{"id":29395,"date":"2023-04-22T00:25:31","date_gmt":"2023-04-21T22:25:31","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=29395"},"modified":"2023-04-21T14:59:05","modified_gmt":"2023-04-21T12:59:05","slug":"windows-april-2023-updates-netlogon-und-kerberos-protokoll-anderungen-es-gibt-probleme","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/04\/22\/windows-april-2023-updates-netlogon-und-kerberos-protokoll-anderungen-es-gibt-probleme\/","title":{"rendered":"Windows April 2023 Updates: Netlogon- and Kerberos protocol changes, there seems to be issues"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2023\/04\/20\/windows-april-2023-updates-netlogon-und-kerberos-protokoll-nderungen-es-gibt-probleme\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft has indeed postponed its schedules for phased adjustments to the Netlogon protocol (due to CVE-2022-38023) and the Kerberos protocol from April 11, 2023 to June 13, 2023. But with the Windows update of April 11, 2023, the option to disable RPC sealing in the registry has already been removed. In the meantime, the first problems are being reported and a Microsoft employee has just asked administrators to test the systems, as I saw on Twitter.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/4cf3e8a35c8742c784ea203bed8d5a88\" alt=\"\" width=\"1\" height=\"1\" \/>In November 2022, Microsoft had initiated a phased change to the Netlogon and Kerberos protocols with its security updates, which should last until October 2023. The reason is three vulnerabilities (CVE-2022-38023 and CVE-2022-37967) in Windows. Administrators must respond accordingly to ensure that these changes are reflected in network communications (see my blog post <a href=\"https:\/\/borncity.com\/win\/2022\/11\/10\/updates-for-windows-nov-2022-changes-in-netlogon-and-kerberos-protocol-causing-issues\/\">Updates for Windows (Nov. 2022): Changes in Netlogon and Kerberos protocol \u2013 causing issues<\/a>). The next change should take effect on April 11, 2023.<\/p>\n<h2>April 2023 security updates<\/h2>\n<p>In April 2023, Microsoft had actually planned the next step by activating the so-called enforcement mode for RPC sealing. However, Microsoft postponed this step to June 11, 2023, as can be read in the support article <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25\" target=\"_blank\" rel=\"noopener\">KB5021130: How to manage the Netlogon protocol changes related to CVE-2022-38023<\/a> and in the article <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb\" target=\"_blank\" rel=\"noopener\">KB5020805: How to manage Kerberos protocol changes related to CVE-2022-37967<\/a>. It says there:<\/p>\n<blockquote><p><b>April 5, 2023:<\/b> Moved the \"Enforcement by Default\" phase of the registry key from April 11, 2023 to June 13, 2023 in the \"Timing of updates to address CVE-2022-38023\" section.<\/p><\/blockquote>\n<p>AHowever, support post <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25\" target=\"_blank\" rel=\"noopener\">KB5021130: How to manage the Netlogon protocol changes related to CVE-2022-38023<\/a> also states that the April 11, 2023 security update (i.e., April 2023 patchday) initiates the Initial Inforcement phase.<\/p>\n<blockquote><p>The Windows updates released on or after April 11, 2023 will remove the ability to disable RPC sealing by setting value <b>0<\/b> to the <b>RequireSeal<\/b> registry subkey.<\/p><\/blockquote>\n<p>If the April 2023 update is installed on Windows, RPC sealing cannot be disabled by setting the RequireSeal registry value to 0. For the KrbtgtFullPacSignature key, the enforcement mode does not become active until June 13, 2023 (see <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb\" target=\"_blank\" rel=\"noopener\">KB5020805: How to manage Kerberos protocol changes related to CVE-2022-37967<\/a>). However, the April 2023 patches may already cause disruptions to KrbPAC &amp; RPCNetLogonSeal.<\/p>\n<h2>Disruption due to April 2023 update?<\/h2>\n<p>German blog reader Florian T. already emailed me about potential problems related to the protocol changes on April 12, 2023 and wrote.<\/p>\n<blockquote><p>Hello Mr. Born,<\/p>\n<p>a tip for an article: The patch for Kerberos PAC signatures goes into its third phase and enforces the Kerberos PAC signature (krb pac shutdown is disabled). For analysis of where this is missing, see Using Windows Eventlog Eventid 43 or 44.<\/p>\n<p>The patch that enforces RPC Netlogon Sealing and removes RPC Netlogon Signing was also included. Can be analyzed in advance by Windows Eventlog Eventids 5838-5841.<\/p>\n<p>Some vendors have already published warnings for outages, e.g. Netapp and Ivanti vpn (formerly pulsevpn).<\/p><\/blockquote>\n<p><img decoding=\"async\" title=\"Netlogon protocol changes\" src=\"https:\/\/i.imgur.com\/ho4QEVQ.png\" alt=\"Netlogon protocol changes\" \/><\/p>\n<p>The screenshot above shows the excerpt from one of the following Microsoft support articles Florian links to in his mail (thanks for that).<\/p>\n<ul>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb\" target=\"_blank\" rel=\"noopener\">KB5020805: How to manage Kerberos protocol changes related to CVE-2022-37967<\/a><\/li>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25\" target=\"_blank\" rel=\"noopener\">KB5021130: How to manage the Netlogon protocol changes related to CVE-2022-38023<\/a><\/li>\n<\/ul>\n<p>Administrators should therefore read the two support articles again and test their Windows Server environments for corresponding problems.<\/p>\n<h2>Test the enforcement mode!<\/h2>\n<p>Recently the following tweet from Microsoft's Ryan Ries has come to my attention. Ries asks all administrators, especially those using third-party devices like NetApp storage, to test Enforcent Mode as soon as possible.<\/p>\n<p><a href=\"https:\/\/twitter.com\/JosephRyanRies\/status\/1648724225773953024\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Test Netlogon protocol changes Enforement\" src=\"https:\/\/i.imgur.com\/dG2tJWE.png\" alt=\"Test Netlogon protocol changes Enforement\" \/><\/a><\/p>\n<p>Ries notes: <em>Nothing is confirmed yet, but I'm increasingly getting internal reports that this might not go as smoothly as we think<\/em>. Administrators should not wait with testing &#8211; and if necessary updating &#8211; the necessary software until the last minute. Otherwise, there will be a rude awakening in June 2023.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft has indeed postponed its schedules for phased adjustments to the Netlogon protocol (due to CVE-2022-38023) and the Kerberos protocol from April 11, 2023 to June 13, 2023. But with the Windows update of April 11, 2023, the option to &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/04\/22\/windows-april-2023-updates-netlogon-und-kerberos-protokoll-anderungen-es-gibt-probleme\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1319,1547],"tags":[2794,166,69],"class_list":["post-29395","post","type-post","status-publish","format-standard","hentry","category-general","category-software","tag-edge-windows","tag-issues","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/29395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=29395"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/29395\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=29395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=29395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=29395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}