Solved

failing PCI scan due to SSL2 issue

Posted on 2010-08-26
9
854 Views
Last Modified: 2012-06-21
A third-party PCI compliance scanner let us know that we need to disable SSL2 on our mail server.  I followed this MS KB, and did that (including a reboot):

http://support.microsoft.com/kb/187498

Requested a re-scan, but the results are the same:

 
s_client -host x.x.x.x -port 443 -ssl2



Ciphers common between both SSL endpoints:

RC4-MD5         DES-CBC3-MD5



New, SSLv2, Cipher is DES-CBC3-MD5

Server public key is 1024 bit

Secure Renegotiation IS NOT supported

SSL-Session:

    Protocol  : SSLv2

Open in new window


serversniff.net reports:

Available SSL2 ciphers:  
DES-CBC3-MD5 168 bit
RC4-MD5 128 bit

So I'm guessing I need to disable these ciphers as well.  However, I'm not sure what registry entry corresponds with these 2 ciphers.  These are the ciphers listed in the registry:

ciphers in registry

Windows 2008 Server/IIS 7

Thanks.
0
Comment
Question by:j_aebi
  • 5
  • 3
9 Comments
 
LVL 19

Expert Comment

by:CoccoBill
ID: 33541083
Did you change the value of the "Enabled" key under "HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server" to dword:00000000 and restart the system?

Also, this is only one part of the PCI requirements regarding SSL. Another one is to disable all weak ciphers:

http://blog.zenone.org/2009/03/pci-compliance-disable-sslv2-and-weak.html
0
 

Author Comment

by:j_aebi
ID: 33543714
Yes, as I said, I followed the first KB article, which specifies to change those dword values and restart.

My second question is indeed about the ciphers: "So I'm guessing I need to disable these ciphers as well.  However, I'm not sure what registry entry corresponds with these 2 ciphers.  These are the ciphers listed in the registry" (see pic that I posted).
0
 
LVL 30

Expert Comment

by:Brad Howe
ID: 33544273
Hi,
For PCI Compliance, your CIPHERS and SSL version need to be updated. Here is the registry setting I implement for all my clients.
1. Create SSL.reg with this code attached.
 2. Execute entry into registry.
3. Reboot and run scan again.
Let me know if you have questions,
Hades666

Windows Registry Editor Version 5.00

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols]

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0]

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client]

"DisabledByDefault"=dword:00000001

"Enabled"=dword:00000000

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server]

"Enabled"=dword:00000000

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0]

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client]

"Enabled"=dword:00000001

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server]

"Enabled"=dword:00000001

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0]

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client]

"Enabled"=dword:00000001

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server]

"Enabled"=dword:00000001

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers]

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 128/128]

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 128/128]

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES]

Open in new window

0
 
LVL 30

Expert Comment

by:Brad Howe
ID: 33544369
And yes, for the other CIPHERS you have, Delete these keys.
DES 56/56, NULL, RC2 40/128, RC4 40/128, RC4 56/128
They are weak ciphers.
Cheers,
Hades666
0
Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

 

Author Comment

by:j_aebi
ID: 33563246
Thanks Hades666, I'll give it a shot.
0
 

Author Comment

by:j_aebi
ID: 33563482
Ok, did that, but still seeing this from http://serversniff.net/sslcheck.php:

Preferred cipher:  
TLSv1/SSLv3, Cipher is RC4-MD5 RC4(128)  
 
Available SSL2 ciphers:  
DES-CBC3-MD5 168 bit
RC4-MD5 128 bit

Attached file is what the registry looks like currently (2 files in one here - ciphers the protocols).

I don't have values set for the SSL2 client keys - does this matter?  Seems I've seen KB articles that both mention this, and don't mention it.



ciphers-protocols.txt
0
 
LVL 30

Expert Comment

by:Brad Howe
ID: 33576370

Hi,

Yes, you need to disable the client and server protocols.

You should also delete the following cipher keys completely. Don't disable them. Both my sites report only 128/168/256 Bit encryption and SSL3 only.

Here is how my register Channels and ciphers are configured.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 128/128]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 128/128]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client]
"DisabledByDefault"=dword:00000001
"Enabled"=dword:00000000
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server]
"Enabled"=dword:00000000
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0]
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client]
"Enabled"=dword:00000001
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server]
"Enabled"=dword:00000001
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0]
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client]
"Enabled"=dword:00000001
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server]
"Enabled"=dword:00000001

cheers, Hades666
0
 

Author Comment

by:j_aebi
ID: 33589274
Ok, thanks, this all looks good and I'll give it another shot.  However, I'm wondering what the difference is between using 00000001 and ffffffff for the "Enabled" DWORD values?  

In your example:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server]
"Enabled"=dword:00000001

In mine:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server]
"Enabled"=dword:ffffffff

I know you mentioned your sites are passing the PCI scans just fine, so all must be well :) but I'm curious, as that MS cipher KB mentions: "To allow this cipher algorithm, change the DWORD value data of the Enabled value to 0xffffffff, otherwise change the DWORD value data to 0x0. "
0
 

Accepted Solution

by:
j_aebi earned 0 total points
ID: 33746482
So when I delete those cipher keys, close regedit and open it back up, they reappear.  And we then continue to fail this PCI scan.

I ended up contacting MS support about this and am working with them.  Thanks anyway.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IIS6 Virtual SMTP server resends old email after reboot 13 50
Radius ASA Authentication Failed 4 62
Auto Smartport macro for Dell and HP laptops 2 54
Sonicwall blocks a site 49 56
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
There are many Password Managers (PM) out there to choose from. PM's can help with your password habits and routines, but they should not be a crutch you rely on too heavily. I also have an article for company/enterprise PM's.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now