Insecure Cipher Suite
- IANA name:
- OpenSSL name:
- GnuTLS name:
- Hex code:
- 0x00, 0x1B
- TLS Version(s):
- TLS1.0, TLS1.1
- Transport Layer Security (TLS)
- Key Exchange:
- Diffie-Hellman (DH)
- Anonymous (anon)
- Triple-DES (Encrypt Decrypt Encrypt) in Cipher Block Chaining mode (3DES EDE CBC)
- Secure Hash Algorithm 1 (SHA)
- Included in RFC:
Diffie-Hellman key exchanges not using ephemeral keys do not support Perfect Forward Secrecy (PFS) which is recommended, so attackers cannot decrypt the whole communication stream.
Anonymous key exchanges are generally vulnerable to Man in the Middle attacks.
The CBC mode is vulnerable to plain-text attacks with TLS 1.0, SSL 3.0 and lower. However a real fix is implemented with TLS 1.2 in which the GCM mode was introduced and which is not vulnerable to the BEAST attack. GCM should be preferred over CBC (cf. BEAST).
While Triple-DES is still recognized as a secure symmetric-key encryption, a more and more standardizations bodies and projects decide to deprecate this algorithm. Though not broken, it has been proven to suffer from several vulnerabilities in the past (cf. Sweet32).
The Secure Hash Algorithm 1 has been proven to be insecure as of 2017 (cf. shattered.io).