Key-Exchange-Method-IMAPS/EN/Consequence
Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used to read out mail content and misuse them for criminal purposes.
Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used to read out mail content and misuse them for criminal purposes.