I think you can test it by using the openssl client from the command line:
        openssl s_client -ssl3 -connect SERVERNAME:PORT
If it connects and you see "Protocol: SSLv3", it's not disabled.  If you see 
"sslv3 alert handshake failure" and it doesn't connect, you're done!

-- Sam Clippinger




On Aug 20, 2015, at 7:28 AM, Alessio Cecchi via spamdyke-users 
<spamdyke-users@spamdyke.org> wrote:

> Hi,
> 
> I'm running spadyke 5 in front of a Qmail without TLS patch. My Qmail acts 
> only as MX so I'm not interesting into smtp authentication via TLS, but I 
> need TLS to send e receiv encrypted email from others servers.
> 
> But my MX also accept SSLv3 and I would like to disable it.
> 
> So I inset in spamdyke.conf:
> 
> tls-cipher-list=ALL:!LOW:!SSLv2:!SSLv3:!EXP:!aNULL
> 
> but I'm not sure if the list of cipher is correct.
> 
> Can somebody help me?
> Thanks
> -- 
> Alessio Cecchi
> http://www.linkedin.com/in/alessice
> _______________________________________________
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users

_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to