Created
November 26, 2016 14:38
-
-
Save jhochwald/f019e9d94496c47dff44a74e21f6d978 to your computer and use it in GitHub Desktop.
Enales a stronger and more secure SSL configuration in IIS
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#requires -Version 1.0 | |
function Set-EnableStrongSSLConfig | |
{ | |
<# | |
.SYNOPSIS | |
Make IIS SSL Config more secure | |
.DESCRIPTION | |
Enales a stronger SSL configuration in IIS | |
.EXAMPLE | |
PS C:\> Set-EnableStrongSSLConfig | |
.NOTES | |
Based on an idea of Tyler McCamant | |
#> | |
# Stop the IIS | |
$null = (& "$env:windir\system32\iisreset.exe" /stop) | |
$null = (& "$env:windir\system32\iisreset.exe" /stop) | |
# Define some defaults | |
$defaultValues = @{ | |
ErrorAction = 'SilentlyContinue' | |
WarningAction = 'SilentlyContinue' | |
} | |
# Re-create the protocols key. | |
$null = New-Item -Path 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols' -Force @defaultValues | |
# Disable weak protocols | |
$weakProtocols = @( | |
'Multi-Protocol Unified Hello', | |
'PCT 1.0', | |
'SSL 2.0', | |
'SSL 3.0' | |
) | |
Foreach ($protocol in $weakProtocols) | |
{ | |
$null = New-Item -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Server -Force @defaultValues | |
$null = New-Item -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Client -Force @defaultValues | |
$null = New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Server -Name Enabled -Value 0 -PropertyType 'DWord' -Force @defaultValues | |
$null = New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Server -Name DisabledByDefault -Value '0xffffffff' -PropertyType 'DWord' -Force @defaultValues | |
$null = New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Client -Name Enabled -Value 0 -PropertyType 'DWord' -Force @defaultValues | |
$null = New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Client -Name DisabledByDefault -Value '0xffffffff' -PropertyType 'DWord' -Force @defaultValues | |
} | |
# Enable strong protocols | |
$strongProtocols = @( | |
'TLS 1.0', | |
'TLS 1.1', | |
'TLS 1.2' | |
) | |
Foreach ($protocol in $strongProtocols) | |
{ | |
$null = New-Item -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Server -Force @defaultValues | |
$null = New-Item -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Client -Force @defaultValues | |
$null = New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Server -Name 'Enabled' -Value '0xffffffff' -PropertyType 'DWord' -Force @defaultValues | |
$null = New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Server -Name 'DisabledByDefault' -Value 0 -PropertyType 'DWord' -Force @defaultValues | |
$null = New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Client -Name 'Enabled' -Value '0xffffffff' -PropertyType 'DWord' -Force @defaultValues | |
$null = New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\$protocol\Client -Name 'DisabledByDefault' -Value 0 -PropertyType 'DWord' -Force @defaultValues | |
} | |
# Re-create the ciphers key. | |
$null = New-Item -Path 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers' -Force @defaultValues | |
# Disable Weak Ciphers | |
$weakCiphers = @( | |
'DES 56/56', | |
'NULL', | |
'RC2 128/128', | |
'RC2 40/128', | |
'RC2 56/128', | |
'RC4 40/128', | |
'RC4 56/128', | |
'RC4 64/128', | |
'RC4 128/128' | |
) | |
Foreach ($cipher in $weakCiphers) | |
{ | |
$key = (Get-Item -Path HKLM:\).OpenSubKey('SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers', $true).CreateSubKey($cipher) | |
$key.SetValue('Enabled', 0, 'DWord') | |
$key.Close() | |
} | |
# Enable Strong Ciphers | |
$strongCiphers = @( | |
'AES 128/128', | |
'AES 256/256', | |
'Triple DES 168/168' | |
) | |
Foreach ($cipher in $strongCiphers) | |
{ | |
$key = (Get-Item -Path HKLM:\).OpenSubKey('SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers', $true).CreateSubKey($cipher) | |
$null = New-ItemProperty -Path ('HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\{0}' -f $cipher) -Name 'Enabled' -Value '0xffffffff' -PropertyType 'DWord' -Force @defaultValues | |
$key.Close() | |
} | |
# Recreate the hashes key | |
$null = New-Item -Path 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes' -Force @defaultValues | |
# Enable Hashes | |
$strongHashes = @( | |
'SHA 256', | |
'SHA 384', | |
'SHA 512' | |
) | |
Foreach ($hash in $strongHashes) | |
{ | |
$key = (Get-Item -Path HKLM:\).OpenSubKey('SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes', $true).CreateSubKey($hash) | |
$null = New-ItemProperty -Path ('HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes\{0}' -f $hash) -Name 'Enabled' -Value '0xffffffff' -PropertyType 'DWord' -Force @defaultValues | |
$key.Close() | |
} | |
# Disable weak hashes | |
$weakHashes = @( | |
'MD5', | |
'SHA' | |
) | |
Foreach ($hash in $weakHashes) | |
{ | |
$key = (Get-Item -Path HKLM:\).OpenSubKey('SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes', $true).CreateSubKey($hash) | |
$null = New-ItemProperty -Path ('HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes\{0}' -f $hash) -Name 'Enabled' -Value '0' -PropertyType 'DWord' -Force @defaultValues | |
$key.Close() | |
} | |
# Recreate the KeyExchangeAlgorithms key | |
$null = New-Item -Path 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms' -Force @defaultValues | |
# Enable KeyExchangeAlgorithms | |
$strongKeyExchanges = @( | |
