[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #24 from kavra --- The problem continues with me -- You are receiving this mail because: You are watching all bug changes.
[plasma-nm] [Bug 355079] [RFE] Fortigate VPN plugin
https://bugs.kde.org/show_bug.cgi?id=355079 kavra changed: What|Removed |Added CC||kavra.ka...@gmail.com --- Comment #1 from kavra --- Any news for this issue? -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 kavra changed: What|Removed |Added CC||kavra.ka...@gmail.com --- Comment #2 from kavra --- Same problem in gentoo. Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp0 0 localhost:ipp 0.0.0.0:* LISTEN - tcp0 0 0.0.0.0:59000.0.0.0:* LISTEN 11182/krfb tcp6 0 0 [::]:1716 [::]:* LISTEN 11031/kdeconnectd tcp6 0 0 localhost:ipp [::]:* LISTEN - tcp6 0 0 [::]:5900 [::]:* LISTEN 11182/krfb udp0 0 0.0.0.0:47934 0.0.0.0:* - udp0 0 0.0.0.0:bootpc 0.0.0.0:* - udp0 0 0.0.0.0:bootpc 0.0.0.0:* - udp6 0 0 [::]:1716 [::]:* 11031/kdeconnectd udp6 0 0 [::]:44685 [::]:* - https://forums.gentoo.org/viewtopic-p-776.html#776 -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #3 from kavra --- another user, in my system, identical result -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #7 from kavra --- Created attachment 102984 --> https://bugs.kde.org/attachment.cgi?id=102984&action=edit Android see the port open -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #8 from kavra --- There is no firewall running on the system. kavra # /etc/init.d/iptables status * Executing: /lib64/rc/sh/openrc-run.sh /lib64/rc/sh/openrc-run.sh /etc/init.d/iptables status * status: stopped kavra # /etc/init.d/ufw status * Executing: /lib64/rc/sh/openrc-run.sh /lib64/rc/sh/openrc-run.sh /etc/init.d/ufw status * status: stopped The client and server are on the same local network segment, they do not cross any firewall or layer 3 element. Server: 192.168.0.50 Client:192.168.0.2 Android shows port 1716 open but does not connect. I have renamed the computer and the device and the pairing continues to fail. I have reinstalled kdeconect on the phone and on the computer and the pairing continues to fail. I have deleted .config/kdeconnect on the computer and the pairing fails. I have removed the apk, deleted /stored/emulated/0/kdeconnect from the phone, reinstalled the apk and still failed to pair. -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #9 from kavra --- Another phone Huawey G7 (android 4.4.4) matches well. Phone Motorola motoG 2ªG (android 6) failed to pair. -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #11 from kavra --- I have changed the mac address on the two devices, the problem continues. I returned to version 0.9g and everything works perfectly again. In version 0.9g everything worked correctly, in version >0.9g stopped working. -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #13 from kavra --- Hello @Allan, what version of android and phone model do you have? -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #15 from kavra --- Hi @Sascha, what version of android and phone model do you have? -- You are receiving this mail because: You are watching all bug changes.
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #17 from kavra --- (In reply to Albert Vaca from comment #16) > I don't think anything related to IP version has changed since 0.9... the > biggest thing that differs between 0.9 and 1.0 is the kind of encryption > used. > > Can you post the "netstat -tulpen" output on both 1.0 and 0.9 to see if > there is actually a difference? This way we will be sure it's a IPv6-related > problem and not something related to the encryption like a cipher suites > mismatch. > > > Since I can't reproduce this issue, I will need your help guys to solve the > problem :) of course ;) Version 0.9g: (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp0 0 127.0.0.1:631 0.0.0.0:* LISTEN - tcp0 0 0.0.0.0:59000.0.0.0:* LISTEN 12602/krfb tcp6 0 0 ::1:631 :::*LISTEN - tcp6 0 0 :::5900 :::*LISTEN 12602/krfb tcp6 0 0 :::1714 :::*LISTEN 24925/kdeconnectd udp0 0 0.0.0.0:68 0.0.0.0:* - udp6 0 0 :::47392:::* 24925/kdeconnectd udp6 0 0 :::1714 :::* 24925/kdeconnectd Version 1.x Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp0 0 localhost:ipp 0.0.0.0:* LISTEN - tcp0 0 0.0.0.0:59000.0.0.0:* LISTEN 11182/krfb tcp6 0 0 [::]:1716 [::]:* LISTEN 11031/kdeconnectd tcp6 0 0 localhost:ipp [::]:* LISTEN - tcp6 0 0 [::]:5900 [::]:* LISTEN 11182/krfb udp0 0 0.0.0.0:47934 0.0.0.0:* - udp0 0 0.0.0.0:bootpc 0.0.0.0:* - udp0 0 0.0.0.0:bootpc 0.0.0.0:* - udp6 0 0 [::]:1716 [::]:* 11031/kdeconnectd udp6 0 0 [::]:44685 [::]:* - According to this thread and the one of gentoo that I follow in parallel(https://forums.gentoo.org/viewtopic-p-776.html#776), the problem happens with different models of telephone and operating system. In the gentoo thread there are tcpdump outputs, in case they can help. Copy a piece: # tcpdump portrange 1716-1730 -vv dropped privs to tcpdump tcpdump: listening on enp5s0f2, link-type EN10MB (Ethernet), capture size 262144 bytes 19:03:57.222116 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 854) 192.168.0.2.43542 > 255.255.255.255.1716: [udp sum ok] UDP, length 826 19:03:57.222379 IP (tos 0x0, ttl 64, id 24029, offset 0, flags [DF], proto TCP (6), length 60) 192.168.0.50.34846 > 192.168.0.2.1716: Flags [S], cksum 0x9a35 (correct), seq 3441841316, win 29200, options [mss 1460,sackOK,TS val 2034041 ecr 0,nop,wscale 7], length 0 19:03:57.223751 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 192.168.0.2.1716 > 192.168.0.50.34846: Flags [S.], cksum 0xf4a4 (correct), seq 1635920093, ack 3441841317, win 65535, options [mss 1460,sackOK,TS val 8228018 ecr 2034041,nop,wscale 8], length 0 19:03:57.223791 IP (tos 0x0, ttl 64, id 24030, offset 0, flags [DF], proto TCP (6), length 52) 192.168.0.50.34846 > 192.168.0.2.1716: Flags [.], cksum 0x228b (correct), seq 1, ack 1, win 229, options [nop,nop,TS val 2034043 ecr 8228018], length 0 19:03:57.224061 IP (tos 0x0, ttl 64, id 24031, offset 0, flags [DF], proto TCP (6), length 1141) 192.168.0.50.34846 > 192.168.0.2.1716: Flags [P.], cksum 0x0bf7 (correct), seq 1:1090, ack 1, win 229, options [nop,nop,TS val 2034043 ecr 8228018], length 1089 19:03:57.225568 IP (tos 0x0, ttl 64, id 42092, offset 0, flags [DF], proto TCP (6), length 52) 192.168.0.2.1716 > 192.168.0.50.34846: Flags [.], cksum 0x1dd3 (correct), seq 1, ack 1090, win 348, options [nop,nop,TS val 8228018 ecr 2034043], length 0 19:03:57.343945 IP (tos 0x0, ttl 64, id 42093, offset 0, flags [DF], proto TCP (6), length 128) 192.168.0.2.1716 > 192.168.0.50.34846: Flags
[kdeconnect] [Bug 371539] Only listens to IPv6
https://bugs.kde.org/show_bug.cgi?id=371539 --- Comment #18 from kavra --- Information about active ciphering in the kernel: # cat /usr/src/linux/.config | grep CRYPTO | grep -v '#' CONFIG_CRYPTO=y CONFIG_CRYPTO_ALGAPI=y CONFIG_CRYPTO_ALGAPI2=y CONFIG_CRYPTO_AEAD=y CONFIG_CRYPTO_AEAD2=y CONFIG_CRYPTO_BLKCIPHER=y CONFIG_CRYPTO_BLKCIPHER2=y CONFIG_CRYPTO_HASH=y CONFIG_CRYPTO_HASH2=y CONFIG_CRYPTO_RNG=y CONFIG_CRYPTO_RNG2=y CONFIG_CRYPTO_RNG_DEFAULT=y CONFIG_CRYPTO_AKCIPHER2=y CONFIG_CRYPTO_AKCIPHER=y CONFIG_CRYPTO_KPP2=y CONFIG_CRYPTO_KPP=y CONFIG_CRYPTO_RSA=y CONFIG_CRYPTO_DH=y CONFIG_CRYPTO_MANAGER=y CONFIG_CRYPTO_MANAGER2=y CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=y CONFIG_CRYPTO_GF128MUL=y CONFIG_CRYPTO_NULL=y CONFIG_CRYPTO_NULL2=y CONFIG_CRYPTO_WORKQUEUE=y CONFIG_CRYPTO_CRYPTD=y CONFIG_CRYPTO_AUTHENC=y CONFIG_CRYPTO_ABLK_HELPER=y CONFIG_CRYPTO_GLUE_HELPER_X86=y CONFIG_CRYPTO_CCM=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_CHACHA20POLY1305=y CONFIG_CRYPTO_SEQIV=y CONFIG_CRYPTO_ECHAINIV=y CONFIG_CRYPTO_CBC=y CONFIG_CRYPTO_CTR=y CONFIG_CRYPTO_CTS=y CONFIG_CRYPTO_ECB=y CONFIG_CRYPTO_LRW=y CONFIG_CRYPTO_PCBC=y CONFIG_CRYPTO_XTS=y CONFIG_CRYPTO_KEYWRAP=y CONFIG_CRYPTO_CMAC=y CONFIG_CRYPTO_HMAC=y CONFIG_CRYPTO_CRC32C=y CONFIG_CRYPTO_CRC32C_INTEL=y CONFIG_CRYPTO_CRCT10DIF=y CONFIG_CRYPTO_GHASH=y CONFIG_CRYPTO_POLY1305=y CONFIG_CRYPTO_POLY1305_X86_64=y CONFIG_CRYPTO_MD4=y CONFIG_CRYPTO_MD5=y CONFIG_CRYPTO_MICHAEL_MIC=y CONFIG_CRYPTO_RMD128=y CONFIG_CRYPTO_RMD160=y CONFIG_CRYPTO_RMD256=y CONFIG_CRYPTO_RMD320=y CONFIG_CRYPTO_SHA1=y CONFIG_CRYPTO_SHA1_SSSE3=y CONFIG_CRYPTO_SHA256=y CONFIG_CRYPTO_SHA512=y CONFIG_CRYPTO_TGR192=y CONFIG_CRYPTO_WP512=y CONFIG_CRYPTO_GHASH_CLMUL_NI_INTEL=y CONFIG_CRYPTO_AES=y CONFIG_CRYPTO_AES_X86_64=y CONFIG_CRYPTO_AES_NI_INTEL=y CONFIG_CRYPTO_ANUBIS=y CONFIG_CRYPTO_ARC4=y CONFIG_CRYPTO_BLOWFISH=y CONFIG_CRYPTO_BLOWFISH_COMMON=y CONFIG_CRYPTO_BLOWFISH_X86_64=y CONFIG_CRYPTO_CAMELLIA=y CONFIG_CRYPTO_CAST_COMMON=y CONFIG_CRYPTO_CAST5=y CONFIG_CRYPTO_CAST5_AVX_X86_64=y CONFIG_CRYPTO_CAST6=y CONFIG_CRYPTO_CAST6_AVX_X86_64=y CONFIG_CRYPTO_DES=y CONFIG_CRYPTO_DES3_EDE_X86_64=y CONFIG_CRYPTO_FCRYPT=y CONFIG_CRYPTO_KHAZAD=y CONFIG_CRYPTO_SALSA20=y CONFIG_CRYPTO_SALSA20_X86_64=y CONFIG_CRYPTO_CHACHA20=y CONFIG_CRYPTO_CHACHA20_X86_64=y CONFIG_CRYPTO_SEED=y CONFIG_CRYPTO_SERPENT=y CONFIG_CRYPTO_SERPENT_SSE2_X86_64=y CONFIG_CRYPTO_TEA=y CONFIG_CRYPTO_TWOFISH=y CONFIG_CRYPTO_TWOFISH_COMMON=y CONFIG_CRYPTO_TWOFISH_X86_64=y CONFIG_CRYPTO_TWOFISH_X86_64_3WAY=y CONFIG_CRYPTO_LZO=y CONFIG_CRYPTO_842=y CONFIG_CRYPTO_DRBG_MENU=y CONFIG_CRYPTO_DRBG_HMAC=y CONFIG_CRYPTO_DRBG_HASH=y CONFIG_CRYPTO_DRBG_CTR=y CONFIG_CRYPTO_DRBG=y CONFIG_CRYPTO_JITTERENTROPY=y CONFIG_CRYPTO_USER_API=y CONFIG_CRYPTO_USER_API_HASH=y CONFIG_CRYPTO_USER_API_SKCIPHER=y CONFIG_CRYPTO_USER_API_AEAD=y CONFIG_CRYPTO_HASH_INFO=y CONFIG_CRYPTO_HW=y CONFIG_CRYPTO_DEV_QAT=y CONFIG_CRYPTO_DEV_QAT_DH895xCCVF=y -- You are receiving this mail because: You are watching all bug changes.