- IANA name:
- Hex code:
- 0xC0, 0x7F
- TLS Version(s):
- TLS1.2, TLS1.3
- Transport Layer Security (TLS)
- Key Exchange:
- Diffie-Hellman (DH)
- Rivest Shamir Adleman algorithm (RSA)
- AEAD CAMELLIA with 256bit key in Galois/Counter mode (CAMELLIA 256 GCM)
- Secure Hash Algorithm 384 (SHA384)
- Included in RFC:
This key exchange algorithm does not support Perfect Forward Secrecy (PFS) which is recommended, so attackers cannot decrypt the complete communication stream.
The so-called Raccoon Attack affects the specifications of TLS 1.2 and below when using a DH(E) key exchange. According to the researchers, while very hard to exploit, in rare circumstances this timing attack allows attackers to decrypt the connection between users and the server. A fix has been introduced in the TLS 1.3 specification.
There are reports that servers using the RSA authentication algorithm with keys longer than 3072-bit may experience heavy performance issues leading to connection timeouts and even service unavailability if many clients open simultaneous connections.