What's new

Bypass ERR_SSL_VERSION_OR_CIPHER_MISMATCH

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

sentinelvdx

Very Senior Member
Hi,

I have not so old TP-Link IP cameras I want to access their config., but I'm unable to do it because of this error.
Any help on how can I bypass it with Chrome/Edge/Firefox?

Thanks in advance,
 
Most browsers have hidden settings that allow you to re-enable old protocols such as SSLv3. You will have to look the documentation for your specific browser.
 
Most browsers have hidden settings that allow you to re-enable old protocols such as SSLv3. You will have to look the documentation for your specific browser.
Thanks, I'll do some research on where to find it.
 
@sentinelvdx
As @Merlin hints at its to do with older methods of encryption.

To See Cipher Suites: https://browserleaks.com/ssl

If you are unable to cat > out the conf in via SSH from the camera.?
If you are able to revert to using older security protocols from within browser settings via chrome://flags in the address bar. Search for TLS using the search bar at the top. The results will include the TLS 1.3 downgrade hardening options

Disable QUIC Protocol​

Chrome has many security settings, and “Experimental QUIC Protocol” can be the cause of the err_ssl_version_or_cipher_mismatch error.

To disable the QUIC protocol in Chrome:

In the address bar type in chrome://flags. In the search bar at the top, enter QUIC. The search results should list “Experimental QUIC protocol.”

Change from Default to Disabled, restart Chrome, and try loading the website again.

Then clear SSL State on system

Clear the SSL State on your Computer.​

To clear the SSL state on your computer, go directly to the “Internet Properties” section. The quickest way in Windows 10 is to search for “Internet Properties” or “Internet Options” from the Start menu.


to gain initial access then go back in to regrade with latest certs??

From what I gather there has been a shift away from using DHE in TLS1.3 cypher suites / chains. [See Arbitrary Diffie-Hellman groups: CVE-2016-0701]
Also there has been complete drop of RC4 stream cipher: [See: Not secure for use in HTTPS ]

For creating a SSL with v3 extentions SNI [not to be confused with multi-domain SAN]
See this on X.509 v3 certificate specifically with SAN section.

As a Primer This may help:

The Problem:
I am dealing with slightly different (yet similar) issue as this.
As of the latest chrome updates and general move to stronger forms of encryption, as in TLS 1.3 it causes problems for older devices (embedded or otherwise setup to admin GUI over HTTPS being on old versions of SSL certificates,etc)
Changes in the Cipher suite ordering of the ciphers which are used in previous TLS mechinisms have changed (or been found to be insecure and dropped (see above)) which maybe as to why your device is throwing this error.

You may find some helpful information with changes in this read: HTTP Strict Transport Security (HSTS) and TLS1.3. [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security#description]

I susupect this has a fair bit to do with the transition over to TLS1.3 and dropping of previous cypher suite used in previous TLS Schemes... "RC4" being one such portion of the cypher ring which in TLS1.3 has been done away with.

in comments:
Im using spring boot 1.8 and my machine has Java 9-internal. I added these SSL_RSA_WITH_RC4_128_MD5,SSL_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA cyphers it tends to work but it disabled seems to be disabled DHE
and
(1) Oracle j9 does not say 'internal' and does support ECDHE (and other EC), and I'm pretty sure but can't easily check OpenJDK also, so I don't know what you have (2) don't use (any suite including) RC4; it's been seriously weakened by attacks over the past decade or so and officially prohibited since 2015 by RFC7465 (3) yes, if you configure only non-DHE suites, it disables DHE; if you want both DHE (for other clients) and non-DHE (for Chrome) suites configure both of them. To make Chrome somewhat happier, configure at least some (nonDHE) AES+GCM suites (it prefers AEAD over CBC)

How to confirm this is cause of your issue? ..is unknown but based on my own past pains trying to figure this all out I hazard a guess this post should help put you on the right path..

TESTED using following dumb luck.:
Only that in generating SSL certs based on cypher-chains using DHE and then generating certs derrived from my own PKI CA based certs using X509 v3 SNI certs and then cross validating PKI CA derrived from those without using either of DH OR ECDHE Elliptic Curve Diffie-Hellman Ephemeral the problem goes away and I no longer see this error thrown anymore during deployment testing, which makes me confident the OP issue could very well be the same issue I tackled only but a few weeks back. -

I am unsure about how exactly each of the three browsers impliments Standards or put differently which are strict on enforcing standards compliance and which are allowing graceful bypass (for a period) and which are not.
To maybe help Keep It Simple (..and your Sanity) run your testing via one browser initially like Chrome then if it works move over to Edge/FF rinse & repeat.

Tools (& Guides) you may find helpful.
[XCA v2.4.0 Download: https://hohnstaedt.de/xca/index.php/download]
XCA Step By Step guide into PKI / CA and Self Cert chaining

[Solution #2]
Solution to your problem (Hopefully!) https://phoenixnap.com/kb/fix-err-ssl-version-or-cipher-mismatch#ftoc-heading-7
 
Last edited:

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top