TLS 1.2 Update
- Enterprise IT
- Shilpa K (Deactivated)
- Mayuresh Balaji Kamble (Unlicensed)
Definitions
Following are list of few terms with their definitions used in the document:
Term | Definitions |
---|---|
TLS | The Transport Layer Security (TLS) protocol is an industry standard designed to help protect the privacy of information communicated over the Internet. TLS 1.2 is a standard that provides security improvements over previous versions. TLS provides enhanced security by encrypting data sent over the internet. |
SummitAI Proxy Server | For more details about SummitAI Proxy Server, refer the page Viewing Proxy Server Details. |
SummitAI Asset Agent | For more details about SummitAI Asset Agent, refer the page SAM Agent (Asset Management) Version History 1. |
How to check if Summit Asset Agent is running or not | For more details on how to verify if Summit Asset Agent is running or not, refer the page Agent Online Status Report. |
Preface and Audience
Overview
From Denali SP3 (Tentative Release Schedule: December 2020) onwards SummitAI Asset Agents will be released with the default binding to TLS version 1.2 or higher. This feature will be made available to recent Major predecessor versions to accommodate larger user communities and with less transition effort.
Why are we making this change?
This change is in recognition of security best practices. It has also been mandated by the PCI Security Council and Product Manufacturers like Microsoft has stopped supporting older version of TLS from June 2020.
You may have heard of these vulnerabilities by some of their better-known names such as Heartbleed, Poodle, Freak and Beast. These vulnerabilities concern the weak encryption of sensitive data transmission over the internet, which may allow unauthorized parties to view the data. All versions of SSL, and versions of TLS before TLS 1.2 have been explicitly identified as no longer being a strong form of encryption because they are vulnerable to many known attacks.
This is not a change being taken up at SummitAI product suites alone, rather it is a mandatory technology transition for every Software vendor to protect against security vulnerabilities. If you or your customers are using an insecure or unsupported browser or API client, you will find that all secure websites will stop working very soon. Summit would be happy to answer any queries you may have related to this change.
Please reach out to your SummitAI account managers if you have any concerns.
Further Reading & Resources
https://www.ssllabs.com/ssltest/clients.html
https://www.howsmyssl.com/
Target Audience
This document can be used by engineers and IT System administrator professionals having knowledge on SummitAI ITAM product suites along with the Infrastructure knowledge.
Getting Started
SUMMIT recommends to start the TLS 1.2 upgrade activity with least impacted Proxy server/ or least number of end points prior to rolling out to a larger environment.
TLS 1.2 Agent Upgrade Prerequisites
Ensure that the following pre-requisites are met before upgrading SummitAI Asset Agents to the latest TLS version 1.2:
For SummitAI Application Versions 5.6 till Denali SP3:
Platform | Supported Versions |
End-Point Operating System and .Net Framework Version | Windows 7 SP1 and above with Microsoft .NET framework > 4.0 |
Server Operating System | Windows 2008 R2 and above with Microsoft .NET framework > 4.0 version |
Agent Version for Auto Upgrade | 2.0.1.X and above |
Agent Versions requiring manual upgrade | Older than 2.0.1.x |
Agent Version to be deployed | 2.3.5.15 |
For SummitAI Application Versions Denali SP3 HF01 and Later:
Platform | Supported Versions |
End-Point Operating System and .Net Framework Version | Windows 7 SP1 and above with Microsoft .NET framework > 2.0 |
Server Operating System | Windows 2008 R2 and above with Microsoft .NET framework > 2.0 version |
Agent Version for Auto Upgrade | 2.0.1.X and above |
Agent Versions requiring manual upgrade | Older than 2.0.1.x |
Agent Version to be deployed | 2.5.5.19 |
Microsoft Patches to be deployed on end points | KB3154520 for Windows Server 2012 R2, KB3154519 for Windows Server 2012 KB3154518 for Windows Server 2008 R2 |
Upgrade Process
The following flowchart depicts how to perform TLS 1.2 upgrade:
Figure: Flowchart of Upgrade Process
Prerequisites
Ensure that the following pre-requisites are met, before proceeding:
- Check the Product Definitions & standard functionality assumptions
- Compatibility Matrix
- Supported Microsoft .NET Framework Libraries (Refer to the Supported Libraries)
- Supported End Point/Desktop Operating systems (Refer to the Supported Desktop Operating System)
- Supported Server operating systems (Refer to the Supported Server Operating System)
- Capture the current “contacted” & “Non-Contacted” agent counts from the Report on the agent version upgrade information (Admin->Reports->Asset Management->Agent Online Status Report). This is to know how many agents expected gets upgraded to newer version.
- Download the explicit TLS 1.2 agent kit compatible to Main SummitAI Release.
- Download the IISCrypto (https://www.nartac.com/Downloads/IISCrypto/IISCrypto.exe) or any equivalent tool for enforcing TLS 1.2 Protocol suites at OS Level.
Steps in Detail
To upgrade TLS 1.2 perform the following steps (applicable if you are using SUMMIT Release v5.6 to DENALI SP3):
- Perform the Proxy configurations for Agent Upgrade and activate the auto update feature.
