Thomas Preissler:

    ssl_protocols = !SSLv3 !SSLv2
that disable SSLv3

When I enable verbose_ssl I get this:
2015-03-15 08:27:39 imap-login: Warning: SSL: where=0x2001, ret=1: SSLv3 flush data [$CLIENTIP]
    ...
Is this right? Is SSLv3 used on this connection?

The logging is right, but SSLv3 isn't used.
Today it's not uncommon that application /log/ SSLv3, where they /mean/ TLS1.x

Some days ago where TLSv1 became available there wasn't a great difference between SSLv3 and TLSv1
So Developers reused large portions of code. That's what you see here..

But when I explicitely test for SSLv3 support I get

    $ openssl s_client -connect $SERVERIP:993 -ssl3

    CONNECTED(00000003)
140683835029160:error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure:s3_pkt.c:1260:SSL alert number 40 140683835029160:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake failure:s3_pkt.c:598:

That is the ultimate prove your server have SSLv3 disabled.

Andreas

Reply via email to