Skip to content

Instantly share code, notes, and snippets.

@wnoguchi
Last active January 4, 2017 14:02
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save wnoguchi/0746f60065740568184f1ee4a9f9f928 to your computer and use it in GitHub Desktop.
Save wnoguchi/0746f60065740568184f1ee4a9f9f928 to your computer and use it in GitHub Desktop.
PCPT(Pearson IT Certification Practice Test) Software Installation register phase fails over 2016/12/25

PCPT(Pearson IT Certification Practice Test) Software Installation register phase fails over 2016/12/25

You can download PCPT Software following URL:

http://www.pearsonitcertification.com/content/downloads/pcpt/engine.zip

But Version 1.0.0.26 2016/04/27 Could not register software because of register endpoint suddenly not support TLS 1.0 Client Hello negotiation. But above url still distributed 1.0.0.26 version.

2017/01/04 23:01JST You can download newer version PCPT Software 1.0.0.26.1.

Obsolete

Now this point, You should add registry entry manually.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
"SchUseStrongCrypto"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319]
"SchUseStrongCrypto"=dword:00000001

This override .NET Framework 4.5 application TLS Negotiation behavior forces TLS1.2 encryption not default TLS1.0.

  1. ssl - Are there .NET implementation of TLS 1.2? - Stack Overflow

And then restart your PCPT Application, Register Successful. If PCPT Activation, Download Successful. Then You will seen Update Dialog. You SHOULD Update at this time because of current software version negotiate tls1.0, and cannnot update software without above registry workaround.

Then update suceeded, you can remove registry entry safely.

Thats all.

Detailed analyze result

https://www.informit.com/

[wataru.noguchi@localhost ~ 12:20:16]$ dig www.informit.com

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6_8.3 <<>> www.informit.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5755
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;www.informit.com.              IN      A

;; ANSWER SECTION:
www.informit.com.       19      IN      A       159.182.165.92

;; Query time: 1 msec
;; SERVER: 10.1.2.101#53(10.1.2.101)
;; WHEN: Sun Dec 25 12:20:17 2016
;; MSG SIZE  rcvd: 50

[wataru.noguchi@localhost ~ 12:20:17]$ openssl s_client -connect www.informit.com:443 -tls1 </dev/null
CONNECTED(00000003)
write:errno=104
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 0 bytes and written 0 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : 0000
    Session-ID:
    Session-ID-ctx:
    Master-Key:
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    Start Time: 1482636284
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---
[wataru.noguchi@localhost ~ 12:24:44]$ openssl s_client -connect www.informit.com:443 -tls1_1 </dev/null
CONNECTED(00000003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
verify return:1
depth=2 C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority
verify return:1
depth=1 C = US, ST = DE, L = Wilmington, O = Corporation Service Company, CN = Trusted Secure Certificate Authority 5
verify return:1
depth=0 C = US, postalCode = 07675, ST = NJ, L = Old Tappan, street = 200 Old Tappan Rd, O = "Pearson Education, Inc.", OU = Storefront, OU = Enterprise SSL, CN = www.informit.com
verify return:1
---
Certificate chain
 0 s:/C=US/postalCode=07675/ST=NJ/L=Old Tappan/street=200 Old Tappan Rd/O=Pearson Education, Inc./OU=Storefront/OU=Enterprise SSL/CN=www.informit.com
   i:/C=US/ST=DE/L=Wilmington/O=Corporation Service Company/CN=Trusted Secure Certificate Authority 5
 1 s:/C=US/ST=DE/L=Wilmington/O=Corporation Service Company/CN=Trusted Secure Certificate Authority 5
   i:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority
 2 s:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=US/postalCode=07675/ST=NJ/L=Old Tappan/street=200 Old Tappan Rd/O=Pearson Education, Inc./OU=Storefront/OU=Enterprise SSL/CN=www.informit.com
issuer=/C=US/ST=DE/L=Wilmington/O=Corporation Service Company/CN=Trusted Secure Certificate Authority 5
---
No client certificate CA names sent
Server Temp Key: ECDH, secp521r1, 521 bits
---
SSL handshake has read 4995 bytes and written 373 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1.1
    Cipher    : ECDHE-RSA-AES256-SHA
    Session-ID: 0A2500007E8B3F5ACDB2D05BE74B8132E0C3529A6E017E375760801F27265F36
    Session-ID-ctx:
    Master-Key: 41BB02A8A1831852968167E2DD9A18B946580EC5D5D8B4B90596359F130C5BBC146848CB922B90144381BB5F503F66E3
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    Start Time: 1482636426
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---
DONE
[wataru.noguchi@localhost ~ 12:27:06]$ openssl s_client -connect www.informit.com:443 -tls1_2 </dev/null
CONNECTED(00000003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
verify return:1
depth=2 C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority
verify return:1
depth=1 C = US, ST = DE, L = Wilmington, O = Corporation Service Company, CN = Trusted Secure Certificate Authority 5
verify return:1
depth=0 C = US, postalCode = 07675, ST = NJ, L = Old Tappan, street = 200 Old Tappan Rd, O = "Pearson Education, Inc.", OU = Storefront, OU = Enterprise SSL, CN = www.informit.com
verify return:1
---
Certificate chain
 0 s:/C=US/postalCode=07675/ST=NJ/L=Old Tappan/street=200 Old Tappan Rd/O=Pearson Education, Inc./OU=Storefront/OU=Enterprise SSL/CN=www.informit.com
   i:/C=US/ST=DE/L=Wilmington/O=Corporation Service Company/CN=Trusted Secure Certificate Authority 5
 1 s:/C=US/ST=DE/L=Wilmington/O=Corporation Service Company/CN=Trusted Secure Certificate Authority 5
   i:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority
 2 s:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=US/postalCode=07675/ST=NJ/L=Old Tappan/street=200 Old Tappan Rd/O=Pearson Education, Inc./OU=Storefront/OU=Enterprise SSL/CN=www.informit.com
issuer=/C=US/ST=DE/L=Wilmington/O=Corporation Service Company/CN=Trusted Secure Certificate Authority 5
---
No client certificate CA names sent
Server Temp Key: ECDH, secp521r1, 521 bits
---
SSL handshake has read 5029 bytes and written 497 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-SHA384
    Session-ID: F64D000018A14AED3E9AA41E56E4486C997377299609FD3995DD858D6F494E94
    Session-ID-ctx:
    Master-Key: DE25A2D957F98A677F3925A12D055D4DFA8D810C3BF161A239E083236610C6F37147C19540A10F4CE88E319FCF3E778B
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    Start Time: 1482636433
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---
DONE
[wataru.noguchi@localhost ~ 12:27:14]$ openssl s_client -connect www.informit.com:443 -tls1 </dev/null
CONNECTED(00000003)
write:errno=104
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 0 bytes and written 0 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : 0000
    Session-ID:
    Session-ID-ctx:
    Master-Key:
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    Start Time: 1482636452
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment