Since yesterday evening I have my Insync icon that is most of time greyed out and unable to do any synchro ! I have 3 Google Business accounts in synchro and none of them are working in Insync (two colleagues have same problem, one using some Google Business accounts and one Gmail account and that have exact same problem !)
I’m using latest Ubuntu release and they are using Mac version !
Is it a problem with Google ? Insync ? My drives are perfectly fine if I try to access them through Web !
There is no noted issue with Insync as of the moment, but we would like to investigate this. Please send in your logs along with the link to this post to support@insynchq.com How to find the log files
Thanks, I have noticed that using my VPN to Netherlands the problem disappeared ! What port is used by Insync to do synchronisation ? Is it just regular SSL Web connection ? as I’m currently in Bahrain where Internet is a little filtered (but all Google services are fully avalaible !)
@Vincen: Apologies for not replying sooner. The logs suggest that Insync is trying to connect using SSLv3. It is not supported by the server Insync is trying to connect to which causes the issue. Please try the following to debug.
Run openssl s_client -connect doc-00-7k-docs.googleusercontent.com:443 2>/dev/null | grep -C1 Protocol. The output may look like this:
This is just to confirm the protocol used when connecting normally.
Run the command nmap --script ssl-enum-ciphers -p 443 doc-00-7k-docs.googleusercontent.com as well to confirm what protocols and ciphers are supported. In my test the output is:
$ nmap --script ssl-enum-ciphers -p 443 doc-00-7k-docs.googleusercontent.com
Starting Nmap 7.01 ( https://nmap.org ) at 2016-12-05 17:42 PHT
Nmap scan report for doc-00-7k-docs.googleusercontent.com (216.58.220.225)
Host is up (0.065s latency).
Other addresses for doc-00-7k-docs.googleusercontent.com (not scanned): 2404:6800:4004:81a::2001
rDNS record for 216.58.220.225: nrt13s37-in-f225.1e100.net
PORT STATE SERVICE
443/tcp open https
| ssl-enum-ciphers:
| TLSv1.0:
| ciphers:
| TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: server
| TLSv1.1:
| ciphers:
| TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: server
| TLSv1.2:
| ciphers:
| TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
| TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
| TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
| TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
| compressors:
| NULL
| cipher preference: server
|_ least strength: C
Nmap done: 1 IP address (1 host up) scanned in 10.38 seconds
@lpugoy@jaduenas I am facing the exact same issue. I am also now in Bahrain, and the problem only occurred when I arrived here. I never faced this issue when I were in UAE.
Here are my details and the issue as extracted from the log files:
OS: Mac OS Mojave version 10.14.3
Insync version: v1.5.6
Country: Bahrain
Errors:
{“message”: “SSL certificate validation failed! (host: %s, error: %r)”, “params”: [“doc-00-bc-docs.googleusercontent.com”, “SSLError(1, u’[SSL: WRONG_VERSION_NUMBER] wrong version number (_ssl.c:590)')”]}
@heiba I never found any solution to the problem that is I guess linked to the crap internet connectivity that is filtered of bahrain and the very poor management by Batelco The guys are definitively not knowing what they are doing (have seen crazy things done by these guys…
Hopefully I have left google drive since a long time and using my own system (Nextcloud) so I keep all my datas safe and have no problem of sync with it even in bahrain
I always wanted to know about the best vpn apps for android which you can use on windows and mac also for my personal use. Now I have a list of some good free VPN for winodws.