TLS 1.2 not negotiated in .NET 4.7 without explicit ServicePointManager.SecurityProtocol call
I had the same issue (Windows 10 and SSL3 / TLS only... not System Default) with a legacy app targeting 4.7.2. My issue was that during the upgrade process over the years we never added in the targetFramework
to the system.web
> httpRuntime
element (Note: it did exist on system.web
> compilation
element). Before taking bigger steps, ensure your system.web looks something like the following:
<system.web>
<compilation targetFramework="4.7.2"></compilation>
<httpRuntime targetFramework="4.7.2" />
</system.web>
In the above example, swap 4.7.2 for whatever version of the framework you are currently using that is >= 4.7.
Starting with apps that target the .NET Framework 4.7, the default value of the ServicePointManager.SecurityProtocol property is SecurityProtocolType.SystemDefault.
This change allows .NET Framework networking APIs based on SslStream (such as FTP, HTTPS, and SMTP) to inherit the default security protocols from the operating system instead of using hard-coded values defined by the .NET Framework.
That's the reason of the new behaviour you experienced and the need of the new configuration:
<runtime>
<AppContextSwitchOverrides value="Switch.System.ServiceModel.DisableUsingServicePointManagerSecurityProtocols=false;Switch.System.Net.DontEnableSchUseStrongCrypto=false" />
</runtime>
See here and here
Update (useful info)
Keep in mind, best security practices suggest to update your IIS configuration disabling, time by time, old protocols and ciphers key (e.g. TLS 1.0, 1.1). See Setup Microsoft Windows or IIS for SSL Perfect Forward Secrecy and TLS 1.2 for very interesting info.
If you follow this practice, you don't need to set the configuration above (as MS suggests), because your Win server / IIS is already well configured.
Of course, this is possible only if you have access to the server with proper grants.