Asked by:
2003 servers failing with 80072EFE after SSL implementation

Question
-
Hello.
I recently changed our WSUS implementation to utilize SSL and created a new downstream WSUS server on 2008 R2 from scratch for this purpose. All windows 7 x64 and 2008 servers work fine using the new SSL server via SSL.
All 2003 servers fail with 80072EFE. They are receiving the exact same WSUS group policy settings as the clients that work. If I attempt to access https://<wsusserver FQDN>/selfupdate/wuident.cab from a 2003 server, it fails with "page cannot be displayed". If I access http://<wsusserver FQDN>, it comes up with the IIS 7 homepage.
80072EFE means "connection aborted". So I assume there is some reason the 2008 IIS is terminating the SSL connections from 2003 servers.
I have searched and found others with the same problem, such as https://social.technet.microsoft.com/Forums/windowsserver/en-US/8d51f26f-d5fb-415c-8055-f2edb795bf3f/some-clients-not-registering-with-wsus-server-with-error-0x80072efe?forum=winserverwsus and https://social.technet.microsoft.com/Forums/fr-FR/e227fcc1-b613-4a00-8f42-d56c7fbc085c/wsus-server-does-not-show-up-in-windows-update-services-80072efe-error-as-well?forum=winserverwsus, and others, however, none have resolved my situation.
I have installed KB2992611 because I read someone else had solved it after installing this. It did not fix my situation. I need help in understanding why my 2003 servers are unable to connect via SSL to my WSUS with error 80072efe, when windows 7 and 2008 clients connect fine. Again, if I attempt to access https://<wsusserver FQDN>/selfupdate/wuident.cab from a 2003 server, it fails with "page cannot be displayed", whereas browsing to that same URL from a windows 7 or 2008 server works.
Please help
Wednesday, September 30, 2015 4:08 PM
All replies
-
Lawrence Garvin where you @? Holla at an MCSE!
Thursday, October 1, 2015 1:52 PM -
Hi,
>>Again, if I attempt to access https://<wsusserver FQDN>/selfupdate/wuident.cab from a 2003 server, it fails with "page cannot be displayed", whereas browsing to that same URL from a windows 7 or 2008 server works.
Have you enabled SSL on the selfupdate? If yes, please disable it.
For detailed information, please refer to the link below:
Also, please make sure that the 2003 server trusts the certificate used by the WSUS server.
If issue persists, please try to enable SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 on the 2003 server.
If it still doesn't work, please post the windowsupdate.log here, it may give some hints.
Best Regards.
Steven Lee Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact tnmff@microsoft.com.
Wednesday, October 7, 2015 6:32 AM -
Hi Steven,
I do not have SSL enabled on the selfupdate, and everything was set up wrt SSL enabled/disabled per the article you linked to. The 2003 server has the public key portion of the cert in its "Trusted Root Certification Authorities" and everything seems fine there.
I have enabled SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 on the 2003 (both client and server) via registry settings per KB245030 using the "DisabledByDefault" DWORD value set to 0, and I also enabled them on the 2008 R2 WSUS (both client and server) using the "Enabled" DWORD set to 0xffffffff.
I still am getting the same.
I also should note that the certificate being used by this WSUS uses SHA256. I installed KB968730 which addresses an issue with 2003 servers being unable to autoenroll for certs using SHA256 or higher, but that seemed to make no difference.
