https://technet.microsoft.com/en-us/library/security/ms14-066.aspx


V2.0 (November 18, 2014): Bulletin revised to announce the reoffering of the 
2992611 update to systems running Windows Server 2008 R2 and Windows Server 
2012. The reoffering addresses known issues that a small number of customers 
experienced with the new TLS cipher suites that were included in the original 
release.

-->  Customers running Windows Server 2008 R2 or Windows Server 2012 who 
installed the 2992611 update prior to the November 18 reoffering should reapply 
the update. See Microsoft Knowledge Base Article 2992611 for more information.

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Free, Bob
Sent: Tuesday, November 18, 2014 11:03 AM
To: [email protected]
Subject: RE: [NTSysADM] Problems with the schannel update?

Disclaimer: This is all YMMV,  Caveat emptor but I thought I'd share what I dug 
up.

--As I was preparing to send I see the bulletin has been re-released as 
expected so much of this is likely moot.

My understanding is that at least one of the roots of the root of the problem 
is the new cipher suites that were added at the top of the default priority 
order and only supported on 8.1 and 2012R2, 

The new Ciphers included in MS14-066 / KB 2992611:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256

I started poking around Friday and found it's in the fine print in the security 
bulletin and the KB below. I think some bulletins / links are being updated as 
I can't find some of the info I saw Friday

'Update adds new TLS cipher suites and changes cipher suite priorities in 
Windows 8.1 and Windows Server 2012 R2' - 
https://urldefense.proofpoint.com/v2/url?u=http-3A__support2.microsoft.com_kb_2929781&d=AAICaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=-VFPlb4m8Kw_JH5V49A_wiBAZVQhtxxoGZfNeVNIwhE&s=8SrNqDPGaGU_Pmt50yxQ1km4JILGOMl7L_RXYuyxehk&e=
 

There's a GPO that I believe is relevant but I haven't had time to test-

How to Prioritize Schannel Cipher Suites with Group Policy  
https://urldefense.proofpoint.com/v2/url?u=http-3A__msdn.microsoft.com_en-2Dus_library_windows_desktop_bb870930-28v-3Dvs.85-29.aspx&d=AAICaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=-VFPlb4m8Kw_JH5V49A_wiBAZVQhtxxoGZfNeVNIwhE&s=xGcNot-gnq5BxzuCLU8jxOnrTiAAYz-Xw12bxMnDo_U&e=
 

 Also a lot of background info on the topic here: 
https://urldefense.proofpoint.com/v2/url?u=http-3A__www.wilderssecurity.com_threads_changing-2Dies-2Dssl-2Dcipher-2Dorder.355446_&d=AAICaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=-VFPlb4m8Kw_JH5V49A_wiBAZVQhtxxoGZfNeVNIwhE&s=sYqOKx1BukIAXuw9Qw1rliSiNeTX6OAz4uT0tG0xvvw&e=
 

You check out the order on a client here here:  
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ssllabs.com_ssltest_viewMyClient.html&d=AAICaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=-VFPlb4m8Kw_JH5V49A_wiBAZVQhtxxoGZfNeVNIwhE&s=mqqiX9MzMoeaN9WXocjBHSiJFg0ezqy8eDFmKNijR50&e=
 


>From the GPO help-

Determines the cipher suites used by the Secure Socket Layer (SSL).

**If this setting is enabled, SSL cipher suites will be prioritized in the 
order specified**  <---understood to be default pre-patch settings. 

If this setting is disabled or not configured, the factory default cipher suite 
order will be used.

SSL2, SSL3, TLS 1.0 and TLS 1.1 cipher suites:

TLS_RSA_WITH_AES_128_CBC_SHA                 
TLS_RSA_WITH_AES_256_CBC_SHA                 
TLS_RSA_WITH_RC4_128_SHA                     
TLS_RSA_WITH_3DES_EDE_CBC_SHA                
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256      
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384      
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521      
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256      
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384       
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256    
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384    
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P521    
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256    
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384    
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P521    
TLS_DHE_DSS_WITH_AES_128_CBC_SHA             
TLS_DHE_DSS_WITH_AES_256_CBC_SHA              
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_RC4_128_MD5                                       
SSL_CK_RC4_128_WITH_MD5                      
SSL_CK_DES_192_EDE3_CBC_WITH_MD5             
TLS_RSA_WITH_NULL_SHA
TLS_RSA_WITH_NULL_MD5                        

TLS 1.2 SHA256 and SHA384 cipher suites:

TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_NULL_SHA256

TLS 1.2 ECC GCM cipher suites:

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521



-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Rod Trent
Sent: Monday, November 17, 2014 7:27 AM
To: [email protected]
Subject: RE: [NTSysADM] Problems with the schannel update?

Several reports...

https://urldefense.proofpoint.com/v2/url?u=http-3A__windowsitpro.com_security_ms14-2D066-2Dmonths-2Dproblem-2Dpatch&d=AAIFaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=euSWtoPm9w6aOJW4SG9MYSZgXyuH05qjnpvfh_n6r9Y&s=imX3Mme12wtdK4MXrIa3K9wF_gx4PCANnTS9GKsHLrc&e=
  

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Kennedy, Jim
Sent: Monday, November 17, 2014 10:10 AM
To: [email protected]
Subject: RE: [NTSysADM] Problems with the schannel update?

Not personally but I have seen a good number of reports on it.  Amazons AWS got 
hit pretty hard with it I have heard.

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Michael Leone
Sent: Monday, November 17, 2014 10:07 AM
To: [email protected]
Subject: [NTSysADM] Problems with the schannel update?

We haven't noticed anything yet. Anybody else?

https://urldefense.proofpoint.com/v2/url?u=http-3A__www.zdnet.com_microsoft-2Dwarns-2Dof-2Dproblems-2Dwith-2Dschannel-2Dsecurity-2Dupdate-2D7000035835_-3Fs-5Fcid-3De539-26ttag-3De539-26ftag-3DTRE17cfd61&d=AAIFaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=euSWtoPm9w6aOJW4SG9MYSZgXyuH05qjnpvfh_n6r9Y&s=hZcO4_-oEd-cmYbm4or4LkelfsR6Dbd75CwkW57kD5w&e=
 









PG&E is committed to protecting our customers' privacy. 
To learn more, please visit http://www.pge.com/about/company/privacy/customer/




PG&E is committed to protecting our customers' privacy. 
To learn more, please visit http://www.pge.com/about/company/privacy/customer/


Reply via email to