Support for: TLS_RSA_WITH_3DES_EDE_CBC_SHA and other weak ciphers
See original GitHub issueHi,
maybe it’s a duplicate question, but I can’t find any solutions for this issue. I must connect to a server wich only supports TLS_RSA_WITH_3DES_EDE_CBC_SHA and sadly I can’t change this.
I read that this cipher suite is disabled by Android by default, but in Google Chrome for example I can connect to this server.
But in my application (API Level 16) i got this stacktrace:
W/System.err: at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native Method)
W/System.err: at com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:302)
W/System.err: at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.java:241)
Any suggestions?
Issue Analytics
- State:
- Created 7 years ago
- Comments:8 (3 by maintainers)
Top Results From Across the Web
TLS/SSL Server Supports 3DES Cipher Suite - Rapid7
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what...
Read more >Managing SSL/TLS Protocols and Cipher Suites for AD FS
Learn how to disable and enable certain TLS/SSL protocols and cipher suites that are used by AD FS.
Read more >SSL/TLS Weak Cipher Suites Supported - Tenable
The remote host supports the use of SSL/TLS ciphers that offer weak encryption (including RC4 and 3DES encryption).
Read more >Recommendations for TLS/SSL Cipher Hardening - Acunetix
Below is a list of recommendations for a secure SSL/TLS implementation. ... It is also used by several other services and protocols, ...
Read more >Disable Weak Ciphers (RC4 & TripleDES) Windows Server ...
This video is following on from the previous one (Disabling SSLv3 and TLS v1.0), which can be found here ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
I understand totally that you disable obsolete protocols, but this means means for me, that I must use Version 2.1.0 instead of the current version?
This code doesn’t help me. Or am I wrong?