Weak TLS_PSK_DHE_WITH_AES_256_CCM_8
- IANA name:
- TLS_PSK_DHE_WITH_AES_256_CCM_8
- OpenSSL name:
- DHE-PSK-AES256-CCM8
- GnuTLS name:
- TLS_DHE_PSK_AES_256_CCM_8
- Hex code:
- 0xC0, 0xAB
- TLS Version(s):
- TLS1.2, TLS1.3
- Protocol:
- Transport Layer Security (TLS)
- Key Exchange:
- PFS Diffie-Hellman Ephemeral (DHE)
- Authentication:
- Pre-Shared Key (PSK)
- Encryption:
- AEAD Advanced Encryption Standard with 256bit key in Counter with CBC-MAC mode with an 8-Octet ICV (AES 256 CCM 8)
- Hash:
- Secure Hash Algorithm 256 (SHA256)
- Included in RFC:
- Machine-readable:
- application/json
DHEat Attack:
The so-called DHEat Attack affects cryptographic protocols using the Diffie Hellman key exchange (incl. TLS). According to its authors, it exploits a protocol particularity that may allow attackers to perform a DoS attack "with a low-bandwidth network connection without authentication, privilege, or user interaction."
Raccoon Attack:
The so-called Raccoon Attack affects the specifications of TLS 1.2 and below when using a DH(E) key exchange. According to the researchers, while very hard to exploit, in rare circumstances this timing attack allows attackers to decrypt the connection between users and the server. A fix has been introduced in the TLS 1.3 specification.