|
| 1 | +--- |
| 2 | +title: Transport Layer Security in Azure Site Recovery |
| 3 | +description: Learn how to enable Azure Site Recovery to use the encryption protocol Transport Layer Security (TLS) to keep data secure when being transferred over a network. |
| 4 | +ms.topic: conceptual |
| 5 | +ms.date: 11/01/2020 |
| 6 | +--- |
| 7 | + |
| 8 | +# Transport Layer Security in Azure Site Recovery |
| 9 | + |
| 10 | +Transport Layer Security (TLS) is an encryption protocol that keeps data secure when being transferred over a network. Azure Site Recovery uses TLS to protect the privacy of data being transferred. Azure Site Recovery now uses TLS 1.2 protocol, for improved security. |
| 11 | + |
| 12 | +## Enable TLS on older versions of Windows |
| 13 | + |
| 14 | +If the machine is running earlier versions of Windows, ensure to install the corresponding updates as detailed below and make the registry changes as documented in the respective KB articles. |
| 15 | + |
| 16 | +|Operating system |KB article | |
| 17 | +|---------|---------| |
| 18 | +|Windows Server 2008 SP2 | <https://support.microsoft.com/help/4019276> | |
| 19 | +|Windows Server 2008 R2, Windows 7, Windows Server 2012 | <https://support.microsoft.com/help/3140245> | |
| 20 | + |
| 21 | +>[!NOTE] |
| 22 | +>The update installs the required components for the protocol. After installation, to enable the required protocols, ensure to update the registry keys as mentioned in the above KB articles. |
| 23 | +
|
| 24 | +## Verify Windows registry |
| 25 | + |
| 26 | +### Configure SChannel protocols |
| 27 | + |
| 28 | +The following registry keys ensure that the TLS 1.2 protocol is enabled at the SChannel component level: |
| 29 | + |
| 30 | +```reg |
| 31 | +[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client] |
| 32 | + "Enabled"=dword:00000001 |
| 33 | +
|
| 34 | +[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client] |
| 35 | + "DisabledByDefault"=dword:00000000 |
| 36 | +``` |
| 37 | + |
| 38 | +>[!NOTE] |
| 39 | +>By default, the above registry keys are set in values shown are set in Windows Server 2012 R2 and later versions. For these versions of Windows, if the registry keys are absent, you do not need to create them. |
| 40 | +
|
| 41 | +### Configure .NET Framework |
| 42 | + |
| 43 | +Use the following registry keys to configure .NET Framework that supports strong cryptography. Learn more about [configuring .NET Framework here](/dotnet/framework/network-programming/tls#configuring-schannel-protocols-in-the-windows-registry). |
| 44 | + |
| 45 | +```reg |
| 46 | +[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319] |
| 47 | + "SystemDefaultTlsVersions"=dword:00000001 |
| 48 | + "SchUseStrongCrypto" = dword:00000001 |
| 49 | +
|
| 50 | +[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319] |
| 51 | + "SystemDefaultTlsVersions"=dword:00000001 |
| 52 | + "SchUseStrongCrypto" = dword:00000001 |
| 53 | +``` |
| 54 | + |
| 55 | +## Frequently asked questions |
| 56 | + |
| 57 | +### Why enable TLS 1.2? |
| 58 | + |
| 59 | +TLS 1.2 is more secure than previous cryptographic protocols such as SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1. Azure Site Recovery services fully support TLS 1.2. |
| 60 | + |
| 61 | +### What determines the encryption protocol used? |
| 62 | + |
| 63 | +The highest protocol version supported by both the client and server is negotiated to establish the encrypted conversation. For more information on the TLS handshake protocol, see [Establishing a Secure Session by using TLS](/windows/win32/secauthn/tls-handshake-protocol#establishing-a-secure-session-by-using-tls). |
| 64 | + |
| 65 | +### What is the impact if TLS 1.2 is not enabled? |
| 66 | + |
| 67 | +For improved security from protocol downgrade attacks, Azure Site Recovery is beginning to disable TLS versions older than 1.2. This is part of a long-term shift across services to disallow legacy protocol and cipher suite connections. Azure Site Recovery services and components fully support TLS 1.2. However, Windows versions lacking required updates or certain customized configurations can still prevent TLS 1.2 protocols being offered. This can cause failures including but not limited to one or more of the following: |
| 68 | + |
| 69 | +- Replication may fail at source. |
| 70 | +- Azure Site Recovery components connections failures with error 10054 (An existing connection was forcibly closed by the remote host). |
| 71 | +- Services related to Azure Site Recovery won't stop or start as usual. |
| 72 | + |
| 73 | +## Additional resources |
| 74 | + |
| 75 | +- [Transport Layer Security Protocol](/windows/win32/secauthn/transport-layer-security-protocol) |
| 76 | +- [Ensuring support for TLS 1.2 across deployed operating systems](/security/engineering/solving-tls1-problem#ensuring-support-for-tls-12-across-deployed-operating-systems) |
| 77 | +- [Transport layer security (TLS) best practices with the .NET Framework](/dotnet/framework/network-programming/tls) |
0 commit comments