Insecure TLS_DH_anon_WITH_RC4_128_MD5
- IANA name:
- TLS_DH_anon_WITH_RC4_128_MD5
- GnuTLS name:
- TLS_DH_ANON_ARCFOUR_128_MD5
- Hex code:
- 0x00, 0x18
- TLS Version(s):
- TLS1.0, TLS1.1, TLS1.2, TLS1.3
- Protocol:
- Transport Layer Security (TLS)
- Key Exchange:
- Diffie-Hellman (DH)
- Authentication:
- Anonymous (anon)
- Encryption:
- Rivest Cipher 4 with 128bit key (RC4 128)
- Hash:
- HMAC Message Digest 5 (MD5)
- Included in RFC:
- Machine-readable:
- application/json
This key exchange algorithm does not support Perfect Forward Secrecy (PFS) which is recommended, so attackers cannot decrypt the complete communication stream.
The so-called Raccoon Attack affects the specifications of TLS 1.2 and below when using a DH(E) key exchange. According to the researchers, while very hard to exploit, in rare circumstances this timing attack allows attackers to decrypt the connection between users and the server. A fix has been introduced in the TLS 1.3 specification.
Anonymous key exchanges are generally vulnerable to Man in the Middle attacks.
IETF has officially prohibited RC4 for use in TLS in RFC 7465. Therefore, it can be considered insecure.
The Message Digest 5 algorithm suffers form multiple vulnerabilities and is considered insecure.