

In my C# program, I was specifying that the client accept any of TLS 1.2 | TLS 1.1 | TLS 1.0.However, that did not seem to be the cause of the issue here (despite the Internet Explorer error message): For example, the client specified that it would only connect using SSL 3.0 or TLS 1.0, but the server would only accept TLS 1.2. I’ve run into SSL handshaking problems before caused by a protocol mismatch.

The remainder of this post details the investigation that led me to the above solution. The value I used: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256 Edit the existing comma-separated value, and add a new value to the end that’s supported by the client OS, is cryptographically secure, and works with a key with an ECDSA signature.Navigate to HKLM/SOFTWARE/Policies/Microsoft/Cryptography/Configuration/SSL/0010002.I was able to fix this by adding a ECDSA value to my client PC’s set of cipher_suites: This caused SSL handshaking to fail after the initial “Client Hello” step. Specifically, in my case, the server had an SSL key signed with ECDSA (not RSA), and my problematic client PCs were configured to use only ECDSA (not RSA) cipher_suites. In my case, the problem was caused by there being no match between the set of cipher_suites supported by the client, and the set of values that the server was able to accept. Note 3: Don’t use Registry Editor (as suggested here) unless you know what you’re doing. Note 2: If you’re reading this post after August 2016, check and make sure the new cipher_suites value that you add is one that’s still cryptographically valid.
#TERMINAL SERVER WINDOWS 2012 R2 SECURITY ERROR CERTIFICATE PC#
Note: This solution will only help if the remote server is configured with an SSL key that has an ECDSA (not RSA) signature, but all of the the cipher_suites that the client PC is configured to support are RSA (not ECDSA).
