-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[8.0] Self-signed certificates flood Windows Security event log #108966
Comments
Tagging subscribers to this area: @dotnet/ncl, @bartonjs, @vcsjones |
The impact on our customers is significant - PCI SSF certification requires them to monitor failed authentication attempts in the logs. Due to this issue the Windows Event logs are flooded with such events - millions of occurences from each of the several nodes on the retail site network. Such huge amount floods any processing tools and prevents any meaningful filtering - it fills up the disk space and slows down the production system. |
Customer will not write to this public forum. What I can share is that they do actively filter/ignore the events. There are 12.1 millions of these events filtered in the 24 hours period. While the events can be filtered out from alerting mechanism, there is still a regulatory requirement to store them for a year. It is a matter of unneccessary storage and budget required to store these incorrect events. |
That sounds like pretty bad impact. I would have expected customers to upgrade to .NET 9 in such case (the cost/discomfort of staying on .NET 8 being too high for them). |
The problem with .NET 9 is that it is not an LTSC release. On retail sites we use only the LTSC releases to minimize number (and size) of upgrades. Any upgrade has an impact on operation and is costly. |
I compiled the affected application on .NET 9 and ran it in a lab environment where I was able to reproduce the issue previously and can confirm that it is indeed fixed. |
I would like to re-open discussion about backporting the fix for #100774 into .NET 8, as we have been getting more reports about impact of the audit logs to site oprations.
Originally posted by @karelz in #100774
@jp185163 should provide additional details about impact directly to the customer
Tagging @rzikm @karelz for attention.
The text was updated successfully, but these errors were encountered: