Installing Citrix Receiver on Ubuntu 12.04

Citrix Receiver is a useful cross-platform tool for accessing programs and files on other networks. My university uses Citrix for their desktopAnywhere service but only provides support for MacOS and Windows which is a pain because installing Citrix on Ubuntu is not quite smooth sailing. So here’s a quick guide to cover install and all the hurdles I went through trying to set it up.

1. Download your packages

You can find all the files for Citrix Receiver on the Citrix website in various different flavours. 64 bit packages are at the bottom of the page. Be aware of the file type you’re downloading; Ubuntu users will want to download the .deb files. You can also download the USB Support Package which gives Citrix the ability to read and write from your USB flash drives during a session.

Note: If you’re unsure about which package you need, x86 (32 bit) or x86_64 (64 bit), then run the command uname -i in terminal and you’ll see the arch type of your machine.

Download Options

OpenMotif is required for the graphical configuration menu of Citrix Receiver but not required for general use so we won’t bother with it for the time being.

2. Installing your packages

Due to a few prompts that may pop up during installation, it’d be best to install through the command line. There’s also a bug that prevents successful installation on 64 bit systems so there’s two ways to go about this.

32 bit: Open the terminal and find where you downloaded the files, for me that was Downloads, and install with dpkg as such:

~$ cd Downloads
~/Downloads$ sudo dpkg -i icaclient-12.1.0_i386.deb

Use the same command to install the USB support package if you wish to do so.

~$ sudo dpkg -i ctxusb-2.2.0_i386.deb

64 bit: Open the terminal and find where you downloaded the files, for me that was Downloads, and we want to partially install with dpkg as such:

~$ cd Downloads
~/Downloads$ sudo dpkg --unpack icaclient-12.1.0_amd64.deb

This unpacks the .deb file but doesn’t configure it. The reason for this is an error in the installation script that fails to detect the system type leading to this message appearing:

Unpacking icaclient (from .../icaclient_12.1.0_amd64.deb) ... Setting up icaclient (12.1.0) ... dpkg: error processing icaclient (--install): subprocess installed post-installation script returned error exit status 2 Processing triggers for menu ... Errors were encountered while processing: icaclient

Open your favourite text editor (gedit will do) and find icaclient.postinst in the directory /var/lib/dpkg/info/

~$ sudo gedit /var/lib/dpkg/info/icaclient.postinst

It’s a bit of a long file but you want to find the text near line 2648 that reads

echo $Arch|grep "i[0-9]86" >/dev/null

Replace that line with this

echo $Arch|grep -E "i[0-9]86|x86_64" >/dev/null

How the text should appear.

Save the file and finally, run this command to configure the package.

~$ sudo dpkg --configure icaclient

ICA client should be installed. Should you wish, you can also take this opportunity to install USB support in the same way by using dpkg -i <filename here>.

3. Supplying authentication certificates.

The Citrix Client does not supply many of it’s own SSL certificates for secure connection authentication, fortunately for Ubuntu users – Firefox does! You can use the following command to copy them over.

~$ sudo cp /usr/share/ca-certificates/mozilla/* /usr/lib/ICAClient/keystore/cacerts/

Any specific CA certificates that your Citrix admin requires can be placed in that folder too. If you get the error You have not chosen to trust “<name here>“, the issuer of the server’s security certificate. then you’ll need to place the appropriate CA certificate in the /usr/lib/ICAClient/keystore/cacerts/ directory.

4. Give it a go!

I’d had a few issues installing the Citrix Receiver onto 64 bit Ubuntu but following those worked for me and… voilà!

Citrix Receiver running on Ubuntu 12.04 x64

Is hacktivism a genuine form of protest?

Cross-post, originally published on ORG-Zine.

In the online age of uncertain digital rights, it’s crucial for individuals to take a stand and raise awareness of the issues that affect all of us online. There’s several ways within the online world to demonstrate and raise awareness of causes such as e-petitions or social networking groups, but one of the more controversial methods is hacktivism. The term hacktivism is a portmanteau of the wordshacker and activist which tends to refer to the use of unauthorised computer access to further an agenda, usually political or social. Hacktivism itself can be a fairly dubious issue, for all the power it can grant hackers of varying shades of grey, it could potentially be an effective tool for promoting an important agenda.

Is hacktivism effective?

It’s very difficult for activists in small numbers to bring awareness to the issues that they campaign against. It’s tempting for activists to pull stunts in order to raise awareness of their cause; take the instance of Eddie Gorecki and Jonathan Stanesby, two members of Fathers 4 Justice, who scaled the Royal Courts of Justice dressed as Batman and Robin. Their protest managed to gain national recognition in the press, which rather successfully raised their profile. Days later two-thousand supporters marched in London with a tank!

So perhaps hacktivism is just that – the gimmick that raises the profile of a cause. Anonymous hacktivists have used the Low Orbit Ion Cannon (LOIC), a tool for Distributed Denial of Service (DDoS) attacks, to take down several websites of organisations supporting the Stop Online Piracy Act. The Department of Justice website was taken down as well as those owned by the FBI, MPAA, RIAA. Was it effective? Well SOPA failed, didn’t it?

That said, I wouldn’t attribute the success of the anti-SOPA campaign to Anonymous taking down websites. At most, I could imagine people trying to access those sites being irritated that “heir internet isn’t working properly.” Many of the examples of hacktivism I’ve seen are preaching to the converted; this style of hacktivism does not seem to do much to engage with the public beyond creating momentary annoyances.

I believe that most of the attention to the anti-SOPA campaign came from the blackout of prominent websites such as Wikipedia, Reddit and Craigslist. This seemed a brilliant strategy to confront end-users with the effects of censorship, perhaps more-so than a ‘500 Internal Error’ web page.

However, aside from black-outs, there is also the case of internet vigilantes such as ‘The Jester’ who put a lot of effort into disrupting the websites of alleged terrorist organisations. As of late, he’s also helped to put behind bars several ‘script-kiddies’ who disrupted the UK anti-terrorist hotline as well as disrupt the activities of Anonymous group LulzSec. If there’s such a thing as hacktivism in action – that’s it!

Is hacktivism ethical?

On the face of it, a lot of DDoS attacks can seem to simply be retaliation – an eye for an eye. I’ve never been comfortable with that stance. To me, activism should be about rectification rather than revenge. So can hacktivism ethically meet this criteria?

It could be seen that hacktivism in the form of website take-downs and take-overs is a method of censorship. Denying access to information from groups with opposing viewpoints could be seen as dodgy behaviour, however I’m not ready to brand this as censorship. I feel that censorship is a very strong term describing the suppression of ideas; this sort of website blocking is more comparable to graffiti than book burning. These actions often take websites offline for a few hours, nothing serious enough to cause lasting damage but just enough to raise attention to a cause. Consider as well that this behaviour could be a form of disobedience in refusing to accept services as-is; that perhaps attacks like these are comparable to blockading buildings like the recent protest in Mexico against biased TV reporting or even the Occupy movement.

It’s easy enough to imagine however that the owners of these websites won’t see having their own content effectively blocked as a legitimate act of protest. It’d be all too easy for groups of organised hackers to pick on somebody whose livelihood depends on their web presence. It’s unlikely to be that bad; targets of hacktivist attacks tend to be large multi-national corporations like Visa, to whom a few angry nerds with a DDoS script pose little risk. But the key question as to whether these attacks are justified does not have a blanket answer; it will always depend on the specific case.

A tactic that certainly should be of concern to digital rights campaigners is document droppingor as it’s referred to: “dox drops”. This is the practise of hackers stealing personal, or otherwise private, information pertaining to individuals and publishing it to the web. Personal details of executives of the pro-copyright lobby were published to the world as part of Anonymous’Operation Payback. Clearly that was a breach of individual privacy and served no purpose for pursuing an agenda, other than an incitement of retaliation.

I feel this comes down to an argument of “does the ends justify the means?” If we consider that using hacktivist methods could disrupt terrorist networks or promote a particular cause or ideology, are we willing to accept that it’s ok? At the end of the day, hacktivists have to accept that it’s as important for those they disagree with to share their opinion as it is for those they oppose.

So is hacktivism a genuine form of protest?

I’ve spent a while thinking about this but I believe that yes, hacktivism is a genuine form of protest. Clearly from the attention that has been given to causes utilising hacktivist methods it seems fair to say that hacktivism can be effective. I find it debateable though as to whether hacktivist methods can create sympathy for a cause, it’s difficult to ascertain the helpfulness of hacktivism for a particular cause. I do believe that it is entirely possible for hacktivist methods to be used in a justified and ethical way.

The serious nature of hacktivism necessitates that it be one of the final options of protest for when all other methods have failed. It’s a rather aggressive tactic that’s more likely to intimidate and aggravate rather than promote progressive discourse between two parties. Failing that, clever clogs hackers will no doubt find a way to promote their message.