OpenSSL has the ability to pass configuiration for the server side prefered ciphers, for example: ssl_ciphers ECDH+AESGCM:ECDH+CHACHA20:ECDH+AES256:ECDH+AES128:!aNULL and includes a specifier !AESCCM which removes those from the list. There isn't a way to say 'no Cipher Block Chaining...
Using built version (built in /opt/ssldevel) of openssl 1.1.1-tls1.3-draft-18 (source code downloaded with the command: "git clone -b tls1.3-draft-18 --single-branch https://github.com/openssl/openssl.git /path/openssl-1.1.1-tls1.3-draft-18") I was not able to test ciphers by co...