Weak TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256
- IANA name:
 - TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256
 - Hex code:
 - 0xC0, 0x82
 - TLS Version(s):
 - TLS1.2, TLS1.3
 - Protocol:
 - Transport Layer Security (TLS)
 - Key Exchange:
 - Diffie-Hellman (DH)
 - Authentication:
 - Digital Signature Standard (DSS)
 - Encryption:
 - AEAD CAMELLIA with 128bit key in Galois/Counter mode (CAMELLIA 128 GCM)
 - Hash:
 - Secure Hash Algorithm 256 (SHA256)
 - Included in RFC:
 - Machine-readable:
 - application/json
 
                            
                            Non-ephemeral Key Exchange: 
                    
                    
                    
                    This key exchange algorithm does not support Perfect Forward Secrecy (PFS) which is recommended, so attackers cannot decrypt the complete communication stream.
                            
                            Raccoon Attack: 
                    
                    
                    
                
                The so-called Raccoon Attack affects the specifications of TLS 1.2 and below when using a DH(E) key exchange. According to the researchers, while very hard to exploit, in rare circumstances this timing attack allows attackers to decrypt the connection between users and the server. A fix has been introduced in the TLS 1.3 specification.