Tapo C230 - after firmware update to 1.4.2 home assistant not working

Tapo C230 - after firmware update to 1.4.2 home assistant not working

Tapo C230 - after firmware update to 1.4.2 home assistant not working
Tapo C230 - after firmware update to 1.4.2 home assistant not working
2025-12-20 06:40:06 - last edited 2026-01-08 02:47:48
Model: Tapo C230  
Hardware Version: V1
Firmware Version: 1.4.2
After update of the firmware to 1.4.2 Home Assistant can't connect with the offical integration, error:

Failed setup, will retry: Unable to communicate with the device connect: ('Device connection error: 192.168.x.x: Cannot connect to host 192.168.x.x:443 ssl:<ssl.SSLContext object at 0x7f16163c34d0> [[SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] ssl/tls alert handshake failure (_ssl.c:1032)]', ClientConnectorSSLError(ConnectionKey(host='192.168.x.x', port=443, is_ssl=True, ssl=<ssl.SSLContext object at 0x7f16163c34d0>, proxy=None, proxy_auth=None, proxy_headers_hash=None), SSLError(1, '[SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] ssl/tls alert handshake failure (_ssl.c:1032)')))

 

also on HA site there is a report: https://github.com/home-assistant/core/issues/156926

 

please fix the issue or provide downgrade instructions

  4      
  4      
#1
Options
1 Accepted Solution
Re:Tapo C230 - after firmware update to 1.4.2 home assistant not working-Solution
2025-12-22 09:25:04 - last edited 2026-01-08 02:47:48

  @MaggusE  @gex 

Hi,
1. On the Tapo app > Me > Tapo Lab > Third-Party Compatibility page, please enable it and check if your Tapo Camera can connect to Home Assistant. Please note that TP-Link has not officially advertised support for Home Assistant, so enabling this feature does not guarantee seamless integration. If you still encounter issues after enabling compatibility, we recommend contacting Home Assistant for further assistance.

 

2. If you want to stream the camera on Home Assistant via RTSP/ONVIF connection, please refer to the instructions below to establish the connection.
How to view Tapo camera on PC/NAS/NVR through RTSP/Onvif Protocol

Best Regards
 

Recommended Solution
  1  
  1  
#4
Options
5 Reply
Re:Tapo C230 - after firmware update to 1.4.2 home assistant not working
2025-12-20 09:41:22
The same problem occurred with the C201 after upgrading to version 1.3.1.
  0  
  0  
#2
Options
Re:Tapo C230 - after firmware update to 1.4.2 home assistant not working-Solution
2025-12-22 09:25:04 - last edited 2026-01-08 02:47:48

  @MaggusE  @gex 

Hi,
1. On the Tapo app > Me > Tapo Lab > Third-Party Compatibility page, please enable it and check if your Tapo Camera can connect to Home Assistant. Please note that TP-Link has not officially advertised support for Home Assistant, so enabling this feature does not guarantee seamless integration. If you still encounter issues after enabling compatibility, we recommend contacting Home Assistant for further assistance.

 

2. If you want to stream the camera on Home Assistant via RTSP/ONVIF connection, please refer to the instructions below to establish the connection.
How to view Tapo camera on PC/NAS/NVR through RTSP/Onvif Protocol

Best Regards
 

Recommended Solution
  1  
  1  
#4
Options
Re:Tapo C230 - after firmware update to 1.4.2 home assistant not working
2 weeks ago

  @Solla-topee I also ran into this problem, only I began with home assistant after the update and never had the C230 working. A number of C200, C210 and C500 work like a charm.

I found out that the C230 reports an SSL/TLS error because of the 1024 RSA key of the certificate, which is considered to be to short:

 

$ openssl s_client -connect <address-of-c230>:443 -showcerts
CONNECTED(00000003)
---
Certificate chain
 0 s:CN=TPRI-DEVICE, O=TPRI, C=US
   i:CN=TPRI-DEVICE, O=TPRI, C=US
   a:PKEY: RSA, 1024 (bit); sigalg: sha256WithRSAEncryption
   v:NotBefore: Jan  1 00:00:00 2001 GMT; NotAfter: Dec 31 23:59:59 2070 GMT
-----BEGIN CERTIFICATE-----
…
-----END CERTIFICATE-----
---
Server certificate
subject=CN=TPRI-DEVICE, O=TPRI, C=US
issuer=CN=TPRI-DEVICE, O=TPRI, C=US
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: rsa_pkcs1_sha256
Peer Temp Key: X25519, 253 bits
---
SSL handshake has read 839 bytes and written 1661 bytes
Verification error: EE certificate key too weak
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Protocol: TLSv1.2
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
    Session-ID-ctx: 
    Master-Key: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1772061990
    Timeout   : 7200 (sec)
    Verify return code: 66 (EE certificate key too weak)
    Extended master secret: yes
---

For comparison: from a C500 I get the following answer (there is still complaints, but only because of the self-signed certificate and the camera works, also with home assistant):


$ openssl s_client -connect <address-of-c500>:443 -showcerts
Certificate chain
0 s:CN=TPRI-DEVICE, O=TPRI, C=US
   i:CN=TPRI-DEVICE, O=TPRI, C=US
   a:PKEY: EC, (prime256v1); sigalg: ecdsa-with-SHA256
   v:NotBefore: Jan  1 00:00:00 2001 GMT; NotAfter: Dec 31 23:59:59 2070 GMT
-----BEGIN CERTIFICATE-----
…
-----END CERTIFICATE-----
---
Server certificate
subject=CN=TPRI-DEVICE, O=TPRI, C=US
issuer=CN=TPRI-DEVICE, O=TPRI, C=US
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ecdsa_secp256r1_sha256
Peer Temp Key: ECDH, secp521r1, 521 bits
---
SSL handshake has read 755 bytes and written 1756 bytes
Verification error: self-signed certificate
---
New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256
Protocol: TLSv1.2
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-ECDSA-AES128-GCM-SHA256
    Session-ID: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
    Session-ID-ctx:
    Master-Key: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1772062301
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: yes

 

Is there any way (factory reset, firmware update) to get a new server certificate for the camera with a better cipher algorithm, a larger key or —even better— can I install my own certificate?

 

Best Regards

  1  
  1  
#5
Options
Re:Tapo C230 - after firmware update to 1.4.2 home assistant not working
2 weeks ago

  @u-ber same here. On both a C210 and C220 2.0 release. The C220 1.0 release still works. 
 

hope tp link comes with a solution soon. 

  0  
  0  
#6
Options
Re:Tapo C230 - after firmware update to 1.4.2 home assistant not working
a week ago

  @gex Im having the same issue with the latest Firmware. 

HA info

  • Core2026.3.0
  • Supervisor2026.02.3
  • Operating System17.1
  • Frontend20260304.0

    It can see the cameras when It searches for them but fails connecting.
  0  
  0  
#7
Options