forked from cloudbase/unattended-setup-scripts
-
Notifications
You must be signed in to change notification settings - Fork 0
/
SetupWinRMAccess.ps1
96 lines (74 loc) · 4.35 KB
/
SetupWinRMAccess.ps1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
$ErrorActionPreference = "Stop"
function SetAdminOnlyACL($path) {
$acl = New-Object System.Security.AccessControl.DirectorySecurity
# Disable inheritance from parent
$acl.SetAccessRuleProtection($true,$true)
$fsRights = [System.Security.AccessControl.FileSystemRights]::FullControl
$inheritanceFlags = [System.Security.AccessControl.InheritanceFlags]"ContainerInherit, ObjectInherit"
$propagationFlags = [System.Security.AccessControl.PropagationFlags]::None
$aceType =[System.Security.AccessControl.AccessControlType]::Allow
# BUILTIN\Administrators, NT AUTHORITY\SYSTEM
# Avoid using account names as they might change based on the locale
foreach($sid in @("S-1-5-32-544", "S-1-5-18"))
{
$sidObj = New-Object System.Security.Principal.SecurityIdentifier($sid)
$account = $sidObj.Translate( [System.Security.Principal.NTAccount])
$ace = New-Object System.Security.AccessControl.FileSystemAccessRule (
$account, $fsRights, $inheritanceFlags, $propagationFlags, $aceType)
$acl.AddAccessRule($ace)
}
Set-ACL $path $acl
}
$base_dir="C:\OpenSSL-Win32\"
$ca_dir="$base_dir\CA"
mkdir $ca_dir
SetAdminOnlyACL $ca_dir
pushd .
cd $ca_dir
mkdir private
mkdir certs
mkdir crl
[System.IO.File]::WriteAllText("$ca_dir\index.txt", "")
[System.IO.File]::WriteAllText("$ca_dir\serial", "01`n")
$ca_conf_file="ca.cnf"
$openssl_conf_file="openssl.cnf"
$conf_base_url="https://raw.github.com/cloudbase/unattended-setup-scripts/master/"
(new-object System.Net.WebClient).DownloadFile($conf_base_url + $ca_conf_file, "$ca_dir\$ca_conf_file")
(new-object System.Net.WebClient).DownloadFile($conf_base_url + $openssl_conf_file, "$ca_dir\$openssl_conf_file")
$ENV:PATH+=";C:\OpenSSL-Win32\bin"
$ENV:OPENSSL_CONF="$ca_dir\ca.cnf"
openssl req -x509 -nodes -days 3650 -newkey rsa:2048 -out certs\ca.pem -outform PEM -keyout private\ca.key
if ($LastExitCode) { throw "openssl failed to create CA certificate" }
$ENV:OPENSSL_CONF="$ca_dir\openssl.cnf"
openssl req -newkey rsa:2048 -nodes -sha1 -keyout private\cert.key -keyform PEM -out certs\cert.req -outform PEM -subj "/C=US/ST=Washington/L=Seattle/[email protected]/organizationName=IT/CN=$ENV:COMPUTERNAME"
if ($LastExitCode) { throw "openssl failed to create server certificate request" }
$ENV:OPENSSL_CONF="$ca_dir\ca.cnf"
openssl ca -batch -notext -in certs\cert.req -out certs\cert.pem -extensions v3_req_server
if ($LastExitCode) { throw "openssl CA failed to sign server certificate request" }
# Import CA certificate
$cacert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2("$ca_dir\certs\ca.pem")
$castore = New-Object System.Security.Cryptography.X509Certificates.X509Store(
[System.Security.Cryptography.X509Certificates.StoreName]::Root,
[System.Security.Cryptography.X509Certificates.StoreLocation]::LocalMachine)
$castore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite)
$castore.Add($cacert)
# Import server certificate
openssl pkcs12 -export -in certs\cert.pem -inkey private\cert.key -out certs\cert.pfx -password pass:Passw0rd
$cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2(
"$ca_dir\certs\cert.pfx", "Passw0rd",
([System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::MachineKeySet -bor
[System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet))
$store = New-Object System.Security.Cryptography.X509Certificates.X509Store(
[System.Security.Cryptography.X509Certificates.StoreName]::My,
[System.Security.Cryptography.X509Certificates.StoreLocation]::LocalMachine)
$store.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite)
$store.Add($cert)
del certs\cert.pfx
popd
# Configure WinRM
& winrm create winrm/config/Listener?Address=*+Transport=HTTPS `@`{Hostname=`"$($ENV:COMPUTERNAME)`"`;CertificateThumbprint=`"$($cert.Thumbprint)`"`}
if ($LastExitCode) { throw "Failed to setup WinRM HTTPS listener" }
& winrm set winrm/config/service/auth `@`{Basic=`"true`"`}
if ($LastExitCode) { throw "Failed to setup WinRM basic auth" }
& netsh advfirewall firewall add rule name="WinRM HTTPS" dir=in action=allow protocol=TCP localport=5986
if ($LastExitCode) { throw "Failed to setup WinRM HTTPS firewall rules" }