Hello Everyone,
We are trying to harden use Software Restriction Polices (SRP) to white list application in a kiosk. Per Microsoft SRP supports MD5 and SHA1. We are able to succeed implement SRP with MD5 Algorithm but we are not able to set Hashrules with SHA1. Could you one of you help how to set.
technet.microsoft.com/en-us/library/bb457006.aspx
Hash Rules
A hash rule is a cryptographic fingerprint that uniquely identifies a file regardless of where it is accessed or what it is named. An administrator may not want users to run a particular version of a program. This may be the case if the program has security or privacy bugs, or compromises system stability. With a hash rule, software can be renamed or moved into another location on a disk, but it will still match the hash rule because the rule is based on a cryptographic calculation involving file contents.
A hash rule consists of three pieces of data, separated by colons:
MD5 or SHA-1 hash value
File length
Hash algorithm ID
It is formatted as follows:
[MD5 or SHA1 hash value]:[file length]:[hash algorithm id]
Files that are digitally signed will use the hash value contained in the signature, which may be SHA-1 or MD5. Files that are not digitally signed will use an MD5 hash.
Example:*The following hash rule matches a file with a length of 126 bytes and with contents that match the MD5 (denoted by the hash algorithm identifier of 32771) hash of 7bc04acc0d6480af862d22d724c3b049—
7bc04acc0d6480af862d22d724c3b049:126:32771
We are trying to harden use Software Restriction Polices (SRP) to white list application in a kiosk. Per Microsoft SRP supports MD5 and SHA1. We are able to succeed implement SRP with MD5 Algorithm but we are not able to set Hashrules with SHA1. Could you one of you help how to set.
technet.microsoft.com/en-us/library/bb457006.aspx
Hash Rules
A hash rule is a cryptographic fingerprint that uniquely identifies a file regardless of where it is accessed or what it is named. An administrator may not want users to run a particular version of a program. This may be the case if the program has security or privacy bugs, or compromises system stability. With a hash rule, software can be renamed or moved into another location on a disk, but it will still match the hash rule because the rule is based on a cryptographic calculation involving file contents.
A hash rule consists of three pieces of data, separated by colons:
MD5 or SHA-1 hash value
File length
Hash algorithm ID
It is formatted as follows:
[MD5 or SHA1 hash value]:[file length]:[hash algorithm id]
Files that are digitally signed will use the hash value contained in the signature, which may be SHA-1 or MD5. Files that are not digitally signed will use an MD5 hash.
Example:*The following hash rule matches a file with a length of 126 bytes and with contents that match the MD5 (denoted by the hash algorithm identifier of 32771) hash of 7bc04acc0d6480af862d22d724c3b049—
7bc04acc0d6480af862d22d724c3b049:126:32771