Xeams runs on Java; therefore, most network-related configurations are inherited from the underlying platform. Administrators often want to fine-tune configuration related to TLS/SSL like specifying different cipher suites and/or disabling weaker protocols. This page describes how to accomplish this task.
Before modifying the TLS settings, we recommend you upgrade to a newer JRE in Xeams to see if that uses newer ciphers that you wanted. Use the following directions to upgrade the JRE:
java.version
on this page.
Most of the advanced configuration in Xeams is done by adding entries in the server.properties file.
tls.protocols.4.smtp=TLSv1.1,TLSv1.2,TLSv1.3 synametrics.https.sslProtocol=TLSv1.1,TLSv1.2,TLSv1.3The above lines restrict the TLS version for SMTP and HTTPS to TLSv1.1, TSLv1.2 and TLSv1.3.
Add the following lines in server.properties.
ssl.cipher.list=TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,...Additional ciphers can be appended with a comma separating their names.