I'm running this f/w -
Device TypeIPC-HFW5231E-Z
System VersionV2.800.0000005.0.R, Build Date: 2019-03-25
Unfortunately I could not get wireshark working for me to get a capture. Promiscuous mode was enabled by default. Not sure if my NIC supports that mode (an Intel I219-V, with latest updated drivers).
OpenSSL 1.1.1, which supports TLS 1.3, seems to agree:
$ openssl s_client -tls1_3 -connect smtp.gmail.com:587 -starttls smtp
CONNECTED(00000003)
---
<CUT>
---
SSL handshake has read 3033 bytes and written 351 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
250 SMTPUTF8
If I force tls 1.2 and set TLS_FALLBACK_SCSV, I then get the same error as the packet capture from the camera:
$ openssl s_client -tls1_2 -connect smtp.gmail.com:587 -fallback_scsv -starttls smtp
CONNECTED(00000003)
140147300115456:error:1409443E:SSL routines:ssl3_read_bytes:tlsv1 alert inappropriate fallback:ssl/record/rec_layer_s3.c:1536:SSL alert number 86
Thanks, let's wait for further news from dahua, any firmware updated i will let guys know here.Via this post, from Dahua support:
Thank you for your information, your case number 648255
In regards to your issue, Google email TLS protocol has been updated. Therefore, we are having compatibility issues. Because multiply product lines involve in this issue, they will give us the firmware fix and upgrade plan probably tomorrow.
We will keep you update Avi,
not the best time of the year... leaving on holiday in a few... hurry up Dahua!