Bug 369603

Summary: Desktop not detected since update to 1.0
Product: [Applications] kdeconnect Reporter: Sebastian Schüller <schueller.se>
Component: android-applicationAssignee: Albert Vaca Cintora <albertvaka>
Status: RESOLVED FIXED    
Severity: normal    
Priority: NOR    
Version First Reported In: unspecified   
Target Milestone: ---   
Platform: Other   
OS: All   
Latest Commit: Version Fixed In:
Sentry Crash Report:

Description Sebastian Schüller 2016-10-01 13:30:08 UTC
----
Tested with desktop versions: 1.0, 1.0.1 and current master;
                     android apk       : 1.4.4 from Playstore, and current master.

Desktop OS  : gentoo with plasma5
Smartphone: OnePlus 3 with stock ROM
----

I'm not sure if this is a bug in the app or the desktop application, but the error
is reported from the app, so I hope this is the correct place to put it.

Since the update to >=kdeconnect-1.0 the phone can't detect the desktop and vice versa.
Compiling the app and running it over adb shows an exception during the ssl handshake:

I/KDE/LanLinkProvider: Identity package received from a TCP connection from sebas@SirVimes
I/KDE/LanLinkProvider: Starting SSL handshake with sebas@SirVimes trusted:false
E/KDE/LanLinkProvider: Handshake failed with sebas@SirVimes
W/System.err: javax.net.ssl.SSLHandshakeException: Connection closed by peer
W/System.err:     at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native Method)
W/System.err:     at com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:324)
W/System.err:     at org.kde.kdeconnect.Backends.LanBackend.LanLinkProvider$4.run(LanLinkProvider.java:246)
W/System.err:     at java.lang.Thread.run(Thread.java:818)

Supported ciphers for the phone (according to the apps debug output):
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_CBC_SHA256
I/SupportedCiphers: cipher: TLS_PSK_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_PSK_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: SSL_RSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_PSK_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: SSL_RSA_WITH_RC4_128_MD5
I/SupportedCiphers: cipher: SSL_RSA_WITH_3DES_EDE_CBC_SHA
I/SupportedCiphers: cipher: TLS_EMPTY_RENEGOTIATION_INFO_SCSV
I/SupportedCiphers: cipher: TLS_FALLBACK_SCSV
Comment 1 Sebastian Schüller 2016-10-03 09:54:18 UTC
Fixed, issue was an outdated openssl version on the desktop, trying to fall back to SSL_RSA_WITH_RC_128_SHA cipher, which is not supported on API 20+ devices.