密码壳无响应

时间:2018-08-11 21:49:54

标签: neo4j cypher

我正在Ubuntu和Openjdk版本1.8.0_131上运行Neo4J Community Edition 3.1.1。

直到几天前,还可以从命令行启动密码查询,例如。喜欢

> cat myscript.cql | /neo4j/neo4j-community-3.1.1/bin/cypher-shell -u
> $neo4j_user -p $neo4j_pass --format verbose

这很长一段时间都正常。由于某些原因,我无法确定,因为几天前cypher-shell挂起而没有将任何消息返回到标准输出。

Java版本未更改。

这是启动cypher-shell时在日志文件中看到的错误:

> 2018-08-11 21:30:01.851+0000 WARN 
> [io.netty.channel.DefaultChannelPipeline] An exceptionCaught() event
> was fired, and it reached at the tail of the pipeline. It usually
> means the last handler in the pipeline did not handle the exception.
> java.lang.ExceptionInInitializerError
> io.netty.handler.codec.DecoderException:
> java.lang.ExceptionInInitializerError
>         at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:442)
>         at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:248)
> (...) Caused by: java.lang.IllegalArgumentException: Unsupported
> customized DH key size: 4096. The key size can only range from 1024 to
> 2048 (inclusive)
>         at sun.security.ssl.ServerHandshaker.<clinit>(ServerHandshaker.java:140)
> (...)

此处完整记录https://www.dropbox.com/sh/a7oh7h6ta6chnc4/AABYC0NvjALnOPEPJ9-oXZdna?dl=0

1 个答案:

答案 0 :(得分:0)

问题解决了。

neo4j.conf中的配置错误:

# Expand Diffie Hellman (DH) key size from default 1024 to 2048 for DH-RSA cipher suites used in server TLS handshakes.
# This is to protect the server from any potential passive eavesdropping.
dbms.jvm.additional=-Djdk.tls.ephemeralDHKeySize=4096

将其设置为可接受的值:

dbms.jvm.additional=-Djdk.tls.ephemeralDHKeySize=2048