Security Advisory 2868725: Recommendation to disable RC4 (2024)

In light of recent research into practical attacks on biases in the RC4 stream cipher, Microsoft is recommending that customers enable TLS1.2 in their services and take steps to retire and deprecate RC4 as used in their TLS implementations. Microsoft recommends TLS1.2 with AES-GCM as a more secure alternative which will provide similar performance.

Background

Developed in 1987 by Ron Rivest, RC4 was one of the earliest stream ciphers to see broad use. It was initially used in commercial applications and was faster than alternatives when implemented in software and over time became pervasive because of how cheap, fast and easy it was to implement and use.

Stream vs. Block

At a high level, a stream cipher generates a pseudorandom stream of bits of the same length as the plaintext and then XOR’s the pseudorandom stream and the plaintext to generate the cipher text. This is different than a block cipher, which chunks plaintext into separate blocks, pads the plaintext to the block size and encrypts the blocks.

A History of Issues

RC4 consists of a Key Scheduling Algorithm (KSA) which feeds into a Psuedo-Random Generator (PRG), both of which need to be robust for use of the cipher to be considered secure. Beyond implementation issues with RC4, such as, document encryption and the 802.11 WEP implementation, there are some significant issues that exist in the KSA which lead to issues in the leading bytes of PRG output.

By definition, a PRG is only secure if the output is indistinguishable from a stream of random data. In 2001, Mantin and Shamir < http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.6198 > found a significant bias in RC4 output, specifically that the second byte of output would be ‘0’. Attacks and research have evolved since 2001, the work of T. Isobe, T. Ohigashi, Y. Watanabe, M. Morii of Kobe University in Japan is especially significant when evaluating the risk of RC4 use. Their findings show additional, significant bias in the first 257 bytes of RC4 output as well as practical plaintext recovery attacks on RC4.

The plaintext recovery attacks show a passive attacker collecting ciphertexts encrypted with different keys. Given 2^32 ciphertexts with different keys, the first 257 bytes of the plaintext are recovered with a probability of more than .5 < [http://home.hiroshima- u.ac.jp/ohigashi/rc4/Full_Plaintext_Recovery%20Attack_on%20Broadcast_RC4_pre-proceedings.pdf](«http://home.hiroshima-> u.ac.jp/ohigashi/rc4/Full_Plaintext_Recovery%20Attack_on%20Broadcast_RC4_pre-proceedings.pdf>)>.

Since early RC4 output cannot be discarded from SSL/TLS implementations without protocol-level changes, this attack demonstrates the practicality of attacks against RC4 in common implementations.

Internet Use of RC4

One of the first steps in evaluating the customer impact of new security research and understanding the risks involved has to do with evaluating the state of public and customer environments. Using a sample size of five million sites, we found that 58% of sites do not use RC4, while approximately 43% do. Of the 43% that utilize RC4, only 3.9% require its use. Therefore disabling RC4 by default has the potential to decrease the use of RC4 by over almost forty percent.

Security Advisory 2868725: Recommendation to disable RC4 (1)

Microsoft’s Response

Today’s update provides tools for customers to test and disable RC4. The launch of Internet Explorer 11 (IE 11) and Windows 8.1 provide more secure defaults for customers out of the box.

IE 11 enables TLS1.2 by default and no longer uses RC4-based cipher suites during the >TLS handshake.

More detailed information about these changes can be found in the IE 11 blog <http://blogs.msdn.com/b/ie/archive/2013/11/12/ie11-automatically-makes-over-40-of-the-web-more-secure-while-making-sure-sites-continue-to-work.aspx>

For application developers, we have implemented additional options in SChannel which allow for its use without RC4.

Today’s Updates

Today’s update KB 2868725provides support for the Windows 8.1 RC4 changes on Windows 7, Windows 8, Windows RT, Server 2008 R2, and Server 2012. These updates will not change existing settings and customers must implement changes (which are detailed below) to help secure their environments against weaknesses in RC4.

Call to Action

Microsoft strongly encourages customers to evaluate, test and implement the options for disabling RC4 below to increase the security of clients, servers and applications. Microsoft recommends enabling TLS1.2 and AES-GCM. Clients and servers running on Windows with custom SSL/TLS implementations, such as, Mozilla Firefox and Google Chrome will not be affected by changes to SChannel.

How to Completely Disable RC4

Clients and Servers that do not wish to use RC4 ciphersuites, regardless of the other party’s supported ciphers, can disable the use of RC4 cipher suites completely by setting the following registry keys. In this manner any server or client that is talking to a client or server that must use RC4, can prevent a connection from happening. Clients that deploy this setting will not be able to connect to sites that require RC4 while servers that deploy this setting will not be able to service clients that must use RC4.

  • [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 128/128]

      • “Enabled”=dword:00000000
  • [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128]

      • “Enabled”=dword:00000000
  • [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128]

      • “Enabled”=dword:00000000

How Other Applications Can Prevent the Use of RC4 based Cipher Suites

RC4 is not turned off by default for all applications. Applications that call into SChannel directly will continue to use RC4 unless they opt-in to the security options. Applications that use SChannel can block the use of RC4 cipher suites for their connections by passing the SCH_USE_STRONG_CRYPTO flag to SChannel in the SCHANNEL_CRED structure. If compatibility needs to be maintained, then they can also implement a fallback that does not pass this flag.

Microsoft recommends that customers upgrade to TLS1.2 and utilize AES-GCM. On modern hardware AES-GCM has similar performance characteristics and is a much more secure alternative to RC4.

- William Peteroy, MSRC

I would like to thank the Windows, Internet Explorer and .NET teams for their work in this effort as well as Ali Rahbar and Suha Can of the MSRC Engineering team for their hard work and input. I would also like to thank Matthew Green for the excellent write-ups he has for this and other applied cryptography issues on his blog.

Security Advisory 2868725: Recommendation to disable RC4 (2024)

FAQs

How do I disable RC4 authentication? ›

Disable RC4 in Operations Manager

On the Management Server, go to Local Group Policy Editor > Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options > Network security: Configure encryption types allowed for Kerberos > Disable RC4.

Should we disable RC4? ›

Mozilla and Microsoft recommend disabling RC4 where possible. RFC 7465 prohibits the use of RC4 in TLS.

Is Microsoft disabling RC4? ›

The purpose of this advisory is to notify customers that an update is available for Microsoft . NET Framework that disables RC4 in Transport Layer Security (TLS) and also changes the SSL/TLS default protocol from TLS 1.0 | SSL 3.0 to TLS 1.2 | TLS 1.1 | TLS 1.0 if you are running a .

Is RC4 still secure? ›

NIST has published guidelines and recommendations for cryptographic algorithms, and RC4 is generally considered insecure for applications requiring strong security. A stream cipher is a type of cipher that operates on data a byte at a time to encrypt that data.

What is RC4 authentication? ›

RC4 is a stream cipher symmetric key algorithm, widely recognized for its simplicity and speed. Ronald Rivest of RSA Security first designed this algorithm. Despite its simplicity, RC4 has been instrumental in several protocols, including WEP for wireless network encryption and SSL/TLS for internet security.

What is the problem with RC4? ›

Also, since RC4 is a stream cipher and not a block cipher, it is more vulnerable to a bit-flipping attack. Finally, RC4 has also been found to be susceptible to plaintext recovery attacks and several other security risks.

What replaces RC4? ›

According to manual pages shipped with the operating system, in the 2017 release of macOS and iOS operating systems, Apple replaced RC4 with AES in its implementation of arc4random.

What is RC4 algorithm used for? ›

RC4 (also known as Rivest Cipher 4) is a form of stream cipher. It encrypts messages one byte at a time via an algorithm. Plenty of stream ciphers exist, but RC4 is among the most popular.

