ms14-068 is pretty scary and kind of dwarfs it in my mind. From: [email protected] [mailto:[email protected]] On Behalf Of Steven Peck Sent: Tuesday, November 18, 2014 11:54 AM To: [email protected] Subject: Re: [NTSysADM] Problems with the schannel update?
By and large we didn’t have issues with the patch on Windows products, but we have some 3rd party products that do LDAP look ups against our DCs and those all pretty much broke so we had to take it off the DC’s. It stayed on on everything else. With the out of band and the rerelease, we are putting it in our dev and test environments tonight and tomorrow and all of production in the next few days Sent from Windows Mail From: Free, Bob<mailto:[email protected]> Sent: Tuesday, November 18, 2014 11:21 AM To: [email protected]<mailto:[email protected]> https://technet.microsoft.com/en-us/library/security/ms14-066.aspx<https://urldefense.proofpoint.com/v2/url?u=https-3A__technet.microsoft.com_en-2Dus_library_security_ms14-2D066.aspx&d=AAMGaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=ZCo55VIzGTZKTlAJZBu6BRqfJDCdVSQZp0HSyKTBvcI&s=nqrtJsuUB-OR6gSyX_nwjDB7UWNtAXT7uAaVGlesK7Y&e=> V2.0 (November 18, 2014): Bulletin revised to announce the reoffering of the 2992611 update to systems running Windows Server 2008 R2 and Windows Server 2012. The reoffering addresses known issues that a small number of customers experienced with the new TLS cipher suites that were included in the original release. --> Customers running Windows Server 2008 R2 or Windows Server 2012 who installed the 2992611 update prior to the November 18 reoffering should reapply the update. See Microsoft Knowledge Base Article 2992611 for more information. -----Original Message----- From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Free, Bob Sent: Tuesday, November 18, 2014 11:03 AM To: [email protected]<mailto:[email protected]> Subject: RE: [NTSysADM] Problems with the schannel update? Disclaimer: This is all YMMV, Caveat emptor but I thought I'd share what I dug up. --As I was preparing to send I see the bulletin has been re-released as expected so much of this is likely moot. My understanding is that at least one of the roots of the root of the problem is the new cipher suites that were added at the top of the default priority order and only supported on 8.1 and 2012R2, The new Ciphers included in MS14-066 / KB 2992611: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_128_GCM_SHA256 I started poking around Friday and found it's in the fine print in the security bulletin and the KB below. I think some bulletins / links are being updated as I can't find some of the info I saw Friday 'Update adds new TLS cipher suites and changes cipher suite priorities in Windows 8.1 and Windows Server 2012 R2' - https://urldefense.proofpoint.com/v2/url?u=http-3A__support2.microsoft.com_kb_2929781&d=AAICaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=-VFPlb4m8Kw_JH5V49A_wiBAZVQhtxxoGZfNeVNIwhE&s=8SrNqDPGaGU_Pmt50yxQ1km4JILGOMl7L_RXYuyxehk&e= There's a GPO that I believe is relevant but I haven't had time to test- How to Prioritize Schannel Cipher Suites with Group Policy https://urldefense.proofpoint.com/v2/url?u=http-3A__msdn.microsoft.com_en-2Dus_library_windows_desktop_bb870930-28v-3Dvs.85-29.aspx&d=AAICaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=-VFPlb4m8Kw_JH5V49A_wiBAZVQhtxxoGZfNeVNIwhE&s=xGcNot-gnq5BxzuCLU8jxOnrTiAAYz-Xw12bxMnDo_U&e= Also a lot of background info on the topic here: https://urldefense.proofpoint.com/v2/url?u=http-3A__www.wilderssecurity.com_threads_changing-2Dies-2Dssl-2Dcipher-2Dorder.355446_&d=AAICaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=-VFPlb4m8Kw_JH5V49A_wiBAZVQhtxxoGZfNeVNIwhE&s=sYqOKx1BukIAXuw9Qw1rliSiNeTX6OAz4uT0tG0xvvw&e= You check out the order on a client here here: https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ssllabs.com_ssltest_viewMyClient.html&d=AAICaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=-VFPlb4m8Kw_JH5V49A_wiBAZVQhtxxoGZfNeVNIwhE&s=mqqiX9MzMoeaN9WXocjBHSiJFg0ezqy8eDFmKNijR50&e= >From the GPO help- Determines the cipher suites used by the Secure Socket Layer (SSL). **If this setting is enabled, SSL cipher suites will be prioritized in the order specified** <---understood to be default pre-patch settings. If this setting is disabled or not configured, the factory default cipher suite order will be used. SSL2, SSL3, TLS 1.0 and TLS 1.1 cipher suites: TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_3DES_EDE_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P521 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P521 TLS_DHE_DSS_WITH_AES_128_CBC_SHA TLS_DHE_DSS_WITH_AES_256_CBC_SHA TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_RSA_WITH_RC4_128_MD5 SSL_CK_RC4_128_WITH_MD5 SSL_CK_DES_192_EDE3_CBC_WITH_MD5 TLS_RSA_WITH_NULL_SHA TLS_RSA_WITH_NULL_MD5 TLS 1.2 SHA256 and SHA384 cipher suites: TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_NULL_SHA256 TLS 1.2 ECC GCM cipher suites: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521 -----Original Message----- From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Rod Trent Sent: Monday, November 17, 2014 7:27 AM To: [email protected]<mailto:[email protected]> Subject: RE: [NTSysADM] Problems with the schannel update? Several reports... https://urldefense.proofpoint.com/v2/url?u=http-3A__windowsitpro.com_security_ms14-2D066-2Dmonths-2Dproblem-2Dpatch&d=AAIFaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=euSWtoPm9w6aOJW4SG9MYSZgXyuH05qjnpvfh_n6r9Y&s=imX3Mme12wtdK4MXrIa3K9wF_gx4PCANnTS9GKsHLrc&e= -----Original Message----- From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Kennedy, Jim Sent: Monday, November 17, 2014 10:10 AM To: [email protected]<mailto:[email protected]> Subject: RE: [NTSysADM] Problems with the schannel update? Not personally but I have seen a good number of reports on it. Amazons AWS got hit pretty hard with it I have heard. -----Original Message----- From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Michael Leone Sent: Monday, November 17, 2014 10:07 AM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] Problems with the schannel update? We haven't noticed anything yet. Anybody else? https://urldefense.proofpoint.com/v2/url?u=http-3A__www.zdnet.com_microsoft-2Dwarns-2Dof-2Dproblems-2Dwith-2Dschannel-2Dsecurity-2Dupdate-2D7000035835_-3Fs-5Fcid-3De539-26ttag-3De539-26ftag-3DTRE17cfd61&d=AAIFaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=euSWtoPm9w6aOJW4SG9MYSZgXyuH05qjnpvfh_n6r9Y&s=hZcO4_-oEd-cmYbm4or4LkelfsR6Dbd75CwkW57kD5w&e= PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/ PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/ PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/

