Error
Following Windows security updates in May 2018, when attempting to RDP to a Windows 10 Pro workstation the following error message is displayed after successfully entering user credentials:
An authentication error occurred. The function requested is not supported.
This could be due to CredSSP encryption oracle remediation
Screenshot
Debugging
We have confirmed user credentials are correct.
Rebooted the workstation.
Confirmed on prem directory services are operational.
Isolated workstations yet to apply the May security patch are not effected.
Can manage in the interim for on perm hosts, concerned about cloud based server access however. No occurrences on Server 2016 yet.
Thank you
Based entirely on Graham Cuthbert's reply I created a text file in Notepad with the following lines, and just double clicked it afterwards (which should add to Windows Registry whatever parameters are in the file).
Just note that the first line varies depending on which Windows version you are using, so it might be a good idea to open
regedit
and export any rule just to see what's in the first line and use the same version in your file.Also, I am not concerned about degrading security in this particular situation becase I am connecting to an encrypted VPN and the host Windows does not have access to the internet and thus doesn't have the latest update.
File
rd_patch.reg
:For those who would like something easy to copy / paste into an elevated command prompt:
Source: https://support.microsoft.com/en-us/help/4093492/credssp-updates-for-cve-2018-0886-march-13-2018 [1]
See also this reddit thread: https://www.reddit.com/r/sysadmin/comments/8i4coq/kb4103727_breaks_remote_desktop_connections_over/ [2]
Microsoft's workaround:
Not recommended workarounds if your server is publicly available, or if you do NOT have strict traffic control in your internal network, but sometimes restarting RDP server in work hours is a no go.
Be sure to understand the risks when using those and patch your systems ASAP.
[1] All GPO CredSSP description and registry modifications are described here.
[2] examples of GPO and registry settings in case Microsoft's site goes down.
Research
Referring to this article:
https://blogs.technet.microsoft.com/askpfeplat/2018/05/07/credssp-rdp-and-raven/
Resolution
Based on this information I am proceeding to ensure all clients are fully patched, I would then expect the issue to be mitigated.
The registry value was not there on my Windows 10 machine. I had to go to the following local group policy and apply the change on my client:
Enable and set to value to
vulnerable.
It's recommended to update client instead of these kind of scripts to just bypass the error, but on your own risk you can do this on client and no need to restart client PC. Also no need to change any thing on server.
Run
, typegpedit.msc
and clickOK
.Administrative Templates
.System
.Credentials Delegation
.Encryption Oracle Remediation
.Enable
.Vulnerable
fromProtection Level
list.Reference
Simply, try to Disable
Network Level Authentication
From Remote Desktop. Could you please Check the following image:I found the answer here, so can't claim it as my own, but adding the following key to my registry and restarting fixed it for me.
This guy has a solution for your exact issue:
Essentially - you'll have to change the GPO settings and Force an update. But these changes will require a reboot to be in effect.
https://www.petenetlive.com/KB/Article/0001433
As others have said, this is because of a March patch that Microsoft released. They released a May patch on May 8th that actually enforces the March patch. So if you have a workstation that received the May patch and you're trying to connect to a server that hasn't received the March patch, you'll get the error message in your screenshot.
The Resolution You really want to patch the servers so that they have the March patch. Otherwise, in the meantime you can apply a Group Policy or registry edit.
You can read detailed instructions in this article: How to Fix Authentication Error Function Not Supported CredSSP Error RDP
You can also find copies of the ADMX and ADML files in case you need to find them.