home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.comp.os.windows-10      Steaming pile of horseshit Windows 10      197,590 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 196,311 of 197,590   
   Nomen Nescio to All   
   Microsoft will finally kill obsolete cip   
   18 Dec 25 10:51:36   
   
   XPost: alt.comp.os.windows-11, alt.privacy.anon-server, comp.security.misc   
   From: nobody@dizum.com   
      
   Microsoft is killing off an obsolete and vulnerable encryption cipher   
   that Windows has supported by default for 26 years following more than a   
   decade of devastating hacks that exploited it and recently faced   
   blistering criticism from a prominent US senator.   
      
   When the software maker rolled out Active Directory in 2000, it made RC4   
   a sole means of securing the Windows component, which administrators use   
   to configure and provision fellow administrator and user accounts inside   
   large organizations. RC4, short for Rivest Cipher 4, is a nod to   
   mathematician and cryptographer Ron Rivest of RSA Security, who   
   developed the stream cipher in 1987. Within days of the   
   trade-secret-protected algorithm being leaked in 1994, a researcher   
   demonstrated a cryptographic attack that significantly weakened the   
   security it had been believed to provide. Despite the known   
   susceptibility, RC4 remained a staple in encryption protocols, including   
   SSL and its successor TLS, until about a decade ago.   
      
   Out with the old   
   One of the most visible holdouts in supporting RC4 has been Microsoft.   
   Eventually, Microsoft upgraded Active Directory to support the much more   
   secure AES encryption standard. But by default, Windows servers have   
   continued to respond to RC4-based authentication requests and return an   
   RC4-based response. The RC4 fallback has been a favorite weakness   
   hackers have exploited to compromise enterprise networks. Use of RC4   
   played a key role in last year’s breach of health giant Ascension. The   
   breach caused life-threatening disruptions at 140 hospitals and put the   
   medical records of 5.6 million patients into the hands of the attackers.   
   US Senator Ron Wyden (D-Ore.) in September called on the Federal Trade   
   Commission to investigate Microsoft for “gross cybersecurity   
   negligence,” citing the continued default support for RC4.   
      
   Last week, Microsoft said it was finally deprecating RC4 and cited its   
   susceptibility to Kerberoasting, the form of attack, known since 2014,   
   that was the root cause of the initial intrusion into Ascension’s   
   network.   
      
   “By mid-2026, we will be updating domain controller defaults for the   
   Kerberos Key Distribution Center (KDC) on Windows Server 2008 and later   
   to only allow AES-SHA1 encryption,” Matthew Palko, a Microsoft principal   
   program manager, wrote. “RC4 will be disabled by default and only used   
   if a domain administrator explicitly configures an account or the KDC to   
   use it.”   
      
   AES-SHA1, an algorithm widely believed to be secure, has been available   
   in all supported Windows versions since the roll out of Windows Server   
   2008. Since then, Windows clients by default authenticated using the   
   much more secure standard, and servers responded using the same. But,   
   Windows servers, also by default, respond to RC4-based authentication   
   requests and returned an RC4-based response, leaving networks open to   
   Kerberoasting.   
      
   Following next year’s change, RC4 authentication will no longer function   
   unless administrators perform the extra work to allow it. In the   
   meantime, Palko said, it’s crucial that admins identify any systems   
   inside their networks that rely on the cipher. Despite the known   
   vulnerabilities, RC4 remains the sole means of some third-party legacy   
   systems for authenticating to Windows networks. These systems can often   
   go overlooked in networks even though they are required for crucial   
   functions.   
      
   https://arstechnica.com/security/2025/12/microsoft-will-finally-kill-obso   
   lete-cipher-that-has-wreaked-decades-of-havoc/   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca