Why Windows Server 2025 always uses TLS 1.0 to connect to remote LDAP Server?

Anonymous
2024-11-15T08:30:53+00:00

Hi all,
I met an issue on Windows Server 2025 Standard (Version: 24H2, OS Build: 26100.2314, Experience: Windows Feature Experience Pack 1000.26100.32.0) when trying to connect to LDAP Server.

I wrote a C++ tool,  using 'ldap_sslinit' to initialize an LDAP Connection and then 'ldap_connect' to connect to a remote LDAP Server. The tool is run on a Windows Server 2025. Unexpectedly, ldap_connect returns 0x51(LDAP_SERVER_DOWN). I used Wireshark to capture the LDAP traffics, and I found the Windows Server 2025 machine tries to use TLS 1.0 to say hello to the LDAP server. After double check the TLS settings in Registry, TLS 1.0 and 1.1 are disabled and TLS 1.2 and 1.3 are enabled by default.

Same test was done on Windows 11 Enterprise (Version: 21H2, OS Build: 22000.3260, Experience: Windows Feature Experience Pack 1000.22004.1000.0), LDAP Server can be connected correctly. The default enabled TLS protocol version are 1.2 and 1.3. When connecting to LDAP Server, the Windows 11 machine tries to use TLS v1.2 to say hello to the LDAP server.

TLS 1.0 should be disabled by default on Windows Server 2025 according to the following link:
https://learn.microsoft.com/en-us/windows-server/get-started/removed-deprecated-features-windows-server-2025
Could someone give me some detailed information on why Windows Server 2025 uses TLS 1.0 when connecting to LDAP Server?

Thanks a lot!

Windows for business | Windows Server | Networking | Other

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question. To protect privacy, user profiles for migrated questions are anonymized.

0 comments No comments
{count} votes
Accepted answer
  1. Anonymous
    2024-11-21T05:48:21+00:00

    After double checking the messages captured by WireShark, I found that I misunderstood the protocol WireShark returned, it was TLS 1.2 & 1.3. Thanks for your help!

    1 person found this answer helpful.
    0 comments No comments

5 additional answers

Sort by: Most helpful
  1. Anonymous
    2024-11-15T14:17:50+00:00

    Hi ISxuezha,

    I suggest that you use Group Policy to disable the TLS protocol.

    Click windows+R and enter gpedit.msc.

    Open Group Policy and open [Computer Configuration] - [Administrative Templates] - [Windows Components] - [Internet Explorer] - [Internet Control Panel] - [Advanced Page] in sequence.

    Find "Disable encryption support" on the right and set it to enabled. Set the protocol combination to tls1.0.

    Then click OK and restart the computer to see if the issue is resolved.

    Best Regards

    Zunhui

    0 comments No comments
  2. Anonymous
    2024-11-18T02:50:21+00:00

    Hi Zunhui,
    Thanks for your help, but after changing "Turn off encryption support" to enable and set the protocol combination to TLS 1.0, WireShark is still capturing TLS 1.0 messages when connecting to LDAP Server.

    0 comments No comments
  3. Anonymous
    2024-11-18T07:54:26+00:00

    Hi,

    Thank you for your reply. I suggest you open the Network and Sharing Center, find the Advanced tab in the Network tab as shown in the figure below and see if there is TLS 1.0. If it is checked, please uncheck it.

    Best Regards

    Zunhui

    0 comments No comments
  4. Anonymous
    2024-11-18T08:11:05+00:00

    Hi Zunhui,
    Thanks for your reply. I have double checked the settings you mentioned and found that TLS 1.0 is not selected.

    0 comments No comments