https://bugs.kde.org/show_bug.cgi?id=391645

--- Comment #2 from Dan <dan...@mail.com> ---
This issue is still present. Here's a log from KRDC 18.12.1 and x11vnc 0.9.16:


30/01/2019 11:13:31 SSL: accept_openssl(OPENSSL_VNC)
30/01/2019 11:13:31 SSL: spawning helper process to handle: 10.4.1.2:54308
30/01/2019 11:13:31 SSL: helper for peerport 54308 is pid 24211: 
30/01/2019 11:13:31 connect_tcp: trying:   127.0.0.1 20000
30/01/2019 11:13:33 check_vnc_tls_mode: waited: 1.412067 / 1.40 input: (future)
RFB Handshake
30/01/2019 11:13:33 check_vnc_tls_mode: version: 3.8
30/01/2019 11:13:33 check_vnc_tls_mode: reply: 19 (VeNCrypt)
30/01/2019 11:13:33 vencrypt: received 0.2 client version.
30/01/2019 11:13:33 vencrypt: client selected sub-type: 258 (rfbVencryptTlsVnc)
30/01/2019 11:13:33 Using Anonymous Diffie-Hellman mode.
30/01/2019 11:13:33 WARNING: Anonymous Diffie-Hellman uses encryption but is
30/01/2019 11:13:33 WARNING: susceptible to a Man-In-The-Middle attack.
30/01/2019 11:13:33 loaded Diffie Hellman 1024 bits, 0.000s
30/01/2019 11:13:33 SSL: ssl_init[24211]: 10/10 initialization timeout: 20
secs.
30/01/2019 11:13:33 SSL: ssl_helper[24211]: SSL_accept() *FATAL: -1 SSL FAILED
30/01/2019 11:13:33 SSL: error:1417A0C1:SSL
routines:tls_post_process_client_hello:no shared cipher
30/01/2019 11:13:33 SSL: ssl_helper[24211]: Proto: unknown
30/01/2019 11:13:33 SSL: ssl_helper[24211]: exit case 2 (ssl_init failed)
30/01/2019 11:13:33 SSL: accept_openssl: cookie from ssl_helper[24211] FAILED.
0


The connection works fine with x11vnc 0.9.13 which supports TLSv1.0.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to