{"id":21553,"date":"2014-05-16T18:41:16","date_gmt":"2014-05-16T22:41:16","guid":{"rendered":"http:\/\/www.opensource.im\/?p=21553"},"modified":"2014-05-16T18:41:16","modified_gmt":"2014-05-16T22:41:16","slug":"microsofts-net-framework-security-updates-further-effort-to-phase-out-rc4-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/microsofts-net-framework-security-updates-further-effort-to-phase-out-rc4-encryption.php","title":{"rendered":"Microsoft&#8217;s .NET Framework security updates further effort to phase out RC4 encryption"},"content":{"rendered":"<p><p>    Microsoft released optional security updates Tuesday for    various versions of the .NET Framework that prevent the RC4    encryption algorithm from being used in TLS (Transport Layer    Security) connections.  <\/p>\n<p>    The    updates are only available through the Windows Update    Catalog and the Microsoft Download Center, not Windows Update,    and are part of Microsofts efforts that began in November to    phase out the use of RC4 in TLS. They are in addition to the    companys scheduled security patches for Windows, Internet    Explorer and Office.  <\/p>\n<p>    The    Rivest Cipher 4 (RC4) was invented in 1987 by cryptographer    Ronald Rivest and remained a popular encryption algorithm over    the years despite cryptographic weaknesses being discovered by    researchers.  <\/p>\n<p>    Until    last year, the use of RC4 as a preferred cipher in TLS was    considered safe and actually recommended for a while after    cipher-block chaining mode ciphers like AES-CBC were found to    be     vulnerable to attacks.  <\/p>\n<p>    However, in March 2013, a team of researchers    presentedfeasible    attacks against RC4 as used in TLS; subsequent revelations    about the U.S. National Security Agencys efforts to defeat    encryption sparked concerns that breaking RC4 might be within    its capabilities.  <\/p>\n<p>    In    November Microsoft     released an update for Windows 7, Windows 8, Windows RT,    Windows Server 2008 R2 and Windows Server 2012 that allowed    system administrators to disable RC4 support using registry    settings. The new optional updates released Tuesday do the same    thing, but for the .NET Framework.  <\/p>\n<p>    The    use of RC4 in TLS could allow an attacker to perform    man-in-the-middle attacks and recover plaintext from encrypted    sessions, Microsoft said in >a    security advisory Tuesday. A man-in-the-middle attack    occurs when an attacker reroutes communication between two    users through the attackers computer without the knowledge of    the two communicating users. Each user in the communication    unknowingly sends traffic to and receives traffic from the    attacker, all the while thinking they are communicating only    with the intended user.  <\/p>\n<p>    While    blocking RC4 is recommended, the company said that customers    should plan and test the new settings prior to making this    change in their environments.  <\/p>\n<p>    TLS    offers a choice of ciphers that server administrators can    specify in their configurations, but versions 1.0 and 1.1 of    the protocol support only CBC ciphers and RC4, all of which are    now considered insecure.  <\/p>\n<p>    The    AES-GCM cipher is a safe alternative, but it is only available    in TLS version 1.2 which has yet to see widespread deployment.    A scan    of the top 155,000 HTTPS websites performed this month by    the SSL Pulse Project revealed that only around 35 percent of    them supported TLS 1.2.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2155060\/microsofts-net-framework-security-updates-further-effort-to-phase-out-rc4-encryption.html\/RK=0\/RS=w.d8B66k9M7sybfRP9oDhxRiBto-\" title=\"Microsoft's .NET Framework security updates further effort to phase out RC4 encryption\">Microsoft's .NET Framework security updates further effort to phase out RC4 encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Microsoft released optional security updates Tuesday for various versions of the .NET Framework that prevent the RC4 encryption algorithm from being used in TLS (Transport Layer Security) connections. The updates are only available through the Windows Update Catalog and the Microsoft Download Center, not Windows Update, and are part of Microsofts efforts that began in November to phase out the use of RC4 in TLS. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-21553","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/21553"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=21553"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/21553\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=21553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=21553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=21553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}