https://bugs.kde.org/show_bug.cgi?id=369603
Bug ID: 369603 Summary: Desktop not detected since update to 1.0 Product: kdeconnect Version: unspecified Platform: Other OS: All Status: UNCONFIRMED Severity: normal Priority: NOR Component: android-application Assignee: albertv...@gmail.com Reporter: schueller...@gmail.com ---- Tested with desktop versions: 1.0, 1.0.1 and current master; android apk : 1.4.4 from Playstore, and current master. Desktop OS : gentoo with plasma5 Smartphone: OnePlus 3 with stock ROM ---- I'm not sure if this is a bug in the app or the desktop application, but the error is reported from the app, so I hope this is the correct place to put it. Since the update to >=kdeconnect-1.0 the phone can't detect the desktop and vice versa. Compiling the app and running it over adb shows an exception during the ssl handshake: I/KDE/LanLinkProvider: Identity package received from a TCP connection from sebas@SirVimes I/KDE/LanLinkProvider: Starting SSL handshake with sebas@SirVimes trusted:false E/KDE/LanLinkProvider: Handshake failed with sebas@SirVimes W/System.err: javax.net.ssl.SSLHandshakeException: Connection closed by peer W/System.err: at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native Method) W/System.err: at com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:324) W/System.err: at org.kde.kdeconnect.Backends.LanBackend.LanLinkProvider$4.run(LanLinkProvider.java:246) W/System.err: at java.lang.Thread.run(Thread.java:818) Supported ciphers for the phone (according to the apps debug output): I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 I/SupportedCiphers: cipher: TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_CBC_SHA I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 I/SupportedCiphers: cipher: TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_CBC_SHA I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_RC4_128_SHA I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_GCM_SHA384 I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_GCM_SHA256 I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_CBC_SHA I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_CBC_SHA256 I/SupportedCiphers: cipher: TLS_PSK_WITH_AES_256_CBC_SHA I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_CBC_SHA I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_CBC_SHA256 I/SupportedCiphers: cipher: TLS_PSK_WITH_AES_128_CBC_SHA I/SupportedCiphers: cipher: SSL_RSA_WITH_RC4_128_SHA I/SupportedCiphers: cipher: TLS_PSK_WITH_RC4_128_SHA I/SupportedCiphers: cipher: SSL_RSA_WITH_RC4_128_MD5 I/SupportedCiphers: cipher: SSL_RSA_WITH_3DES_EDE_CBC_SHA I/SupportedCiphers: cipher: TLS_EMPTY_RENEGOTIATION_INFO_SCSV I/SupportedCiphers: cipher: TLS_FALLBACK_SCSV -- You are receiving this mail because: You are watching all bug changes.