j.marton
(Janos Marton)
December 14, 2023, 12:36pm
1
Hello!
Please help me solve the situation! Sometimes the UiPath Assistant shows a Robot Error.
Error message: The descryption operation failed, see inner exception.
Details: System.ComponentModel.Win32Exception: "The message or signature supplied for verification has benn altered"
What should be the solution to avoid this appearance altogether?
Thanks in advanced,
János!
pikorpa
(Piotr Kołakowski)
December 14, 2023, 8:11pm
2
Hey,
This issue can be related with SSL, TLS or network issue.
I think you should start with this.
Try to disable the TLS1.3 and TLS1.0 using the below powershell scripts
function disable-tls-1.3
{
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server' -Force
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client' -Force
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server' -name 'Enabled' -value '0' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server' -name 'DisabledByDefault' -value '1' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client' -name 'Enabled' -value '0' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client' -name 'DisabledByDefault' -value '1' –PropertyType 'DWORD'
Write-Host 'Disabling TLSv1.3'
}
disable-tls-1.3
function disable-tls-1.0
{
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -Force
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -Force
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -name 'Enabled' -value '0' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -name 'DisabledByDefault' -value '1' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -name 'Enabled' -value '0' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -name 'DisabledByDefault' -value '1' –PropertyType 'DWORD'
Write-Host 'Disabling TLSv1.0'
}
disable-tls-1.0
Then enable TLS1.2
function enable-tls-1.2
{
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '1' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value '0' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '1' –PropertyType 'DWORD'
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value '0' –PropertyType 'DWORD'
Write-Host 'Enabling TLSv1.2'
}
enable-tls-1.2
To sniff packets using PowerShell you can use the NetEventSession
cmdlet (it provides information similar to Netmon or Wireshark):
Run the below command as Administrator:
New-NetEventSession –Name Sniffer –LocalFilePath 'C:\Temp\Sniffer.etl'
Add-NetEventProvider –Name Microsoft-Windows-TCPIP –SessionName Sniffer
Start-NetEventSession –Name Sniffer
After you finish you can stop the session and then convert the etl file to XML or CSV format:
Stop-NetEventSession –Name Sniffer
# Convert to CSV
netsh trace convert 'C:\Temp\Sniffer.etl' overwrite=yes Dump=CSV Report=Yes
convert
Converts a trace file to an HTML report.
Usage: convert [input=]tracefilename.etl [[output=]filename]
[[dump=]CSV|XML|EVTX|TXT|No] [[report=]yes|no]
[[overwrite=]yes|no] [[tmfpath=]pathname]
Parameters:
Tag Value
input - Input ETL trace file
output - Output file name (defaults to input name)
dump - Output format (default = TXT)
report - Generates an HTML report (default = no)
overwrite - Overwrites existing files (default = no)
tmfpath - Path to tmf files for decoding WPP traces