*** NOTICE FOR FORTE AGENT USERS ***
Forte Agent 3.2 - 8.0 needs only a small configuration change to
support the latest SSL/TLS protocols.
If you get an SSL error 80090302 with a server, then most likely
you need this configuration change.
-a-a-a In the [Online] section of AGENT.INI,
-a-a-a change the setting 'AllowedSSLProtocols' from this: -a-a-a-a-a-a-a-a-a-a-a AllowedSSLProtocols=0
-a-a-a to one of these:
-a-a-a-a * In Windows 11, and in Windows 10 version 1903 and later, -a-a-a-a-a-a-a-a-a-a-a AllowedSSLProtocols=10880
-a-a-a-a-a-a This will configure Agent to support TLS1.2 and TLS1.3.
-a-a-a-a * In Windows 8.1 (and old Windows 10 older than 1903) -a-a-a-a-a-a-a-a-a-a-a AllowedSSLProtocols=2688
-a-a-a-a-a-a This will configure Agent to support TLS1.2.
-a-a-a-a-a-a These versions of Windows will not support TLS1.3.
If you are running Windows XP, 7, or Vista
-a-a-a Agent uses the Windows implementation of SSL/TLS. These versions -a-a-a of Windows did not support either TLS1.2 or TLS1.3.
-a-a-a There are fixes on the Internet to reportedly enable TLS1.2 in
-a-a-a these operating systems. You would need to both apply these fixes -a-a-a to your OS and then make the configuration change in Agent.
-a-a-a I have not tried these fixes myself, so I cannot personally advise -a-a-a how well they work.
EXPLANATION
-a-a-a When AllowedSSLProtocols=0, Windows implicitly supports a default -a-a-a set of SSL/TLS protocols. Microsoft has decided that Windows will -a-a-a only support the latest SSL/TLS protocols when they are *explicitly* -a-a-a requested.
-a-a-a For Agent to explicitly request SSL/TLS protocols, set
-a-a-a AllowedSSLProtocols to a sum of the following numbers: -a-a-a-a-a-a-a-a 128 -a-a-a-a TLS1.0
-a-a-a-a-a-a-a-a 512 -a-a-a-a TLS1.1
-a-a-a-a-a-a-a 2048 -a-a-a-a TLS1.2
-a-a-a-a-a-a-a 8192 -a-a-a-a TLS1.3 -a (not supported in Windows 8.1 or earlier)
Ralph Fox <-rf-nz-@-.invalid> wrote:
*** NOTICE FOR FORTE AGENT USERS ***
Forte Agent 3.2 - 8.0 needs only a small configuration change to
support the latest SSL/TLS protocols.
If you get an SSL error 80090302 with a server, then most likely
you need this configuration change.
-a-a-a In the [Online] section of AGENT.INI,
-a-a-a change the setting 'AllowedSSLProtocols' from this:
-a-a-a-a-a-a-a-a-a-a-a AllowedSSLProtocols=0
-a-a-a to one of these:
-a-a-a-a * In Windows 11, and in Windows 10 version 1903 and later,
-a-a-a-a-a-a-a-a-a-a-a AllowedSSLProtocols=10880
-a-a-a-a-a-a This will configure Agent to support TLS1.2 and TLS1.3.
-a-a-a-a * In Windows 8.1 (and old Windows 10 older than 1903)
-a-a-a-a-a-a-a-a-a-a-a AllowedSSLProtocols=2688
-a-a-a-a-a-a This will configure Agent to support TLS1.2.
-a-a-a-a-a-a These versions of Windows will not support TLS1.3.
If you are running Windows XP, 7, or Vista
-a-a-a Agent uses the Windows implementation of SSL/TLS. These versions
-a-a-a of Windows did not support either TLS1.2 or TLS1.3.
-a-a-a There are fixes on the Internet to reportedly enable TLS1.2 in
-a-a-a these operating systems. You would need to both apply these fixes
-a-a-a to your OS and then make the configuration change in Agent.
-a-a-a I have not tried these fixes myself, so I cannot personally advise
-a-a-a how well they work.
EXPLANATION
-a-a-a When AllowedSSLProtocols=0, Windows implicitly supports a default
-a-a-a set of SSL/TLS protocols. Microsoft has decided that Windows will
-a-a-a only support the latest SSL/TLS protocols when they are *explicitly* >> -a-a-a requested.
-a-a-a For Agent to explicitly request SSL/TLS protocols, set
-a-a-a AllowedSSLProtocols to a sum of the following numbers:
-a-a-a-a-a-a-a-a 128 -a-a-a-a TLS1.0
-a-a-a-a-a-a-a-a 512 -a-a-a-a TLS1.1
-a-a-a-a-a-a-a 2048 -a-a-a-a TLS1.2
-a-a-a-a-a-a-a 8192 -a-a-a-a TLS1.3 -a (not supported in Windows 8.1 or earlier)
Odd Forte Agent does not negotiate to a supported protocol by the
server.
Or afford a choice of protocol in the user config screens for
defining the server.
server. Or afford a choice of protocol in the user config screens for defining the server.
when you use port 563 NNTP servers, how do set up your
newsreader to properly handle the newer encryption protocols?
[40tude_Dialog/2.0.15.41]
when you use port 563 NNTP servers, how do set up your
newsreader to properly handle the newer encryption protocols?
This requires the use of an SSL-Proxy like sTunnel (www.stunnel.org).
The setup is explained inside the 40tude Dialog FAQ:
https://www.barghahn-online.de/4td_faq/sicherheit.php#ssl_tls
English Google-Translate should be fairly understandable: https://www-barghahn--online-de.translate.goog/4td_faq/sicherheit.php?_x_tr_sl=de&_x_tr_tl=en#ssl_tls
VanguardLH wrote:> Odd Forte Agent does not negotiate to a supported protocol by the
server. Or afford a choice of protocol in the user config screens for defining the server.
I noticed you're using "User-Agent: 40tude_Dialog/2.0.15.41" on "individual.net", so when you use port 563 NNTP servers, how do set up your newsreader to properly handle the newer encryption protocols?
How's this for the correct syntax for Mr. VanguardLH?
[EternalSept]
; Ray Banana <rayban@raybanana.net>
client = yes
accept = 127.0.0.1:54321
connect = news.eternal-september.org:563
verifyChain = yes
CAfile = ca-certs.pem
checkHost = news.eternal-september.org
OCSPaia = yes
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 65 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 62:48:34 |
| Calls: | 862 |
| Files: | 1,311 |
| D/L today: |
10 files (20,373K bytes) |
| Messages: | 264,047 |