Why do modern security systems avoid using RC4? ›

Description. In Go, it is strongly discouraged to use the crypto/rc4 package for cryptographic operations involving the RC4 (Rivest Cipher 4) algorithm. Avoid the crypto/rc4 package for the following reasons: Weak Security: The RC4 algorithm is considered weak and insecure for modern cryptographic applications.

Has RC4 been broken? ›

To encrypt a text, this key stream is XORed with a plaintext, and decryption is done by XORing the ciphertext with the key stream again. RC4 is broken in a variety of situations. If you just naively use it twice on two different plaintexts then that is it, it's broken.

How do I enable RC4 encryption? ›

Resolution
  1. Login to the SonicWall management GUI.
  2. Under Encryption Settings, enable check box Enable RC4-Only Cipher Suite Support.
  3. Click Accept at the top to save the change.
  4. Restart for the change to take effect.

How do I disable RC4 and 3DES on Windows server? ›

We can disable 3DES and RC4 ciphers by removing them from registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010002 and then restart the server.

How do I turn off authentication key? ›

Stop using a security key
  1. Go to the 2-Step Verification section of your Google Account. You may need to sign in.
  2. Next to the key you want to remove, select edit .
  3. Select Remove This Key. OK.

How do I disable network authentication in Remote Desktop? ›

  1. On the RD Session Host server, open Remote Desktop Session Host Configuration. ...
  2. Under Connections, right-click the name of the connection, and then click Properties.
  3. In the General tab, un-tick the Allow connections only from computers running Remote Desktop with Network Level Authentication check box.

How do I disable enable RC4 only cipher suite support? ›

Go to "Encryption Settings" and uncheck " "enable RC4-Only Cipher suite support". NOTE: the device will need a reboot.

Top Articles
Why you shouldn't put all your retirement savings in your 401(k), according to a financial planner
How to Repay Subsidized vs. Unsubsidized Student Loans
Section 4Rs Dodger Stadium
9192464227
Beautiful Scrap Wood Paper Towel Holder
Best Transmission Service Margate
Fnv Turbo
Calamity Hallowed Ore
Craigslist Cars And Trucks Buffalo Ny
Here's how eating according to your blood type could help you keep healthy
Palace Pizza Joplin
Pittsburgh Ultra Advanced Stain And Sealant Color Chart
10 Free Employee Handbook Templates in Word & ClickUp
Nebraska Furniture Tables
272482061
Moviesda3.Com
boohoo group plc Stock (BOO) - Quote London S.E.- MarketScreener
Clear Fork Progress Book
R Cwbt
ELT Concourse Delta: preparing for Module Two
Kamzz Llc
What Channel Is Court Tv On Verizon Fios
Hampton University Ministers Conference Registration
R&S Auto Lockridge Iowa
The Many Faces of the Craigslist Killer
Loslaten met de Sedona methode
Copper Pint Chaska
Pixel Combat Unblocked
2021 Tesla Model 3 Standard Range Pl electric for sale - Portland, OR - craigslist
Amazing Lash Bay Colony
The Rise of "t33n leaks": Understanding the Impact and Implications - The Digital Weekly
Renfield Showtimes Near Marquee Cinemas - Wakefield 12
Los Amigos Taquería Kalona Menu
Slv Fed Routing Number
Old Peterbilt For Sale Craigslist
The Mad Merchant Wow
Personalised Handmade 50th, 60th, 70th, 80th Birthday Card, Sister, Mum, Friend | eBay
Bimmerpost version for Porsche forum?
Cl Bellingham
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
Puretalkusa.com/Amac
How to Get a Better Signal on Your iPhone or Android Smartphone
Clima De 10 Días Para 60120
Lucifer Morningstar Wiki
Craigslist Rooms For Rent In San Fernando Valley
Ssc South Carolina
Spurs Basketball Reference
15 Best Places to Visit in the Northeast During Summer
Free Carnival-themed Google Slides & PowerPoint templates
The Significance Of The Haitian Revolution Was That It Weegy
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 5925

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.