Note in recent OpenSSL, SSLV3 is dropped for security reasons. So if you MUST use SSLV3 - which I highly warn against - use an old version of OpenSSL. SSLV3 is an absolute no-no, except for a local network,maybe.
In the latest (any, not only openssl) crypto libraries, there is even no fall-back to sslv3. Don't use it.
So: Like the advice before: Check if your server supports sslv3! I really hope for your sake it doesn't.
You can recompile OpenSSL yourself to support it, but I won't do that ever,never. And it is announced they will remove the code in the future.
Try TLS 1.2 instead. Most servers still support a fall-back to sslv2, btw (also compromized, but not nearly as insecure as sslv3). Google on "poodle attack" and "disable sslv3" and check the write up on wikipedia.
If you don't fully understand crypto issues, just trust me, it is sound advice from an expert.
BTW: (last edit) Synapse supports TLS1.2.
(Absolute last edit) Most recent browsers and email clients have sslv3 disabled by default.