In the Windows Security dialog enter your credentials for the Administrator account This dialog should say that the credentials will be used for a list of two computers where one of them is listed as being an RD Gateway server e If you are using a self signed certificate or an untrusted certificate which is most likely the case in a test environment a Remote Desktop Connection warning dialog will inform you that the identity of the RD Gateway cannot be verified Do not click OK since it will abort the connection sequence The certificate needs to be saved and imported in the proper certificate store before we can successfully connect Open the Certificate dialog by clicking View Certificate In the Details tab click Copy to File to open the Certificate Export Wizard In the Welcome to the Certificate Export Wizard page click Next In the Export File Format page select DER encoded binary
28. tool At the time of writing these lines Message Analyzer is still only a beta but it shows a lot of potential Unlike Network Monitor it will support live analysis It also replaces Network Monitor s Network Parser Language NPL with the new Open Parser Notation OPN which is superior is many aspects For instance Message Analyzer will enable extremely precise filters based on protocol message 13 sequencing The usage of a parser language such as OPN also makes writing new parsers vastly easier than Wireshark which uses an impractical C API for parsing Message Analyzer is currently available on the Message Analyzer Connect Site For further information refer to the Microsoft Message Analyzer Operating Guide 2 6 2 Network Monitor 2 6 2 1 Installation Download and install required tools e Network Monitor http blogs technet com b netmon e NMParsers http nmparsers codeplex com e NMDecrypt http nmdecrypt codeplex com Change default parser profile e Launch Network Monitor e On the Tools menu click Options e In the Parsers Profile tab select Windows and click OK 2 6 2 2 Capturing e Launch Network Monitor e Click New Capture on the top menu bar e Click Start on the top menu bar This may take a few seconds wait until the Stop button becomes enabled e Perform tasks generating network traffic of interest and click Stop on the top menu bar 2 6 3 Wireshark 2 6 3 1 Installation Download and install Wir

Download Pdf Manuals

image

Related Search

Related Contents

Betriebsanleitung TG 200 Stand  Zebra Technologies 2824  Sunix USB 3.0 PCI-E  Manual de Instalação v.4    電波時計について 標準電波について 時計の掛け方について  

Copyright © All rights reserved.
Failed to retrieve file