Enables TLS 1.1 and 1.2 on Windows Server 2k8 (non R2) - windows-server-2008

Has anyone been able to get TLS 1.1 or TLS 1.2 working on Windows 2k8 SP2 (non R2). The support just recently came out Microsoft Support. I have gone through installed the updated and did the registry entries and it doesn't appear to be enabled. Is there a way to check with out just looking at registry entries?

You could use https://www.ssllabs.com/ssltest to test that your IIS configuration has been updated.
The Security tab under Chrome's developer tools will also indicate what protocol, key exchange, and cipher suite are used.

Related

Rs.exe fails to publish reports when SSL is disabled

I am using Rs.exe for automatic deployment of report files. When older versions of SSL and TLS are disabled , and only TLS 1.2 is enabled. Deployments are failing.
I am getting below error:
Could not connect to server: https://ServerName/reportserver/ReportService2010.asmx
Things I tried:
I added following registry entries as per
https://social.msdn.microsoft.com/Forums/sqlserver/en-US/cc1cc0c5-65d0-48ac-a0b4-a689b9e6a2bd/2016-report-builder-connection-difficulty-with-tls-12-only-?forum=sqlreportingservices
Still no luck :(
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\v4.0.30319]
"SchUseStrongCrypto"=dword:00000001
"SystemDefaultTlsVersions"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft.NETFramework\v4.0.30319]
"SchUseStrongCrypto"=dword:00000001
"SystemDefaultTlsVersions"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions"=dword:00000001
OS - Windows Server 2016
SQL - SQL Server 2016
.NET framework - 4.7.1
Proper certificate is installed in server.
https://ServerName/reportserver is accessible in browser.
All valid configurations are done in RS Configuration Manager
Any help would be appreciated. Thank You!

Disable TLS below version TLSv1.2 everywhere in infrastructure

In the infrastructure we've got following machines:
1. Websphere application server (on SUSE Linux Enterprise Server 12 SP4)
2. DB2 server (on SUSE Linux Enterprise Server 12 SP4)
Customer wants to deactivate the TLS 1.1 and below everywhere within the infrastructure.
I know where to disable it in WAS Admin console on server 1, but I don't know where to disable it in other places. Please advice. Thank you!
You need to set the Db2 instance configuration parameter ssl_versions to TLSv12. For example, when using the command line processor, while logged in as the instance owner:
db2 update dbm cfg using ssl_versions TLSv12
You will need to restart the instance for the change to take effect.
Reference

Check TLS1.2 for SQL Server Connection

I want to check if the connection between my application and SQL Server is used TLS1.2.
I disabled TLS1.2 but the connection still happened. I checked via wireshark and saw nothing about TLS1.2.
Please tell us whether your SQL Server is 2012 as the tag displayed. If so, firstly, please check whether the patch for enabling TLS 1.2 is installed.
Next please check whether the update for client components and drivers are installed.
Please refer to the article: TLS 1.2 support for Microsoft SQL Server.
SQL Server in Windows also supports TLS1.0 and TLS1.1. If you want to use only TLS 1.2 for client-server communication, please disable TLS 1.0 and 1.1.
Please try to disable TLS1.0 1.1 and 1.2, then reboot your machine and test whether the connection can do well.
By the way, you can see the blog to verify if a connection to SQL Server is Encrypted.

SQL Server 2012 Compatibility with New TLS 1.2 Standards

I'm trying to switch off TLS 1.0 on my SQL Server 2012 server in order to comply with PCI standards.
Initially I had some trouble with the SQL Server service not starting.
I've found help online on other sites and discussions but I'm having mixed results:
This is what I've done so far:
I have downloaded SQL Server 2012 Cumulative Update 7 (CU 6 also works) and the SQL Server Service then starts correctly.
I had a problem not being able to sign in to the DB instance through SQL Server Enterprise Manager which was fixed by installing .Net 4.6.
Next problem, client computer running IIS Application is unable to connect to SQL instance because of a 'handshaking SSL error'. I followed advice and installed the latest SNAC native client.
This was difficult to track down and the latest version available as a download from Microsoft was from 2014. I then obtained sqlnclient.msi dated 9/7/2015 revision number {E6CB4138-3D1C-4ADC-95C4-88322B60FC14} from a sub folder generated by the extract of CU 7 - "Path to Extract Folder \1033_enu_lp\x64\setup\x64".
I've updated this version of the Native client on my IIS server (and .Net 4.6) and I'm still unable to connect remotely to the SQL instance. If I enable TLS 1.0 I'm able to connect.
The exact error I'm getting is 'A connection was sucessfully established with the server, but then an error occurred during the pre-login handshake'.
My diagnosis is I don't have the correct version of SNAC on my machine compatible with TLS 1.2 and the CU 7 as the client and server cannot handshake. However, this sqlnclient.msi was extracted from the CU 7 and I cannot find a more up to date copy.
Has anyone else experienced this problem? What version of the SNAC are you using? Where did you get it?
Thanks
As of January 29th, Microsoft SQL Server supports TLS 1.2 for SQL Server 2008, SQL Server 2008 R2, SQL Server 2012 and SQL Server 2014 and major client drivers like Server Native Client, Microsoft ODBC Driver for SQL Server, Microsoft JDBC Driver for SQL Server and ADO.NET (SqlClient).
Blog post about the release: http://blogs.msdn.com/b/sqlreleaseservices/archive/2016/01/29/tls-1-2-support-for-sql-server-2008-2008-r2-2012-and-2014.aspx
List of builds that support TLS 1.2 along with the client and server component download locations (KB3135244): http://support.microsoft.com/kb/3135244
Did you get the client update from the KB (https://support.microsoft.com/en-us/kb/3052468)
Package name: 2012_SP2_SNAC_CU6_3052468_11_0_5592_x64
Download link: http://support2.microsoft.com/hotfix/KBHotfix.aspx?kbnum=3052468&kbln=en-us
What is the provider name in your IIS site?
You will need the KB3052468 update both for the client and the server. They are available on the hotfix download link provided.

Disable SSL 3.0 Windows CE Web Server

I have web server running on a few devices running a few versions of Windows CE. One is CE 5.0 and the other is CE 6.0 R3.
I have a tool that can check to see if a server supports TLS and SSL and which versions. I can see that both of the web servers support TLS 1.0 and SSL 3.0. I can see from this site:
http://msdn.microsoft.com/en-us/library/ms900411.aspx
that I can disable SSL, but when I do that it also disables TLS 1.0. Is there a way to turn off SSL 3.0 without turning off TLS?
I also tried what works on Windows Server, but that didn't help either:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server]
"Enabled"=dword:00000000
this link might help:
Authentication Services Registry Settings (Windows CE 5.0)