I'm not sure how it would affect non-http email services / handshakes exactly; Apache does give you options to accept various levels of SSL/TLS versions you can accept concurrently (with the ability to securely downgrade the connection if, say, you're using TLS 1.2 but someone wants to connect via 1.1 or 1.0), as well as either explicitly specifying the ciphers the server uses (or just more general categories of 'High' 'Medium' etc). The current ciphers with stronger generally-accepted key exchanges use DHE with Elliptical Curves (ECDHE) which are all currently strong with TLS 1.2:
ECDHE-ECDSA-AES256-GCM-SHA384
ECDHE-RSA-AES256-GCM-SHA384
ECDHE-ECDSA-CHACHA20-POLY1305
ECDHE-RSA-CHACHA20-POLY1305
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-ECDSA-AES256-SHA384
ECDHE-RSA-AES256-SHA384
ECDHE-ECDSA-AES128-SHA256
ECDHE-RSA-AES128-SHA256
OpenSSL is planning their 1.1.1 release April 5th to support TLS 1.3 (
https://www.thesslstore.com/blog/openss ... 3-april-5/); obvs most devs are going to require some time to build the protocol into their releases so it'll be awhile before it's commonplace, but I was hoping we could get at least the ECDHE ciphers as AMS/AFS options...