﻿<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:blogChannel="http://backend.userland.com/blogChannelModule" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:pingback="http://madskills.com/public/xml/rss/module/pingback/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:betag="http://dotnetblogengine.net/schemas/tags">
  <channel>
    <title>Nartac Software Blog</title>
    <description />
    <link>https://www.nartac.com/Blog/</link>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>BlogEngine.NET 3.1.0.1</generator>
    <language>en-US</language>
    <blogChannel:blogRoll>https://www.nartac.com/Blog/opml.axd</blogChannel:blogRoll>
    <dc:creator>Nartac Software</dc:creator>
    <dc:title>Nartac Software Blog</dc:title>
    <geo:lat>0.000000</geo:lat>
    <geo:long>0.000000</geo:long>
    <item>
      <title>IIS Crypto Updated</title>
      <description>&lt;p&gt;We just published a minor update of&amp;nbsp;&lt;a href="https://www.nartac.com/Products/IISCrypto"&gt;IIS Crypto&lt;/a&gt;. If you have been experiencing a crash while running from a network share, this resolves the issue.&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2016/07/16/iis-crypto-updated1.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2016/07/16/iis-crypto-updated1.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=671afc63-368d-43c0-8409-53545a47d6d3</guid>
      <pubDate>Sat, 16 Jul 2016 10:06:00 +0000</pubDate>
      <category>Security</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=671afc63-368d-43c0-8409-53545a47d6d3</pingback:target>
      <slash:comments>59</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=671afc63-368d-43c0-8409-53545a47d6d3</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2016/07/16/iis-crypto-updated1.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=671afc63-368d-43c0-8409-53545a47d6d3</wfw:commentRss>
    </item>
    <item>
      <title>Cipher Suites Renamed in Windows Server 2016</title>
      <description>&lt;p&gt;After testing &lt;a href="https://www.nartac.com/Products/IISCrypto"&gt;IIS Crypto 2.0&lt;/a&gt;&amp;nbsp;we ran into an issue with soon to be released &lt;a href="https://www.microsoft.com/en-us/cloud-platform/windows-server-2016" target="_blank"&gt;Windows Server 2016&lt;/a&gt;. All of the &lt;a href="https://www.ssllabs.com/ssltest" target="_blank"&gt;Qualys SSL scans&lt;/a&gt; were not recognizing the order of the cipher suites configured by IIS Crypto. It turns out that&amp;nbsp;&lt;span style="line-height: 1.42857;"&gt;Microsoft quietly renamed most of their cipher suites dropping the curve (_P521, _P384, _P256) from them. This reduced most suites from three down to one. However, this threw us a bit of a curve ball as now IIS Crypto's configuration and all of the templates needed to support OS version checking. We added this in one of the beta versions, retested and sure enough the scans were now showing the correct cipher suite order.&lt;/span&gt;&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2016/07/12/cipher-suites-renamed-in-windows-server-2016.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2016/07/12/cipher-suites-renamed-in-windows-server-2016.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=eab01abc-ee30-43e0-b956-d1087e812ceb</guid>
      <pubDate>Tue, 12 Jul 2016 11:15:00 +0000</pubDate>
      <category>Cryptography</category>
      <category>Security</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=eab01abc-ee30-43e0-b956-d1087e812ceb</pingback:target>
      <slash:comments>15</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=eab01abc-ee30-43e0-b956-d1087e812ceb</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2016/07/12/cipher-suites-renamed-in-windows-server-2016.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=eab01abc-ee30-43e0-b956-d1087e812ceb</wfw:commentRss>
    </item>
    <item>
      <title>Default Cipher Suites in Windows Server</title>
      <description>&lt;p&gt;While testing the latest version of &lt;a href="https://www.nartac.com/Products/IISCrypto"&gt;IIS Crypto&lt;/a&gt;, we researched all of the cipher suites for each operating system. Unfortunately there is little up-to-date documentation on the default cipher suites included or their order for TLS negotiation. We ended up extracting the list by logging into every fully patched version of Windows Server and exporting the proper registry key values. The full list can be found &lt;a href="https://www.nartac.com/Support/IISCrypto/CipherSuites"&gt;here&lt;/a&gt;.&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2016/07/11/default-cipher-suites-in-windows-server.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2016/07/11/default-cipher-suites-in-windows-server.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=d7a52bbf-30a6-48d4-b4ab-4d46814cda2c</guid>
      <pubDate>Mon, 11 Jul 2016 13:05:00 +0000</pubDate>
      <category>Cryptography</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=d7a52bbf-30a6-48d4-b4ab-4d46814cda2c</pingback:target>
      <slash:comments>1</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=d7a52bbf-30a6-48d4-b4ab-4d46814cda2c</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2016/07/11/default-cipher-suites-in-windows-server.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=d7a52bbf-30a6-48d4-b4ab-4d46814cda2c</wfw:commentRss>
    </item>
    <item>
      <title>IIS Crypto 2.0 Released!</title>
      <description>&lt;p&gt;We are happy to announce that &lt;a href="https://www.nartac.com/Products/IISCrypto"&gt;IIS Crypto 2.0&lt;/a&gt; has been released! This new version is a complete rewrite and has a brand new interface. Some new features include creating custom templates, Windows Server 2016 support, add your own cipher suites, check for updates and much more. The full change log can be found on our &lt;a href="https://www.nartac.com/Products/IISCrypto/Download"&gt;download&lt;/a&gt; page. We have also updated the &lt;a href="https://www.nartac.com/Products/IISCrypto"&gt;documentation&lt;/a&gt; and &lt;a href="https://www.nartac.com/Support/IISCrypto/FAQ"&gt;FAQ&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Thank-you everyone for all of your comments and feedback!&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2016/07/08/iis-crypto-2-0-released.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2016/07/08/iis-crypto-2-0-released.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=108bbfec-da94-4183-8870-3ad7e6de8e61</guid>
      <pubDate>Fri, 08 Jul 2016 14:20:00 +0000</pubDate>
      <category>Security</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=108bbfec-da94-4183-8870-3ad7e6de8e61</pingback:target>
      <slash:comments>2</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=108bbfec-da94-4183-8870-3ad7e6de8e61</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2016/07/08/iis-crypto-2-0-released.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=108bbfec-da94-4183-8870-3ad7e6de8e61</wfw:commentRss>
    </item>
    <item>
      <title>New SSL/TLS Attack - FREAK</title>
      <description>&lt;p&gt;A new SSL/TLS vulnerabilty was recently discovered dubbed "&lt;a title="FREAK Attack" href="https://freakattack.com/" target="_blank"&gt;FREAK&lt;/a&gt;". Originally it was thought that only OpenSSL was vulnerable, however, Microsoft just issued an&amp;nbsp;&lt;a title="FREAK Advisory 3046015" href="https://technet.microsoft.com/en-us/library/security/3046015" target="_blank"&gt;advisory&lt;/a&gt;&amp;nbsp;(3046015) describing the affected versions of Windows. The default configuration of Windows 2003 is vulnerable, however, Windows 2008 and above are not affected in the default configuration. The Best Practices template in &lt;a title="IIS Crypto" href="https://www.nartac.com/Products/IISCrypto/Default.aspx"&gt;IIS Crypto&lt;/a&gt; solves this by removing the affected cipher suites.&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2015/03/05/New-SSLTLS-Attack-FREAK.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2015/03/05/New-SSLTLS-Attack-FREAK.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=2a8f4a23-95f8-4ce3-9012-356387d696c5</guid>
      <pubDate>Thu, 05 Mar 2015 14:14:00 +0000</pubDate>
      <category>Cryptography</category>
      <category>General</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=2a8f4a23-95f8-4ce3-9012-356387d696c5</pingback:target>
      <slash:comments>23</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=2a8f4a23-95f8-4ce3-9012-356387d696c5</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2015/03/05/New-SSLTLS-Attack-FREAK.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=2a8f4a23-95f8-4ce3-9012-356387d696c5</wfw:commentRss>
    </item>
    <item>
      <title>MS14-066 Updated</title>
      <description>&lt;p&gt;Microsoft has just released an update for &lt;a title="MS14-066 Update" href="https://support.microsoft.com/kb/2992611" target="_blank"&gt;MS14-066&lt;/a&gt;. All this update does is remove TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256 from the default cipher suite list for Windows 2008 R2 and Windows 2012. It does not update Windows 2012 R2. This seems like a temporary measure until Microsoft figures out what the real issue is. In the mean time, make sure that those cipher suites are unchecked in IIS Crypto.&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2014/11/18/MS14-066-Updated.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2014/11/18/MS14-066-Updated.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=9c285f02-8723-42b2-a6d1-c78c0da71e93</guid>
      <pubDate>Tue, 18 Nov 2014 14:26:00 +0000</pubDate>
      <category>Security</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=9c285f02-8723-42b2-a6d1-c78c0da71e93</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=9c285f02-8723-42b2-a6d1-c78c0da71e93</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2014/11/18/MS14-066-Updated.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=9c285f02-8723-42b2-a6d1-c78c0da71e93</wfw:commentRss>
    </item>
    <item>
      <title>IIS Crypto 1.6 Released with Updates for MS14-066</title>
      <description>&lt;p&gt;&lt;a title="IIS Crypto 1.6 Released" href="https://www.nartac.com/Products/IISCrypto/Default.aspx"&gt;IIS Crypto 1.6&lt;/a&gt;&amp;nbsp;has been released. This version adds the 4 additional cipher suites that were updated as part of the &lt;a title="MS14-066 KB2992611" href="https://support.microsoft.com/kb/2992611" target="_blank"&gt;MS14-066 (KB2992611)&lt;/a&gt; patch. Along with some minor fixes, the PCI template now disables SSL 3.0 and RC4. Full version history can be found &lt;a title="IIS Crypto Version History" href="https://www.nartac.com/Products/IISCrypto/Versions.aspx"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Microsoft released a patch named MS14-066 on November 11, 2014 to address a vulnerability in SChannel that could allow remote code execution. The patch includes 4 new cipher suites for Windows Server versions 2003 through 2012 R2. Previously only Windows Server 2012 R2 had these cipher suites. On November 16, Microsoft updated the advisory stating that they found an issue with the new cipher suites they introduced. If you have applied this patch and are running into connection issues with clients, the work around is to disable the following cipher suites: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384 and TLS_RSA_WITH_AES_128_GCM_SHA256. Using IIS Crypto simply uncheck these cipher suites, click Apply and reboot your server.&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2014/11/17/IIS-Crypto-16-Released-with-Updates-for-MS14-066.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2014/11/17/IIS-Crypto-16-Released-with-Updates-for-MS14-066.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=0fcf558a-e73d-42da-bea0-59020d4a753e</guid>
      <pubDate>Mon, 17 Nov 2014 18:30:00 +0000</pubDate>
      <category>Security</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=0fcf558a-e73d-42da-bea0-59020d4a753e</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=0fcf558a-e73d-42da-bea0-59020d4a753e</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2014/11/17/IIS-Crypto-16-Released-with-Updates-for-MS14-066.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=0fcf558a-e73d-42da-bea0-59020d4a753e</wfw:commentRss>
    </item>
    <item>
      <title>IIS Crypto 1.5 and Attack of the POODLE</title>
      <description>&lt;p&gt;A new version of &lt;a title="IIS Crypto 1.5" href="https://www.nartac.com/Products/IISCrypto/Default.aspx"&gt;IIS Crypto&lt;/a&gt; has been released. This updates the Best Practices template to disable SSL 3.0 because of the &lt;a title="POODLE Attack" href="http://en.wikipedia.org/wiki/POODLE" target="_blank"&gt;POODLE&lt;/a&gt; attack. Best Practices also has an updated cipher suite order and excludes RC4 encryption and DSA certificates. &lt;a title="Windows Server 2012 R2 Cipher Suites" href="http://support.microsoft.com/kb/2929781" target="_blank"&gt;Addtional cipher suites&lt;/a&gt;&amp;nbsp;have been added to Windows Server 2012 R2. Full version history can be found &lt;a title="IIS Crypto Version History" href="https://www.nartac.com/Products/IISCrypto/Versions.aspx"&gt;here&lt;/a&gt;. Check the updated &lt;a title="IIS Crypto FAQ" href="https://www.nartac.com/Products/IISCrypto/FAQ.aspx"&gt;FAQ&lt;/a&gt; for more help.&lt;/p&gt;
&lt;p&gt;Thanks to everyone for the feedback and help with testing!&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2014/11/08/IIS-Crypto-15-and-Attack-of-the-POODLE.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2014/11/08/IIS-Crypto-15-and-Attack-of-the-POODLE.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=9d54f1e7-936c-4076-8206-a52b38d00f80</guid>
      <pubDate>Sat, 08 Nov 2014 11:40:00 +0000</pubDate>
      <category>Security</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=9d54f1e7-936c-4076-8206-a52b38d00f80</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=9d54f1e7-936c-4076-8206-a52b38d00f80</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2014/11/08/IIS-Crypto-15-and-Attack-of-the-POODLE.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=9d54f1e7-936c-4076-8206-a52b38d00f80</wfw:commentRss>
    </item>
    <item>
      <title>IIS Crypto 1.4 Released</title>
      <description>&lt;p&gt;&lt;a title="IIS Crypto" href="https://www.nartac.com/Products/IISCrypto/Default.aspx"&gt;IIS Crypto 1.4&lt;/a&gt; has finally been released. Along with the usual bug fixes, &lt;a title="IIS Crypto Version History" href="https://www.nartac.com/Products/IISCrypto/Versions.aspx"&gt;version 1.4&lt;/a&gt; adds in a new Best Practices template which prefers &lt;a title="Forward Secrecy" href="https://en.wikipedia.org/wiki/Forward_secrecy" target="_blank"&gt;forward secrecy&lt;/a&gt; cipher suites with the highest key length. The BEAST template has been removed as RC4 is now considered much weaker than previously was known. A good explaination can be found &lt;a title="BEAST Still A Threat" href="https://community.qualys.com/blogs/securitylabs/2013/09/10/is-beast-still-a-threat" target="_blank"&gt;here&lt;/a&gt;. Finally, the SSL scanner from &lt;a title="Qualys SSL Labs" href="https://www.ssllabs.com/index.html" target="_blank"&gt;Qualys&lt;/a&gt; is now built in so you can scan your website directly from IIS Crypto.&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2013/11/05/IIS-Crypto-14-Released.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2013/11/05/IIS-Crypto-14-Released.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=76de0965-a47e-4359-a10d-6936bf7a91eb</guid>
      <pubDate>Tue, 05 Nov 2013 16:25:00 +0000</pubDate>
      <category>Security</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=76de0965-a47e-4359-a10d-6936bf7a91eb</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=76de0965-a47e-4359-a10d-6936bf7a91eb</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2013/11/05/IIS-Crypto-14-Released.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=76de0965-a47e-4359-a10d-6936bf7a91eb</wfw:commentRss>
    </item>
    <item>
      <title>IIS Crypto Explained</title>
      <description>&lt;p&gt;Lately, we have been receiving a lot of questions with regards to what exactly IIS Crypto does. I will do my best to answer these questions in this post.&lt;/p&gt;
&lt;p&gt;&lt;a title="IIS Crypto" href="https://www.nartac.com/Products/IISCrypto/Default.aspx"&gt;IIS Crypto&lt;/a&gt; was created to simplify enabling and disabling various protocols and cipher suites on the many servers we administer. Originally we had a script that we would execute on each server after the initial setup, however, some servers needed different protocols and cipher suites enabled. We also wanted to see the current configuration of existing servers. Thus IIS Crypto was born.&lt;/p&gt;
