Insecure TLS_DH_anon_WITH_AES_128_GCM_SHA256
- IANA name:
- TLS_DH_anon_WITH_AES_128_GCM_SHA256
- OpenSSL name:
- ADH-AES128-GCM-SHA256
- GnuTLS name:
- TLS_DH_ANON_AES_128_GCM_SHA256
- Hex code:
- 0x00, 0xA6
- TLS Version(s):
- TLS1.2, TLS1.3
- Protocol:
- Transport Layer Security (TLS)
- Key Exchange:
- Diffie-Hellman (DH)
- Authentication:
- Anonymous (anon)
- Encryption:
- AEAD Advanced Encryption Standard with 128bit key in Galois/Counter mode (AES 128 GCM)
- Hash:
- Secure Hash Algorithm 256 (SHA256)
- Included in RFC:
- Machine-readable:
- application/json
Non-ephemeral Key Exchange:
This key exchange algorithm does not support Perfect Forward Secrecy (PFS) which is recommended, so attackers cannot decrypt the complete communication stream.
Raccoon Attack:
The so-called Raccoon Attack affects the specifications of TLS 1.2 and below when using a DH(E) key exchange. According to the researchers, while very hard to exploit, in rare circumstances this timing attack allows attackers to decrypt the connection between users and the server. A fix has been introduced in the TLS 1.3 specification.
Anonymous key exchange:
Anonymous key exchanges are generally vulnerable to Man in the Middle attacks.