
I imported the public certificate using Thunderbird's certificate manager under the "Authorities" tab.

The default value, 1, allows Kerio Connect decide which cipher set to use regardless of the client preferences.I have generated a self-signed certificate authority using as the common name.
#SSLV3 KERIO CONNECT FULL#
Leave the variable empty to use a default cipher list.įor the full syntax of cipher lists, see the OpenSSL website. In this variable, you can change the client cipher list. Leave the variable empty to use a default set of SSL/TLS protocols: TLSv1,TLSv1.1įor example: SSLv3,TLSv1,TLSv1.1,TLSv1.2 ClientTlsCiphers In this variable, you can change the SSL/TLS protocols used when Kerio Connect acts as a client, for example, when sending messages via the SMTP protocol. To use a custom cipher list, type the cipher list in the variable.įor the full syntax of cipher lists, see the OpenSSL website. Leave the variable empty to use a default cipher list: AESGCM:HIGH:+EDH-RSA-DES-CBC3-SHA:+EDH-DSS-DES-CBC3-SHA:+DES-CBC3-SHA In this variable, you can change the cipher list used by Kerio Connect. To use a custom set of protocols, list the protocol names, separated by commas, in the variable.įor example: SSLv3,TLSv1,TLSv1.1,TLSv1.2 ServerTlsCiphers Leave the variable empty to use a default set of SSL/TLS protocols: TLSv1,TLSv1.1,TLSv1.2 In this variable, you can change the SSL/TLS protocols used by Kerio Connect. If you set the variable to 0, some older implementations of SSL may not connect to Kerio Connect servers. The default value, 1, disables the OpenSSL workaround for the CVE-2011-3389 vulnerability. ECDHE is more efficient than DHE and uses shorter keys. The server generates a random ephemeral public key for each session so that attackers cannot decipher past sessions. The default value, 1, enables ECDHE for key exchange. You can change the default value to 1024, 2048, or 4096 AllowEphemeralECDH Make sure the DisableEphemeralDH is enabled. The default value, 0, sets the size of DHE to 2048 (1024 for SMTP services).


These ciphers are not recommended for compliance: Weak Ciphers Here is a list of strong ciphers available: Strong ciphers (Recommended) It is recommended to use only strong ciphers suites to ensure compliance with various compliance standards. Kerio Connect sets the default values of all the SSL/TLS variables. Delete any variable in the Security or SmtpSecurity sections.To reset the SSL/TLS configuration in the configuration file:

