Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Broken in Android 6? #16

Open
daveeeh opened this issue Oct 7, 2015 · 6 comments
Open

Broken in Android 6? #16

daveeeh opened this issue Oct 7, 2015 · 6 comments

Comments

@daveeeh
Copy link

daveeeh commented Oct 7, 2015

Can anyone confirm whether this is broken in Android 6 due to the removal of various ciphers?

I get the following in LogCat - Caused by: java.lang.IllegalArgumentException: cipherSuite SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA is not supported.

And have tracked down the following link https://code.google.com/p/android-developer-preview/issues/detail?id=3056

@instagibbs
Copy link

Can confirm it has been deprecated.

Unfortunately that cipher is listed as a required cipher in the Tor specr: https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt

Connections between two Tor relays, or between a client and a relay,
use TLS/SSLv3 for link authentication and encryption. All
implementations MUST support the SSLv3 ciphersuite
"SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA", and SHOULD support the TLS
ciphersuite "TLS_DHE_RSA_WITH_AES_128_CBC_SHA" if it is available.

I think someone needs to go ask Android pros if there are work-arounds.

edit: Doesn't look like any quick workarounds are possible. Apparently, although I haven't been offered real evidence yet, that cipher is no longer mandatory, but probably requires an updated version of the protocol.

An additional mandatory cipher is also disabled, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA.

If you comment them out it just hangs and fails to connect.

@axet
Copy link

axet commented Oct 24, 2016

Can we use bouncycastle to achieve this? Of course for Android we have to use spongycastle.

EDIT: seems like bouncycastle has no support for SSLContext.getInstance()

@axet
Copy link

axet commented Oct 26, 2016

Now it saying:

Connections between two Tor relays, or between a client and a relay,
use TLS/SSLv3 for link authentication and encryption. All
implementations MUST support the SSLv3 ciphersuite
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA" if it is available. They SHOULD
support better ciphersuites if available.

@tizbac
Copy link

tizbac commented Feb 13, 2017

I can confirm it too, the library is unuseable on android >= 6

@tizbac
Copy link

tizbac commented Feb 13, 2017

commenting setenabledchiphers on the socket actually works

@daveeeh
Copy link
Author

daveeeh commented Mar 9, 2017

@tizbac can you explain more?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants