I've updated some of my test hosts to Update 1 (KB2919355
).
Now, they cannot scan against WSUS anymore (0x80072F8F
)
OK, easy you say! Microsoft patched that issue, and warned about it.
Now to the harder part. My WSUS Server is running on 2012 R2, and has TLS 1.2 enabled - I should not be affected.
Even weirder, I've installed the corrected update which is supposed to have fixed the issue.
To be safe, I tried installing the Update KB2959977
mentioned in above KB Article. Result: This update is already installed.
So, I'm at a loss here :) Does anyone else have the same problem? Any suggestions? Did Microsoft screw this really up?
Check your certificate chain for certificates with signature algorithm MD5 or SHA512. TLS 1.2 no longer supports MD5. Microsoft implementation of TLS 1.2 does not support SHA512 by default. Have a look:
http://social.technet.microsoft.com/Forums/windowsserver/en-US/857c6804-8ce1-4f09-b657-00554055da16/tls-12-and-sha512/
It had indeed to do with Certificates.
After installing
KB2919355
it seems that certificates are more closely examined, especially the CRL.We had to diagnose this using:
Diagnostics
Clear revocation caches by running these commands as admin
Start network tracing by running this command as admin:
Enable CAPI2 logging from Event Viewer:
Open 'Event Viewer'
Browse to 'Application and Services Logs' > Microsoft > Windows > CAPI2 > Operational.
Right click on 'Operational' in the directory tree, and select 'Enable log'
Scan against public Windows Update using UI (Control Panel applet or PC Settings) and let it fail.
Run this command as admin, and it will produce a NetTrace.cab file:
Go back to Event Viewer and export CAPI2 events by clicking “Save All Events as …”
Analysis
Indeed, I had a look at the CRL CDP of the Certificate, and the IDP field of the CRL:
One was escaped, and one wasn't.
(Courtesy this thread on TechNet Forums)
Solution aka TL;DR
The Solution in my case was pretty simple. I regenerated the WSUS IIS Certificate, and it magically got the correct CRL CDP URL.
Actually, it now has both URL's in it:
After this, scanning against WSUS works perfectly fine again.