Fixed
Status Update
Comments
bd...@google.com <bd...@google.com> #2
доколе?
vi...@gmail.com <vi...@gmail.com> #3
+1
There should be possible to open source in any installed (or minSdk for project) android API version, because compileSdk is not only one used for run the app.
Why it takes so long to release source code to SDK when the sources was already pushed to GIT?
There should be possible to open source in any installed (or minSdk for project) android API version, because compileSdk is not only one used for run the app.
Why it takes so long to release source code to SDK when the sources was already pushed to GIT?
bd...@google.com <bd...@google.com> #4
Fuck this issue, always happened from android 23. Fuck this. Not friendly to developers
jh...@googlemail.com <jh...@googlemail.com> #6
yep, no 26 sources no funny ;(
all the bunnies gonna cry ;((
all the bunnies gonna cry ;((
jh...@googlemail.com <jh...@googlemail.com> #7
vi...@gmail.com <vi...@gmail.com> #8
+1
jh...@googlemail.com <jh...@googlemail.com> #9
While debugging, we consider this behavior WAI. That's because stepping through code that doesn't match SDK version of the device is not a good experience. However, we can consider fallbacks to older sources when navigating to definitions while editing your code.
jh...@googlemail.com <jh...@googlemail.com> #10
[Comment deleted]
bd...@google.com <bd...@google.com>
sc...@gmail.com <sc...@gmail.com> #11
SNI is definitely a must. Using named virtual hosts is becoming more and more common and popular (who the hell wants to pay for more IP addresses just because you need another site secured?). Please fix this - make it a priority.
at...@gmail.com <at...@gmail.com> #12
Hi! I have noticed that the status of this has changed to 'released'. In what ersion has is been released? Will it be included in my new Android handset's update (currently on 2.3.3, waiting eagerly for 2.3.4).
bd...@google.com <bd...@google.com> #13
atur...@googlemail.com, it is marked Target-Honeycomb, so 3.0.
SNI might work on 2.3 with alternative browsers that have their own https stack, such as Firefox. Usually I test withhttps://gmail.com
(changing owner since the old username was no longer valid)
SNI might work on 2.3 with alternative browsers that have their own https stack, such as Firefox. Usually I test with
(changing owner since the old username was no longer valid)
ma...@klauseder.com <ma...@klauseder.com> #14
Very disappointing that this still hasn't been implemented. Using 2.3.5 on a Galaxy S2, doesn't work in included browser nor in dolphin browser. :/
ch...@gmail.com <ch...@gmail.com> #15
SNI is also not working in Android 2.3.3 on Droid 2. Perhaps the status or the Target should be updated.
bd...@google.com <bd...@google.com> #16
chrishie...@gmail.com, the status is that the issue has been addressed in Honeycomb. There are no plans to address it in earlier releases.
vi...@gmail.com <vi...@gmail.com> #17
chrishie...@gmail.com :
Non "corporate gibberish" summary :
* Gingerbread (2.3) Will never get this update officially.
* Honeycomb (3.0) contains the fix but isn't available on phones.
* Ice Cream Sandwich (4.0) will provide this feature to phones but isn't already available (soon).
Also :
* The fix from Honeycomb could have been backported by the manufacturers that got it's source code but none that I know off did it.
* As Honeycomb is a closed source release none of the alternative distribution could merge the patch without re-developing it.
* As Ice Cream Sandwitch will include this patch it will be in all distributions and could even be backported to Gingerbread.
Sadly coupled with the fact that google don't control at all the updates of previous phones it lock SNI in an "Unusable for most of Android users" state for 2+ Years at least for environements where you don't control users hardware.
At least now for companies you could plan an upgrade (software or hardware depending on the phone models your employees got) as soon as ICS is released.
Non "corporate gibberish" summary :
* Gingerbread (2.3) Will never get this update officially.
* Honeycomb (3.0) contains the fix but isn't available on phones.
* Ice Cream Sandwich (4.0) will provide this feature to phones but isn't already available (soon).
Also :
* The fix from Honeycomb could have been backported by the manufacturers that got it's source code but none that I know off did it.
* As Honeycomb is a closed source release none of the alternative distribution could merge the patch without re-developing it.
* As Ice Cream Sandwitch will include this patch it will be in all distributions and could even be backported to Gingerbread.
Sadly coupled with the fact that google don't control at all the updates of previous phones it lock SNI in an "Unusable for most of Android users" state for 2+ Years at least for environements where you don't control users hardware.
At least now for companies you could plan an upgrade (software or hardware depending on the phone models your employees got) as soon as ICS is released.
[Deleted User] <[Deleted User]> #18
If servers choke on TLS extensions, just get the user an error message stating that it's the servers fault, and also remove the fallback from chrome. At some time, server owners will be forced to support state of the art technology like they should.
[Deleted User] <[Deleted User]> #19
[Comment deleted]
[Deleted User] <[Deleted User]> #20
Hello All,
I am developer and I am facing the same issue. Do you know how we can overcome this issue from server side.
I am developer and I am facing the same issue. Do you know how we can overcome this issue from server side.
bd...@google.com <bd...@google.com> #21
sven.k.heinemann, see http://www.imperialviolet.org/2012/04/11/falsestart.html for a discussion of trying to force server owners to upgrade to support state of the art technology like they should.
bd...@google.com <bd...@google.com> #22
dipu, the lack of SNI means https sites can be virtual hosted on the same IP. the workaround is to use different IPs for different https hosts. Note this can still be done on one server, it just needs multiple IP addresses to distinguish which request is for which server.
Description
- Steps to reproduce the problem.
- Open the android browser
- Browse to the page
- What happened.
- The browser displayed a security alert but shouldn't have if SNI was working.
- The test site doesn't report SNI as enabled.
- What you think the correct behavior should be.
- As the chrome browser and all other modern browsers SNI should be supported.
Don't forget to mention which device you have, and which version of Android
is installed on it. (Find it under Home > Menu > Settings > About phone.)
- The device is an HTC Desire
- Android is at version 2.2 (CyanogenMod-6.0.2-Desire) but the android emulator with the 2.2 rom seem to have the same behavior.