Weak TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA
- IANA name:
- TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA
- OpenSSL name:
- SRP-DSS-AES-128-CBC-SHA
- GnuTLS name:
- TLS_SRP_SHA_DSS_AES_128_CBC_SHA1
- Hex code:
- 0xC0, 0x1F
- TLS Version(s):
- TLS1.0, TLS1.1, TLS1.2, TLS1.3
- Protocol:
- Transport Layer Security (TLS)
- Key Exchange:
- Secure Remote Password (SRP)
- Authentication:
- Secure Hash Algorithm 1 with Digital Signature Standard (SHA DSS)
- Encryption:
- Advanced Encryption Standard with 128bit key in Cipher Block Chaining mode (AES 128 CBC)
- Hash:
- HMAC Secure Hash Algorithm 1 (SHA)
- Included in RFC:
- Machine-readable:
- application/json
Secure Hash Algorithm 1:
The Secure Hash Algorithm 1 has been proven to be insecure as of 2017 (see shattered.io).
Cipher Block Chaining:
In 2013, researchers demonstrated a timing attack against several TLS implementations using the CBC encryption algorithm (see isg.rhul.ac.uk). Additionally, the CBC mode is vulnerable to plain-text attacks in TLS 1.0, SSL 3.0 and lower. A fix has been introduced with TLS 1.2 in form of the GCM mode which is not vulnerable to the BEAST attack. GCM should be preferred over CBC.
Secure Hash Algorithm 1:
The Secure Hash Algorithm 1 has been proven to be insecure as of 2017 (see shattered.io).