Key-Exchange-Method/EN/Consequence
Version vom 11. Juni 2019, 12:28 Uhr von Siwebot (Diskussion | Beiträge)
Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used, for example, to read out passwords or credit card information and misuse them for criminal purposes.