-
-
Notifications
You must be signed in to change notification settings - Fork 672
Android app can no longer connect to secure server trusted by user-added CA #3312
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Fixes zulip#3312 Apps that target API Level 24 and above no longer trust user or admin-added CAs for secure connections, by default. This config allows the app to trust user-added certificate authorities for all secure connections More details here: * [Changes to Trusted Certificate Authorities in Android Nougat](https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html) * [Network security configuration](https://developer.android.com/training/articles/security-config)
A later request for this appears at #3425. The reason this changed in a new version of the Zulip app was that the default had changed in Android. This was one of those changes which Android gives apps some choice in the timing of, through the There was a PR at #3314, now stale. That version allowed user-added CAs globally. My feedback there was:
I'd be happy to take a PR for the solution described in that last paragraph. |
[greg: expanded explanatory comments] Fixes: zulip#3312
We have a Zulip server set up with a secure SSL certificate, but the certificate is trusted only by an internal Certificate Authority of ours so far, not yet a public CA.
In previous versions of the Android app, I was able to connect to the server over from the Android app as long as my phone was connected to our VPN and I had added our internal CA to my Android device.
This no longer works in the latest versions of the app. Zulip now says "Cannot connect to server".
I'm fairly confident the fix is fairly simple: add a network security configuration file to the app, and set it up to trust user-added CAs for secure connections, but I'm not sure if there's any philosophical objections to re-enabling that. Hopefully not! It has been a handy workflow while we're internally testing Zulip before we are able to expose our server publicly.
Thanks!
The text was updated successfully, but these errors were encountered: