Hi UHHH01 !
In my plesk linux 11.09 debian wheezy 32 bits, Apache+Nginx+Postfix smtps with SSLv2 y SSLv3 disabled and forced TLS, works ok doing the steps on
KB123160.
However courier-imap pop3s imaps not work with
TLS_CIPHER_LIST="ALL:!SSLv2:!SSLv3:!ADH:!NULL:!EXPORT:!DES:!LOW
STRENGTH"
You say me that uses:
TLS_CIPHER_LIST="ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384
HE-RSA-AES128-GCM-SHA256
HE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA
HE-RSA-AES128-SHA256
HE-RSA-AES128-SHA
HE-DSS-AES128-SHA256
HE-RSA-AES256-SHA256
HE-DSS-AES256-SHA
HE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA:AES256-SHA:AES:CAMELLIA
ES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:"
But above works because use all ciphers avalaible but not disable SSLv2 and SSLv3. So it works because is over SSL no over TLS.
I did this (view last line with "!SSLv2:!SSLv3" ):
TLS_CIPHER_LIST="ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384
HE-RSA-AES128-GCM-SHA256
HE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA
HE-RSA-AES128-SHA256
HE-RSA-AES128-SHA
HE-DSS-AES128-SHA256
HE-RSA-AES256-SHA256
HE-DSS-AES256-SHA
HE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA:AES256-SHA:AES:CAMELLIA
ES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SSLv2:!SSLv3"
And then not works because force TLS.
Moreover, cipher list above is same that use "ALL" -> TLS_CIPHER_LIST="ALL:!SSLv2:!SSLv3:!ADH:!NULL:!EXPORT:!DES:!LOW
STRENGTH"
I hope KB update a solution.
By the moment myplesk is vulnerable only for 993 and 995 because I have to use SSL and not TLS:
myplesk:21 - Not vulnerable. Failed to establish SSLv3 connection.
myplesk:587 - Not vulnerable. Failed to establish SSLv3 connection.
myplesk:443 - Not vulnerable. Failed to establish SSLv3 connection.
myplesk:465 - Not vulnerable. Failed to establish SSLv3 connection.
myplesk:8443 - Not vulnerable. Failed to establish SSLv3 connection.
myplesk:993 - Vulnerable! SSLv3 connection established using SSLv3/AES256-SHA
myplesk:995 - Vulnerable! SSLv3 connection established using SSLv3/AES256-SHA
Thanks for your help.