Folks,
Having a greater need to go through PCI compliance lately, and have plugged basically every hole save for AMS; I realize updating to TLS 1.3 / OpenSSL 1.1.1 / 3.0 is a big (but necessary) update, but I'm wondering if there's a simpler option update that may help us in the meantime;
I'm really only getting dinged for old encryption ciphers being available in AMS (even though they may be further down the list than the more robust ones offered, which is typical), and for what we're doing I would probably be ok in the interim if I could disable the oldest ciphers within AMS to remove them from being offered by the server.
So going along with what would likely end up being AMS 5.0, can we maybe get an update to 4.2.x that has an option tab where we can pick from available ciphers and enable / disable them, and/or do so via a settings .ini file? That would provide a lot more flexibility in case some admins need a much tighter or looser environment depending on what they're doing.
I also run Jive Networks' Openfire server for XMPP / messaging, and they have a chooser where one window has all the Enabled ciphers, and the other window has all the ones the server can support but aren't enabled (you just move them back and forth). This way, with each future backend update of AMS that includes an OpenSSL update, we can adjust which ciphers are available over time as standards tighten and new ones become available.