On Oct/17/14 2:10, Sam Varshavchik wrote:
> Oliver Mihatsch writes:
>
>> Behaviour when using the following variable (added !, added TLSv1_1):
>> TLS_CIPHER_LIST="!SSLv3:TLSv1:TLSv1_1:HIGH:!LOW:!MEDIUM:!EXP:!NULL:!aNULL@STRENGTH"
>>  
>>
>>
>> SSLv3 working, TLS 1.0 working, TLS 1.1 working, TLS 1.2 working (no 
>> changes to before)
>>
>>
>> So results were not really what I was expecting. SSLv3 and TLS1/1.1 
>> are somehow just an alias for each other.
>
> This weirdness is entirely OpenSSL's doing. This setting is passed 
> directly to OpenSSL, with no further interpretation.
>
> Someone else already dug up the code change necessary to disable 
> SSLv3. It appears that a small code change is required.
>
There was a patch released for OpenSSL recently which included 
TLS_FALLBACK_SCSV support. Isn't upgrading enough in this case? Or is 
there still a need to reconfigure imapd?

Thanks.

------------------------------------------------------------------------------
Comprehensive Server Monitoring with Site24x7.
Monitor 10 servers for $9/Month.
Get alerted through email, SMS, voice calls or mobile push notifications.
Take corrective actions from your mobile device.
http://p.sf.net/sfu/Zoho
_______________________________________________
Courier-imap mailing list
Courier-imap@lists.sourceforge.net
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-imap

Reply via email to