05-22-2023 06:00 AM
Several of my clients use Duo Authentication for Remote Desktop Gateway and Duo for Remote Desktop Web Access. They’ve all received the email about TLS 1.0 and 1.1 been depreciated and that they have devices still using these protocols. The email isn’t very useful on narrowing down which devices so I’m a bit lost! AFAIK, there are three possible targets:
In terms of #1, I’ve loaded the RDS web console (https://connect.domain.co.uk/rdweb and looked in dev tools. That reports that this connection is secure and using TLS 1.2. That suggests to me that the Windows server is using TLS 1.2.
In terms of phones, there is one phone listed as end-of-life (Android 9 and below) and five out-of-date (all IOS). Would I be right to focus on these?
In terms of #3 endpoints, the clients don’t have the more expensive license which would show information about endpoints. However, they’re all Windows 10 or 11 with regular updates so I’d expect them to be supporting TLS 1.2 or 1.3.
Any help much appreciated!
Solved! Go to Solution.
05-26-2023 09:10 AM
So this change with Duo means that it will actively refuse to connect if the client and/or server doesn’t support TLS 1.2
Yep, that’s basically it.
Duo installed on RD Web:
Duo installed on RD Gateway (the difference here is that the RD client never communicates directly with Duo):
Duo Authentication for Windows logon (RDP to session host with Duo WinLogon installed):
If Duo WinLogon credential provider and local console access, pretty much the same except the outbound connections to Duo are from the user’s Windows system instead of the server they RDP into.
05-22-2023 06:02 AM
What confuses me is that the email says that all the devices failing are coming from Windows endpoints, I should focus there. So maybe the EOL and out of date phones are not the problem.
05-22-2023 06:39 AM
Later… Googling this, I found the very useful (and free!) IIS Crypto tool. Part of this is a site scanner and this reports that the Windows 2019 Server is still accepting TLS 1.0 and TLS 1.1 protocols. I’m going to try disabling them using IIS Crypto on my test lab.
05-25-2023 06:03 AM
Please contact Duo Support. they can give you more specific information about the clients and Duo applications for which we still see TLS 1.1 or below used for the outbound connection to Duo.
Note that we are not monitoring nor do we even see inbound TLS connections from clients to the IIS server. We are only trying to warn about the TLS 1.2 requirement for the connections from whatever exists on-premises with a Duo application installed to the Duo API host.
05-26-2023 01:50 AM
Will do. One thing not to do is disable TLS 1.0 and 1.1 on a remote desktop server Although this will instantly expose some of those old applications that don’t support TLS 1.2 like old copies of Act!
I disabled TLS 1.0 and 1.1 on both server and client. I would imagine I could have left the client settings enabled.
Although reading up more on this, it believe that as long as TLS 1.2 is supported, Duo will be fine. The fact that the endpoint and/or server also still supports TLS 1.0 & 1.1 is okay. Older apps with establish a connection with the older versions but newer apps will negotiate to the latest protocol each end supports. Think that’s how this works.
05-26-2023 02:09 AM
Interestingly, when I disabled legacy protocols and ciphers, Duo stopped working through the Remote Desktop Web - it didn’t prompt for Duo push. It kept working through the Remote Desktop Gateway though. So clearly going from this protocol/cipher stack to the one below isn’t the right thing to do! This is a combination of “Best Practises” and also disabling TLS 1.0 and 1.1 on client and server. I suspect this is what broke it. So IIS Crypto best practise is to keep TLS 1.0 and 1.1 supported. Probably still too many apps out there using it. But intrigued why disabling them stopped Duo Remote Gateway Web from working.
If I’ve got time, I’ll do some further tests on my lab. But as I get paid by the hour, I can’t waste client time on this.
05-26-2023 02:41 AM
Whilst I’ve been in this game for many years as developer and support, I’m not 100% familiar with all the terminology. Is my understanding of the above correct?
At the negotiation phase, the client asks the server what it supports and will uses what’s classed as the highest security? So if the client supports TLS 1.0, 1.1 & 1.2 but the server only supports 1.1, it’ll use TLS 1.1.
So this change with Duo means that it will actively refuse to connect if the client and/or server doesn’t support TLS 1.2. I assume that it’s the operating system/browser that actually does the heavy lifting here in establishing the connection and then Duo checks what it’s got. If it’s TLS 1.0 or 1.1, it’ll not authenticate.
05-26-2023 09:10 AM
So this change with Duo means that it will actively refuse to connect if the client and/or server doesn’t support TLS 1.2
Yep, that’s basically it.
Duo installed on RD Web:
Duo installed on RD Gateway (the difference here is that the RD client never communicates directly with Duo):
Duo Authentication for Windows logon (RDP to session host with Duo WinLogon installed):
If Duo WinLogon credential provider and local console access, pretty much the same except the outbound connections to Duo are from the user’s Windows system instead of the server they RDP into.
06-04-2023 02:59 AM
Thanks for the detailed explanation.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide