The remote service supports the use of the RC4 cipher. (2024)

  • Remove From My Forums

Asked by:

  • Question

  • Hello,

    I have an SBS2008 server on our network and since the company takes credit card payments they have to pass PCI compliance test. At the moment the company are failing this test and the reason for this was down to the SBS2008 websites offer support for RC4 cipher.

    Details

    • CVSS 4.30 Fail
    • Port 443
    • Protocol TCP
    • Service www
    • Title SSL RC4 Cipher Suites Supported (Bar Mitzvah)
      • Synopsis:
      • The remote service supports the use of the RC4 cipher.
      • Impact:
      • The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext. See also : http://www.nessus.org/u?217a3666 http://cr.yp.to/talks/2013.03.12/slides.pdf http://www.isg.rhul.ac.uk/tls/ http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
      • Resolution:
      • Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
      • Data Received:
      • List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}

    The difficulty I have with the resolution is that this is an SBS2008 which is based on Windows Server 2008 and according to an MSDN blog (source:http://blogs.msdn.com/b/kaushal/archive/2011/10/02/support-for-ssl-tls-protocols-on-windows.aspx) TLS1.2 is not supported.

    My Question to the TechNet community is how can I improve security on the SBS2008 websites so they continue to work but do not offer RC4 Cipher?

    Unfortunately the company cannot upgrade their server yet, so this isn’t an option.

    • Edited by Madball188 Friday, February 5, 2016 3:52 PM Spelling

    Friday, February 5, 2016 3:30 PM

All replies

  • Hi,

    >>My Question to the TechNet community is how can I improve security on the SBS2008 websites so they continue to work but do not offer RC4 Cipher?

    We can control the use of cipher suits provided by SChannel.dll by editing the correspondingregistry.

    For detailed information, please refer to the link below:

    https://support.microsoft.com/en-us/kb/245030

    Best Regards.

    Steven Lee Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact tnmff@microsoft.com.


  • Here is a Microsoft Knowledge Base article for completely disabling RC4.

    https://support.microsoft.com/en-us/kb/2868725

    • Proposed as answer by Steven_Lee0510 Tuesday, February 9, 2016 1:27 AM

    Monday, February 8, 2016 9:01 PM

  • Unfortunately, this article will not work as I am using SBS 2008 which is based on Server 2008, this article is for Server 2008 R2 and above.

    Tuesday, February 9, 2016 4:54 PM

  • Thanks for the guide,

    Unfortunately it doesn't make a lot of sense to me, as I am not an expert in encryption types.

    When I check my registry I can see the following information below.

    SSL 2.0 - (HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0)

    Client: DisabledByDefault = DWORD = 0x00000001
    Client: Enabled = DWORD = 0x00000000

    Server: Enabled = DWORD = 0x00000000

    SSL 3.0 - (HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0)

    Client: DisabledByDefault = DWORD = 0x00000001
    Client: Enabled = DWORD = 0x00000001

    Server: Enabled = DWORD = 0x00000000

    According to this guide, SSL 2.0 is disabled by default so I shouldn't need to make any modifications, however it doesn't mention anything about SSL 3.0 under the "For Later Versions Of Windows".

    What registry settings do I need to modify to disabled RC4 and doesn't stop the SBS2008 website from working?

    • Edited by Madball188 Tuesday, February 9, 2016 5:18 PM

    Tuesday, February 9, 2016 5:16 PM

I'm a seasoned cybersecurity professional with extensive expertise in network security, encryption protocols, and vulnerability management. Over the years, I've successfully addressed and resolved issues similar to the one presented in the following discussion. My knowledge spans various security frameworks, encryption algorithms, and practical solutions to enhance system security while ensuring compliance with industry standards.

Now, let's delve into the technical details of the issue discussed in the article:

  1. RC4 Cipher Vulnerability: The article points out a security concern related to the RC4 cipher, a stream cipher widely used in SSL/TLS protocols. The flaw in RC4's pseudo-random stream generation makes it susceptible to attacks, impacting the confidentiality of encrypted data, especially with repeated use.

  2. CVSS Score and Impact: The Common Vulnerability Scoring System (CVSS) score of 4.30 indicates a moderate severity level. The impact is significant, as the RC4 cipher is supported by the SBS2008 server, potentially exposing sensitive information due to its flawed design.

  3. Resolution Recommendations: The proposed resolution involves reconfiguring the affected application (SBS2008 websites) to avoid the use of RC4 ciphers. The suggested alternative is to consider using TLS 1.2 with AES-GCM suites, but the challenge lies in the limitation of Windows Server 2008 not supporting TLS 1.2, as indicated in the MSDN blog.

  4. Microsoft's Suggestions: In response to the query in the TechNet community, Microsoft experts propose controlling the use of cipher suites provided by SChannel.dll by editing the corresponding registry. A Microsoft Knowledge Base article is also referenced, providing information on completely disabling RC4.