'Diffie-Hellman', | |
'ECDH', | |
'PKCS' | |
) | |
Foreach ($keyExchange in $strongKeyExchanges) | |
{ | |
$key = (Get-Item -Path HKLM:\).OpenSubKey('SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms', $true).CreateSubKey($keyExchange) | |
$null = New-ItemProperty -Path ('HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms\{0}' -f $keyExchange) -Name 'Enabled' -Value '0xffffffff' -PropertyType 'DWord' -Force @defaultValues | |
$key.Close() | |
} | |
# Set cipher order | |
$cipherOrder = @( | |
'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521', | |
'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384', | |
'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256', | |
'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521', | |
'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384', | |
'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256', | |
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521', | |
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384', | |
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256', | |
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521', | |
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384', | |
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256', | |
'TLS_RSA_WITH_AES_256_GCM_SHA384', | |
'TLS_RSA_WITH_AES_128_GCM_SHA256', | |
'TLS_RSA_WITH_AES_256_CBC_SHA256', | |
'TLS_RSA_WITH_AES_256_CBC_SHA', | |
'TLS_RSA_WITH_AES_128_CBC_SHA256', | |
'TLS_RSA_WITH_AES_128_CBC_SHA', | |
'TLS_RSA_WITH_3DES_EDE_CBC_SHA' | |
) | |
$cipherOrderString = [string]::join(',', $cipherOrder) | |
$null = New-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL\00010002' -Name 'Functions' -Value $cipherOrderString -PropertyType 'String' -Force @defaultValues | |
# Start the IIS | |
$null = (& "$env:windir\system32\iisreset.exe" /start) | |
} | |
function Set-DisableStrongSSLConfig | |
{ | |
<# | |
.SYNOPSIS | |
Reset the IIS SSL config back to the defaults | |
.DESCRIPTION | |
Try to restore the IIS default SSL configuration | |
.EXAMPLE | |
PS C:\> Set-EnableStrongSSLConfig | |
.NOTES | |
Based on an idea of Tyler McCamant | |
#> | |
# Stop the IIS | |
$null = (& "$env:windir\system32\iisreset.exe" /stop) | |
$null = (& "$env:windir\system32\iisreset.exe" /stop) | |
# Define some defaults | |
$defaultValues = @{ | |
ErrorAction = 'SilentlyContinue' | |
WarningAction = 'SilentlyContinue' | |
} | |
# This will reset the default SSL/TLS settings for Windows | |
# Reset default settings | |
$null = New-Item 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers' -Force @defaultValues | |
$null = New-Item 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes' -Force @defaultValues | |
