Are there any consequences with RDP (port 3389) when disabling RC4 on a Windows 7 Machine?
Are there any consequences with RDP (port 3389) when disabling RC4 on a Windows 7 Machine? The system in question is Windows 7 x64.
Collaborate Disseminate
Are there any consequences with RDP (port 3389) when disabling RC4 on a Windows 7 Machine? The system in question is Windows 7 x64.
I have multiple physical and virtual servers on a company domain. The physical and virtual servers are all still Windows 2008 R2. The clients have all been updated to Windows 10 from Windows 7 in the past couple of weeks.
I’m implementing an API endpoint based on howsmyssl to check the TLS version of clients then notify those clients about whether or not they passed the test. However, several clients have reported failing the test on our site … Continue reading Why does tls_version "TLS 1.2" from howsmyssl rate "Probably Okay" in Chrome on Windows 10 but "Bad" in IE11 on Windows 7?
I don’t know if this is normal or not, but it seems to me that the rendering (result) of the RC4 encryption that I implemented in C provides me with something else and I’m not convinced where I’m wrong.
#define REF_RC4 0xFF
#define EXP_RC4 0x100
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
typedef struct s_context{
unsigned int I;
unsigned int J;
unsigned int S[EXP_RC4];
}CONTEXT;
void f_init_rc4( CONTEXT *p, unsigned char Key[], int size ){
p->I = 0;
p->J = 0;
p->S[0] = '\0';
unsigned int s = 0;
for( p->I = 0; REF_RC4 > p->I; p->I++ )
p->S[p->I] = p->I;
for( p->I = 0; REF_RC4 > p->I; p->I++ ){
p->J = ( p->J + p->S[p->I] + Key[p->I % size]) & REF_RC4;
s = p->S[p->I];
p->S[p->I] = p->S[p->J];
p->S[p->J] = s;
}
p->I = 0;
p->J = 0;
}
void f_cipher_RC4( CONTEXT *p,unsigned char *pMsg){
unsigned int i = 0;
unsigned int s = 0;
const unsigned long x = (unsigned long)strlen((char*)pMsg);
for( i = 0; x > i; i++ ){
p->I = ( p->I + 1 ) & EXP_RC4;
p->J = ( p->J + p->S[p->I] ) & EXP_RC4;
s = p->S[p->I];
p->S[p->I] = p->S[p->J];
p->S[p->J] = s;
pMsg[i] = pMsg[i] ^ p->S[(p->S[p->I]+p->S[p->J]) & REF_RC4 ];
}
}
int main( void ){
extern int errno;
CONTEXT *p = NULL;
unsigned char Key[] = "Wiki\0";
unsigned char Message[] = "pedia\0";
errno = 0;
if( NULL == (p = malloc(1 *sizeof(struct s_context*) ) ) ){
(void)fprintf(stderr, "Error(%d)\t:%s\n÷t:%s\n", errno,
"Error malloc context", strerror(errno) );
return EXIT_FAILURE;
}
(void)memset(p, 0, sizeof(*p));
f_init_rc4(p, Key, 4 );
p->I = 0;
p->J = 0;
f_cipher_RC4(p, Message);
(void)fprintf( stdout, "CIPHER\t:%02X\n", (unsigned int)Message );
free( (NULL==p) ? NULL : p );
p = NULL;
return EXIT_SUCCESS;
}
Result:
CIPHER :5FBFF603
Program ended with exit code: 0
Expected results:
CIPHER :1021BF0420
I have a few questions about Datagram Transport Layer Security (DTLS) and TLS.
In TLS’s traffic encryption layer (called the TLS Record Layer),
records are not independent. Cryptographic context (stream cipher key
stream) is retained between records. DTLS solves the first problem by
banning stream ciphers. [RFC6347 (3.1)]
I don’t understand why there is a problem with interrecord depedency and therefore DTLS can not use stream ciphers. If I understood RC4 correctly, only a correct exchange of the key is needed. So if the key was exchanged, for example with Diffie-Hellman, why is there a depedency of the records transmitted before?
EDIT: I think I understand it now. The records are encrypted with a key and if a record gets lost (after the handshake was done), it is not possible to determine which bit of the key has to be used to decrypt the record you received. Please correct me, if that was wrong.
I would appreciate if you could help me with my questions.
My email provider still supports old SSL_RSA_WITH_RC4_128_SHA ciphers. What does that mean for me?
If I use an updated system (Ubuntu 16.04) and an updated client (Thunderbird 52), shouldn’t it use this ciphers?
But when t… Continue reading Using old ciphers in email security
I am utterly confused about this. I understand why you would want to minimize redundancy if you’re using a substitution cipher, but why is this necessary when using a stream cipher such as RC4? Since the attacker does not h… Continue reading Why is it necessary to minimize redundancy in the ciphertext of a stream cipher?
I am utterly confused about this. I understand why you would want to minimize redundancy if you’re using a substitution cipher, but why is this necessary when using a stream cipher such as RC4? Since the attacker does not h… Continue reading Why is it necessary to minimize redundancy in the ciphertext of a stream cipher?
I was testing rc4-40 out with a 200-bit key (25 bytes) and, to my surprise, the results were the same as they were with rc4:
<?php
$key_size = 25;
$key = ”;
for ($i = 0; $i < $key_size; $i++) {
$key.= chr(mt_rand(… Continue reading difference between rc4-40 and rc4 in OpenSSL
According to RFC7465 RC4 is banned from TLS and my question is : Is it banned for good, does any site can use it now and if it does, will I get any notification from Chrome?