TLS 1.2 connections for the Payment Processor - ssl

Payment is requesting all traffic we sent to them be TLS 1.2, they are complaining now that we’re using TSL 1.0. For this
The first thing i did was, I have created a Windows 2012 R2 EC2 instance. In the regitry I have added the following under
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL:
In protocols,
I have created the keys along with Dword,
SSL 2.0 (Client (disabled) server(Enabled),
SSL 3.0 (Client (disabled) server(Enabled),
TLS 1.1 (client (disabled)-server(Enabled)),
TLS 1.2 (client (Enabled)- server(Enabled))
After doing this, I restarted the server. Once i restarted, the RDP could able to connect to the server after making the changes. ( I stucked up here)
enter image description here

Assuming you are using .NET, you'll need to tell it to use the settings in SCHANNEL. Depending on your .NET version, it'll be something like:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\v2.0.50727] "SystemDefaultTlsVersions"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft.NETFramework\v2.0.50727] "SystemDefaultTlsVersions"=dword:00000001
Alternatively, you could also use the "SchUseStrongCrypto" key or hard-code the values in ServicePointManager.SecurityProtocol.
Additional info:
https://support.microsoft.com/en-us/kb/3135244
https://blogs.msdn.microsoft.com/dataaccesstechnologies/2016/07/12/enable-tls-1-2-protocol-for-reporting-services-with-custom-net-application/#comment-3335

Related

Get TLS version from the client(browser) that makes request to tomcat server

I have java app deployed to tomcat server 8.5.32.
I configured the server to use only TLS 1.2 so if the user send a request to the app(tomcat server) using browser and the browser is old(supports only TLS 1.0 and TLS 1.1) then i want to know that someone tries to reach my app but no handshake is made and I want to make a record in DB.
Is there any way I can know that client is using TLS version that my server is not supporting it and somehow get that info what is the TLS version of the client? OR at least to know that client is using older TLS version?

Remote Desktop SSL Nessus Vulnerability 2008R2

I have TLS 1.0 completely disabled in the Registry. However Nessus still returns an SSL vulnerability for port 3389 which is Remote Desktop. Specifically the certificate.
Why does this come up when TLS 1.0 is turned off?
What is the best option to remediate this?
- Create my own self signed certificate?
- Purchase a certificate
I do realize that 2008 r2 is running out of even extended support. However, it will be a year before we're able to replace the servers. So I'm stuck with patching it the best I can.
I just don't understand why this is an issue with TLS 1.0 turned of.
Thanks in advance for any advice rendered.
Disable TLS 1.0 registry value and there appropriate sub-key value (Client, Server and Protocols)
Generally registry entry does not exist in the registry by default. so create entry and change the DWORD value to 0 for all sub-Key.
Registry location: HKLM SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0
Also Enable TLS 1.2 and disable SSL 2.0 and 3.0 in the Registry.
For more information refer this link https://docs.ukfast.co.uk/operatingsystems/windows/rdp/rdptls.html

How to force WebLogic 10.3.2.0 to use TLS v1.0 minimum?

Having trouble with chrome v 4x.xx and WebLogic not automatically handshaking via tls 1.0 minimum. While calling a RESTful service from JavaScript front end I keep getting net::ERR_SSL_FALLBACK_BEYOND_MINIMUM_VERSION since Google have dropped support for SSL V3.0. I have tried adding the flag forcing this to JAVA_OPTIONS and on another occasion to the starting arguments for WebLogic, despite knowing these only become suported in 10.3.6. Is there another way?
So it turns out WebLogic 10.3.2.0 has a bug in it. When the client makes contact with the server for the first time it tells the server which SSL/TLS certificate version it supports - UP TO. The latest Chrome I believe supports TLS v1.2, so this is the only information sent to WebLogic. WebLogic has problems recognising that 1.2 is greater than 1.0, (which is the highest version available on WebLogic 10.3.2.0 (AFAIK, it is on ours) and should therefore be trusted, so terminates the connection.
source - https://productforums.google.com/forum/#!topic/chrome/iwX2PbNGk8E

Background Intelligent Transfer and TLS 1.2

I have a .NET application that uses the Background Intelligent Transfer service to upload files from a client Windows 7 X64 machine to a Windows 2012 R2 server. The server is locked down for TLS 1.2 for compliance with PCI 3.1, i.e. protocols SSL 2.0/3.0, TLS 1.0/1.1 have been explicitly disabled in the reigstry using IISCrypto and TLS 1.2 enabled. The client has a trusted Root CA certificate for the server installed on it.
The application uses the IBackgroundCopyManager and IBackgroundCopyJob COM interfaces to create the job and add it to the queue. In the Bits-Client event log, I see the following warning after it has started the the transfer (note that addresses and filenames are for illustrative purposes only):
BITS stopped transferring the test.tmp transfer job that is associated with the https://server/folder/temp.tmp URL. The status code is 0x80072EFE
The error code translates to:
ERROR_WINHTTP_CONNECTION_ERROR
12030
The connection with the server has been reset or terminated, or an incompatible SSL protocol was encountered. For example, WinHTTP version 5.1 does not support SSL2 unless the client specifically enables it.
This makes sense, as I can see in Wireshark that the BITS request is only ever trying to use TLS 1.0 in the handshake protocol with the server and this has been disabled.
My question is therefore: is it possible to enable the use of TLS 1.2 by the Bits-Client and if so, how is it done?
The COM interface does not provide any methods to set the protocol used and I cannot see anything in the registry settings for the BITS service either. It is definitely not a certificate issue as the transfers work as soon as TLS 1.0 is enabled on the server.
BITS goes over WinHTTP and uses the default WINHTTP_OPTION_SECURE_PROTOCOLS. The problem is that your client is running Windows 7. From MSDN:
By default only SSL3 and TLS1 are enabled in Windows 7 and Windows 8. By default only SSL3, TLS1.0, TLS1.1, and TLS1.2 are enabled in Windows 8.1 and Windows 10
See this support article for instructions on how to enable TLS 1.1 and TLS 1.2 on Windows 7 machines: https://support.microsoft.com/en-us/help/3140245/update-to-enable-tls-1-1-and-tls-1-2-as-a-default-secure-protocols-in

enable TLS 1.0 in windows server 2008

Our production server is running on Windows Server 2008 and currently has SSL 2.0 enabled. We are looking to migrate to TLS 1.0 protocol, we did find some help online as how to disable SSL and enable TLS 1.0 in the registry. We have various LIVE applications configured in our IIS and we would like to test this migration per application basis. I assume enabling TLS in the registry would affect all the applications in the Application Pool. My question is, is there a way to disable SSL and enable TLS for a single application, test it and then propagate it to all the applications?