$null = New-Item 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms' -Force @defaultValues | |
$null = New-Item 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols' -Force @defaultValues | |
# Disable SSLv2 client support (Default settings for Windows) | |
$null = New-Item 'HKLM:SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client' -Force @defaultValues | |
$null = New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client' -Name DisabledByDefault -Value 1 -PropertyType 'DWord' -Force @defaultValues | |
# Reset cipher order | |
$null = New-Item 'HKLM:\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL\00010002' -Force @defaultValues | |
# Start the IIS | |
$null = (& "$env:windir\system32\iisreset.exe" /start) | |
} | |
# SIG # Begin signature block | |
# MIIZXgYJKoZIhvcNAQcCoIIZTzCCGUsCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB | |
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR | |
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUwCjP7flQXrrpRq289m+FVwXO | |
# ULCgghPvMIIEFDCCAvygAwIBAgILBAAAAAABL07hUtcwDQYJKoZIhvcNAQEFBQAw | |
# VzELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNV | |
# BAsTB1Jvb3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw0xMTA0 | |
# MTMxMDAwMDBaFw0yODAxMjgxMjAwMDBaMFIxCzAJBgNVBAYTAkJFMRkwFwYDVQQK | |
# ExBHbG9iYWxTaWduIG52LXNhMSgwJgYDVQQDEx9HbG9iYWxTaWduIFRpbWVzdGFt | |
# cGluZyBDQSAtIEcyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlO9l | |
# +LVXn6BTDTQG6wkft0cYasvwW+T/J6U00feJGr+esc0SQW5m1IGghYtkWkYvmaCN | |
# d7HivFzdItdqZ9C76Mp03otPDbBS5ZBb60cO8eefnAuQZT4XljBFcm05oRc2yrmg | |
# jBtPCBn2gTGtYRakYua0QJ7D/PuV9vu1LpWBmODvxevYAll4d/eq41JrUJEpxfz3 | |
# zZNl0mBhIvIG+zLdFlH6Dv2KMPAXCae78wSuq5DnbN96qfTvxGInX2+ZbTh0qhGL | |
# 2t/HFEzphbLswn1KJo/nVrqm4M+SU4B09APsaLJgvIQgAIMboe60dAXBKY5i0Eex | |
# +vBTzBj5Ljv5cH60JQIDAQABo4HlMIHiMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB | |
# Af8ECDAGAQH/AgEAMB0GA1UdDgQWBBRG2D7/3OO+/4Pm9IWbsN1q1hSpwTBHBgNV | |
# HSAEQDA+MDwGBFUdIAAwNDAyBggrBgEFBQcCARYmaHR0cHM6Ly93d3cuZ2xvYmFs | |
# c2lnbi5jb20vcmVwb3NpdG9yeS8wMwYDVR0fBCwwKjAooCagJIYiaHR0cDovL2Ny | |
# bC5nbG9iYWxzaWduLm5ldC9yb290LmNybDAfBgNVHSMEGDAWgBRge2YaRQ2XyolQ | |
# L30EzTSo//z9SzANBgkqhkiG9w0BAQUFAAOCAQEATl5WkB5GtNlJMfO7FzkoG8IW | |
# 3f1B3AkFBJtvsqKa1pkuQJkAVbXqP6UgdtOGNNQXzFU6x4Lu76i6vNgGnxVQ380W | |
# e1I6AtcZGv2v8Hhc4EvFGN86JB7arLipWAQCBzDbsBJe/jG+8ARI9PBw+DpeVoPP | |
# PfsNvPTF7ZedudTbpSeE4zibi6c1hkQgpDttpGoLoYP9KOva7yj2zIhd+wo7AKvg | |
# IeviLzVsD440RZfroveZMzV+y5qKu0VN5z+fwtmK+mWybsd+Zf/okuEsMaL3sCc2 | |
# SI8mbzvuTXYfecPlf5Y1vC0OzAGwjn//UYCAp5LUs0RGZIyHTxZjBzFLY7Df8zCC | |
# BJ8wggOHoAMCAQICEhEh1pmnZJc+8fhCfukZzFNBFDANBgkqhkiG9w0BAQUFADBS | |
# MQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEoMCYGA1UE | |
# AxMfR2xvYmFsU2lnbiBUaW1lc3RhbXBpbmcgQ0EgLSBHMjAeFw0xNjA1MjQwMDAw | |
# MDBaFw0yNzA2MjQwMDAwMDBaMGAxCzAJBgNVBAYTAlNHMR8wHQYDVQQKExZHTU8g | |
# R2xvYmFsU2lnbiBQdGUgTHRkMTAwLgYDVQQDEydHbG9iYWxTaWduIFRTQSBmb3Ig | |
# TVMgQXV0aGVudGljb2RlIC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK | |
# AoIBAQCwF66i07YEMFYeWA+x7VWk1lTL2PZzOuxdXqsl/Tal+oTDYUDFRrVZUjtC | |
# oi5fE2IQqVvmc9aSJbF9I+MGs4c6DkPw1wCJU6IRMVIobl1AcjzyCXenSZKX1GyQ | |
# oHan/bjcs53yB2AsT1iYAGvTFVTg+t3/gCxfGKaY/9Sr7KFFWbIub2Jd4NkZrItX | |
# nKgmK9kXpRDSRwgacCwzi39ogCq1oV1r3Y0CAikDqnw3u7spTj1Tk7Om+o/SWJMV | |
# TLktq4CjoyX7r/cIZLB6RA9cENdfYTeqTmvT0lMlnYJz+iz5crCpGTkqUPqp0Dw6 | |
# yuhb7/VfUfT5CtmXNd5qheYjBEKvAgMBAAGjggFfMIIBWzAOBgNVHQ8BAf8EBAMC | |
# B4AwTAYDVR0gBEUwQzBBBgkrBgEEAaAyAR4wNDAyBggrBgEFBQcCARYmaHR0cHM6 | |
# Ly93d3cuZ2xvYmFsc2lnbi5jb20vcmVwb3NpdG9yeS8wCQYDVR0TBAIwADAWBgNV | |
# HSUBAf8EDDAKBggrBgEFBQcDCDBCBgNVHR8EOzA5MDegNaAzhjFodHRwOi8vY3Js | |
# Lmdsb2JhbHNpZ24uY29tL2dzL2dzdGltZXN0YW1waW5nZzIuY3JsMFQGCCsGAQUF | |
# BwEBBEgwRjBEBggrBgEFBQcwAoY4aHR0cDovL3NlY3VyZS5nbG9iYWxzaWduLmNv | |
# bS9jYWNlcnQvZ3N0aW1lc3RhbXBpbmdnMi5jcnQwHQYDVR0OBBYEFNSihEo4Whh/ | |
# uk8wUL2d1XqH1gn3MB8GA1UdIwQYMBaAFEbYPv/c477/g+b0hZuw3WrWFKnBMA0G | |
# CSqGSIb3DQEBBQUAA4IBAQCPqRqRbQSmNyAOg5beI9Nrbh9u3WQ9aCEitfhHNmmO | |
# 4aVFxySiIrcpCcxUWq7GvM1jjrM9UEjltMyuzZKNniiLE0oRqr2j79OyNvy0oXK/ | |
# bZdjeYxEvHAvfvO83YJTqxr26/ocl7y2N5ykHDC8q7wtRzbfkiAD6HHGWPZ1BZo0 | |
# 8AtZWoJENKqA5C+E9kddlsm2ysqdt6a65FDT1De4uiAO0NOSKlvEWbuhbds8zkSd | |
# wTgqreONvc0JdxoQvmcKAjZkiLmzGybu555gxEaovGEzbM9OuZy5avCfN/61PU+a | |
# 003/3iCOTpem/Z8JvE3KGHbJsE2FUPKA0h0G9VgEB7EYMIIFTDCCBDSgAwIBAgIQ | |
# FtT3Ux2bGCdP8iZzNFGAXDANBgkqhkiG9w0BAQsFADB9MQswCQYDVQQGEwJHQjEb | |
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRow | |
# GAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDEjMCEGA1UEAxMaQ09NT0RPIFJTQSBD | |
# b2RlIFNpZ25pbmcgQ0EwHhcNMTUwNzE3MDAwMDAwWhcNMTgwNzE2MjM1OTU5WjCB | |
# kDELMAkGA1UEBhMCREUxDjAMBgNVBBEMBTM1NTc2MQ8wDQYDVQQIDAZIZXNzZW4x | |
# EDAOBgNVBAcMB0xpbWJ1cmcxGDAWBgNVBAkMD0JhaG5ob2ZzcGxhdHogMTEZMBcG | |
# A1UECgwQS3JlYXRpdlNpZ24gR21iSDEZMBcGA1UEAwwQS3JlYXRpdlNpZ24gR21i | |
# SDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK8jDmF0TO09qJndJ9eG | |
# Fqra1lf14NDhM8wIT8cFcZ/AX2XzrE6zb/8kE5sL4/dMhuTOp+SMt0tI/SON6BY3 | |
# 208v/NlDI7fozAqHfmvPhLX6p/TtDkmSH1sD8AIyrTH9b27wDNX4rC914Ka4EBI8 | |
# sGtZwZOQkwQdlV6gCBmadar+7YkVhAbIIkSazE9yyRTuffidmtHV49DHPr+ql4ji | |
# NJ/K27ZFZbwM6kGBlDBBSgLUKvufMY+XPUukpzdCaA0UzygGUdDfgy0htSSp8MR9 | |
# Rnq4WML0t/fT0IZvmrxCrh7NXkQXACk2xtnkq0bXUIC6H0Zolnfl4fanvVYyvD88 | |
# qIECAwEAAaOCAbIwggGuMB8GA1UdIwQYMBaAFCmRYP+KTfrr+aZquM/55ku9Sc4S | |
# MB0GA1UdDgQWBBSeVG4/9UvVjmv8STy4f7kGHucShjAOBgNVHQ8BAf8EBAMCB4Aw | |
# DAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEE | |
# BAMCBBAwRgYDVR0gBD8wPTA7BgwrBgEEAbIxAQIBAwIwKzApBggrBgEFBQcCARYd | |
# aHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwQwYDVR0fBDwwOjA4oDagNIYy | |
# aHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ29kZVNpZ25pbmdDQS5j | |
# cmwwdAYIKwYBBQUHAQEEaDBmMD4GCCsGAQUFBzAChjJodHRwOi8vY3J0LmNvbW9k | |
# b2NhLmNvbS9DT01PRE9SU0FDb2RlU2lnbmluZ0NBLmNydDAkBggrBgEFBQcwAYYY | |
# aHR0cDovL29jc3AuY29tb2RvY2EuY29tMCMGA1UdEQQcMBqBGGhvY2h3YWxkQGty | |
# ZWF0aXZzaWduLm5ldDANBgkqhkiG9w0BAQsFAAOCAQEASSZkxKo3EyEk/qW0ZCs7 | |
# CDDHKTx3UcqExigsaY0DRo9fbWgqWynItsqdwFkuQYJxzknqm2JMvwIK6BtfWc64 | |
# WZhy0BtI3S3hxzYHxDjVDBLBy91kj/mddPjen60W+L66oNEXiBuIsOcJ9e7tH6Vn | |
# 9eFEUjuq5esoJM6FV+MIKv/jPFWMp5B6EtX4LDHEpYpLRVQnuxoc38mmd+NfjcD2 | |
# /o/81bu6LmBFegHAaGDpThGf8Hk3NVy0GcpQ3trqmH6e3Cpm8Ut5UkoSONZdkYWw | |
# rzkmzFgJyoM2rnTMTh4ficxBQpB7Ikv4VEnrHRReihZ0zwN+HkXO1XEnd3hm+08j | |
# LzCCBeAwggPIoAMCAQICEC58h8wOk0pS/pT9HLfNNK8wDQYJKoZIhvcNAQEMBQAw | |
# gYUxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAO | |
# BgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMSswKQYD | |
# VQQDEyJDT01PRE8gUlNBIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTEzMDUw | |
# OTAwMDAwMFoXDTI4MDUwODIzNTk1OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT | |
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR | |
# Q09NT0RPIENBIExpbWl0ZWQxIzAhBgNVBAMTGkNPTU9ETyBSU0EgQ29kZSBTaWdu | |
# aW5nIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAppiQY3eRNH+K | |
# 0d3pZzER68we/TEds7liVz+TvFvjnx4kMhEna7xRkafPnp4ls1+BqBgPHR4gMA77 | |
# YXuGCbPj/aJonRwsnb9y4+R1oOU1I47Jiu4aDGTH2EKhe7VSA0s6sI4jS0tj4CKU | |
# N3vVeZAKFBhRLOb+wRLwHD9hYQqMotz2wzCqzSgYdUjBeVoIzbuMVYz31HaQOjNG | |
# UHOYXPSFSmsPgN1e1r39qS/AJfX5eNeNXxDCRFU8kDwxRstwrgepCuOvwQFvkBoj | |
# 4l8428YIXUezg0HwLgA3FLkSqnmSUs2HD3vYYimkfjC9G7WMcrRI8uPoIfleTGJ5 | |
# iwIGn3/VCwIDAQABo4IBUTCCAU0wHwYDVR0jBBgwFoAUu69+Aj36pvE8hI6t7jiY | |
# 7NkyMtQwHQYDVR0OBBYEFCmRYP+KTfrr+aZquM/55ku9Sc4SMA4GA1UdDwEB/wQE | |
# AwIBhjASBgNVHRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMDMBEG | |
# A1UdIAQKMAgwBgYEVR0gADBMBgNVHR8ERTBDMEGgP6A9hjtodHRwOi8vY3JsLmNv | |
# bW9kb2NhLmNvbS9DT01PRE9SU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDBx | |
# BggrBgEFBQcBAQRlMGMwOwYIKwYBBQUHMAKGL2h0dHA6Ly9jcnQuY29tb2RvY2Eu | |
# Y29tL0NPTU9ET1JTQUFkZFRydXN0Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8v | |
# b2NzcC5jb21vZG9jYS5jb20wDQYJKoZIhvcNAQEMBQADggIBAAI/AjnD7vjKO4ne | |
