Tag Archives: SSL

OpenSSL 1.1.1 will become End of Life on 11th September 2023

OpenSSL 1.1.1 is due to become End of Life on 11th September 2023.  Premium support (paid) may be available beyond this date but you should consider migrating to OpenSSL 3.1 or OpenSSL 3.1

Additional information can be found on the official OpenSSL site, link below:

OpenSSL 1.1.1 End of Life – OpenSSL Blog

Watchguard XTM 1050, XTM 2050, XTM 2 Series, XTM 3 Series, XTM 5 Series, XTM 8 Series – Fireware XTM OS 11.6.1 – Build # 346666

Watchguard XTM 1050, XTM 2050, XTM 2 Series, XTM 3 Series, XTM 5 Series, XTM 8 Series – Fireware XTM OS 11.6.1 – Build # 346666

11.6.1 – Build # 346666 Provides some new features and resolves the following issues:

• This release introduces support for the new high-performance XTM 5 Series models 515, 525, 535, and 545

• Provides an update to our localized user interfaces and documentation

• An XTM device configured in bridge mode can now pass VLAN traffic between 802.1Q switches or bridges

• FireCluster support for XTM 25, 26, and 33 wired models

• Several issues have been resolved in this release that caused XTM devices to crash when configured to use Application Control or IPS [66937, 65426, 65636, 67312, 66135, 67159, 67399, 67310]

• An issue was resolved that caused some XTM device processes to crash when running Mu Dynamics default published vulnerability test [66490]

• An issue was resolved that caused a kernel crash and device reboot [67329]

• The XTM 2 Series device can now handle a large file transfer without interface instability [67367]

• A problem that caused incorrect data to display on the XTM 5 Series LCD screen has been resolved [67197]

• Policy Manager now displays the correct VLAN limits for XTM 5 Series models 505, 510, 520, and 530 with a standard Fireware XTM feature key (not Pro) [67780]

• You can now successfully configure and apply Traffic Management actions for XTM 2 and 3 Series devices from the Web UI [67221, 66645]

• Firebox X Edge e-Series devices can now be successfully managed with templates [67658]

• The notification message sent when a local Log or Report database is down now correctly shows the host IP address instead of “???” [41731]

• The Log Server can now handle backup files greater than 2GB in size without generating an error message: “Error (8199), Exception during backup of oldest log data: File is not a zip file” exception” [66811]

• The DHCP lease activity report now works correctly [66062]

• Log Collector now handles XTM device log data that spans multiple SSL/TLS records without crashing [66347]

• A problem has been resolved that caused poor performance on XTM 2 Series models 25 and 26 because of an incorrect memory allocation for security subscription signatures [67240]

• A deny message is now correctly sent to the web browser in most cases when Application Control blocks content in the Web/Web 2.0 category [66201]

• The WebBlocker automatic database update time is no longer off by one hour when daylight savings time is in effect on the host server’s timezone [67551]

• If you use PPPoE or DHCP for an external interface on an XTM device configured to use multi-WAN, the XTM device no longer loses the default routes for external interfaces after the external interface reconnects [67424, 67520]

• A problem has been resolved that caused a static route to fail after an external interface configured to use PPPoE is disconnected, then reconnected [67520]

• Tagged VLAN traffic is now correctly recognized when an XTM device is configured in Bridge mode [64355]

• The CLl command “restore factory default all” now successfully restores a device to its factory default settings [66240]

• An issue has been resolved that caused Policy Manager to incorrectly display an interface IP address as 0.0.0.0/24 when you viewed a FireCluster configuration for a cluster in drop-in mode [63551]

• The Mobile VPN with SSL process no longer crashes during a FireCluster failover [66118]

You can download 11.6.1 – Build # 346666 from the Watchguard website

Schannel.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

Schannel.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

05-May-2015 – 6.1.7601.23045 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

05-May-2015 – 6.1.7601.18843 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

06-Mar-2015 – 6.1.7601.22983 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-gb/kb/3046049 – MS15-031: Vulnerability in SChannel could allow security feature bypass: March 10, 2015

06-Mar-2015 – 6.1.7601.18779 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-gb/kb/3046049 – MS15-031: Vulnerability in SChannel could allow security feature bypass: March 10, 2015

14-Oct-2014 – 6.1.7601.22843 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3011780 – MS14-068: Vulnerability in Kerberos could allow elevation of privilege: November 18, 2014

14-Oct-2014 – 6.1.7601.22843 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3003743 – MS14-074: Vulnerability in Remote Desktop Protocol could allow security feature bypass: November 11, 2014

19-Sep-2014 – 6.1.7601.22814 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2992611 – MS14-066: Vulnerability in SChannel could allow remote code execution: November 11, 2014

19-Sep-2014 – 6.1.7601.18606 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3011780 – MS14-068: Vulnerability in Kerberos could allow elevation of privilege: November 18, 2014

19-Sep-2014 – 6.1.7601.18606 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2992611 – MS14-066: Vulnerability in SChannel could allow remote code execution: November 11, 2014

11-Jul-2014 – 6.1.7601.22741 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2982706 – You cannot access network shares after the computer restarts in Windows 8.1 or Windows 7

30-May-2014 – 6.1.7601.22705 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2

30-May-2014 – 6.1.7601.18489 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3003743 – MS14-074: Vulnerability in Remote Desktop Protocol could allow security feature bypass: November 11, 2014

30-May-2014 – 6.1.7601.18489 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2

10-Jun-2013 – 6.1.7601.22352 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2830145 – SID S-1-18-1 and SID S-1-18-2 can’t be mapped on Windows 7 or Windows Server 2008 R2-based computers in a domain environment

08-Mar-2013 – 6.1.7601.22276 – Schannel.dll – x64 – http://support.microsoft.com/kb/2824066 – Hotfix is available that corrects “User’s SID” in event ID 6035 in Windows Server 2008 R2

05-Nov-2012 – 6.1.7601.22153 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2768492 – User cannot connect to remote desktop server on a Windows 7-based or Windows Server 2008 R2-based client computer

02-Nov-2012 – 6.1.7601.22150 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2760730 – Description of an update rollup that resolves interoperation issues in Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows Server 2008 R2 SP1

21-Sep-2012 – 6.1.7601.22116 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2748437 – User profile folder name is displayed as “user name@domain name” when use a UPN to log on to a Windows 7-based or Windows Server 2008 R2-based client computer

23-Jul-2012 – 6.1.7601.22068 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1

20-Jul-2012 – 6.1.7601.17911 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1

02-Jun-2012 – 6.1.7601.22010 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012

02-Jun-2012 – 6.1.7601.17856 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012

06-Apr-2012 – 6.1.7601.21959 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2695401 – DPAPI keys are not synchronized when you unlock a Windows 7-based or Windows Server 2008 R2-based computer

10-Feb-2012 – 6.1.7601.21920 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2675498 – “NetBIOS domain name\username” format cannot be used with the Kerberos referral mechanism to log on to a computer in a cross-forest environment

18-Jan-2012 – 6.1.7601.21901 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2665790 – Resource-based constrained delegation KDC_ERR_POLICY failure in environments that have Windows Server 2008 R2-based domain controllers

17-Nov-2011 – 6.1.7601.21861 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

17-Nov-2011 – 6.1.7601.17725 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

18-Dec-2010 – 6.1.7601.21624 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2416849 – SSL authentication fails and X.509 error occurs when a WCF-enabled application performs mutual authentication in Windows 7, in Windows Server 2008 R2, in Windows Vista, or in Windows Server 2008