Since applying the full set of patches on a Win 7.1 Pro desktop and a Windows 2012 R2 Datacenter Azure server running SQL 2014, SQL Management Studio (2008 and 2014 versions) won't connect to the SQL 2014 Azure server. The client connection attempt times out and fails with SQL server error 5.
SQL server transactional replication continues to work normally between local SQL 2008 instance and the remote SQL 2014 instance. Also, the SQL Management Studio 2014 on the remote (Azure) server can connect to the local (on site) SQL 2008 instance with no problem, as well as to the remote (Azure) SQL 2014 server. DNS resolution and IP connectivity in both directions is normal. I can see that the remote SQL 2014 instance correctly creates its SPN at startup. There is a warning on the SQL 2014 that NTLM fallback is being used by some clients.
I don't have a local instance of SQL 2014 nor a remote instance of SQL 2008. So I'm not sure if it's a relevant factor that the server is remote, on Azure, over VPN, or if I would be seeing the same problem with a patched local client and patched local SQL server.
I notice the SQL Browser service on the remote SQL 2014 server is stopped and disabled. I'm not sure if this was the case pre-patch. However I am running one instance on the default port, not a named instance, so I would expect I don't need the SQL Browser service?
There are reported authentication problems with this Patch Tuesday relating to Server 2003 network file shares. I haven't seen reports of general AD authentication problems, or SQL Server authentication problems. Is anyone else having this problem or similar? Any suggestions of which KB I should try to rollback? Should I run the Kerberos configuration analyser? Should I start the disabled SQL Browser service?
Any help appreciated.
Removing MS15-027(KB3002657) from the server and rebooting the server does not resolve the problem.
Removing KB 3046049 on the client and rebooting the client does not resolve the problem.
Removing KB 3046049 on the server and rebooting the server does not resolve the problem, but the error code changed from 5 to 53 (a more common error code).
Edit: this is not the same problem as SQL Server Windows Authentication fails after tonight's security updates: The login is from an untrusted domain though it may have the same root cause. (There seem to be increasing reports of a variety of authentication related problems after Tuesday's patch.) Specifically in my case, windows authentication is working normally, I can RDP into the patched machines and between the patched machines and AD based login works fine.
Edit: The same problem affects SQL authentication (non AD). Identical error message. That suggests this is a connectivity problem and not an authentication problem.
We don't have any Windows 2003 servers affected. So the problem we are seeing is not confined to Windows Server 2003 (as is reported for some other similar March Patch issues).