RC4 is a required fallback legacy encryption type under FIPS 140-2, which means, failing to negotiate all other encryption types, it will use RC4. If RC4 is being used as the main encryption method, then it appears that something in the environment is disallowing all other kinds of encryption.
From the Technical Guide: The Change Auditor 7.0.2 agent connects to a coordinator using WCF with Windows authentication and TCP transport security, which negotiates Kerberos for both authentication and encryption. Only Kerberos encryption algorithms allowed by the “Network security: Configure encryption types allowed for Kerberos” group policy would by used by Windows Authentication. This was tested in 2 different labs where in one lab only some hosts had RC4 hard disabled and the other lab had all hosts in the environment with RC4 disabled, using a GPO to define only "AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryptions types" as options. There was no impact on the coordinator or agents ability to start or connect in both labs.
Please refer to additional information concerning this issue.
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center