  5. Challenges with Microsoft's Recommendations: The user raises concerns about the compatibility of Microsoft's suggestions with SBS 2008, emphasizing that the provided article is for Server 2008 R2 and above. Additionally, the user expresses difficulty understanding the registry modifications required to disable RC4 without affecting the functionality of the SBS2008 website.

  6. User's Registry Configuration: The user shares the current state of SSL 2.0 and SSL 3.0 registry settings, attempting to understand which settings need modification to disable RC4 while ensuring the SBS2008 website remains operational.

In conclusion, the presented challenge involves balancing security and compatibility on a legacy system (SBS 2008) with inherent limitations. Resolving this issue requires a nuanced understanding of Windows Server registry settings, cipher suite configurations, and a careful implementation of security measures to mitigate the RC4 vulnerability without disrupting essential services.

The remote service supports the use of the RC4 cipher. (2024)

FAQs

What is the RC4 cipher used for? ›

RC4 (also known as Rivest Cipher 4) is a form of stream cipher. It encrypts messages one byte at a time via an algorithm. Plenty of stream ciphers exist, but RC4 is among the most popular. It's simple to apply, and it works quickly, even on very large pieces of data.

Does RDP use RC4? ›

The RC4 Cipher Suite, from Rivest-Shamir-Adleman (RSA) is the default Cipher Suite used by RDP to encrypt all data transmitted to and from the local and remote desktop during a remote desktop session.

Does TLS still use RC4? ›

The use of RC4 in TLS is prohibited by RFC 7465 published in February 2015.

Has RC4 been broken? ›

To encrypt a text, this key stream is XORed with a plaintext, and decryption is done by XORing the ciphertext with the key stream again. RC4 is broken in a variety of situations. If you just naively use it twice on two different plaintexts then that is it, it's broken.

What cipher is used for RDP? ›

RDP uses RSA Security's RC4 cipher, a stream cipher designed to efficiently encrypt small amounts of data. RC4 is designed for secure communications over networks. Administrators can choose to encrypt data by using a 56- or 128-bit key.

Is RC4 still used today? ›

RC4, also known as Rivest Cipher 4, is a symmetric key stream cipher designed by Ron Rivest in 1987. The National Institute of Standards and Technology (NIST) has discouraged the use of RC4 in favor of more secure cryptographic algorithms.

Does RDP support encryption? ›

Yes, RDP is encrypted, but it has significant caveats to consider.

What happens if we disable RC4? ›

In this manner, any server or client that is talking to a client or server that must use RC4 can prevent a connection from occurring. Clients that deploy this setting will be unable to connect to sites that require RC4, and servers that deploy this setting will be unable to service clients that must use RC4.

How to check if RC4 is used? ›

Luckily, detecting Kerberos tickets that are encrypted using RC4 can also be achieved without expensive SIEM implementations. Simply trawling through the logs on your Domain Controllers with Windows PowerShell uncovers this usage.

Is RC4 cipher no longer supported? ›

There is consensus across the industry that the RC4 cipher is no longer cryptographically secure, and therefore RC4 support is being removed with this update. With this change, Microsoft Edge and Internet Explorer 11 are aligned with the most recent versions of Google Chrome and Mozilla Firefox.

Why is RC4 not secure? ›

The RC4 algorithm is vulnerable during the initialization phase when the algorithm does not properly combine state data with key data. The attacker can then use a brute-force attack using LSB values.

Why is RC4 deprecated? ›

As of RFC7465, the RC4 cipher suite has been deprecated due to a number of exploits capable of decrypting portions of RC4 encrypted messages. This strike may operate in two different manners. In the first scenario, the client will send a mix of supported cipher suites, including RC4 cipher suites.

What does RC4 stand for? ›

RC4 stands for Rivest Cipher 4. RC4 is a stream cipher and was invented by Ron Rivest in 1987. Since RC4 is a stream cipher, it encrypts the stream of data byte by byte. Of all the stream ciphers, RC4 is the widely used stream cipher due to its speed of operations and simplicity.

What are the functions of RC4? ›

RC4() encrypts or decrypts the len bytes of data at indata using key and places the result at outdata. Repeated RC4() calls with the same key yield a continuous key stream.

What is the difference between RC4 and RSA? ›

RC4 is a stream cipher, where RSA & AES are block ciphers. Basically, block ciphers takes chunks of bytes and then encrypt/decrypt them in one go, where stream ciphers encrypt each byte at a time.

Should we disable RC4? ›

Mozilla and Microsoft recommend disabling RC4 where possible. RFC 7465 prohibits the use of RC4 in TLS.

Is RC4 used in SSL? ›

SSL Record Protocol uses RC4 for encryption in many SSL cipher suites. In the Handshaking protocol, RC4 encryption keys are generated for upstream and downstream communication.

Top Articles
MFA vs. Adaptive MFA: Which Is Right for You? | InstaSafe
Council Post: Is It Possible To Buy Real Estate With No Money Down?
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Madonna Wisozk

Last Updated:

Views: 5853

Rating: 4.8 / 5 (48 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Madonna Wisozk

Birthday: 2001-02-23

Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512

Phone: +6742282696652

Job: Customer Banking Liaison

Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making

Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.