back to article Microsoft calls time on ancient TLS in Windows, breaking own stuff in the process

Microsoft has reminded users that TLS 1.0 and 1.1 will soon be disabled by default in Windows. While home users of Windows are unlikely to notice many issues, Microsoft warned that choppy waters could lie ahead for enterprise administrators. It published a non-exhaustive list of applications that it said were "expected to be …

  1. Bruce Ordway

    protocols were disabled by default

    I need it to keep some older "stuff" working so am already in the habit of re-enabling TLS versions on Windows and Linux.

    But... that's just a few personal PC's on my home LAN.

    For enterprises I'd be a little more concerned...

    1. Paul Crawford Silver badge

      Re: protocols were disabled by default

      For enterprises I'd be a little more concerned...

      I would hope, but don't expect, that enterprise systems would properly segment the network so such legacy TLS systems are not facing the world or those machines used for web/email access.

      1. Strahd Ivarius Silver badge
        Facepalm

        Re: protocols were disabled by default

        sweet summer child...

      2. Mostly Irrelevant

        Re: protocols were disabled by default

        *maniacal laugh*

        Enterprises are the least competent of all, at least for their internal systems. They don't update until forced... and sometimes not until it breaks.

        1. Anonymous Coward
          Anonymous Coward

          Re: protocols were disabled by default

          >Enterprises are the least competent of all, at least for their internal systems. They don't update until forced... and sometimes not until it breaks.

          Having done this for a reasonably sized UK government arm a few years ago, the problems wasn't that we couldn't update, but that some of the "Enterprise" software wasn't compatible with anything *above* TLS 1.0 or able to use more than one domain controller for authentication. Disabling older TLS on that DC caused quite a sizeable P1...

      3. fajensen
        Coffee/keyboard

        Re: protocols were disabled by default

        I would hope, but don't expect, that enterprise systems

        May they never change and I hope can keep doubling my normal salary just by being on-call and fixing stupid stuff that should never happen.

        ... But still does, because the stakes are so high that nobody can accumulate the authority to do anything about any of it, which is by design. The whole decision making process is like in the old USSR: All 5-year plans, done by 500-people commitees, and you will still get shot for doing anything or nohing at all, depending on the mood of the CEO.

        1. Ignazio

          Re: protocols were disabled by default

          It's never a priority no matter how loud the techies shout, until there's a breach and then it's endless meetings on "how did it happen", "what do we do" and "what can WE ALL learn from this"

    2. Anonymous Coward
      Anonymous Coward

      Re: protocols were disabled by default

      The problem is that the people holding the purse strings don't seem to understand that these things happen in a way that you, the techie, can't control.

      Give them a choice of not being secure while using WAN services vs. not being able to talk to that piece of legacy hardware that you've been asking to replace for years but they won't stump up the money, and they will choose internet security, and expect you to just fix it!

      Fortunately, where I am (which is actually quite a sensitive environment), it finally looks like they will finally fund the replacement of the tape libraries and management consoles that are running code so old it's fallen off the suppliers compatibility matrix!

      Hopefully.

      Pretty Please?

    3. Anonymous Coward
      Anonymous Coward

      Re: protocols were disabled by default

      But it's the enterprises that have "critical" software that's not been touched for decades :-)

      1. Anonymous Coward
        Anonymous Coward

        Re: protocols were disabled by default

        oh it has been touched... with bubble gum and bailing wire some elbow grease sweat tears and maybe some blood as well.

    4. karlkarl Silver badge

      Re: protocols were disabled by default

      In a similar boat. I recommend disabling encryption (but making software listen localhost only (and enforced by firewall)) and then using i.e stunnel (or with some fiddling, openssh) to create secure tunnels between them which act like "proxies".

      In some ways I am considering doing this for more recent installs too in order to allow configuration of certificates in one central location rather than individual daemons.

  2. Lee D Silver badge

    Ran IISCrypto last year and enabled it's best practice mode on all the servers on my new workplace.

    Who the hell relies on early TLS still? And Microsoft doing it now "because usage has fallen to an acceptable level", in essence? How ridiculous for an outdated and insecure security-based protocol with a clear path to replacement/upgrade for years now.

    1. MrReynolds2U

      Most of us don't have the luxury of working only with up to date kit. I provide support for certain devices that are still tied to security standards common in the IE era. They aren't public facing but still critical. Unfortunately there's never the budget to rip and replace apparently, since they "still work".

      There's a reason we commonly curse out management and bean-counters on here.

      1. Anonymous Coward
        Anonymous Coward

        OK - you curse the beancounters

        while the rest of the world curses the IT industry for not supplying a robust product in the first place.

        1. MrReynolds2U

          Re: OK - you curse the beancounters

          Perhaps, but the IT industry includes the managers and bean-counters.

          I presume a cost-benefit analysis was carried out on providing updated firmware and it didn't indicate a profit.

          You can make a lot more from up-selling new kit over supporting legacy hardware.

          1. ColinPa Silver badge

            Fix the bean counters

            Someone told me that after their request for upgrading the infrastructure got turned down because of cost. They fixed the bean counters, by turning off one of the old server - which supported the bean counters and their systems ran very slowly. Cue lots of cursing from the bean counters. After 2 days they turned the server on again. The bean counters said "that cost is xxxx thousands points in lost time" The sysprogs replied - it only cost y thousand to replace it... so if we could have upgraded the server it would have saved you all this money.

        2. Ignazio

          Re: OK - you curse the beancounters

          Yeah we should have fixed the bugs we didn't know existed

        3. Elongated Muskrat Silver badge

          Re: OK - you curse the beancounters

          In the phrase "IT industry", it’s not the "IT" part that's the problem, it's the "industry" part, comprised of manglement and beancounters who don't understand the IT part, but still hold the purse-strings.

      2. sbegrupt

        I fail to see why rip and replace is needed to upgrade from TLS 1.1 to TLS 1.2.

        1. phuzz Silver badge

          Some devices are so old they only support old standards, and the manufacturer has given up supporting them. That leaves you with the choice of either finding a way to work around it (segmented network, keeping an old browser around to talk to it), or buying a newer device.

          I'm thinking in particular of some APC power distribution units we have, which don't have firmware updates available, but upgrading them will involve unplugging the power to several devices, not all of which have reliably redundant power supplies. (I've been burned before by supposedly 'redundant' PSUs which fail when they have to support the load they're supposed to be rated for).

          Fortunately we don't need access to their web interfaces more than once every few years, so they can be left without networking, and we have an old laptop we can plug in if they ever need a tweak.

          1. rcxb Silver badge

            not all of which have reliably redundant power supplies. (I've been burned before by supposedly 'redundant' PSUs which fail when they have to support the load they're supposed to be rated for).

            Best to find that out for certain during your scheduled maintenance window, rather than unexpectedly...

            1. Excused Boots Bronze badge

              Sorry but this ‘Scheduled Maintenance Window’ of which you speak, is that a common thing in the Universe you inhabit?

              Because in the reality that the rest of us are in, apparently some managers have vaguely heard of such a notion!

      3. Lee D Silver badge

        "Most of us" would then utterly fail any kind of cybersecurity review, which is required for workplaces as basic as primary schools nowadays.

    2. david 12 Silver badge

      Who the hell relies on early TLS still?

      Per the article, people using SQL Server 2016.

      This won't affect me. Our SQL Server 2000 on Win 2000 won't be updated by this change. Running on a private network, with 3 automation clients.

      Personally, I just wish that web sites using TLS would just switch to HTTP. That would solve all my TLS problems.

      1. Sora2566 Silver badge

        Sadly, we live in a world where all sites NEED to be using HTTPS. https://doesmysiteneedhttps.com/

      2. ColinPa Silver badge

        run http instead of TLS>

        It would have to be https and not http. And Https runs on top of TLS!

    3. Bendacious Silver badge

      IISCrypto in Best Practice mode leaves TLS1.0 and TLS1.1 protocols switched on. Both Server and Client protocols.

      Outdated client protocols being used between internal servers is not a problem. This is just another unsubtle nudge from Microsoft to get the chequebook out. If it was really security they are concerned about, then they would add TLS 1.3 to Server 2016.

    4. DougMac

      As the article stated, many versions of SQL server will break hard from my testing.

      My application doesn't officially support newer versions of SQL server. So, its either run unsupported SQL version and hope it works 100% correctly, keep the old version, and disable Microsoft's force changes, or replace the whole thing at some unknown cost, and unknown amount of migration and dev work.

      In my testing, Microsoft's TLS patches for SQL don't work reliably. The only fix is to do major version upgrades.

      I've also got old network devices online. They right now have their management links isolated, but now we'll have to keep out-of-date desktops around so that they can still be managed.

      Rip and replace is the only option. Otherwise, operationally they work totally fine for our needs. Its not a security application, but just because the UI was written long ago the whole thing needs to be tossed.

      1. This post has been deleted by its author

      2. Elongated Muskrat Silver badge

        Why don't you test it with a newer SQL Server version, then? IIRC, they're generally backwards-compatible, unless your application is using something arcane (like some sort of Silverlight integration) that has been killed with prejudice by MS in the meanwhile. If it's plain old SQL queries, then you'll be fine, and if you want to know what your application is sending over the wire, use SQL Profiler, or an equivalent profiling method; that has all been easily available at least as far back as SQL Server 2012.

      3. Jou (Mxyzptlk) Silver badge

        Define your "old" SQL Server. I've in-place upgraded quite a number of MS-SQL servers (2008 without R2 and higher, non-cluster, to SQL 2017), and since the databases have their version number encoded the newer SQL still behaves like the old one for this database. Try it, create maintenance window, shut VM down, snapshot, boot up, upgrade, reboot, test.

    5. Anonymous Coward
      Anonymous Coward

      I have to use the web interface of old printers for troubleshooting. Many don't support "modern" encryption. I had to enable TLS 1.0 in Win10 and use IE mode in Edge (not allowed to install another browser per IT) to be able to talk to them. As another poster said, not everyone has the luxury of working with up-to-date equipment. Why should we replace a bunch of fully-functional, relatively cheap to maintain printers just because they use an old protocol? Especially since the replacements break more often and are more expensive to maintain. They're already behind a firewall anyway.

      Now if only we could get corporate to update that one bit of operation-critical software, used daily by a huge number of us, that only works with SMB 1.0 (I wish I was making that up).

      1. Jou (Mxyzptlk) Silver badge

        > Why should we replace a bunch of fully-functional, relatively cheap to maintain printers

        That is a bad example, and easy to solve. The actual printing is via port 9100 HP JetDirect style or port 515 *NIX LPD Style, and it always unencrypted. Won't change soon. You only need http or old https to CONFIGURE the printer, not to USE it. Use an older browser which does not care about the Microsoft Windows setting and done.

        Many companies are going the way to put all pinters in a separate VLAN with routing/firewall for obvious security reasons. And using http or old TLS there is not an issue since only specified management machines, maybe even only an extra VM in the same subnet, can reach the printer on http or old https.

        Another step is to have a print server with two network cards. One facing the "source" computers, the other facing the "destination" printer. So the printers don't even need a default gateway and be reachable.

        You are absolutely right: Replacing old reliable printers is not a good idea.

  3. Pascal Monett Silver badge
    Trollface

    "low enough to act"

    Translation : the few hippies left who are still using can complain, there's not enough for us to care.

    1. Anonymous Coward Silver badge
      Holmes

      Re: "low enough to act"

      .... they don't pay us enough for us to care.

    2. CowHorseFrog Silver badge

      Re: "low enough to act"

      No Microsoft want to force them old sql servers to buy new licenses.

      WHy do people fail to appreciate big corp only wants your money,... the answer is always more money.

  4. Jou (Mxyzptlk) Silver badge

    Our experience: Problems are rare

    We've adjusted a huge amount of servers to only use TLS 1.2 and higher, at least AES128 as crypto and SHA256 as hash. Up to now no real problems occurred, ranging from Server 2008 (without R2) and SQL 2008 (without R2) up to the newest stuff.

    1. Paul Crawford Silver badge

      Re: Our experience: Problems are rare

      The usual issue is bits of old hardware with some sort of web interface, like UPS or CNC hardware, or at home a perfectly good NAS from a good few years back. They are a problem and need steps to allow older TLE to work.

      1. MrReynolds2U

        Re: Our experience: Problems are rare

        Add old versions of ILOs (base management interface), networking hardware etc, plus a lot of computer controlled industrial and commercial equipment

        1. Bitsminer Silver badge

          Re: Our experience: Problems are rare

          Reminds me of SSHv1 vs SSHv2.

          A lot of old ILO couldn't be upgraded.

      2. Jou (Mxyzptlk) Silver badge

        Re: Our experience: Problems are rare

        That is easy: Use a browser which ignores the Microsoft settings you just applied :D. You have to keep those old versions anyway.

        1. Strahd Ivarius Silver badge
          Coat

          Re: Our experience: Problems are rare

          But where would you find a copy of Mosaic?

          1. Jou (Mxyzptlk) Silver badge

            Re: Our experience: Problems are rare

            > But where would you find a copy of Mosaic?

            Mosaic : https://github.com/alandipert/ncsa-mosaic and https://archive.org/details/mosaic-ncsa-evolt_browsers

            Netscape 3 (and 4) : https://winworldpc.com/product/netscape-navigator/30x and http://www.oldversion.com.de/windows/netscape/

            More old browsers: https://browsers.evolt.org/ (<- wow, never know how many were made)

    2. Anonymous Coward
      Anonymous Coward

      Re: Our experience: Problems are rare

      Have you tested SQL 7 on Windows 2000 yet? Asking for a friend ( I wish!)

      1. Jou (Mxyzptlk) Silver badge

        Re: Our experience: Problems are rare

        Of course not. Server 2003, XP and 2000 with TLS 1.2? Use an external helper like stunnel or a real proxy.

  5. Anonymous Coward
    Anonymous Coward

    This will be fun

    I work in a bank where we have production systems running on SQL 2008 lol

    1. Lee D Silver badge

      Re: This will be fun

      There are still mainstream UK banks insisting that you have to do all your millions of pounds of bank transfers via Internet Explorer, so I'm not surprised.

      To the point that they just point you at a PDF on their main website which basically says "Get your IT to re-enable it" including "after 30 days the security settings will revert, so you'll have to put them back every 30 days".

      So you have to have a smartcard, double-authentication via two separate entities, getting a card is almost as difficult as opening a bank account in the first place because of all the authorisation you have to get, but then you have to plug it into a Gemalto reader for which they will only give you IE plugins to access it (despite Gemalto having Chrome, etc. plugins for everything) and won't support any alternative.

      1. Paul Crawford Silver badge

        Re: This will be fun

        Can you name and shame them?

        Thankfully I could get Halifax/Bank of Scotland as well as Santander to work on sensible computers.

        Given IE is out of support, it ought to be illegal to actually accept its use for high value activities...

        1. Claverhouse

          Re: This will be fun

          NatWest works on Basilisk on Linux ( and it's brother Pale Moon ).

          .

          .

          Which is more than can be said for some ridiculous Linux forums, including Rocky and the OS i am currently using, Manjaro: who defaults to the fine old nonsense of :

          Unfortunately, your browser is unsupported. Please switch to a supported browser to view rich content, log in and reply.

          God Alone Knows what they mean by Rich Content.

          1. Elongated Muskrat Silver badge

            Re: This will be fun

            Rich Content? Was he one of the Bay City Rollers?

        2. BinkyTheMagicPaperclip Silver badge

          Re: This will be fun

          IE the browser is out of support, IE the rendering engine is very much still in support, and can be enabled either via options within the browser, or with more control using an Enterprise Mode Site List and a group policy.

          Take a wild guess why I know chapter and verse on this :(

          1. CowHorseFrog Silver badge

            Re: This will be fun

            A browser is not a rendering engine... you are comparing apples with oranges.

