https://bugs.kde.org/show_bug.cgi?id=369603

            Bug ID: 369603
           Summary: Desktop not detected since update to 1.0
           Product: kdeconnect
           Version: unspecified
          Platform: Other
                OS: All
            Status: UNCONFIRMED
          Severity: normal
          Priority: NOR
         Component: android-application
          Assignee: albertv...@gmail.com
          Reporter: schueller...@gmail.com

----
Tested with desktop versions: 1.0, 1.0.1 and current master;
                     android apk       : 1.4.4 from Playstore, and current
master.

Desktop OS  : gentoo with plasma5
Smartphone: OnePlus 3 with stock ROM
----

I'm not sure if this is a bug in the app or the desktop application, but the
error
is reported from the app, so I hope this is the correct place to put it.

Since the update to >=kdeconnect-1.0 the phone can't detect the desktop and
vice versa.
Compiling the app and running it over adb shows an exception during the ssl
handshake:

I/KDE/LanLinkProvider: Identity package received from a TCP connection from
sebas@SirVimes
I/KDE/LanLinkProvider: Starting SSL handshake with sebas@SirVimes trusted:false
E/KDE/LanLinkProvider: Handshake failed with sebas@SirVimes
W/System.err: javax.net.ssl.SSLHandshakeException: Connection closed by peer
W/System.err:     at
com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native Method)
W/System.err:     at
com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:324)
W/System.err:     at
org.kde.kdeconnect.Backends.LanBackend.LanLinkProvider$4.run(LanLinkProvider.java:246)
W/System.err:     at java.lang.Thread.run(Thread.java:818)

Supported ciphers for the phone (according to the apps debug output):
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_CBC_SHA256
I/SupportedCiphers: cipher: TLS_PSK_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_PSK_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: SSL_RSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_PSK_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: SSL_RSA_WITH_RC4_128_MD5
I/SupportedCiphers: cipher: SSL_RSA_WITH_3DES_EDE_CBC_SHA
I/SupportedCiphers: cipher: TLS_EMPTY_RENEGOTIATION_INFO_SCSV
I/SupportedCiphers: cipher: TLS_FALLBACK_SCSV

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to