I think you can test it by using the openssl client from the command line:
openssl s_client -ssl3 -connect SERVERNAME:PORT
If it connects and you see "Protocol: SSLv3", it's not disabled. If you see
"sslv3 alert handshake failure" and it doesn't connect, you're done!
-- Sam Clippinger
On Aug 20, 2015, at 7:28 AM, Alessio Cecchi via spamdyke-users
<[email protected]> wrote:
> Hi,
>
> I'm running spadyke 5 in front of a Qmail without TLS patch. My Qmail acts
> only as MX so I'm not interesting into smtp authentication via TLS, but I
> need TLS to send e receiv encrypted email from others servers.
>
> But my MX also accept SSLv3 and I would like to disable it.
>
> So I inset in spamdyke.conf:
>
> tls-cipher-list=ALL:!LOW:!SSLv2:!SSLv3:!EXP:!aNULL
>
> but I'm not sure if the list of cipher is correct.
>
> Can somebody help me?
> Thanks
> --
> Alessio Cecchi
> http://www.linkedin.com/in/alessice
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users