Patch by Robert Scheck for Zarafa >= 7.1.12 which re-adds the whole documentation that was initially proposed to upstream but lost when this feature was backported from Zarafa 7.2 to the 7.1 series. Proposed to upstream via e-mail on Sat, 8 Mar 2014 14:30:29 +0100, initial patch was put into the upstream ticket https://jira.zarafa.com/browse/ZCP-12143. --- zarafa-7.1.12/doc/manual.xml 2015-04-07 12:03:31.000000000 +0200 +++ zarafa-7.1.12/doc/manual.xml.ssl_protocols_ciphers 2015-04-07 17:05:47.000000000 +0200 @@ -4226,14 +4226,35 @@ - + - Incoming SSL connections normally are v3. - Default: no - + Disabled or enabled protocol names. Supported protocol names + are SSLv2, SSLv3 + and TLSv1. If Zarafa was linked against + OpenSSL 1.0.1 or later there is additional support for the new protocols + TLSv1.1 and TLSv1.2. + To exclude both, SSLv2 and SSLv3 set + to !SSLv2 !SSLv3. SSLv2 is considered unsafe + and these connections should not be accepted. + Default: !SSLv2 + + + + + + + SSL ciphers to use, set to ALL for backward compatibility. + Default: ALL:!LOW:!SSLv2:!EXP:!aNULL + + + + Prefer the server's order of SSL ciphers over client's. + Default: no + + @@ -8090,11 +8111,32 @@ - + + + Disabled or enabled protocol names. Supported protocol names + are SSLv2, SSLv3 + and TLSv1. If Zarafa was linked against + OpenSSL 1.0.1 or later there is additional support for the new protocols + TLSv1.1 and TLSv1.2. + To exclude both, SSLv2 and SSLv3 set + to !SSLv2 !SSLv3. SSLv2 is considered unsafe + and these connections should not be accepted. + Default: !SSLv2 + + + + + - Accept SSLv2 only connections. SSLv2 is considered - unsafe, and these connections should not be - accepted. + SSL ciphers to use, set to ALL for backward compatibility. + Default: ALL:!LOW:!SSLv2:!EXP:!aNULL + + + + + + + Prefer the server's order of SSL ciphers over client's. Default: no @@ -10091,11 +10133,32 @@ - + + + Disabled or enabled protocol names. Supported protocol names + are SSLv2, SSLv3 + and TLSv1. If Zarafa was linked against + OpenSSL 1.0.1 or later there is additional support for the new protocols + TLSv1.1 and TLSv1.2. + To exclude both, SSLv2 and SSLv3 set + to !SSLv2 !SSLv3. SSLv2 is considered unsafe + and these connections should not be accepted. + Default: !SSLv2 + + + + + + + SSL ciphers to use, set to ALL for backward compatibility. + Default: ALL:!LOW:!SSLv2:!EXP:!aNULL + + + + + - Accept SSLv2 only connections. SSLv2 is considered - unsafe, and these connections should not be - accepted. + Prefer the server's order of SSL ciphers over client's. Default: no