Raccoon is a timing attack that exploits a vulnerability in the Diffie-Hellman specification in TLS 1.2 and older [1].
Airlock Gateway is not affected.
Details:
Airlock Gateway supports ECDHE and DHE ciphers by default to provide forward secrecy. Both cipher suite types use Diffie-Hellman to establish a session key. The ellipic curve ciphers (ECDHE) are not affected by this attack [1]. DHE ciphers are affected when the server reuses the same Diffie-Hellman share in multiple TLS connections. All supported Airlock Gateway versions use newer OpenSSL versions to implement SSL that do not reuse Diffie-Hellman shares and are therefore not vulnerable to this attack.