Bug 369603 - Desktop not detected since update to 1.0
Summary: Desktop not detected since update to 1.0
Status: RESOLVED FIXED
Alias: None
Product: kdeconnect
Classification: Applications
Component: android-application (other bugs)
Version First Reported In: unspecified
Platform: Other All
: NOR normal
Target Milestone: ---
Assignee: Albert Vaca Cintora
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-10-01 13:30 UTC by Sebastian Schüller
Modified: 2016-10-03 09:54 UTC (History)
0 users

See Also:
Latest Commit:
Version Fixed In:
Sentry Crash Report:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Schüller 2016-10-01 13:30:08 UTC
----
Tested with desktop versions: 1.0, 1.0.1 and current master;
                     android apk       : 1.4.4 from Playstore, and current master.

Desktop OS  : gentoo with plasma5
Smartphone: OnePlus 3 with stock ROM
----

I'm not sure if this is a bug in the app or the desktop application, but the error
is reported from the app, so I hope this is the correct place to put it.

Since the update to >=kdeconnect-1.0 the phone can't detect the desktop and vice versa.
Compiling the app and running it over adb shows an exception during the ssl handshake:

I/KDE/LanLinkProvider: Identity package received from a TCP connection from sebas@SirVimes
I/KDE/LanLinkProvider: Starting SSL handshake with sebas@SirVimes trusted:false
E/KDE/LanLinkProvider: Handshake failed with sebas@SirVimes
W/System.err: javax.net.ssl.SSLHandshakeException: Connection closed by peer
W/System.err:     at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native Method)
W/System.err:     at com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:324)
W/System.err:     at org.kde.kdeconnect.Backends.LanBackend.LanLinkProvider$4.run(LanLinkProvider.java:246)
W/System.err:     at java.lang.Thread.run(Thread.java:818)

Supported ciphers for the phone (according to the apps debug output):
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
I/SupportedCiphers: cipher: TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_ECDHE_RSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_GCM_SHA384
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_GCM_SHA256
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_256_CBC_SHA256
I/SupportedCiphers: cipher: TLS_PSK_WITH_AES_256_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: TLS_RSA_WITH_AES_128_CBC_SHA256
I/SupportedCiphers: cipher: TLS_PSK_WITH_AES_128_CBC_SHA
I/SupportedCiphers: cipher: SSL_RSA_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: TLS_PSK_WITH_RC4_128_SHA
I/SupportedCiphers: cipher: SSL_RSA_WITH_RC4_128_MD5
I/SupportedCiphers: cipher: SSL_RSA_WITH_3DES_EDE_CBC_SHA
I/SupportedCiphers: cipher: TLS_EMPTY_RENEGOTIATION_INFO_SCSV
I/SupportedCiphers: cipher: TLS_FALLBACK_SCSV
Comment 1 Sebastian Schüller 2016-10-03 09:54:18 UTC
Fixed, issue was an outdated openssl version on the desktop, trying to fall back to SSL_RSA_WITH_RC_128_SHA cipher, which is not supported on API 20+ devices.