2015-10-07 09:50:51:812 836 104 Misc =========== Logging initialized (build: 7.0.6000.374, tz: -0400) =========== 2015-10-07 09:50:51:812 836 104 Misc = Process: C:\WINDOWS\System32\svchost.exe 2015-10-07 09:50:51:812 836 104 Misc = Module: C:\WINDOWS\system32\wuaueng.dll 2015-10-07 09:50:51:812 836 104 Service ************* 2015-10-07 09:50:51:812 836 104 Service ** START ** Service: Service startup 2015-10-07 09:50:51:812 836 104 Service ********* 2015-10-07 09:50:52:234 836 104 Misc Registering binary: C:\WINDOWS\system32\regsvr32.exe /s "C:\WINDOWS\system32\wups.dll" 2015-10-07 10:07:25:121 836 104 Misc Registering binary: C:\WINDOWS\system32\regsvr32.exe /s "C:\WINDOWS\system32\wups2.dll" 2015-10-07 10:07:26:261 836 104 Agent * WU client version 7.0.6000.374 2015-10-07 10:07:26:261 836 104 Agent * Base directory: C:\WINDOWS\SoftwareDistribution 2015-10-07 10:07:26:261 836 104 Agent * Access type: No proxy 2015-10-07 10:07:26:261 836 104 Agent * Network state: Connected 2015-10-07 10:02:14:201 836 104 Report *********** Report: Initializing static reporting data *********** 2015-10-07 10:02:14:201 836 104 Report * OS Version = 5.2.3790.2.0.196882 2015-10-07 10:02:14:295 836 104 Report * Computer Brand = VMware, Inc. 2015-10-07 10:02:14:295 836 104 Report * Computer Model = VMware Virtual Platform 2015-10-07 10:02:14:295 836 104 Report * Bios Revision = 6.00 2015-10-07 10:02:14:295 836 104 Report * Bios Name = PhoenixBIOS 4.0 Release 6.0 2015-10-07 10:02:14:295 836 104 Report * Bios Release Date = 2012-06-22T00:00:00 2015-10-07 10:02:14:295 836 104 Report * Locale ID = 1033 2015-10-07 10:02:14:467 836 104 AU ########### AU: Uninitializing Automatic Updates ########### 2015-10-07 10:02:15:420 836 104 Service ********* 2015-10-07 10:02:15:420 836 104 Service ** END ** Service: Service exit [Exit code = 0x240001] 2015-10-07 10:02:15:420 836 104 Service ************* 2015-10-07 10:02:24:433 836 be4 Misc =========== Logging initialized (build: 7.0.6000.374, tz: -0400) =========== 2015-10-07 10:02:24:433 836 be4 Misc = Process: C:\WINDOWS\System32\svchost.exe 2015-10-07 10:02:24:433 836 be4 Misc = Module: C:\WINDOWS\system32\wuaueng.dll 2015-10-07 10:02:24:433 836 be4 Service ************* 2015-10-07 10:02:24:433 836 be4 Service ** START ** Service: Service startup 2015-10-07 10:02:24:433 836 be4 Service ********* 2015-10-07 10:02:24:433 836 be4 Agent * WU client version 7.0.6000.374 2015-10-07 10:02:24:433 836 be4 Agent * Base directory: C:\WINDOWS\SoftwareDistribution 2015-10-07 10:02:24:433 836 be4 Agent * Access type: No proxy 2015-10-07 10:02:24:433 836 be4 Agent * Network state: Connected 2015-10-07 10:02:52:457 836 760 Agent *********** Agent: Initializing Windows Update Agent *********** 2015-10-07 10:02:52:457 836 760 Agent *********** Agent: Initializing global settings cache *********** 2015-10-07 10:02:52:457 836 760 Agent * WSUS server: https://<WSUS FQDN> 2015-10-07 10:02:52:457 836 760 Agent * WSUS status server: https://<WSUS FQDN> 2015-10-07 10:02:52:457 836 760 Agent * Target group: Servers critical 2015-10-07 10:02:52:457 836 760 Agent * Windows Update access disabled: No 2015-10-07 10:02:52:614 836 be4 Report *********** Report: Initializing static reporting data *********** 2015-10-07 10:02:52:614 836 be4 Report * OS Version = 5.2.3790.2.0.196882 2015-10-07 10:02:52:692 836 be4 Report * Computer Brand = VMware, Inc. 2015-10-07 10:02:52:692 836 be4 Report * Computer Model = VMware Virtual Platform 2015-10-07 10:02:52:692 836 be4 Report * Bios Revision = 6.00 2015-10-07 10:02:52:692 836 be4 Report * Bios Name = PhoenixBIOS 4.0 Release 6.0 2015-10-07 10:02:52:692 836 be4 Report * Bios Release Date = 2012-06-22T00:00:00 2015-10-07 10:02:52:692 836 be4 Report * Locale ID = 1033 2015-10-07 10:02:52:879 836 760 DnldMgr Download manager restoring 0 downloads 2015-10-07 10:02:52:989 836 760 AU ########### AU: Initializing Automatic Updates ########### 2015-10-07 10:02:53:004 836 760 AU # WSUS server: https://<WSUS FQDN> 2015-10-07 10:02:53:004 836 760 AU # Detection frequency: 1 2015-10-07 10:02:53:004 836 760 AU # Target group: Servers critical 2015-10-07 10:02:53:004 836 760 AU # Approval type: Pre-install notify (Policy) 2015-10-07 10:02:53:004 836 760 AU # Auto-install minor updates: No (User preference) 2015-10-07 10:02:53:067 836 760 AU AU finished delayed initialization 2015-10-07 10:02:53:067 836 760 AU Triggering AU detection through DetectNow API 2015-10-07 10:02:53:067 836 760 AU Triggering Online detection (non-interactive) 2015-10-07 10:02:53:067 836 be4 AU ############# 2015-10-07 10:02:53:067 836 be4 AU ## START ## AU: Search for updates 2015-10-07 10:02:53:067 836 be4 AU ######### 2015-10-07 10:02:53:067 836 be4 AU <<## SUBMITTED ## AU: Search for updates [CallId = {FD03796D-4D20-4A79-9C33-B548463B5CE5}] 2015-10-07 10:02:53:067 836 974 Agent ************* 2015-10-07 10:02:53:067 836 974 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates] 2015-10-07 10:02:53:067 836 974 Agent ********* 2015-10-07 10:02:53:067 836 974 Agent * Online = Yes; Ignore download priority = No 2015-10-07 10:02:53:067 836 974 Agent * Criteria = "IsHidden=0 and IsInstalled=0 and DeploymentAction='Installation' and IsAssigned=1 or IsHidden=0 and IsPresent=1 and DeploymentAction='Uninstallation' and IsAssigned=1 or IsHidden=0 and IsInstalled=1 and DeploymentAction='Installation' and IsAssigned=1 and RebootRequired=1 or IsHidden=0 and IsInstalled=0 and DeploymentAction='Uninstallation' and IsAssigned=1 and RebootRequired=1" 2015-10-07 10:02:53:067 836 974 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} 2015-10-07 10:02:53:598 836 974 Misc WARNING: Send failed with hr = 80072efe. 2015-10-07 10:02:53:598 836 974 Misc WARNING: SendRequest failed with hr = 80072efe. Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <> 2015-10-07 10:02:53:598 836 974 Misc WARNING: WinHttp: SendRequestUsingProxy failed for <https://<WSUS FQDN>/selfupdate/wuident.cab>. error 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: Send failed with hr = 80072efe. 2015-10-07 10:02:53:613 836 974 Misc WARNING: SendRequest failed with hr = 80072efe. Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <> 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestUsingProxy failed for <https://<WSUS FQDN>/selfupdate/wuident.cab>. error 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: Send failed with hr = 80072efe. 2015-10-07 10:02:53:613 836 974 Misc WARNING: SendRequest failed with hr = 80072efe. Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <> 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestUsingProxy failed for <https://<WSUS FQDN>/selfupdate/wuident.cab>. error 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: Send failed with hr = 80072efe. 2015-10-07 10:02:53:613 836 974 Misc WARNING: SendRequest failed with hr = 80072efe. Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <> 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestUsingProxy failed for <https://<WSUS FQDN>/selfupdate/wuident.cab>. error 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072efe 2015-10-07 10:02:53:613 836 974 Misc WARNING: DownloadFileInternal failed for https://<WSUS FQDN>/selfupdate/wuident.cab: error 0x80072efe 2015-10-07 10:02:53:613 836 974 Setup FATAL: IsUpdateRequired failed with error 0x80072efe 2015-10-07 10:02:53:613 836 974 Setup WARNING: SelfUpdate: Default Service: IsUpdateRequired failed: 0x80072efe 2015-10-07 10:02:53:613 836 974 Setup WARNING: SelfUpdate: Default Service: IsUpdateRequired failed, error = 0x80072EFE 2015-10-07 10:02:53:613 836 974 Agent * WARNING: Skipping scan, self-update check returned 0x80072EFE 2015-10-07 10:02:53:629 836 974 Agent * WARNING: Exit code = 0x80072EFE 2015-10-07 10:02:53:629 836 974 Agent ********* 2015-10-07 10:02:53:629 836 974 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates] 2015-10-07 10:02:53:629 836 974 Agent ************* 2015-10-07 10:02:53:629 836 974 Agent WARNING: WU client failed Searching for update with error 0x80072efe 2015-10-07 10:02:53:629 836 c18 AU >>## RESUMED ## AU: Search for updates [CallId = {FD03796D-4D20-4A79-9C33-B548463B5CE5}] 2015-10-07 10:02:53:629 836 c18 AU # WARNING: Search callback failed, result = 0x80072EFE 2015-10-07 10:02:53:629 836 c18 AU # WARNING: Failed to find updates with error code 80072EFE 2015-10-07 10:02:53:629 836 c18 AU ######### 2015-10-07 10:02:53:629 836 c18 AU ## END ## AU: Search for updates [CallId = {FD03796D-4D20-4A79-9C33-B548463B5CE5}] 2015-10-07 10:02:53:629 836 c18 AU ############# 2015-10-07 10:02:53:629 836 c18 AU AU setting next detection timeout to 2015-10-07 14:58:51 2015-10-07 10:02:57:691 836 974 Report REPORT EVENT: {00D64DFB-86F8-4B24-9F3F-BAF7D043BD41} 2015-10-07 10:02:53:613-0400 1 148 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 0 80072efe SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x80072efe.
The other thing I noticed is that Windows 7 clients can connect to both https://<wsusserver FQDN>/selfupdate/wuident.cab and http://<wsusserver FQDN>/selfupdate/wuident.cab successfully and download the file from either even though SSL is not enabled for the selfupdate in IIS.
The 2003 servers are still getting "page cannot be displayed" when attempting https://<wsusserver FQDN>/selfupdate/wuident.cab via browser. However, http://<wsusserver FQDN>/selfupdate/wuident.cab works fine. Unfortunately as you can see, the windows update agent attempts https://<wsusserver FQDN>/selfupdate/wuident.cab (presumably because it pulled that from the GPO).
Another test I did was just creating a simple "test" directory within IIS on the WSUS server, with a "test.txt", directory browsing enabled, and SSL required. I can access it fine via Windows 7. However, the 2003 server gives "page cannot be displayed" on this simple "test" directory as well. The properties of the page when loaded in windows 7 shows it using TLS 1.0. So the root of the problem seems to be the 2003 servers unable to establish a basic TLS 1.0 connection with the IIS on the 2008 R2 WSUS server.
- Edited by KCSteele Wednesday, October 7, 2015 3:36 PM
Wednesday, October 7, 2015 2:23 PM -
Hi,
Sorry for the delay.
>>So the root of the problem seems to be the 2003 servers unable to establish a basic TLS 1.0 connection with the IIS on the 2008 R2 WSUS server.
Totally agree.
>>2015-10-07 10:02:53:613 836 974 Misc WARNING: DownloadFileInternal failed for https://<WSUS FQDN>/selfupdate/wuident.cab: error 0x80072efe
2015-10-07 10:02:53:613 836 974 Setup FATAL: IsUpdateRequired failed with error 0x80072efeError 0x80072efe means that the connection with the server was terminated abnormally.
In most cases, this issue occurs because the server doesn't support the cipher suits supported by clients.
If capture the session between client and server, we will find that the server sends a reset after receiving the Client Hello packet. We can check the detailed information of the Client Hello, the protocol and cipher suits supported by clients are logged there.
To find the detailed reason why this connection is terminated, we can check the event log of server.
Best Regards.
Steven Lee Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact tnmff@microsoft.com.
Tuesday, October 20, 2015 9:52 AM -
Hi Steven,
Thanks for the reply. I am getting lots of errors from source SCHANNEL, the same two repeat over and over: 36888 and 36874.
36874: An TLS 1.0 connection request was received from a remote client application, but none of the cipher suites supported by the client application are supported by the server. The SSL connection request has failed.
36888: The following fatal alert was generated: 40. The internal error state is 1205.
Currently, I have the following registry keys set on the WSUS server to disable TLS 1.1 and TLS 1.2 as those apparently are not supported by 2003 server:
HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server - "DisabledByDefault" = 00000000 - "Enabled" = 00000000 HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server - "DisabledByDefault" = 00000000 - "Enabled" = 00000000 HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server - "DisabledByDefault" = 00000000
I initially had a self-signed cert that was created with makecert and using SHA256. I have replaced it with one using SHA1, however, 2003 servers still are unable to connect.
What you mentioned about the packet capture I also have seen detailed in a couple blog posts about similar issues. In this technet forum post the person recommends :
"you can try to generate the certificate request using the CNG Key template in the custom certificate request wizard."
Here is another discussion about similar.
If the certificate being used on the server was generated using the Legacy Key option in the certificate request form, the private key for that certificate will be stored in Microsoft's legacy Cryptographic API framework. When the web server tries to process requests using its new, Cryptographic Next Generation (CNG) framework, it appears that something related to the RSA private key stored in the legacy framework is unavailable to the new framework. As a result, the use of the RSA cipher suites is severely limited. Solution: Generate the certificate request using the CNG Key template in the custom certificate request wizard. MMC | Local Computer Certificate Manager | Personal Certificates Folder | (right click) | All Tasks -> Advanced Operations | Create Custom Request | "Proceed without enrollment policy" | select "(no template) CNG key" | proceed to complete the certificate request according to your needs.
However, I am unsure how to do this with a self-signed certificate and makecert.
- Edited by KCSteele Thursday, October 22, 2015 2:35 PM
Thursday, October 22, 2015 2:34 PM