Insecure Cipher Suite
- IANA name:
- OpenSSL name:
- GnuTLS name:
- Hex code:
- 0xC0, 0x15
- TLS Version(s):
- TLS1.0, TLS1.1, TLS1.2
- Transport Layer Security (TLS)
- Key Exchange:
- Elliptic Curve Diffie-Hellman (ECDH)
- Anonymous (anon)
- NULL Encryption (NULL)
- Secure Hash Algorithm 1 (SHA)
- Included in RFC:
Diffie-Hellman key exchanges not using ephemeral keys do not support Perfect Forward Secrecy (PFS) which is recommended, so attackers cannot decrypt the whole communication stream.
Anonymous key exchanges are generally vulnerable to Man in the Middle attacks.
This cipher suite uses no encryption at all. Hence, it is not providing confidentiality.
The Secure Hash Algorithm 1 has been proven to be insecure as of 2017 (cf. shattered.io).