@5eraph - Hello, greetings, & welcome back to this forum.
Have read some of your work years ago relating to 9x, and you, Gape, mdgx, problmchyld, etc, etc @MSFN were helpful to me, and i appreciate such open philosophy.
I hope i finally have returned the favor. Have removed my name from the title, as it includes some of your work. I hope it can help the "lunatic fringe" that insist on running XP online (clearly without a safety net AND scissors in hand)
For testing, perhaps see SSLscan tool linked above.
Many like being able to make repeatable tests, and hope to eventually see a topic somewhere somehow and by somebody on how to verify these things for themselves independantly. I have a topic with a similar theme for Graphics where a list of tools can verify (ati) graphics issues, for instance.
Structure seems different in this reply (quoted from link below):
"The correct REG_DWORD values are:
..\SSL 3.0\Client
DisabledByDefault : 1
..\SSL 3.0\Server
Enabled : 0""
This work should be verified and expanded to encompass NT6, but i'm not set up for that now.
I wonder if there are other configs that can be tweaked for other libraries than schannel.dll & kerberos.dll (KB2478971<-xp/2k3->KB3011780).
Quote of wikipedia: "Kerberos uses UDP port 88 by default."
I take it not many people other than those on Domains have that port open? (am using linux for internet, so cannot confirm nor deny)
Thank you again.
-----------------------------------
@Outbreaker - Actually, a Search did yield something intriguing, but nothing definative yet.
"We are currently using Exchange 2013 CU6 on Server 2012 R2 with the latest patches. Due to the poodle vulnerability we are attempting to disable SSLv3. We started by using IIS Crypto, however it indicates that SSLv3 is not a supported cipher suite, it only identifies multi protocol unified hello and pct 1.0 as the only valid cipher suites. SSLv3 is also disabled in the registry. A qualsys scan of the exchange server still indicates SSLv3 is supported. How can we disable this?"
https://social.technet.microsoft.com/Fo … esvrdeploy
Others have intonated, but not confirmed, that the HelloWorld protocol is shomehow related to SSLv2 & SSLv3 intercommunication.
Am thinking, "turn that sh*t off!" :lol
PCT??? Nice. You were saying, Jeff? (about viruses, et al)