All Projects → Crosse → SchannelGroupPolicy

Crosse / SchannelGroupPolicy

Licence: MIT License
Group Policy Template for Schannel

Projects that are alternatives of or similar to SchannelGroupPolicy

besu-exflo
A plugin for the Besu enterprise-grade Ethereum client with the aim of making it easier to extract chain data into a variety of different data stores and processing pipelines.
Stars: ✭ 16 (-77.14%)
Mutual labels:  crypto
BittyTax
Crypto-currency tax calculator for UK tax rules.
Stars: ✭ 304 (+334.29%)
Mutual labels:  crypto
Axie Infinity Extras
Here are all the websites and projects that are useful if you are an Axie Infinity player. If you find some projects that are not on the list, feel free to make a pull request!
Stars: ✭ 13 (-81.43%)
Mutual labels:  crypto
Cryptography-Guidelines
Guidance on implementing cryptography as a developer.
Stars: ✭ 15 (-78.57%)
Mutual labels:  crypto
binance-chain-python
Binance chain SDK in Python
Stars: ✭ 22 (-68.57%)
Mutual labels:  crypto
FISCO-BCOS
FISCO BCOS是由微众牵头的金链盟主导研发、对外开源、安全可控的企业级金融区块链底层技术平台。 单链配置下,性能TPS可达万级。提供群组架构、并行计算、分布式存储、可插拔的共识机制、隐私保护算法、支持全链路国密算法等诸多特性。 经过多个机构、多个应用,长时间在生产环境中的实践检验,具备金融级的高性能、高可用性及高安全性。FISCO BCOS is a secure and reliable financial-grade open-source blockchain platform. The platform provides rich features including group architecture, cross-chain communication protoc…
Stars: ✭ 1,603 (+2190%)
Mutual labels:  crypto
Crypto
封装多种CTF和平时常见加密及编码C#类库
Stars: ✭ 20 (-71.43%)
Mutual labels:  crypto
secretpy
Classical ciphers: Caesar, ADFGX, ROT13 and etc.
Stars: ✭ 40 (-42.86%)
Mutual labels:  crypto
ark-go
Ark GO client for ARK.io blockchain ecosystem #golang #ark #blockchain
Stars: ✭ 14 (-80%)
Mutual labels:  crypto
robinhood.tools
📈🤑💰 Advanced trading tools and resources for Robinhood Web.
Stars: ✭ 27 (-61.43%)
Mutual labels:  crypto
core
JCrypTool Core Plug-ins
Stars: ✭ 131 (+87.14%)
Mutual labels:  crypto
provably-fair
Tools for creating and verifying provably fair games.
Stars: ✭ 14 (-80%)
Mutual labels:  crypto
tumbleweed gdax
Prototype market maker specialized to trade on CoinbasePro
Stars: ✭ 41 (-41.43%)
Mutual labels:  crypto
MoniGoMani
Isn't that what we all want? Our money to go many? Well that's what this framework/strategy hopes to do for you! By giving you & HyperOpt a lot of signals to alter the weights from.
Stars: ✭ 868 (+1140%)
Mutual labels:  crypto
trading sim
📈📆 Backtest trading strategies concurrently using historical chart data from various financial exchanges.
Stars: ✭ 21 (-70%)
Mutual labels:  crypto
WindowsFirewallRuleset
Windows firewall PowerShell scripts
Stars: ✭ 94 (+34.29%)
Mutual labels:  gpo
dtls
Datagram Transport Layer Security (DTLS) client.
Stars: ✭ 72 (+2.86%)
Mutual labels:  crypto
CryptoFiscaFacile
Outil (en ligne de commande pour l'instant) vous permettant de rassembler toutes les transactions de vos différents échanges et wallets afin de constituer votre portefeuille global et ainsi vous aider à la déclaration fiscale française.
Stars: ✭ 50 (-28.57%)
Mutual labels:  crypto
mirror-next
A Next.js-powered frontend for your Mirror publication
Stars: ✭ 98 (+40%)
Mutual labels:  crypto
jazz
The Scripting Engine that Combines Speed, Safety, and Simplicity
Stars: ✭ 132 (+88.57%)
Mutual labels:  crypto

Group Policy Template for Schannel

Maintainers Wanted!

