Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/deekayen/ansible-role-schannel

Ansible role (built for Windows) to configure more secure SCHANNEL settings for encrypted network services like IIS and winrm that use SSL or TLS.
https://github.com/deekayen/ansible-role-schannel

ansible-role schannel schannel-settings ssl tls winrm

Last synced: 7 days ago
JSON representation

Ansible role (built for Windows) to configure more secure SCHANNEL settings for encrypted network services like IIS and winrm that use SSL or TLS.

Awesome Lists containing this project

README

        

SCHANNEL
========
[![CI](https://github.com/deekayen/ansible-role-schannel/actions/workflows/ci.yml/badge.svg)](https://github.com/deekayen/ansible-role-schannel/actions/workflows/ci.yml) [![Project Status: Inactive – The project has reached a stable, usable state but is no longer being actively developed; support/maintenance will be provided as time allows.](https://www.repostatus.org/badges/latest/inactive.svg)](https://www.repostatus.org/#inactive) ![BSD 3-Clause license](https://img.shields.io/badge/license-BSD%203--Clause-blue) ![Windows platform](https://img.shields.io/badge/platform-windows-lightgrey)

Makes changes to SCHANNEL settings of the Windows
registry to serve more secure cryptographic
communications for services like IIS and WinRM.

Ciphers:

* AES 128/128
* AES 256/256
* DES 56/56
* NULL
* RC2 40/128
* RC2 56/128
* RC2 128/128
* RC4 40/128
* RC4 56/128
* RC4 64/128
* RC4 128/128
* Triple DES 168/168

Protocols:

* PCT 1.0
* SSLv2
* SSLv3
* TLS 1.0
* TLS 1.1
* TLS 1.2

Hashes:

* MD5
* SHA-1
* SHA-256
* SHA-384
* SHA-512

Related documentation:

* [How to restrict the use of certain cryptographic algorithms and protocols in Schannel.dll](https://support.microsoft.com/en-us/help/245030/how-to-restrict-the-use-of-certain-cryptographic-algorithms-and-protocols-in-schannel.dll)
* [Schannel Security Support Provider Technical Reference: TLS/SSL Settings](https://technet.microsoft.com/en-us/library/dn786418.aspx)
* [MS16-065: Description of the TLS/SSL protocol information disclosure vulnerability (CVE-2016-0149): May 10, 2016](https://support.microsoft.com/en-us/help/3155464/ms16-065-description-of-the-tls-ssl-protocol-information-disclosure-vu)
* [Enabling strong cryptography for all .Net applications](https://www.johnlouros.com/blog/enabling-strong-cryptography-for-all-dot-net-applications)
* [Updated Support for Diffie-Hellman Key Exchange](https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/3174644)
* [Microsoft security advisory: Updated support for Diffie-Hellman Key Exchange](https://support.microsoft.com/en-us/help/3174644/microsoft-security-advisory-updated-support-for-diffie-hellman-key-exc)

Requirements
------------

Windows

Role Variables
--------------

Default values are as follows:

```
schannel_dh_enabled: True
schannel_dhmodulus: 2048

schannel_3des: false
schannel_aes_128: true
schannel_aes_256: true
schannel_des: false
schannel_null: false
schannel_rc2: false
schannel_rc4: false

schannel_md5: false
schannel_sha1: true
schannel_sha256: true
schannel_sha384: true
schannel_sha512: true

schannel_pct: false
schannel_sslv2: false
schannel_sslv3: false
schannel_tlsv10: false
schannel_tlsv11: true
schannel_tlsv12: true

schannel_usestrongcrypto: true
```

Valid values for schannel_dhmodulus:
* 1024
* 2048
* 3072
* 4096

Example Playbook
----------------

- name: Harden Windows SCHANNEL configurations.
hosts: windows2012

vars:
schannel_tlsv10: true

roles:
- deekayen.schannel

Dependencies
------------

None.

Tags
----

There's a unique tag on each task. Read inside.

* schannel
* security
* windows

License
-------

BSD 3-Clause License