            1. BinkyTheMagicPaperclip Silver badge

              Re: This will be fun

              A browser is a shell that provides networking and a user interface to one or more web page renderers.

              For Internet Explorer it handled various revisions of IE standards.

              For Edge Chromium it has at least three engines within it : Chrome, Edge, and all the revisions of Internet Explorer.

              The only supported method of viewing Internet Explorer pages is to use Edge or Edge Chromium in Internet Explorer mode. Internet Explorer the browser has been out of support for some time, and it's therefore important to differentiate the support of a browser itself, and which web pages it will render properly.

    2. Anonymous Coward
      Anonymous Coward

      Re: This will be fun

      Hey I have a Tier 1 retail customer still fucking about on Windows XP, Windows Server 2003 and SQL2000 in production !!!

      1. 43300 Silver badge

        Re: This will be fun

        Are they having trouble getting hardware now? Or is it all virtualised?

    3. Anonymous Anti-ANC South African Coward Silver badge
      Joke

      Re: This will be fun

      TSB Bank?

    4. 43300 Silver badge

      Re: This will be fun

      Which version of Windows are the ATMs running? From what I've noticed in the past when seeing them reboot they tended to be ancient versions of Windows!

  6. Anonymous Coward
    Anonymous Coward

    some old Netgear equipment will be stuffed.

    I have already had to find a win7 laptop to talk to some kit because the latest Chrome will not allow access to the interfaces of some large NAS storage solutions.

    1. Anonymous Coward
      Anonymous Coward

      Re: some old Netgear equipment will be stuffed.

      I'm assuming you tired the thisisunsafe trick to force the page to display?

    2. DaveMcM

      Re: some old Netgear equipment will be stuffed.

      I recently retired my ancient ReadyNas NV+ partly for this reason... that and the fact that the internal PSU (the second in it's lifetime) was starting to get a bit "wobbly".

  7. BinkyTheMagicPaperclip Silver badge

    For once, probably not going to be an issue for me

    TLS 1.0 was an issue because various embedded kit only supported 1.0 (and not properly at that).

    Most code moved across to 1.2 fairly easily, but some legacy ones had issues and a firewall exception until very recently, I believed that's stamped out now.

    Everything is now at a minimum of 1.2. Anything I've seen capable of handling TLS 1.1 can also handle 1.2. 1.3 is probably the next break point, I think some of the newer embedded kit hasn't seen the need to go beyond 1.2, and hopefully firmware will be updated soon. Windows and SQL server have been upgraded, and it's years since everything moved off 2008.

  8. RichardBarrell

    Good plan

    TLS 1.0 isn't as well designed as 1.2 is. I think we should be expecting that there will be protocol vulns found in TLS 1.0 in future, and when they are found we will all have to turn TLS 1.0 off everywhere in a massive hurry. Similarly to how SSL3.0 had protocol vulns that required everyone to turn it off a few years ago (the "POODLE" issue) in a massive hurry.

    In light of this, it's a good idea to turn off TLS 1.0 now, while we can all do it at a leisurely pace, rather than suddenly having to turn it off in a massive hurry if (but probably when) the next big TLS 1.0 protocol vuln is found.

    (As has been noted by other commenters, TLS 1.1 can be ignored because just about everyone who implemented TLS 1.1 also implemented TLS 1.2.)

  9. Arthur Daily

    Delivery Lockers for mail order

    Those postal lockers full of goodies. Want to make a bet which TLS they use? Or how long to crack a trace or transaction?

  10. Anonymous Coward
    Anonymous Coward

    Can you hear the conversations between business CEO types and MS regarding deprecation.

    One doesn't even need to be in the room.

    Setting out clear timetables for killing things that need killing, and then following through (despite the whinging) is welcome, and for a change is something I can commend MS on.

    1. CowHorseFrog Silver badge

      What a loud of crap, ceos dont know shite, they wouldnt be aware of these sorts of real issues.

      However ou can be sure someone in a lower department figured this is a good enough way to force upgrades to a new SQL server license.

  11. JustAnotherITPerson

    Ouch!

    "...dates back to the last century."

    And I took that personally.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like