<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vsphere 7 RC4 warning on Domain Controllers in VMware vSphere™ Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-vSphere-Discussions/Vsphere-7-RC4-warning-on-Domain-Controllers/m-p/2984737#M45985</link>
    <description>&lt;P&gt;I'm late to party.&amp;nbsp; What a cluster.&amp;nbsp; Wish Microsoft would put more effort toward simplified OS administration rather than the next O365 feature I don't care about...&lt;/P&gt;&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/what-happened-to-kerberos-authentication-after-installing-the/ba-p/3696351" target="_blank" rel="noopener"&gt;https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/what-happened-to-kerberos-authentication-after-installing-the/ba-p/3696351&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.microsoft.com/en-gb/topic/kb5021131-how-to-manage-the-kerberos-protocol-changes-related-to-cve-2022-37966-fd837ac3-cdec-4e76-a6ec-86e67501407d" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-gb/topic/kb5021131-how-to-manage-the-kerberos-protocol-changes-related-to-cve-2022-37966-fd837ac3-cdec-4e76-a6ec-86e67501407d&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/takondo/11Bchecker" target="_blank" rel="noopener"&gt;https://github.com/takondo/11Bchecker&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I need to test / verify in a lab first.&lt;/P&gt;&lt;P&gt;(May correct me if I'm wrong) - But the to the point summary is if you are certain your AD environment doesn't need RC4 then Microsoft recommendation is to:&lt;/P&gt;&lt;P&gt;Current Server Update&lt;/P&gt;&lt;P&gt;Default DC GPO&amp;nbsp; --&amp;gt;&amp;nbsp;&amp;nbsp;Configure encryption types allowed for Kerberos' policy --&amp;gt; only enable AES&lt;/P&gt;&lt;P&gt;(Each DC) - HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\KDC&lt;/P&gt;&lt;P&gt;REG_DWORD = DefaultDomainSupportedEncTypes&lt;/P&gt;&lt;P&gt;Value = 0x38&lt;/P&gt;&lt;P&gt;With this setup only AES for tickets + sessions and the "msDS-SupportedEncryptionTypes" attribute with null values will no longer need to be specified.&amp;nbsp; (And will then fail authentication for object using Kerberos RC4)&lt;/P&gt;</description>
    <pubDate>Wed, 30 Aug 2023 22:16:26 GMT</pubDate>
    <dc:creator>SayNo2HyperV</dc:creator>
    <dc:date>2023-08-30T22:16:26Z</dc:date>
    <item>
      <title>Vsphere 7 RC4 warning on Domain Controllers</title>
      <link>https://communities.vmware.com/t5/VMware-vSphere-Discussions/Vsphere-7-RC4-warning-on-Domain-Controllers/m-p/2984700#M45984</link>
      <description>&lt;P&gt;With VC AD integrated our DCs are logging:&lt;/P&gt;&lt;P&gt;Netlogon 5840&lt;BR /&gt;&lt;SPAN&gt;The Netlogon service created a secure channel with a client with RC4.&lt;BR /&gt;&lt;/SPAN&gt;Account Name: VC$&lt;BR /&gt;Domain: mydomain.local&lt;BR /&gt;Account Type: Domain Member&lt;BR /&gt;Client IP Address:&lt;BR /&gt;Negotiated Flags: 6007ffff&lt;BR /&gt;For more information about why this was logged, please visit &lt;A href="https://go.microsoft.com/fwlink/?linkid=2209514" target="_blank"&gt;https://go.microsoft.com/fwlink/?linkid=2209514&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;A href="https://kb.vmware.com/s/article/90227" target="_blank"&gt;https://kb.vmware.com/s/article/90227&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://communities.vmware.com/t5/VMware-vCenter-Discussions/Change-vCenter-RC4-Kerberos-tickets-to-AES/td-p/2948035" target="_blank"&gt;https://communities.vmware.com/t5/VMware-vCenter-Discussions/Change-vCenter-RC4-Kerberos-tickets-to-AES/td-p/2948035&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I've made the change yesterday to&amp;nbsp;&lt;SPAN&gt;msDS-SupportedEncryptionTypes = 24&lt;BR /&gt;But still getting log warning every ~6 hours.&amp;nbsp; How to disable RC4 from being used?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 18:19:39 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vSphere-Discussions/Vsphere-7-RC4-warning-on-Domain-Controllers/m-p/2984700#M45984</guid>
      <dc:creator>SayNo2HyperV</dc:creator>
      <dc:date>2023-08-30T18:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: Vsphere 7 RC4 warning on Domain Controllers</title>
      <link>https://communities.vmware.com/t5/VMware-vSphere-Discussions/Vsphere-7-RC4-warning-on-Domain-Controllers/m-p/2984737#M45985</link>
      <description>&lt;P&gt;I'm late to party.&amp;nbsp; What a cluster.&amp;nbsp; Wish Microsoft would put more effort toward simplified OS administration rather than the next O365 feature I don't care about...&lt;/P&gt;&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/what-happened-to-kerberos-authentication-after-installing-the/ba-p/3696351" target="_blank" rel="noopener"&gt;https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/what-happened-to-kerberos-authentication-after-installing-the/ba-p/3696351&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.microsoft.com/en-gb/topic/kb5021131-how-to-manage-the-kerberos-protocol-changes-related-to-cve-2022-37966-fd837ac3-cdec-4e76-a6ec-86e67501407d" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-gb/topic/kb5021131-how-to-manage-the-kerberos-protocol-changes-related-to-cve-2022-37966-fd837ac3-cdec-4e76-a6ec-86e67501407d&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/takondo/11Bchecker" target="_blank" rel="noopener"&gt;https://github.com/takondo/11Bchecker&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I need to test / verify in a lab first.&lt;/P&gt;&lt;P&gt;(May correct me if I'm wrong) - But the to the point summary is if you are certain your AD environment doesn't need RC4 then Microsoft recommendation is to:&lt;/P&gt;&lt;P&gt;Current Server Update&lt;/P&gt;&lt;P&gt;Default DC GPO&amp;nbsp; --&amp;gt;&amp;nbsp;&amp;nbsp;Configure encryption types allowed for Kerberos' policy --&amp;gt; only enable AES&lt;/P&gt;&lt;P&gt;(Each DC) - HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\KDC&lt;/P&gt;&lt;P&gt;REG_DWORD = DefaultDomainSupportedEncTypes&lt;/P&gt;&lt;P&gt;Value = 0x38&lt;/P&gt;&lt;P&gt;With this setup only AES for tickets + sessions and the "msDS-SupportedEncryptionTypes" attribute with null values will no longer need to be specified.&amp;nbsp; (And will then fail authentication for object using Kerberos RC4)&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 22:16:26 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vSphere-Discussions/Vsphere-7-RC4-warning-on-Domain-Controllers/m-p/2984737#M45985</guid>
      <dc:creator>SayNo2HyperV</dc:creator>
      <dc:date>2023-08-30T22:16:26Z</dc:date>
    </item>
  </channel>
</rss>

