Remote Assistance connection to Windows Server 2003 with FIPS encryption does not work (811770)
The information in this article applies to:
- Microsoft Windows Server 2003, Web Edition
- Microsoft Windows Server 2003, 64-Bit Datacenter Edition
- Microsoft Windows Server 2003, Datacenter Edition
- Microsoft Windows Server 2003, 64-Bit Enterprise Edition
- Microsoft Windows Server 2003, Enterprise Edition
- Microsoft Windows Server 2003, Standard Edition
- Microsoft Windows XP Professional
SYMPTOMSMicrosoft has added the FIPS Compliant
setting to the options for Terminal Services encryption levels in Windows
Server 2003. A Windows Server 2003-based server with the encryption level set
to FIPS Compliant cannot permit Remote Assistance connections
from a computer that is running Microsoft Windows XP or Windows XP Service Pack
1 (SP1). When you try to connect from a Windows XP-based client to a Terminal Services server, the connection may not succeed, and you may receive the following error message: Because of a security error, the client could not connect to the terminal server. After making sure that you are logged on to the network, try connecting to the server again. CAUSEWindows XP and Windows XP SP1 do not support the FIPS
Compliant encryption level, and therefore cannot connect to the Windows Server
2003-based server for remote assistance. RESOLUTIONFederal Information Processing Standard (FIPS) support on
the client is handled in the Terminal Services client, not by the operating
system. Upgrading to the RDP 5.2 (Windows Server 2003) client permits a client
that is running Windows XP or Windows XP SP1 to connect to a Terminal Services
session on a Windows Server 2003-based server that is configured for
FIPS-compatible encryption, but does not permit the Remote Assistance client to
connect. Clients that are running Windows XP or Windows XP SP1 cannot provide
Remote Assistance connections to Windows Server 2003-based computers that are
configured to require FIPS-compatible encryption.
WORKAROUNDTo work around this problem, disable the FIPS encryption
level. To disable the FIPS encryption level, you can change the Encryption level setting in the RDP-Tcp Properties dialog box, or you can use the Group Policy Object to disable FIPS data encryption system-wide. To disable the FIPS encryption
level, use one of the following methods: Note There are two ways to enable the FIPS encryption level. If you have to disable the FIPS encryption level for Terminal Services, you must do this by using the same method that you originally used to enable the FIPS encryption level. Method 1To disable the FIPS encryption level by changing the Encryption level setting in the RDP-Tcp Properties dialog box, follow these steps: - Click Start, click Run, type tscc.msc in the Open box, and then click OK.
- Click Connections, and then double-click RDP-Tcp in the right pane.
- In the Encryption level box, click to select a level of encryption other than FIPS Compliant.
Note If the Encryption level setting is disabled when you try to change it, the system-wide setting for System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing has been enabled, and you must disable this system-wide setting by using method 2.
Method 2To use the Group Policy Object to disable FIPS data encryption system-wide, follow these steps: - Click Start, click Run, type gpedit.msc in the Open box, and then click OK.
- Expand Computer Configuration, expand Windows Settings, expand Security Settings, expand Local Policies, and then click Security Options.
- In the right pane, double-click System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing, click Disable, and then click OK.
Note Encryption level settings in Terminal Server are unavailable when FIPS is enabled.
For more information about scoping Group Policy Objects and troubleshooting the resultant policies on your server, click the following article number to view the article in the Microsoft Knowledge Base:
818735
White Paper: Administering Group Policy by Using the Group Policy Management Console
For more information about the GPO setting for System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing, click the following article number to view the article in the Microsoft Knowledge Base:
811833
The effects of enabling the "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" security setting in Windows XP and later versions
STATUSMicrosoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
Modification Type: | Minor | Last Reviewed: | 9/30/2005 |
---|
Keywords: | kbHotfixServer kbQFE kbPrb KB811770 kbAudITPRO |
---|
|