Insecure TLS_DHE_PSK_WITH_RC4_128_SHA
- IANA name:
- TLS_DHE_PSK_WITH_RC4_128_SHA
- GnuTLS name:
- TLS_DHE_PSK_ARCFOUR_128_SHA1
- Hex code:
- 0x00, 0x8E
- TLS Version(s):
- TLS1.0, TLS1.1, TLS1.2, TLS1.3
- Protocol:
- Transport Layer Security (TLS)
- Key Exchange:
- PFS Diffie-Hellman Ephemeral (DHE)
- Authentication:
- Pre-Shared Key (PSK)
- Encryption:
- Rivest Cipher 4 with 128bit key (RC4 128)
- Hash:
- HMAC Secure Hash Algorithm 1 (SHA)
- Included in RFC:
- Machine-readable:
- application/json
The so-called DHEat Attack affects cryptographic protocols using the Diffie Hellman key exchange (incl. TLS). According to its authors, it exploits a protocol particularity that may allow attackers to perform a DoS attack "with a low-bandwidth network connection without authentication, privilege, or user interaction."
The so-called Raccoon Attack affects the specifications of TLS 1.2 and below when using a DH(E) key exchange. According to the researchers, while very hard to exploit, in rare circumstances this timing attack allows attackers to decrypt the connection between users and the server. A fix has been introduced in the TLS 1.3 specification.
IETF has officially prohibited RC4 for use in TLS in RFC 7465. Therefore, it can be considered insecure.
The Secure Hash Algorithm 1 has been proven to be insecure as of 2017 (see shattered.io).