Weak Cipher Suite
- IANA name:
- TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
- OpenSSL name:
- ECDHE-PSK-AES256-CBC-SHA
- GnuTLS name:
- TLS_ECDHE_PSK_AES_256_CBC_SHA1
- Hex code:
- 0xC0, 0x36
- TLS Version(s):
- TLS1.0, TLS1.1, TLS1.2
- Protocol:
- Transport Layer Security (TLS)
- Key Exchange:
- Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)
- Authentication
- Pre-Shared Key (PSK)
- Encryption:
- Advanced Encryption Standard with 256bit key in Cipher Block Chaining mode (AES 256 CBC)
- Hash:
- Secure Hash Algorithm 1 (SHA)
- Included in RFC:
- Machine-readable:
- application/json
Cipher Block Chaining:
The CBC mode is vulnerable to plain-text attacks with TLS 1.0, SSL 3.0 and lower. However a real fix is implemented with TLS 1.2 in which the GCM mode was introduced and which is not vulnerable to the BEAST attack. GCM should be preferred over CBC (cf. BEAST).
Secure Hash Algorithm 1:
The Secure Hash Algorithm 1 has been proven to be insecure as of 2017 (cf. shattered.io).