tls_protocols — allowable ciphers for TLS inbound and outbound sessions
tls_protocols = "+<baseprotocol>[:[+|-]<additional protocols]"
**Configuration Change. ** This option is available as of version 188.8.131.52.
tls_protocols specifies the allowable protocols for an OpenSSL TLS session. The available protocols are
TLSv1.2. Each set can be enabled or disabled by prefixing its name with a “+” or “-“ respectively. The following example shows the SSLv2 and SSLv3 protocols being disabled:
TLS_Protocols = "+ALL:-SSLv2:-SSLv3"
This option has no meaning for GNUTLS.
The default value is “+ALL”.
In Centos/RHEL 5, which are typically shipped with OpenSSL 0.98, TLSv1.1 and TLSv1.2 are not available.
tls_ciphers is valid in the binding, binding_group, domain, ecstream_listener, esmtp_listener, global, http_listener, listen, pathway, pathway_group and peer scopes.