NT6_PFS.INF
(for
Microsoft®
Windows™ 7,
Windows Server 2008 R2, Windows 8 and
Windows Server 2012) and
NT60_PFS.INF
(for Windows Vista® and
Windows Server 2008) configure
Windows’
SSL/TLS
package
SChannel
to use
Cipher Suites
which provide The setup scripts also disable deprecated, insecure or weak
cryptographic algorithms, ciphers, hashes and protocols, as
recommended in the Security Advisories
2868725
and
3009008
or the
MSKB
articles
2868725
and
3009008
respectively.
Additionally the setup scripts disable the deprecated, insecure or
weak protocols
SSL v2.0,
SSL v3.0
and
TLS v1.0,
and enable the protocols
TLS v1.1
and
TLS v1.2
in Internet Explorer.
The vulnerabilities are known as BEAST and POODLE; the CVE® lists them as CVE-2011-3389, CVE-2014-3566 and CVE-2014-8730.
Also see the IETF’s RFCs 5469, 6151, 6176, 7457, 7465, 7507, 7525, 7568, 8996 and 9325, plus the post Is SSL broken? – More about Security Bulletin MS12-006 (previously known as Security Advisory 2588513) on Microsoft’s Security Research and Defense Blog.
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
,
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
,
TLS_RSA_WITH_AES_256_GCM_SHA384
and
TLS_RSA_WITH_AES_128_GCM_SHA256
, the security update
2992611
alias
MS14-066,
its successor
3046049
alias
MS15-031,
or
3042058
has to be installed.
To enable the
TLS cipher
suites TLS_DHE_RSA_WITH_AES_128_CBC_SHA
and
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
, the update
3161639,
which is part of the optional update
3172605,
has to be installed.
To enable RSA/SHA512
and EDCSA/SHA512
signatures with
TLS v1.2,
the update
2973337
has to be installed.
For Windows 8 and Windows Server 2012 this
update is included in the update
2975331;
for Windows 8.1 and
Windows Server 2012 R2 it is included in the update
2975719.
Note: Windows Vista and
Windows Server 2008 don’t support
TLS v1.2!
To enable TLS v1.2 on Windows Vista and Windows Server 2008, the update 4019276 has to be installed.
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010002]
"Functions"=multi:…
Caveat: Windows’
CBS may
overwrite this Registry entry every time an update for
the SChannel package is
installed!
Despite numerous requests from its customers, for example
Better support for Perfect forward secrecy,
Microsoft has but not published
corresponding updates for Windows 8,
Windows Server 2012, Windows 7,
Windows Server 2008 R2,
Windows Vista and
Windows Server 2008, although these versions of
Windows NT support
Perfect Forward Secrecy too.
Note: Windows’
IPsec
implementation supports
Perfect Forward Secrecy since many years;
see the
MSKB
articles
252735,
301284
and
816514
as well as the
TechNet
article
Key exchange methods.
NT6_PFS.INF
and
NT60_PFS.INF
are packaged in the (compressed and
digitally signed)
cabinet
file
SCHANNEL.CAB
.
SCHANNEL.CAB
and verify its digital signature, then open it in
Windows Explorer, extract its
contents, right-click the extracted setup script
NT6_PFS.INF
or
NT60_PFS.INF
respectively to display its context menu and click Installto run the installation.
Note:
InfDefaultInstall.exe
,
the application registered for the Install
verb of
*.inf
files, requests administrative privileges.
Open the Control Panel and click the entry
View installed updates underneath the
Programs and Features or Programs
category.
In Installed Updates select the entry
'Perfect Forward Secrecy' für 'Windows Vista/2008'
or
'Perfect Forward Secrecy' für 'Windows 7/2008 R2/8.x/2012 [R2]'
respectively underneath Systemkonfiguration
and
click the Uninstall
menu entry.
Use the X.509 certificate to send S/MIME encrypted mail.
Note: email in weird format and without a proper sender name is likely to be discarded!
I dislike
HTML (and even
weirder formats too) in email, I prefer to receive plain text.
I also expect to see your full (real) name as sender, not your
nickname.
I abhor top posts and expect inline quotes in replies.
as iswithout any warranty, neither express nor implied.
cookiesin the web browser.
The web service is operated and provided by
Telekom Deutschland GmbH The web service provider stores a session cookie
in the web
browser and records every visit of this web site with the following
data in an access log on their server(s):