According to https://test.drownattack.com/?site=126.96.36.199 developer.kde.org provides mail services via SSLv2 using the same SSL certificate as kde.org does.
These servers reusing the same RSA keys render the SSL encryption vulnerable to the DROWN attack. https://drownattack.com/drown-attack-paper.pdf
I guess you should use http://sysadmin.kde.org/tickets/ so that system administrator actually see this. I'll add some people here just in case though.
We're in the process of replacing this certificate now, so I consider this issue resolved (or soon to be resolved).