Unfortunately I don't think this is going to get fixed.
I'm already looking to upgrade out IMAP server, which should have the latest protocols that Mail.app will accept. The problem (and I'm still not 100% sure about this until I have some time to setup the lab IMAP server and verify) has to do with older servers using deprecate digests and cyphers. I doubt Apple is going to go back on this.
If this is indeed is about not allowing deprecate encryption than it IS really sad. I agree that this should be a user/admin choice, not forced down our throats like some infant who doesn't want to eat his vegetables.
Here's what the logs from a working 10.9.5 Mail.app look like (connection doctor):
READ Jul 02 14:58:51.288 [kCFStreamSocketSecurityLevelTLSv1_0] -- host:postoffice.inksystems.com -- port:587 -- socket:0x6000006d6ea0 -- thread:0x608000261a80
235 2.0.0 OK Authenticated
WROTE Jul 02 14:58:51.288 [kCFStreamSocketSecurityLevelTLSv1_0] -- host:postoffice.inksystems.com -- port:587 -- socket:0x6000006d6ea0 -- thread:0x608000261a80
QUIT
INITIATING CONNECTION Jul 02 14:58:57.327 host:postoffice.inksystems.com -- port:587 -- socket:0x0 -- thread:0x608001069780
CONNECTED Jul 02 14:58:57.343 [kCFStreamSocketSecurityLevelNone] -- host:postoffice.inksystems.com -- port:587 -- socket:0x6080006d3b00 -- thread:0x608001069780
READ Jul 02 14:58:57.355 [kCFStreamSocketSecurityLevelNone] -- host:postoffice.inksystems.com -- port:587 -- socket:0x6080006d3b00 -- thread:0x608001069780
220 postoffice.inksystemsinc.com ESMTP Sendmail 8.14.2/8.14.2; Thu, 2 Jul 2015 14:58:57 -0700
WROTE Jul 02 14:58:57.371 [kCFStreamSocketSecurityLevelNone] -- host:postoffice.inksystems.com -- port:587 -- socket:0x6080006d3b00 -- thread:0x608001069780
EHLO [12.238.189.78]
READ Jul 02 14:58:57.372 [kCFStreamSocketSecurityLevelNone] -- host:postoffice.inksystems.com -- port:587 -- socket:0x6080006d3b00 -- thread:0x608001069780
250-postoffice.inksystemsinc.com Hello [12.238.189.78], pleased to meet you
250-ENHANCEDSTATUSCODES
250-PIPELINING
250-8BITMIME
250-SIZE
250-DSN
250-AUTH GSSAPI
250-STARTTLS
250-DELIVERBY
250 HELP
WROTE Jul 02 14:58:57.372 [kCFStreamSocketSecurityLevelNone] -- host:postoffice.inksystems.com -- port:587 -- socket:0x6080006d3b00 -- thread:0x608001069780
STARTTLS
READ Jul 02 14:58:57.373 [kCFStreamSocketSecurityLevelNone] -- host:postoffice.inksystems.com -- port:587 -- socket:0x6080006d3b00 -- thread:0x608001069780
220 2.0.0 Ready to start TLS
The problem is at the end of this process 10.10.4 no longer responds, as if it can not negotiate the cypher to use.
Not that I don't get that DH 512 is now easily hackable, but I mean, do I really care? Our email information is not that important that a hacker would go to all the trouble to setup a man in the middle attack, and we really have nothing to hide form the likes of the NSA so, what's the big deal ??