diff -pruN 0.5.6-1/debian/changelog 0.5.6-1ubuntu1/debian/changelog
--- 0.5.6-1/debian/changelog	2021-01-01 15:20:51.000000000 +0000
+++ 0.5.6-1ubuntu1/debian/changelog	2021-04-08 10:46:23.000000000 +0000
@@ -1,3 +1,11 @@
+interimap (0.5.6-1ubuntu1) hirsute; urgency=medium
+
+  * On Ubuntu, to access TLS less than 1.2 one needs to also lower the
+    security level to 1. Lower it to zero, because in the future openssl
+    release zero will be needed.
+
+ -- Dimitri John Ledkov <xnox@ubuntu.com>  Thu, 08 Apr 2021 11:46:23 +0100
+
 interimap (0.5.6-1) unstable; urgency=high
 
   * New upstream bugfix release with the correct minimum Net::SSLeay version.
diff -pruN 0.5.6-1/debian/control 0.5.6-1ubuntu1/debian/control
--- 0.5.6-1/debian/control	2021-01-01 15:20:51.000000000 +0000
+++ 0.5.6-1ubuntu1/debian/control	2021-04-08 10:46:23.000000000 +0000
@@ -1,7 +1,8 @@
 Source: interimap
 Section: mail
 Priority: optional
-Maintainer: Guilhem Moulin <guilhem@debian.org>
+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
+XSBC-Original-Maintainer: Guilhem Moulin <guilhem@debian.org>
 Build-Depends: debhelper-compat (= 13),
                dovecot-imapd (>= 1:2.3~) <!nocheck>,
                dovecot-lmtpd (>= 1:2~) <!nocheck>,
diff -pruN 0.5.6-1/debian/patches/seclevel-zero.patch 0.5.6-1ubuntu1/debian/patches/seclevel-zero.patch
--- 0.5.6-1/debian/patches/seclevel-zero.patch	1970-01-01 00:00:00.000000000 +0000
+++ 0.5.6-1ubuntu1/debian/patches/seclevel-zero.patch	2021-04-08 10:46:23.000000000 +0000
@@ -0,0 +1,47 @@
+Description: set seclevel to zero
+ On Ubuntu, to access TLS less than 1.2 one needs to also lower the
+ security level to 1. Lower it to zero, because in the future openssl
+ release zero will be needed.
+Author: Dimitri John Ledkov <xnox@ubuntu.com>
+
+
+Index: interimap-0.5.6/tests/tls-protocols/openssl.cnf
+===================================================================
+--- interimap-0.5.6.orig/tests/tls-protocols/openssl.cnf
++++ interimap-0.5.6/tests/tls-protocols/openssl.cnf
+@@ -11,4 +11,4 @@ system_default = system_default_sect
+ 
+ [system_default_sect]
+ MinProtocol = None
+-CipherString = DEFAULT
++CipherString = DEFAULT@SECLEVEL=0
+Index: interimap-0.5.6/tests/tls-ciphers/t
+===================================================================
+--- interimap-0.5.6.orig/tests/tls-ciphers/t
++++ interimap-0.5.6/tests/tls-ciphers/t
+@@ -7,14 +7,14 @@ with_remote_config() {
+ 
+ with_remote_config <<-EOF
+ 	SSL_protocol_max = TLSv1.2
+-	SSL_cipherlist = DHE-RSA-AES128-SHA256:ALL:!COMPLEMENTOFDEFAULT:!eNULL
++	SSL_cipherlist = DHE-RSA-AES128-SHA256:ALL@SECLEVEL=0:!COMPLEMENTOFDEFAULT:!eNULL
+ EOF
+ interimap --debug || error
+ grep -Fx "remote: SSL cipher: DHE-RSA-AES128-SHA256 (128 bits)" <"$STDERR" || error
+ 
+ with_remote_config <<-EOF
+ 	SSL_protocol_max = TLSv1.2
+-	SSL_cipherlist = NONEXISTENT:ECDHE-RSA-AES256-SHA384:ALL:!COMPLEMENTOFDEFAULT:!eNULL
++	SSL_cipherlist = NONEXISTENT:ECDHE-RSA-AES256-SHA384:ALL@SECLEVEL=0:!COMPLEMENTOFDEFAULT:!eNULL
+ 	SSL_ciphersuites = TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256
+ EOF
+ interimap --debug || error
+Index: interimap-0.5.6/tests/config/dovecot/ssl.conf
+===================================================================
+--- interimap-0.5.6.orig/tests/config/dovecot/ssl.conf
++++ interimap-0.5.6/tests/config/dovecot/ssl.conf
+@@ -3,3 +3,4 @@ ssl_cert = <dovecot.rsa.crt
+ ssl_key = <dovecot.rsa.key
+ ssl_dh = <dhparams.pem
+ ssl_min_protocol = TLSv1
++ssl_cipher_list = DEFAULT@SECLEVEL=0
diff -pruN 0.5.6-1/debian/patches/series 0.5.6-1ubuntu1/debian/patches/series
--- 0.5.6-1/debian/patches/series	2021-01-01 15:20:51.000000000 +0000
+++ 0.5.6-1ubuntu1/debian/patches/series	2021-04-08 10:46:23.000000000 +0000
@@ -1,2 +1,3 @@
 Mention-the-Debian-BTS-in-the-manpages.patch
 Skip-randomized-tests.patch
+seclevel-zero.patch
