Microsoft is removing cryptographic algorithms that are no
longer considered secure from Windows Vista and from Windows Server 2008.
Therefore, policies that were created by using the IP Security Policies
Management snap-in or by using the
netsh ipsec command have been changed to remove MD5 and DES from the
default policies. The new defaults are backward compatible with policies that were
created by using the defaults in Microsoft Windows 2000, in Windows XP, and in
Windows Server 2003. Additionally, MD5 and DES can still be configured as part
of a policy if they are required for compatibility or interoperability
reasons.
The following settings have been updated.
The main-mode cryptographic set when you use the default settings to create a new
policyPrevious | Current |
3DES, SHA1, DH Medium (2) 3DES, MD5, DH Medium (2)
DES, SHA1, DH Low (1) DES, MD5, DH Low (1) | 3DES, SHA1, DH
Medium (2) |
New filtration settings for the "netsh ipsec" command when it is used
together with the "action=negotiate" parameterPrevious | Current |
ESP: 3DES, SHA1 ESP: 3DES, MD5 | ESP: 3DES,
SHA1 |
Action settings for the default response rule filters
Previous | Current |
ESP: 3DES, SHA1 ESP: 3DES, MD5 ESP: DES, SHA1
ESP: DES, MD5 AH: SHA1 AH: MD5 | ESP: 3DES, SHA1 AH:
SHA1 |
Note The default response rule is deprecated in
Windows Vista. The rule is available only to manage policies for earlier
versions of Windows.
For more information, click the
following article number to view the article in the Microsoft Knowledge Base:
942964
How the default response rule for IPsec policies functions in Windows Vista and in Windows Server 2008 Beta 3