Kerio Connect uses eight variables for the SSL/TLS protocols configuration.
AllowEphemeralDH
NOTE
Changed in Kerio Connect 9.0.2!
The default value, 1, enables the use of DHE (Ephemeral Diffie-Hellman) for key exchange.
The server generates a random ephemeral public key for each session so that attackers cannot decipher past sessions (this is also called forward secrecy).
NOTE
This variable replaces DisableEphemeralDH in Kerio Connect 9.0.0 and 9.0.1. Set the DisableEphemeralDH
to 0 to enable the use of DHE.
EphemeralDHParamSize
NOTE
New in Kerio Connect 9!
The default value, 0, sets the size of DHE to 2048 (1024 for SMTP services). Make sure the DisableEphemeralDH is enabled.
You can change the default value to 1024, 2048, or 4096
AllowEphemeralECDH
The default value, 1, enables ECDHE for key exchange.
The server generates a random ephemeral public key for each session so that attackers cannot decipher past sessions. ECDHE is more efficient than DHE and uses shorter keys.
SSLDontInsertEmptyFragments
The default value, 1, disables the OpenSSL workaround for the CVE-2011-3389 vulnerability.
If you set the variable to 0, some older implementations of SSL may not connect to Kerio Connect servers.
ServerTlsProtocols
In this variable, you can change the SSL/TLS protocols used by Kerio Connect.
Leave the variable empty to use a default set of SSL/TLS protocols: TLSv1,TLSv1.1,TLSv1.2
To use a custom set of protocols, list the protocol names, separated by commas, in the variable.
For example: <variable name="ServerTlsProtocols">SSLv3,TLSv1,TLSv1.1,TLSv1.2</variable>
ServerTlsCiphers
In this variable, you can change the cipher list used by Kerio Connect.
Leave the variable empty to use a default cipher list: AESGCM:HIGH:+EDH-RSA-DES-CBC3-SHA:+EDH-DSS-DES-CBC3-SHA:+DES-CBC3-SHA
To use a custom cipher list, type the cipher list in the variable.
For the full syntax of cipher lists, see the OpenSSL website.
ClientTlsProtocols
In this variable, you can change the SSL/TLS protocols used when Kerio Connect acts as a client, for example, when sending messages via the SMTP protocol.
Leave the variable empty to use a default set of SSL/TLS protocols: TLSv1,TLSv1.1
To use a custom set of protocols, list the protocol names, separated by commas, in the variable.
For example: <variable name="ClientTlsProtocols">SSLv3,TLSv1,TLSv1.1,TLSv1.2</variable>
ClientTlsCiphers
In this variable, you can change the client cipher list.
Leave the variable empty to use a default cipher list.
To use a custom cipher list, type the cipher list in the variable.
For the full syntax of cipher lists, see the OpenSSL website.
PreferServerCipherOrder
The default value, 1, allows Kerio Connect decide which cipher set to use regardless of the client preferences.