Closed agpt8 closed 3 weeks ago
As explained in the other issue, and since this requires FIPS mode, it won't improve security of the system. Unless there is some documentation or proof that says:
Please feel free to prove me wrong and reopen this issue whenever you have those information.
The module enforces NIST cipher suites already and prioritizes them and disables old and insecure algorithms, all happening in the TLS category, that's actually better than what FIPS mode would provide, so FIPS mode would be a downgrade.
Also, a bit confusing since on the other issue you were suggesting not to use NSA made ciphers and algorithms but FIPs explicitly mandates use of those federally approved ciphers and algorithms and they are from the same organization, NIST.
Are you sure the Security measure is not already implemented?
Please explain your new Security measure suggestion
The encryption level of terminal is defined in this post (this is slightly old, but the settings are still there, and the levels are set between 2 and 3, i.e., Client Compatible and High). The following registry tweaks set the levels to FIPs Compliant which ensures that only the highest and most secure algorithms are used to encrypt the connection.
Registry:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows NT\Terminal Services] “MinEncryptionLevel” REG_DWORD set the value to 4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Winstations\RDP-Tcp] “MinEncryptionLevel” REG_DWORD set the value to 4
This also necessitates that FIPs mode is enabled. I will be adding a separate suggestion for this one and will go into more detail on why this has benefits.
There might be other registry and GPO settings that may allow us to increase minimum encryption levels, but this is a start. The inspiration for this comes from this question and answer: https://learn.microsoft.com/en-us/answers/questions/191055/how-to-changeterminal-services-encryption-level-to