email notify

eboman

n3wb
Joined
Jun 9, 2019
Messages
8
Reaction score
4
Location
NL
I got a capture by using my windows machine by using and iphone hotspot and enable internet sharing, seems google indeed denies the TLS CLient hello from the Dahua.
After which the session is closed. So either they broke something or they are no longer supporting a certain cipher not present on the dahua.
View attachment 43382 View attachment 43383
Also tried the SSL option on port 465, but this one gives the same TLS error.

Maybe we can get dahua's attention via Andy ?
 

redfive

Pulling my weight
Joined
Apr 13, 2016
Messages
509
Reaction score
205
Which firmware is running on the device ?
 

alastairstevenson

Staff member
Joined
Oct 28, 2014
Messages
15,930
Reaction score
6,778
Location
Scotland
they are no longer supporting a certain cipher not present on the dahua.
i think you are correct there - though I've not checked any Gmail announcements to that effect.
Summary from here : RFC 7507 - TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks
1. Introduction

To work around interoperability problems with legacy servers, many
TLS client implementations do not rely on the TLS protocol version
negotiation mechanism alone but will intentionally reconnect using a
downgraded protocol if initial handshake attempts fail. Such clients
may fall back to connections in which they announce a version as low
as TLS 1.0 (or even its predecessor, Secure Socket Layer (SSL) 3.0)
as the highest supported version.

While such fallback retries can be a useful last resort for
connections to actual legacy servers, there's a risk that active
attackers could exploit the downgrade strategy to weaken the
cryptographic security of connections. Also, handshake errors due to
network glitches could similarly be misinterpreted as interaction
with a legacy server and result in a protocol downgrade.
 

redfive

Pulling my weight
Joined
Apr 13, 2016
Messages
509
Reaction score
205
Did you allow, the less secure apps, for that gmail account ? Just tried a couple of tcpdupms, and reading the output with wireshark, seems that the client uses TLS1.0, but working here (using smtp.gmail.com, as well as the ip address in your capture)....
 

JulieD

Young grasshopper
Joined
Mar 21, 2019
Messages
32
Reaction score
12
Location
NZ
Version
V2.800.0000004.0.R, Build Date: 2019-01-22
On
IPC-HDW2231R-ZS

Same issue.
 

GGG

n3wb
Joined
Nov 6, 2017
Messages
7
Reaction score
1
I have 9 Dahua Cameras and 1 NVR. 4 months ago i started having problems sending emails. I changed port and from SSL went to TLS and it worked. After 1 month same problem. Changed port again and went back to SSL and it worked. Past 14 days I am having issues again. Cannot sent emails and what ever I do I get Email test failed. I tried Gmail, yahoo same issue. I tried to upgrade firmware on NVR but problem not fixed. I checked all settings in gmail with no luck either. I suddenly realised that its not gmail, its not my ISP. 1 of my cameras is sending out emails but all other 8 and NVR are not. This is really strange and as you guys still looking for an answer. Perhaps Dahua is using a server of its own to send out the emails? Its really strange. The working camera has same firmware as 2 other cameras that are not working.
 

GGG

n3wb
Joined
Nov 6, 2017
Messages
7
Reaction score
1
The underline model below is the one that is working fine. Perhaps there is something on the specific model? Anyone has same model?

1 Private IPC-HFW5431E-Z 1 Private IPC-HDBW4431R-AS 1 Private IPC-HDW4433C-A 1 Private DH-IPC-AW12WP 1 Private IPC-HFW1220S 1 Private IPC-HDBW4431R-AS 1 Private IPC-HDBW4431R-AS 1 Private IPC-HDBW4431R-AS 1 Private IPC-HDBW1220E 1 Private IPC-HDW4431C-A-V2 1 Private IPC-A46 1 Private IPC IPC-HDW4431C-A
 

freshcoast

n3wb
Joined
Aug 21, 2017
Messages
8
Reaction score
15
I posted in another thread as well, but I'm having the same issue. Emails stopped from Dahua and Amcrest cameras on June 6th. I'm using GSuite and allowing lesser security apps. As mentioned, my FreeNAS server has no issue sending emails via the same account, so it's something to do with the content of the emails, or the SMTP connection from the cameras. Looking at the emails I receive though, both the FreeNAS and cameras seem to be using the same TLS cipher, version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128. I'll see if I can get a capture of the working case for comparison.
 

Valiant

Pulling my weight
Joined
Oct 30, 2017
Messages
305
Reaction score
174
Location
Australia
I'm running this f/w -

Device TypeIPC-HFW5231E-Z
System VersionV2.800.0000005.0.R, Build Date: 2019-03-25

Unfortunately I could not get wireshark working for me to get a capture. Promiscuous mode was enabled by default. Not sure if my NIC supports that mode (an Intel I219-V, with latest updated drivers).
 

JulieD

Young grasshopper
Joined
Mar 21, 2019
Messages
32
Reaction score
12
Location
NZ
Yes it was June 6 at 19:00 pm (New Zealand time which is about 18 hours ahead of US time) that all five of my
IPC-HDW2231R-ZS
Version
V2.800.0000004.0.R, Build Date: 2019-01-22
ceased to work with gmail, port 587, tls, insecure apps enabled, no nvr, just straight from the cams. With me it is gmail only that does not work. Yahoo and my isp smtp server does work. I'll grab Wireshark in the next day or so and see if the error is the same one as above (insufficient fallback).

The gmail account itself is fine otherwise and a brand new gmail account didn’t work either, neither does my work gsuite account (insecure apps enabled) and neither does a 2fa enabled gmail account with an app specific password.

Well, can't use wireshark, no port mirroring on my switch. This is frustrating...
 
Last edited:

freshcoast

n3wb
Joined
Aug 21, 2017
Messages
8
Reaction score
15
I got two captures, one from a Dahua and one from a FreeNAS server. For the camera I get the same error as ebowman showed in the wireshark screenshot, the server rejects the TLS handshake. Based on my limited understanding, here's my theory:

Google has probably upgraded their SMTP servers to TLS 1.3. Dahua is using TLS 1.2 (like most). In the TLS Client Hello message (the protocol handshake), Dahua is sending TLS_FALLBACK_SCSV as one of the ciphers. This is wrong:

The TLS_FALLBACK_SCSV cipher suite value is meant for use by clients that repeat a connection attempt with a downgraded protocol (perform a "fallback retry") in order to work around interoperability problems with legacy servers.​

According to the RFC, the server must reject the handshake if TLS_FALLBACK_SCSV is included in the cipher list and the server supports a later version of TLS:

If TLS_FALLBACK_SCSV appears in ClientHello.cipher_suites and the highest protocol version supported by the server is higher than the version indicated in ClientHello.client_version, the server MUST respond with a fatal inappropriate_fallback alert​

TLS_FALLBACK_SCSV is only appropriate for clients to use for repeated connections when downgrading the TLS version. This is not that case, it is the initial connect, thus the connect is rejected. The above quotes are from rfc7507 section 3.

I also found a commit to a google project that has a readable description of this problem.

TLS_FALLBACK_SCSV protects against downgrade attacks when clients implement a version fallback independent of TLS version negotiation, but if it's set on a non-fallback connection attempt, it will prevent an otherwise-safe connection if the
server supports a version higher than the client does. Because the default OpenJDK TLS implementation doesn't support TLS_FALLBACK_SCSV, some developers mistakenly enable it on every connection due to thinking it's a normal cipher suite, which is starting to cause issues when servers upgrade to TLS 1.3.​

For comparison, my FreeNAS box is not sending TLS_FALLBACK_SCSV, which would explain why it works.

Dahua probably needs to update their code to make proper TLS connections.

From the packet capture, here is the TLC Client Hello info sent to the smtp server:
Handshake Protocol: Client Hello
Handshake Type: Client Hello (1)
Length: 264
Version: TLS 1.2 (0x0303)
Random: df745fc725b80557ad2840f6c179ae7e75f4c9fc02de6d99…
Session ID Length: 0
Cipher Suites Length: 142
Cipher Suites (71 suites)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
Cipher Suite: TLS_DH_DSS_WITH_AES_256_GCM_SHA384 (0x00a5)
Cipher Suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 (0x00a3)
Cipher Suite: TLS_DH_RSA_WITH_AES_256_GCM_SHA384 (0x00a1)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b)
Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x006a)
Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA256 (0x0069)
Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA256 (0x0068)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x0038)
Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA (0x0037)
Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA (0x0036)
Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0088)
Cipher Suite: TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0087)
Cipher Suite: TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0086)
Cipher Suite: TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0085)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 (0xc032)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02e)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 (0xc02a)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 (0xc026)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (0xc00f)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (0xc005)
Cipher Suite: TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
Cipher Suite: TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0084)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
Cipher Suite: TLS_DH_DSS_WITH_AES_128_GCM_SHA256 (0x00a4)
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 (0x00a2)
Cipher Suite: TLS_DH_RSA_WITH_AES_128_GCM_SHA256 (0x00a0)
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x0040)
Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA256 (0x003f)
Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA256 (0x003e)
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032)
Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA (0x0031)
Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA (0x0030)
Cipher Suite: TLS_DHE_RSA_WITH_SEED_CBC_SHA (0x009a)
Cipher Suite: TLS_DHE_DSS_WITH_SEED_CBC_SHA (0x0099)
Cipher Suite: TLS_DH_RSA_WITH_SEED_CBC_SHA (0x0098)
Cipher Suite: TLS_DH_DSS_WITH_SEED_CBC_SHA (0x0097)
Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0045)
Cipher Suite: TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA (0x0044)
Cipher Suite: TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0043)
Cipher Suite: TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA (0x0042)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 (0xc031)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02d)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 (0xc029)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 (0xc025)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (0xc00e)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (0xc004)
Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
Cipher Suite: TLS_RSA_WITH_SEED_CBC_SHA (0x0096)
Cipher Suite: TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0041)
Cipher Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Cipher Suite: TLS_FALLBACK_SCSV (0x5600)
Compression Methods Length: 1
Compression Methods (1 method)
Extensions Length: 81
Extension: ec_point_formats (len=4)
Extension: supported_groups (len=28)
Extension: signature_algorithms (len=32)
Extension: heartbeat (len=1)​

Since it isn't a fallback connection, it shouldn't include TLS_FALLBACK_SCSV.

Here's the wireshark TLS error returned by Google:

Transport Layer Security
TLSv1.2 Record Layer: Alert (Level: Fatal, Description: Inappropriate Fallback)
Content Type: Alert (21)
Version: TLS 1.2 (0x0303)
Length: 2
Alert Message
Level: Fatal (2)
Description: Inappropriate Fallback (86)​
 

freshcoast

n3wb
Joined
Aug 21, 2017
Messages
8
Reaction score
15
OpenSSL 1.1.1, which supports TLS 1.3, seems to agree:

$ openssl s_client -tls1_3 -connect smtp.gmail.com:587 -starttls smtp
CONNECTED(00000003)
---
<CUT>
---
SSL handshake has read 3033 bytes and written 351 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
250 SMTPUTF8


If I force tls 1.2 and set TLS_FALLBACK_SCSV, I then get the same error as the packet capture from the camera:

$ openssl s_client -tls1_2 -connect smtp.gmail.com:587 -fallback_scsv -starttls smtp
CONNECTED(00000003)
140147300115456:error:1409443E:SSL routines:ssl3_read_bytes:tlsv1 alert inappropriate fallback:ssl/record/rec_layer_s3.c:1536:SSL alert number 86
 

JulieD

Young grasshopper
Joined
Mar 21, 2019
Messages
32
Reaction score
12
Location
NZ
Turns out my router captures and opens in wireshark, so yeah I can confirm my five cams get the same tls fallback error.
Transport Layer Security
TLSv1.2 Record Layer: Alert (Level: Fatal, Description: Inappropriate Fallback)
Content Type: Alert (21)
Version: TLS 1.2 (0x0303)
Length: 2
Alert Message
Level: Fatal (2)
Description: Inappropriate Fallback (86)


