system
2
Out of hours last night I disabled the “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” policy ,performed a GPUPDATE, checked the policy change has taken effect by using RSOP.MSC and monitored my Avast.Sbc.Service_*.log files for half an hour. I didn’t see any reduction in the logging of the following exception…
System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation. —> System.InvalidOperationException: This implementation is not part of the Windows Platform FIPS validated cryptographic algorithms.
at System.Security.Cryptography.MD5CryptoServiceProvider…ctor()
I then restarted the avast! Administration Console, avast! Administration Console Monitor & avast! Administration Console Website Host services and monitored my Avast.Sbc.Service_*.log files again. I saw no more exceptions and Avast Clients have started going Green in the SOA console. This confirms to me that problem is caused by the “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” policy and that Avast SOA is using the MD5 algorithm in SOA sign communication traffic.
http://www.spectrumcs.net/wp-content/uploads/2015/11/2015_11_05_10_18_25_server3_Remote_Desktop_Connection_Manager_v2.2.png
Unfortunately this isn’t really a solution for us as we need to have the “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” policy enabled to please the regular Pen Test we are subjected to.
I think we might have to look at alternative anti viral solutions.
Regards
Steve