我在Ubuntu上运行3.1.1,使用的是Neo4J版本1.8.0_131。
直到几天前,还可以从命令行启动cypher查询。喜欢
> cat myscript.cql | /neo4j/neo4j-community-3.1.1/bin/cypher-shell -u
> $neo4j_user -p $neo4j_pass --format verbose这在很长一段时间内都运行得很好。由于某些原因,我还不能确定,因为几天前cypher-shell挂起了,没有向标准输出返回任何消息。
Java版本未更改。
这是我在启动cypher-shell时在日志文件中看到的错误:
> 2018-08-11 21:30:01.851+0000 WARN
> [io.netty.channel.DefaultChannelPipeline] An exceptionCaught() event
> was fired, and it reached at the tail of the pipeline. It usually
> means the last handler in the pipeline did not handle the exception.
> java.lang.ExceptionInInitializerError
> io.netty.handler.codec.DecoderException:
> java.lang.ExceptionInInitializerError
> at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:442)
> at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:248)
> (...) Caused by: java.lang.IllegalArgumentException: Unsupported
> customized DH key size: 4096. The key size can only range from 1024 to
> 2048 (inclusive)
> at sun.security.ssl.ServerHandshaker.<clinit>(ServerHandshaker.java:140)
> (...)完整日志在此处https://www.dropbox.com/sh/a7oh7h6ta6chnc4/AABYC0NvjALnOPEPJ9-oXZdna?dl=0
发布于 2018-08-12 20:04:01
问题解决了。
Neo4j.conf中的配置错误:
# Expand Diffie Hellman (DH) key size from default 1024 to 2048 for DH-RSA cipher suites used in server TLS handshakes.
# This is to protect the server from any potential passive eavesdropping.
dbms.jvm.additional=-Djdk.tls.ephemeralDHKeySize=4096将其设置为可接受的值:
dbms.jvm.additional=-Djdk.tls.ephemeralDHKeySize=2048https://stackoverflow.com/questions/51804023
复制相似问题