MECM 2017 fails to check for update payloads when TLS 1.0 is disabled.

Ben Wosjke 136 Reputation points
2022-01-06T22:50:18.6+00:00

Hi all,
Server 2019, MECM 2017 based- environment.

Get the following error in the dmpdownloader.log.... all other functions (such as deployment, OSD, SUP etc) all working fine.

162907-updatepayloaddownloaderror.png

ciphers and older versions have been disabled using IIS crypto with the following settings:

<?xml version="1.0" encoding="utf-8"?>
<iisCryptoTemplate version="3">
<header>
<name>Best Practices</name>
<author>Nartac Software</author>
<lastUpdated>2021-09-22T05:44:40.022859Z</lastUpdated>
<description>This template sets your server to use the best practices for TLS. It aims to be compatible with as many browsers as possible while disabling weak protocols and cipher suites.</description>
<builtIn>false</builtIn>
</header>
<schannel>
<clientProtocols>
<templateItem name="Multi-Protocol Unified Hello" value="0" />
<templateItem name="PCT 1.0" value="0" />
<templateItem name="SSL 2.0" value="0" />
<templateItem name="SSL 3.0" value="0" />
<templateItem name="TLS 1.0" value="0" />
<templateItem name="TLS 1.1" value="-1" />
<templateItem name="TLS 1.2" value="-1" />
</clientProtocols>
<serverProtocols>
<templateItem name="Multi-Protocol Unified Hello" value="0" />
<templateItem name="PCT 1.0" value="0" />
<templateItem name="SSL 2.0" value="0" />
<templateItem name="SSL 3.0" value="0" />
<templateItem name="TLS 1.0" value="0" />
<templateItem name="TLS 1.1" value="-1" />
<templateItem name="TLS 1.2" value="-1" />
</serverProtocols>
<ciphers>
<templateItem name="NULL" value="0" />
<templateItem name="DES 56/56" value="0" />
<templateItem name="RC2 40/128" value="0" />
<templateItem name="RC2 56/128" value="0" />
<templateItem name="RC2 128/128" value="0" />
<templateItem name="RC4 40/128" value="0" />
<templateItem name="RC4 56/128" value="0" />
<templateItem name="RC4 64/128" value="0" />
<templateItem name="RC4 128/128" value="0" />
<templateItem name="Triple DES 168" value="-1" />
<templateItem name="AES 128/128" value="-1" />
<templateItem name="AES 256/256" value="-1" />
</ciphers>
<hashes>
<templateItem name="MD5" value="-1" />
<templateItem name="SHA" value="-1" />
<templateItem name="SHA 256" value="-1" />
<templateItem name="SHA 384" value="-1" />
<templateItem name="SHA 512" value="-1" />
</hashes>
<keyExchanges>
<templateItem name="Diffie-Hellman" value="-1" />
<templateItem name="PKCS" value="-1" />
<templateItem name="ECDH" value="-1" />
</keyExchanges>
</schannel>
<advanced>
<templateItem name="Override Enabled" value="0" />
<templateItem name="DHE Minimum Key Length" value="2048" />
<templateItem name="FIPS Algorithm Policy" value="0" />
</advanced>
<cipherSuites>
<templateItem name="Configured Cipher Suites" value="TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA" minimumOSVersion="Windows2016" />
</cipherSuites>
</iisCryptoTemplate>

Once the IISCrypto settings are set back to default - the error goes away.

Given that "everything else" seems to work - it seems strange that this one service would use an older TLS version or cipher suite.

Microsoft Security | Intune | Configuration Manager | Updates
0 comments No comments
{count} votes

3 answers

Sort by: Most helpful
  1. AllenLiu-MSFT 49,316 Reputation points Microsoft External Staff
    2022-01-07T06:30:02.323+00:00

    Hi, @Ben Wosjke
    Thank you for posting in Microsoft Q&A forum.

    I see someone met the same issue after disable TLS 1.0, we need to enable TLS 1.0 on the database server before the upgrade.

    For your reference:
    https://social.technet.microsoft.com/Forums/en-US/091827f0-de50-43ff-9098-baec596857f4/sccm-installation-requires-tls-10-prereqchkexe-fails-if-tls-10-is-disabled?forum=ConfigMgrDeployment


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


    0 comments No comments

  2. Ben Wosjke 136 Reputation points
    2022-01-10T03:52:50.757+00:00

    Hey - thanks for the answer.

    if you follow that link through - https://learn.microsoft.com/en-US/mem/configmgr/core/plan-design/security/enable-tls-1-2-server

    So - All clients are windows 10 - so the client side is taken care of.

    Site servers are Windows Server 2019 with .NET framework 4.8 and SQL 2019 (with latest patches applied) - so that means that

    • TLS 1.2 is enabled by default
    • The .NET framework version is supported
    • WSUS is the latest version

    SQL native client is the latest version which - as required by the MECM prereq checker.

    So that's all those boxes ticked.

    A extremely similar issue is listed as a "common issue" at https://learn.microsoft.com/en-us/mem/configmgr/core/plan-design/security/enable-tls-1-2-troubleshoot

    So basically, not only when running the original setup, and the in-console upgrades - TLS 1.0 is expected to enabled... which is pretty bad for anywhere that implements basic security hardening on servers. Surely this should be considered a bug ?

    0 comments No comments

  3. AllenLiu-MSFT 49,316 Reputation points Microsoft External Staff
    2022-01-10T09:44:36.007+00:00

    Hi, @Ben Wosjke

    Thanks for the detailed info. According to your description, I do understand how frustrated you are now.

    I'd suggest you so send a frown about this issue:
    https://learn.microsoft.com/en-us/mem/configmgr/core/understand/product-feedback#send-a-frown

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.