Transport Layer Security
TLSv1.2 Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.0 (0x0301)
Length: 268
Handshake Protocol: Client Hello
Handshake Type: Client Hello (1)
Length: 264
Version: TLS 1.2 (0x0303)
Random: bcb14d43b591022e33bcfea90d05e7a543a2400b21e317ed…
Session ID Length: 0
Cipher Suites Length: 142
Cipher Suites (71 suites)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
Cipher Suite: TLS_DH_DSS_WITH_AES_256_GCM_SHA384 (0x00a5)
Cipher Suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 (0x00a3)
Cipher Suite: TLS_DH_RSA_WITH_AES_256_GCM_SHA384 (0x00a1)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b)
Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x006a)
Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA256 (0x0069)
Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA256 (0x0068)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x0038)
Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA (0x0037)
Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA (0x0036)
Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0088)
Cipher Suite: TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0087)
Cipher Suite: TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0086)
Cipher Suite: TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0085)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 (0xc032)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02e)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 (0xc02a)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 (0xc026)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (0xc00f)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (0xc005)
Cipher Suite: TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
Cipher Suite: TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0084)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
Cipher Suite: TLS_DH_DSS_WITH_AES_128_GCM_SHA256 (0x00a4)
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 (0x00a2)
Cipher Suite: TLS_DH_RSA_WITH_AES_128_GCM_SHA256 (0x00a0)
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x0040)
Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA256 (0x003f)
Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA256 (0x003e)
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032)
Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA (0x0031)
Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA (0x0030)
Cipher Suite: TLS_DHE_RSA_WITH_SEED_CBC_SHA (0x009a)
Cipher Suite: TLS_DHE_DSS_WITH_SEED_CBC_SHA (0x0099)
Cipher Suite: TLS_DH_RSA_WITH_SEED_CBC_SHA (0x0098)
Cipher Suite: TLS_DH_DSS_WITH_SEED_CBC_SHA (0x0097)
Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0045)
Cipher Suite: TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA (0x0044)
Cipher Suite: TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0043)
Cipher Suite: TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA (0x0042)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 (0xc031)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02d)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 (0xc029)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 (0xc025)
Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (0xc00e)
Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (0xc004)
Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
Cipher Suite: TLS_RSA_WITH_SEED_CBC_SHA (0x0096)
Cipher Suite: TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0041)
Cipher Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Cipher Suite: TLS_FALLBACK_SCSV (0x5600)
Compression Methods Length: 1
Compression Methods (1 method)
Extensions Length: 81
Extension: ec_point_formats (len=4)
Extension: supported_groups (len=28)
Extension: signature_algorithms (len=32)
Extension: heartbeat (len=1)
 
Last edited:

GGG

n3wb
Joined
Nov 6, 2017
Messages
7
Reaction score
1
Guys i finally managed to send emails out from NVR and CAMERAS. Even if i had one camera that could send through my Gmail account its strange that others couldn't.
I ve created an outlook.com free email account thgouth Microsoft and i enabled pop in the settings
Then i setup my NVR and CAMERAS with Outlook.com pop settings and than was it. Email notifications are working !!!!!!

Hope this helps you too.
 

GGG

n3wb
Joined
Nov 6, 2017
Messages
7
Reaction score
1
problem is back. my outlook.com account is locked due to violation of the policy. GREATTTTTTTTTTT
 

freshcoast

n3wb
Joined
Aug 21, 2017
Messages
8
Reaction score
15
problem is back. my outlook.com account is locked due to violation of the policy. GREATTTTTTTTTTT
Is your account locked, or did you just hit a daily quota limit? It seems outlook.com is a bit more restrictive when it comes to email sending limits, especially for new accounts. Limits are based on your "profile strength" or reputation as a way to fight spam. A new account will have a low score and thus more restrictions. You can try to improve your profile with some advice here. I could not actually find what the limits actually are.
 
Top