# DG1NsfFOkk+vwjgsBMzFYxGrCWOvq6LXAj/MbxnDPdYaCJT/JdipiKcrEBrgm7EH | |
# IhpRHDrU4ekJv+YkdK8eexYxbiPvVFEtUgLidQgFTPG3UeFRAMaH9mzuEER2V2rx | |
# 31hrIapJ1Hw3Tr3/tnVUQBg2V2cRzU8C5P7z2vx1F9vst/dlCSNJH0NXg+p+IHdh | |
# yE3yu2VNqPeFRQevemknZZApQIvfezpROYyoH3B5rW1CIKLPDGwDjEzNcweU51qO | |
# OgS6oqF8H8tjOhWn1BUbp1JHMqn0v2RH0aofU04yMHPCb7d4gp1c/0a7ayIdiAv4 | |
# G6o0pvyM9d1/ZYyMMVcx0DbsR6HPy4uo7xwYWMUGd8pLm1GvTAhKeo/io1Lijo7M | |
# JuSy2OU4wqjtxoGcNWupWGFKCpe0S0K2VZ2+medwbVn4bSoMfxlgXwyaiGwwrFIJ | |
# kBYb/yud29AgyonqKH4yjhnfe0gzHtdl+K7J+IMUk3Z9ZNCOzr41ff9yMU2fnr0e | |
# bC+ojwwGUPuMJ7N2yfTm18M04oyHIYZh/r9VdOEhdwMKaGy75Mmp5s9ZJet87EUO | |
# eWZo6CLNuO+YhU2WETwJitB/vCgoE/tqylSNklzNwmWYBp7OSFvUtTeTRkF8B93P | |
# +kPvumdh/31J4LswfVyA4+YWOUunMYIE2TCCBNUCAQEwgZEwfTELMAkGA1UEBhMC | |
# R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y | |
# ZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxIzAhBgNVBAMTGkNPTU9ETyBS | |
# U0EgQ29kZSBTaWduaW5nIENBAhAW1PdTHZsYJ0/yJnM0UYBcMAkGBSsOAwIaBQCg | |
# eDAYBgorBgEEAYI3AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEE | |
# AYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMCMGCSqGSIb3DQEJ | |
# BDEWBBRfUE+m6A+NyKJB5XVfbGPNexdUhjANBgkqhkiG9w0BAQEFAASCAQAbKUdC | |
# jNyXXzTcf9JCfoH+07BEmQYfA5Ng30pF65fh3/gcFgDpMUClpk37dRTUVfaFbRxc | |
# XUmCMKJPvHTQ4gKxlgOYO0B6Aw1MR8yXvJj0HCkzB2WxQGtgstFeruJ4wesAittg | |
# AmKlFkA4v0VYeqquDxn6IbEUBCOjhXNb4PLrdBzb1Otjn/F508gJXK0sfKWh1MZa | |
# e7qhV3wKrorvr38HBkp8xaZOdLbCVAVIpr8/nnzVFDlz3ms9iXLzTUHX0/oloxbi | |
# 4aWW1KZnKWHTn8usNSstYInLG9sHQSN1XwbpVLBawOrxovOqqjZ7trepep2Z6Yfa | |
# Y5R0KhyQTRzc4Ja3oYICojCCAp4GCSqGSIb3DQEJBjGCAo8wggKLAgEBMGgwUjEL | |
# MAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExKDAmBgNVBAMT | |
# H0dsb2JhbFNpZ24gVGltZXN0YW1waW5nIENBIC0gRzICEhEh1pmnZJc+8fhCfukZ | |
# zFNBFDAJBgUrDgMCGgUAoIH9MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJ | |
# KoZIhvcNAQkFMQ8XDTE2MTEyNjE0MzcxNlowIwYJKoZIhvcNAQkEMRYEFGpyj6Qv | |
# G6ZvH6lmKjzb93z9L33dMIGdBgsqhkiG9w0BCRACDDGBjTCBijCBhzCBhAQUY7gv | |
# q2H1g5CWlQULACScUCkz7HkwbDBWpFQwUjELMAkGA1UEBhMCQkUxGTAXBgNVBAoT | |
# EEdsb2JhbFNpZ24gbnYtc2ExKDAmBgNVBAMTH0dsb2JhbFNpZ24gVGltZXN0YW1w | |
# aW5nIENBIC0gRzICEhEh1pmnZJc+8fhCfukZzFNBFDANBgkqhkiG9w0BAQEFAASC | |
# AQB9t5susoM2us93DpR68jeQEjUjHD5RM6n/uxC2MeiCcxkNN4uf55KsEpLY9PrS | |
# FJVghmFbWjDy0Mm9tQZy4Fe35chyf956o5jlM0nAXN+ApWzdLhbIHJPydV5vZZK/ | |
# o4pbrOW1eLDa8JJCwAvBu79TGOfC5SWVVLEiNNcDgfGqtaD+yhWvREuJKmgew6oZ | |
# 0l4CLanO1G4DDcvYhWDXxLDWhjwlg2Plr6XCDpMnjxwyH60qE3fEhG1Jmh3FLBYf | |
# zjup7DBMR8bGcumX9uIJGep/GaG41tYZ+r3tuCZgnRXOSKlWSxUHUtaq9uAqjUjU | |
# owx0/O8/woZCrskke1laWgSA | |
# SIG # End signature block |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment