Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Google Play store warning #15

Open
Tanv33rA opened this issue Mar 29, 2022 · 4 comments
Open

Google Play store warning #15

Tanv33rA opened this issue Mar 29, 2022 · 4 comments

Comments

@Tanv33rA
Copy link

Thanks for such a helpful library . we have used this module in our vpn app updated our app on play store. After uploading we got a warning from play console "your app uses software that contains security vulnerabilities for users. Apps with these vulnerabilities can expose user information or damage a user’s device, and may be considered to be in violation of our Malicious Behavior policy."

Screenshot 2022-03-29 at 6 09 38 PM

@rizwankhanMiranshah
Copy link

Did you fix it dear i also face same issue

@Tanv33rA
Copy link
Author

Tanv33rA commented Apr 6, 2022

no I could not found solution yet.

@egcodes
Copy link
Owner

egcodes commented Apr 13, 2022

Hi, did the solution google suggested below not work?

Additional details
To properly handle hostname verification, change the implementation of your custom HostnameVerifier interface to perform the following actions:

If you are using the HostnameVerifier interface, change the implementation of the verify method to return false whenever the hostname of the server does not meet your expectations.
If you are using the X509HostnameVerifier interface, change the implementation of the verify methods (variants 1, 2, 3) to raise an SSLException whenever the hostname of the server does not meet your expectations. Ensure that the Exceptions raised within your verify implementation are not caught and suppressed within the method. Suppressing Exceptions in this manner would cause verify to exit normally, leading the app to trust all hostnames.
Also, do not pass AllowAllHostnameVerifier as an argument to setDefaultHostnameVerifier or setHostnameVerifier (e.g., via SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER). AllowAllHostnameVerifier turns off hostname verification, thus making your app vulnerable to attack.

@dygos2
Copy link

dygos2 commented May 20, 2022

Hey @egcodes ! Did you change that in the code and after that does Google approved the apk?
Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants