I found a solution with a simple registry fix.
1) Register the TLS 1.2 protocol:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2] [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client] "Enabled"=dword:ffffffff "DisabledByDefault"=dword:00000000 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server] "Enabled"=dword:ffffffff "DisabledByDefault"=dword:00000000
2) Configure TLS 1.2 by default in 32-bit applications:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp] "DefaultSecureProtocols"=dword:00000800
3) Configure TLS 1.2 by default in 64-bit applications:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp] "DefaultSecureProtocols"=dword:00000800
4) Reboot the server
If you need TLS 1.1 support only:
- In step 1) above, simply change “TLS 1.2” to “TLS 1.1” and apply the new registry fix.
- In steps 2) and 3) above, change the value "00000800" to "00000200" and apply a new registry fix.
If you need support for TLS 1.1 and 1.2, then
- Repeat step 1) from above two times two register both protocols.
- In steps 2) and 3) use the value "00000A00" (which is a combination of "00000800" + "00000200")
Verification Code:
<% Set objHttp = Server.CreateObject("WinHTTP.WinHTTPRequest.5.1") objHttp.open "GET", "https://howsmyssl.com/a/check", False objHttp.Send Response.Write objHttp.responseText Set objHttp = Nothing %>
At the end of the answer you should see the version of TLS used on request
"tls_version":"TLS 1.2"
source share