I no longer maintain Windows servers for my job, so this may be out of date. If you notice something that needs to be updated, please submit an issue or a pull request! I can only rely on others to keep this project relevant and updated, and if you'd like to help out (and have a Windows environment in which you could test pull requests!), let me know and I can add you to this repo. Thanks!

What Is This?

I really like Nartac Software's IIS Crypto tool for configuring protocols, ciphers, hashes and key exchange algorithms on Windows. However, since the tool simply makes changes to the local machine's registry it still requires a bit of work if you want to roll out these changes to multiple machines. Sure, you could use IIS Crypto on a single machine, export the registry keys, then import them via a startup script GPO, but I wanted a more Group Policy-integrated way to enable or disable things. So I created an administrative template for Group Policy to do just that.

What Does it Do?

This template simply twiddles values under the registry key HKLM\CurrentControlSet\Control\SecurityProviders\Schannel.

Note that since that key does not reside under the Policies key, using this template will "tattoo" the settings onto the registry. In other words, removing the policy will not revert these settings to their previous values.

Installation

From MSDN's Managing Group Policy ADMX Files Step-by-Step Guide, there are two ways to install custom administrative templates.

Local Installation

  • Copy the language-neutral ADMX file(s) to %SYSTEMROOT%\PolicyDefinitions.
  • Copy the language-specific ADML file(s) to %SYSTEMROOT%\PolicyDefinitions\[MUIculture] (for example, the U.S. English ADMX language specific file will be stored in %SYSTEMROOT%\policyDefinitions\en-us.)

You will then be able to use the template on your local workstation to create and edit local or domain policies, but the template will not be available to other administrators. A better option is to install the template files in the domain's central store.

Installation in the Central Store

To make the template available automatically to all Group Policy administrators in a domain, perform the following on a domain controller:

  • Copy the language-neutral ADMX file(s) to %SYSTEMROOT%\sysvol\domain\policies\PolicyDefinitions.
  • Copy the language-specific ADML file(s) to %SYSTEMROOT%\sysvol\domain\policies\PolicyDefinitions\[MUIculture] (for example, the U.S. English ADMX language specific file will be stored in %SYSTEMROOT%\sysvol\domain\policies\PolicyDefinitions\en-us.)

Usage

The new policy settings are located in the same place one would normally configure the SSL Cipher Suite order; namely:

Computer Configuration/Administrative Templates/Network/SSL Configuration

Screenshot:

location

Available Policy Settings

Any of the following ciphers, hash algorithms, or key exchange algorithms can be enabled or disabled globally. The protocols can be independently configured for both client and server use. Note that changes to the ciphers and hashes (and presumably, to the key exchange algorithms) will take effect immediately when the group policy is applied. Changes to protocols require a restart of the computer.

Ciphers

Ciphers\Weak Ciphers

Hash Algorithms

Hash Algorithms\Weak Hash Algorithms

  • MD5
  • SHA (also called "SHA-1")

Key Exchange Algorithms

Key Exchange Algorithms\Weak Key Exchange Algorithms

Protocols

Protocols\Weak Protocols

Cipher Suite Order

Setting the cipher suite order (the second half of IIS Crypto) for Windows involves configuring a Microsoft-delivered group policy setting. See Prioritizing Schannel Cipher Suites for more information. (Note this line on that page, however: "The list of cipher suites is limited to 1023 characters." So you can't go nuts with this GPO like you can if you set the registry key outright, but the GPO is certainly easier to deploy.) There are a few ways you can build your cipher suite list.

  • Use IIS Crypto as a guide. Start the tool, click the "Best Practices" button, and copy down what it gives you.
  • Use Steve Gibson's list. Just copy that list, remove the line breaks, and paste it into the GPO setting.
  • Roll your own.

Once you've got your list, add it to your GPO and roll it out!

Resources

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].