Figure: Enabling SAM Agent Auto Update - Check the agent version upgrade information (Admin->Reports->Asset Management->Agent Online Status Report)
Figure: Checking Agent Versions - Apply the version filters in the above report and capture the appropriate status of the upgrade activity.
Figure: Applying Version Filter Once all the agents are shown with the latest version, on the proxy server use the IISCrypto tool (Refer to Pre-requisite for download Link) to disable the TLS 1.0/1.1 Protocol Suites and enforce TLS 1.2.
Important Note
To disable TLS 1.0/1.1 and enable TLS 1.2 using the TLS registry settings, refer this link.
Disable TLS 1.0/1.1 from Server Protocols and Client Protocols as shown in the following figure.
Figure: Disabling TLS1.0/1.1- Enable TLS 1.2 protocol and select Reboot. Click Apply to enforce the usage of TLS 1.2 protocol.
Figure: Enabling TLS1.2 and Rebooting Application
After DENALI SP3 HF01 Upgrade
The agents released with this version are default complaint to TLS 1.2 or higher. The underlying technology framework of agents are provisioned to work independent of .NET Framework/Operating system libraries and designed to leverage REST API Libraries for overall functionality. This enables our agent to work on any of the current TLS 1.0/1.1/1.2 or future versions.
When you must take this route ?
- Already have a plan to upgrade SummitAI Product to Latest release
- Organizational or Infrastructure challenge in rolling out TLS 1.2 supported Microsoft .NET libraries to all the reporting agents.
- Infrastructure contains both legacy and Latest Desktop/Server Operating systems. (Refer to Supported Desktop Operating System & Supported Server Operating System sections)
Key Notes or Impacts
- Latest Agents carries with the Hotfixes + TLS 1.2 or higher complaint features.
- If you are running multi-Proxy Environment, strongly recommend starting this activity Post successful migration on the first proxy server
- No Major impacts in the Agent functionality.
- Underlying agent stack is unchanged except activated with the TLS 1.2 support.
- DO NOT Recommend if you are not sure of .NET Framework 4.0.x or higher availability on all the reporting agents.
- If you are running multi-Proxy Environment, strongly recommend starting this activity Post successful migration on the first proxy server.
Prerequisites
Ensure that the following pre-requisites are met, before proceeding:
- Check the Product Definitions & standard Functionality assumptions
- Compatibility Matrix
- Supported Microsoft .NET Framework Libraries (Refer to the Supported Libraries)
- Supported End Point/Desktop Operating systems (Refer to the Supported Desktop Operating System)
- Supported Server operating systems (Refer to the Supported Server Operating System)
- Capture the current “contacted” & “Non-Contacted” agent counts from the Report on the agent version upgrade information (Admin->Reports->Asset Management->Agent Online Status Report). This is to know how many agents expected gets upgraded to newer version.
- Download the explicit TLS 1.2 agent kit compatible to Main SummitAI Release.
- Download the IISCrypto (https://www.nartac.com/Downloads/IISCrypto/IISCrypto.exe) or any equivalent tool for enforcing TLS 1.2 Protocol suites at OS Level
Steps in Detail
To upgrade TLS 1.2 perform the following steps (applicable if you are using DENALI SP3 HF01 or later):
- Download the latest agent Kit (HF Release) in the respective compatible version to Main SummitAI Release.
Upgrade the Proxy application component.
Important Note
This will NOT disrupt the existing agent reporting functionality) - This requires SummitAI Proxy service restart and MAY NOT requires server restart.
- Perform the Proxy configurations for Agent Upgrade and activate the auto Update feature.
Figure: Enabling SAM Agent Auto Update - Check the agent version upgrade information (Admin->Reports->Asset Management->Agent Online Status Report).
Figure: Checking Agent Version - Apply the version filters in the above report and capture the appropriate status of the upgrade activity.
Figure: Applying Version Filter Once all the agents are shown with the latest version, on the proxy server use the IISCrypto tool (Refer to Pre-requisite for download Link) to disable the TLS 1.0/1.1 Protocol Suites and enforce TLS 1.2.
To disable TLS 1.0/1.1 and enable TLS 1.2 using the TLS registry settings, refer this link.
- Disable TLS 1.0/1.1 from Server Protocols and Client Protocols as shown in the following figure.
Figure: Disabling TLS1.0/1.1 - Enable TLS 1.2 protocol and select Reboot. Click Apply to enforce the usage of TLS 1.2 protocol.
Figure: Enabling TLS1.2 and Rebooting Application
- Disable TLS 1.0/1.1 from Server Protocols and Client Protocols as shown in the following figure.
Functionality Assumptions
- For agent version and SummitAI release matrix access refer the page: https://eitdocs.atlassian.net/wiki/display/OD/SAM+Agent+%28Asset+Management%29+Version+History+1
- Check the Version# and Application version columns.
- Auto Agent Update at Proxy Server is by default disabled.
- Every 6 Hours agent upgrade running automatically looks for latest update.
Frequently Asked Questions (FAQs)
Question | Answer |
---|---|
What happens if I continue to use the current version of agent? |
|
Currently, I am in ALPS SP1 HF 01, should I upgrade immediately? |
|
Is this applicable to on-cloud and on-premises customers? | Yes, it is applicable to both On-Cloud & On-Premise hosted customers. |
Will my functionality get impacted because of this TLS 1.2 agent upgrade today or after Denali SP3 release? | No, we do not expect any impact to Agent functionality. |
What happens if I have combination of unsupported Operating systems such as Windows Serve 2008 or lower, Windows XP or lower in my infrastructure estate? |
|
What does SummitAI recommend for TLS Upgrade? |
|
We will upgrade now for TLS 1.2 compliant as an immediate requirement and what happens to my future agent upgrades? |
|
What happens if there is a confirmed P1/Major Bug on Asset Agent reported before Denali SP3 release and I have upgraded to TLS 1.2 Compliant agent? | SummitAI will provide the hotfix on the TLS 1.2 agents supported version only without any Major version upgrade dependency. |
What happens if there is a Lower Priority Bug on Asset Agent reported before Denali SP3 release and I have upgraded to TLS 1.2 Compliant agent? | SummitAI will provide the hotfix as per the standard release cycle on the Default TLS 1.2 agent supported software which may requires you to upgrade your SummitAI Proxy application as a minimum requirement. |
What happens when we have TLS 1.3 version? | Our Agents released after Denali SP3 will be automatically compliant to TLS version 1.3. |
Appendix
- Supported .Net Framework 4.5
- Supported Desktop Operating System
- Supported Server Operating System
- Supported Microsoft .Net Libraries
- Supported CIpher Suites
Supported .NET Framework 4.5
Operating System | Supported editions | .NET Framework 4.5 |
Windows Vista SP2+ | 32-bit and 64-bit | Supported |
Windows 7 SP1+ | 32-bit and 64-bit | Supported |
Windows Server 2008 SP2 or Higher | 32-bit and 64-bit | Supported |
Supported Desktop Operating System
Operating System Name | TLS 1.0 | TLS 1.1 | TLS 1.2 |
Windows 7 SP1 | |||
Windows 8 | Partial | Partial | |
Windows 8.1 | |||
Windows 10 |
Important Note 1
For Windows 8: TLS 1.1 and TLS 1.2 can be enabled by following the guidelines found here for more information.
Supported Server Operating System
Operating System Name | TLS 1.0 | TLS 1.1 | TLS 1.2 |
Windows Server 2008 SP2 with Windows update installed | |||
Windows Server 2008 R2 | |||
Windows Server 2012 | Partial | Partial | |
Windows Server 2012 R2 | |||
Windows Server 2016 |
Important Note 2
For Windows Server 2012: TLS 1.1 and TLS 1.2 can be enabled by following the guidelines found here for more information.
Supported Microsoft .NET Libraries
.NET Libraries Name | TLS 1.0 | TLS 1.1 | TLS 1.2 |
.NET 4.6 and higher |
|
| |
.NET 4.5 to 4.5.2 | Partial | Partial | |
.Net 4.0 | Partial | ||
.Net 3.5 and below |
Important Note 3
For .NET 4.5 to 4.5.2: TLS 1.1 and TLS 1.2 can be enabled by following either one of the two options indicated below: Option 1:.NET applications may directly enable TLS 1.1 and TLS 1.2 in their software code by setting System.Net.ServicePointManager.SecurityProtocol to enable SecurityProtocolType.Tls12 and SecurityProtocolType.Tls11. The following C# code is an example:
System.Net.ServicePointManager.SecurityProtocol = SecurityProtocolType.Tls12 | SecurityProtocolType.Tls11 | SecurityProtocolType.Tls;
Important Note 4
To enable TLS 1.2 by default, it is possible to install .NET Framework 4.5, or a newer version, and set the SchUseStrongCrypto DWORD value in the following two registry keys to 1. If they do not exist, create them.
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319" and "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319". Those registry keys, however, may enable TLS 1.2 by default in all installed .NET 4.0, 4.5, 4.5.1, and 4.5.2 applications on that system. We recommend testing this change before deploying it to your production servers.
Supported Cipher Suites
The Schannel supports the following Cipher Suites for TLS 1.2,1.1, and 1.0. The Cipher Suites are listed in the default order in which these are chosen.
TLS_RSA_WITH_RC4_128_MD5
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_EXPORT_WITH_RC4_40_MD5
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_WITH_NULL_MD5
TLS_RSA_WITH_NULL_SHA
Reference article: https://docs.microsoft.com/en-us/windows/win32/secauthn/tls-cipher-suites
For Microsoft Windows 10: version 1903, 1909, and 2004 the list of cipher suites enabled and its priority (strong to weak), please refer the following article.
https://docs.microsoft.com/en-us/windows/win32/secauthn/tls-cipher-suites-in-windows-10-v1903
Confluence Cloud Migration Alert: Please refer to known issues you may encounter in Confluence Cloud: https://eitdocs.atlassian.net/wiki/x/wDGwAQ