I recently faced a strange issue after configuring and trying to connect to an SSL VPN hosted on a DrayTek Router. I initially updated the DrayTek Smart VPN Client to the latest release 5.6.3 which did not resolve the issue. I then decided to change the SSL VPN Users password and identified that the below error was a result of using the £ symbol in the SSL VPN Users password. Once I removed the £ symbol from the password I was able to connect without error. It’s possible that other special characters may cause the same problem so if you also encounter this error I would initially suggest simplifying your password for testing purposes.
Tag Archives: SSL
OpenSSL 1.1.1 will become End of Life on 11th September 2023
OpenSSL 1.1.1 is due to become End of Life on 11th September 2023. Premium support (paid) may be available beyond this date but you should consider migrating to OpenSSL 3.1 or OpenSSL 3.1
Additional information can be found on the official OpenSSL site, link below:
Schannel.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)
Schannel.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)
05-May-2015 – 6.1.7601.23045 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015
05-May-2015 – 6.1.7601.18843 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015
06-Mar-2015 – 6.1.7601.22983 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-gb/kb/3046049 – MS15-031: Vulnerability in SChannel could allow security feature bypass: March 10, 2015
06-Mar-2015 – 6.1.7601.18779 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-gb/kb/3046049 – MS15-031: Vulnerability in SChannel could allow security feature bypass: March 10, 2015
14-Oct-2014 – 6.1.7601.22843 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3011780 – MS14-068: Vulnerability in Kerberos could allow elevation of privilege: November 18, 2014
14-Oct-2014 – 6.1.7601.22843 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3003743 – MS14-074: Vulnerability in Remote Desktop Protocol could allow security feature bypass: November 11, 2014
19-Sep-2014 – 6.1.7601.22814 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2992611 – MS14-066: Vulnerability in SChannel could allow remote code execution: November 11, 2014
19-Sep-2014 – 6.1.7601.18606 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3011780 – MS14-068: Vulnerability in Kerberos could allow elevation of privilege: November 18, 2014
19-Sep-2014 – 6.1.7601.18606 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2992611 – MS14-066: Vulnerability in SChannel could allow remote code execution: November 11, 2014
11-Jul-2014 – 6.1.7601.22741 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2982706 – You cannot access network shares after the computer restarts in Windows 8.1 or Windows 7
30-May-2014 – 6.1.7601.22705 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2
30-May-2014 – 6.1.7601.18489 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3003743 – MS14-074: Vulnerability in Remote Desktop Protocol could allow security feature bypass: November 11, 2014
30-May-2014 – 6.1.7601.18489 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2
10-Jun-2013 – 6.1.7601.22352 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2830145 – SID S-1-18-1 and SID S-1-18-2 can’t be mapped on Windows 7 or Windows Server 2008 R2-based computers in a domain environment
08-Mar-2013 – 6.1.7601.22276 – Schannel.dll – x64 – http://support.microsoft.com/kb/2824066 – Hotfix is available that corrects “User’s SID” in event ID 6035 in Windows Server 2008 R2
05-Nov-2012 – 6.1.7601.22153 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2768492 – User cannot connect to remote desktop server on a Windows 7-based or Windows Server 2008 R2-based client computer
02-Nov-2012 – 6.1.7601.22150 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2760730 – Description of an update rollup that resolves interoperation issues in Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows Server 2008 R2 SP1
21-Sep-2012 – 6.1.7601.22116 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2748437 – User profile folder name is displayed as “user name@domain name” when use a UPN to log on to a Windows 7-based or Windows Server 2008 R2-based client computer
23-Jul-2012 – 6.1.7601.22068 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1
20-Jul-2012 – 6.1.7601.17911 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1
02-Jun-2012 – 6.1.7601.22010 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012
02-Jun-2012 – 6.1.7601.17856 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012
06-Apr-2012 – 6.1.7601.21959 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2695401 – DPAPI keys are not synchronized when you unlock a Windows 7-based or Windows Server 2008 R2-based computer
10-Feb-2012 – 6.1.7601.21920 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2675498 – “NetBIOS domain name\username” format cannot be used with the Kerberos referral mechanism to log on to a computer in a cross-forest environment
18-Jan-2012 – 6.1.7601.21901 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2665790 – Resource-based constrained delegation KDC_ERR_POLICY failure in environments that have Windows Server 2008 R2-based domain controllers
17-Nov-2011 – 6.1.7601.21861 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012
17-Nov-2011 – 6.1.7601.17725 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012
18-Dec-2010 – 6.1.7601.21624 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2416849 – SSL authentication fails and X.509 error occurs when a WCF-enabled application performs mutual authentication in Windows 7, in Windows Server 2008 R2, in Windows Vista, or in Windows Server 2008