UiPath Robot Error - The decryption operation failed, see inner exception

Hello!

Please help me solve the situation! Sometimes the UiPath Assistant shows a Robot Error.
Error message: The descryption operation failed, see inner exception.
Details: System.ComponentModel.Win32Exception: "The message or signature supplied for verification has benn altered"

image

What should be the solution to avoid this appearance altogether?

Thanks in advanced,
János!

Hey,
This issue can be related with SSL, TLS or network issue.
I think you should start with this.

Try to disable the TLS1.3 and TLS1.0 using the below powershell scripts

function disable-tls-1.3
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server' -Force
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client' -Force
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server' -name 'Enabled' -value '0' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server' -name 'DisabledByDefault' -value '1' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client' -name 'Enabled' -value '0' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client' -name 'DisabledByDefault' -value '1' –PropertyType 'DWORD'
    Write-Host 'Disabling TLSv1.3'
}

disable-tls-1.3
function disable-tls-1.0
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -Force
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -Force
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -name 'Enabled' -value '0' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -name 'DisabledByDefault' -value '1' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -name 'Enabled' -value '0' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -name 'DisabledByDefault' -value '1' –PropertyType 'DWORD'
    Write-Host 'Disabling TLSv1.0'
}

disable-tls-1.0

Then enable TLS1.2

function enable-tls-1.2
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '1' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value '0' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '1' –PropertyType 'DWORD'
    New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value '0' –PropertyType 'DWORD'
    Write-Host 'Enabling TLSv1.2'
}

enable-tls-1.2

To sniff packets using PowerShell you can use the NetEventSession cmdlet (it provides information similar to Netmon or Wireshark):

Run the below command as Administrator:

New-NetEventSession –Name Sniffer –LocalFilePath 'C:\Temp\Sniffer.etl'
Add-NetEventProvider –Name Microsoft-Windows-TCPIP –SessionName Sniffer
Start-NetEventSession –Name Sniffer

After you finish you can stop the session and then convert the etl file to XML or CSV format:

Stop-NetEventSession –Name Sniffer

# Convert to CSV
netsh trace convert 'C:\Temp\Sniffer.etl' overwrite=yes Dump=CSV Report=Yes

image

convert

  Converts a trace file to an HTML report.

  Usage: convert [input=]tracefilename.etl [[output=]filename] 
          [[dump=]CSV|XML|EVTX|TXT|No] [[report=]yes|no]
          [[overwrite=]yes|no] [[tmfpath=]pathname] 

  Parameters: 

    Tag             Value 
    input         - Input ETL trace file 
    output        - Output file name (defaults to input name) 
    dump          - Output format (default = TXT)
    report        - Generates an HTML report (default = no) 
    overwrite     - Overwrites existing files (default = no) 
    tmfpath       - Path to tmf files for decoding WPP traces