An automatic updater of untrusted certificates is available for Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2
An automatic updater of untrusted certificates is available for Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. This updater expands on the existing automatic root update mechanism technology that is found in Windows Vista and in Windows 7 to let certificates that are compromised or are untrusted in some way be specifically flagged as untrusted.
A certificate trust list (CTL) is a predefined list of items that are signed by a trusted entity. All the items in the list are authenticated and approved by a trusted signing entity. This update expands on this existing functionality by adding known untrusted certificates to the untrusted certificate store by using a CTL that contains either their public key or their signature hash. After this update is installed, customers benefit from quick automatic updates of untrusted certificates.
Users who have disconnected systems will not benefit from this feature improvement. These customers will still have to install the root certificate updates when they are made available. Please see the "More Information" section.
As part of this update, the URLs that are used for contacting Windows Update to download the untrusted and trusted CTLs were changed. This could cause problems for enterprises that hardcode these URLs in their firewalls as exceptions.
The following are the new URLs:
Users who have disconnected systems can install this update. But those users do not receive a benefit from the update. In fact, installing this update may cause service startup failures immediately after the server is restarted. Services that perform certificate validation tasks during service startup may experience an increased delay while network retrieval of the trusted and untrusted CTLs from Windows Update is tried.
For systems that are running Windows Vista, Windows 7, Windows Server 2008, or Windows Server 2008 R2 and that are using the automatic updater of untrusted certificates (that is, if either KB 2677070 or KB 2813430 is already installed), see the rest of this section and also Microsoft Knowledge Base article 2813430 for more information. Customers do not have to take any action because these systems will be automatically protected.
If the system does not have access to Windows Update, either because the system is not connected to the Internet or because Windows Update is blocked by firewall rules, the network retrieval will time-out before the service can continue its startup procedure. In some cases, this network retrieval time-out may exceed the service startup time-out of 30 seconds. If a service cannot report that startup has completed after 30 seconds, the service control manager (SCM) stops the service.
If you cannot avoid installing this update on disconnected systems, you can disable the network retrieval of the trusted and untrusted CTLs. To do this, you disable automatic root updates by using Group Policy settings. To disable automatic root updates by using policy settings, follow these steps:
- Create a Group Policy or change an existing Group Policy in the Local Group Policy Editor.
- In the Local Group Policy Editor, double-click Policies under the Computer Configuration node.
- Double-click Windows Settings, double-click Security Settings, and then double-click Public Key Policies.
- In the details pane, double-click Certificate Path Validation Settings.
- Click the Network Retrieval tab, select Define these policy settings, and then clear the Automatically update certificates in the Microsoft Root Certificate Program (recommended) check box.
- Click OK, and then close the Local Group Policy Editor.
If automatic root updates are disabled, Administrators must manually manage root certificates that are trusted by Windows. Trusted root certificates can be distributed to computers that are running Windows by using Group Policy. For more information about how to manage the root certificates that are trusted by Windows, visit the following Microsoft website:
931125Windows root certificate program members
Update replacement informationThis update replaces the following update:
2603469 System state backup does not include CA private keys in Windows Server 2008 or in Windows Server 2008 R2
The following files are available for download from the Microsoft Download Center.
For all supported x86-based versions of Windows VistaDownload the Windows6.0-KB2677070-x86.msu package now.
For all supported x64-based versions of Windows VistaDownload the Windows6.0-KB2677070-x64.msu package now.
For all supported x86-based versions Windows Server 2008Download the Windows6.0-KB2677070-x86.msu package now.
For all supported x64-based versions of Windows Server 2008Download the Windows6.0-KB2677070-x64 package now.
For all supported IA-64-based versions of Windows Server 2008Download the Windows6.0-KB2677070-ia64.msu package now.
For all supported x86-based versions of Windows 7Download the Windows6.1-KB2677070-x86.msu package now.
For all supported x64-based versions of Windows 7Download the Windows6.1-KB2677070-x64.msu package now.
For all supported x64-based versions of Windows Server 2008 R2Download the Windows6.1-KB2677070-x64.msu package now.
For all supported IA-64-based versions of Windows Server 2008 R2Download the Windows6.1-KB2677070-ia64.msu package now.
Release Date: June 12, 2012
For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to obtain Microsoft support files from online servicesMicrosoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file.
For a list of the files that are provided in this update, download the file information for this update 2677070.
Article ID: 2677070 - Last Review: 11/18/2016 08:58:00 - Revision: 8.0
Windows Server 2008 Datacenter, Windows Server 2008 Datacenter without Hyper-V, Windows Server 2008 Enterprise, Windows Server 2008 Enterprise without Hyper-V, Windows Server 2008 for Itanium-Based Systems, Windows Server 2008 Foundation, Windows Server 2008 Standard, Windows Server 2008 Standard without Hyper-V, Windows Web Server 2008, Windows Server 2008 R2 Datacenter, Windows Server 2008 R2 Enterprise, Windows Server 2008 R2 for Itanium-Based Systems, Windows Server 2008 R2 Foundation, Windows Server 2008 R2 Standard, Windows Web Server 2008 R2, Windows Vista Business, Windows Vista Business 64-bit Edition, Windows Vista Enterprise, Windows Vista Enterprise 64-bit Edition, Windows Vista Home Basic, Windows Vista Home Basic 64-bit Edition, Windows Vista Home Premium, Windows Vista Home Premium 64-bit Edition, Windows Vista Starter, Windows Vista Ultimate, Windows Vista Ultimate 64-bit Edition, Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Starter, Windows 7 Ultimate
- kbqfe kbfix kbexpertiseinter kbsurveynew KB2677070