-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Broken in Android 6? #16
Comments
Can confirm it has been deprecated. Unfortunately that cipher is listed as a required cipher in the Tor specr: https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt
I think someone needs to go ask Android pros if there are work-arounds. edit: Doesn't look like any quick workarounds are possible. Apparently, although I haven't been offered real evidence yet, that cipher is no longer mandatory, but probably requires an updated version of the protocol. An additional mandatory cipher is also disabled, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA. If you comment them out it just hangs and fails to connect. |
Can we use bouncycastle to achieve this? Of course for Android we have to use spongycastle. EDIT: seems like bouncycastle has no support for SSLContext.getInstance() |
Now it saying:
|
I can confirm it too, the library is unuseable on android >= 6 |
commenting setenabledchiphers on the socket actually works |
@tizbac can you explain more? |
Can anyone confirm whether this is broken in Android 6 due to the removal of various ciphers?
I get the following in LogCat - Caused by: java.lang.IllegalArgumentException: cipherSuite SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA is not supported.
And have tracked down the following link https://code.google.com/p/android-developer-preview/issues/detail?id=3056
The text was updated successfully, but these errors were encountered: