I have a device that functions as a server and uses OpenSSL - it supports SSLv3 and TLS 1.0. That same device also functions as a client to some other servers - I am trying to see if I can downgrade the connection from the device to SSLv3 (a connection to a server which supports SSLv3).
I am having some trouble and I suspect (but am not sure) that the device does not support SSLv3 as a client - only as a server. I have this .pcap capture file uploaded on CloudShark (it's anonymized so 0.0.0.0 is the device, 1.1.1.1 is me - functioning as a MITM and 2.2.2.2 is the server) which shows that when I am trying to simply change the protocol version in the TLS 1.0 handshake to show that SSLv3 is the highest supported I get an error - but not on the server, rather on the device itself!
This was surprising to me and I am wondering if the Handshake Error (40) indicates that the device does not support SSLv3 or maybe some other error that is possible to bypass.
Any knowledge in the subject or way I can go about downgrading the connection will be much appreciated.
Note: The checksum and some other parameters will occur as invalid because I modified the packets to keep the anonymity - so ignore the checksum. Also, in the pcap file the failed interaction is shown multiple times in multiple different tries.