&lt;p&gt;IIS Crypto simply sets a few registry keys to enable/disable protocols, ciphers and hashes as well as reorder cipher suites. Microsoft has an article explaining all of the settings&amp;nbsp;&lt;a title="Restrict Schannel Protocols" href="http://support.microsoft.com/default.aspx?scid=kb;EN-US;245030"&gt;here&lt;/a&gt;. These are the exact keys IIS Crypto uses:&lt;/p&gt;
&lt;pre class="brush: c-sharp;"&gt;HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\Multi-Protocol Unified Hello\Server
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\PCT 1.0\Server
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\NULL
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\DES 56/56
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 40/128
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 56/128
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 128/128
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 64/128
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 128/128
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES 168/168
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\AES 128/128
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\AES 256/256

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes\MD5
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes\SHA

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms\Diffie-Hellman
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms\PKCS&lt;/pre&gt;
&lt;p&gt;Each registry key has an "Enabled" value that is set. The protocols have an additional value named "DisabledByDefault" that is also set.&lt;/p&gt;
&lt;p&gt;To reorder the cipher suites, IIS Crypto uses the following keys:&lt;/p&gt;
&lt;pre class="brush: c-sharp;"&gt;HKLM\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010002

HKLM\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL\00010002&lt;/pre&gt;
&lt;p&gt;The first registry key contains the list of supported cipher suites on the server. The second registry key is used to set the cipher suites order. These are the same keys that the group policy editor (gpedit.msc) use. Microsoft explains how to do this manually&amp;nbsp;&lt;a title="Prioritizing Schannel Cipher Suites" href="http://msdn.microsoft.com/en-us/library/windows/desktop/bb870930(v=vs.85).aspx"&gt;here&lt;/a&gt;. The full list of cipher suites supported is&amp;nbsp;&lt;a title="Cipher Suites in Schannel" href="http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;IIS Crypto also supports pre-defined templates that can be set with a single button click:&lt;/p&gt;
&lt;p&gt;PCI - Disables everything except SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, RC4 128, Triple DES 168, AES 128, AES 256, MD5, SHA1, DH and PKCS.&lt;/p&gt;
&lt;p&gt;FIPS 140-2 - Disables everything except TLS 1.0, TLS 1.1, TLS 1.2, Triple DES 168, AES 128, AES 256, SHA1, DH and PKCS.&lt;/p&gt;
&lt;p&gt;BEAST - The same as PCI, but also reorders the cipher suite as follows:&lt;/p&gt;
&lt;pre class="brush: c-sharp;"&gt;TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA&lt;/pre&gt;
&lt;p&gt;Feel free to leave a comment if you have any questions.&lt;/p&gt;</description>
      <link>https://www.nartac.com/Blog/post/2013/04/19/IIS-Crypto-Explained.aspx</link>
      <comments>https://www.nartac.com/Blog/post/2013/04/19/IIS-Crypto-Explained.aspx#comment</comments>
      <guid>https://www.nartac.com/Blog/post.aspx?id=8731f938-2ccd-4921-81cf-73fc1f0f99f2</guid>
      <pubDate>Fri, 19 Apr 2013 08:18:00 +0000</pubDate>
      <category>Security</category>
      <dc:publisher>Jeff</dc:publisher>
      <pingback:server>https://www.nartac.com/Blog/pingback.axd</pingback:server>
      <pingback:target>https://www.nartac.com/Blog/post.aspx?id=8731f938-2ccd-4921-81cf-73fc1f0f99f2</pingback:target>
      <slash:comments>39</slash:comments>
      <trackback:ping>https://www.nartac.com/Blog/trackback.axd?id=8731f938-2ccd-4921-81cf-73fc1f0f99f2</trackback:ping>
      <wfw:comment>https://www.nartac.com/Blog/post/2013/04/19/IIS-Crypto-Explained.aspx#comment</wfw:comment>
      <wfw:commentRss>https://www.nartac.com/Blog/syndication.axd?post=8731f938-2ccd-4921-81cf-73fc1f0f99f2</wfw:commentRss>
    </item>
  </channel>
</rss>