The problem: IIS on Windows 2012 picks SHA-1 algorithm when the client uses SHA-1 certificate. Even though the server-side certificate is SHA-256. So Chrome/Edge don't work.
On analogous Windows 2016 setup: IIS uses a proper algorithm and everything works. This is because there was KB4516061 which fixed the issue: Addresses an issue that chooses a SHA-1 hash algorithm for the secure (HTTPS/TLS) connection to a Windows server.
(Yes, I know about SHA-1, but this is a corpo environment, and some users still have SHA-1 certificates on their smart cards...)
Question: how to make it work on Windows 2012? Maybe some registry setting? Some hotfix KB I am not aware of?
What I tried:
- "Best practices" in IIS Crypto.
- That, and in addition disable SSL3.0 and SHA-1 in all lists.
HKLM\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010003
- remove SHA-1 fromFunctions
value, but that messes up the whole computer.