SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert internal error
I figured the problem had to do with the self signed certificates, so I tried reverse proxying to the non-ssl version of the webadmin control panel like this:
https / 443 / nginx --> http / 7474 / neo4j
This unfortunately doesn't work because of mixed content, some calls in javascript that go to http instead of https, etc. Generally, it just doesn't work.
Then I thought I'd use my own certs, but it seems the one I have is not of an acceptable format to neo4j.
I would like to just get https / 443 / nginx --> https /7473 / neo4j - the setup that was working before, to work again.
I found this (among several other sites) that explain some about the nature of this particular problem, and this approach interests me the most (easiest seeming fix):
http://georgik.sinusgear.com/2012/02/19/tomcat-7-and-curl-ssl23_get_server_hellotlsv1-alert-internal-error/
This is about how to restrict the cypher used in a tomcat server that exhibits this error when trying to access it with curl...
so finally, my question:
Is there an equivalent way to restrict the cyphers used by neo4j's https connection?
--
<VirtualHost *:8000>
ProxyPass / http://127.0.0.1:7474/ha-info/masterinfo/isMaster
ProxyPassReverse / http://127.0.0.1:7474/ha-info/masterinfo/isMaster
RequestHeader set Authorization "Basic [base 64 encoded username:password]"
</VirtualHost>ELB
Hey guys I was working on this last night when I stumbled on this thread. I don't know if you care about which jdk your using but I found this bug report https://bugs.launchpad.net/ubuntu/+source/openjdk-6/+bug/1006776 and figured I would try a different jdk. Long story short I uninstalled openjdk -6 ( Im not sure if your using that ) and installed from oracles repo like this:sudo add-apt-repository ppa:webupd8team/java
sudo apt-get update
sudo apt-get install oracle-java6-installerThe following nginx config got me the rest of the way ( I have some extras in the proxy settings but you can strip them out.. if you even need the config file at all.server {listen 443 default ssl;root /path/to/site;access_log /path/to/log/access.log;error_log /path/to/log/error.log;server_name yourdomain.com;ssl on;ssl_certificate /path/to/ssl/something.pem;ssl_certificate_key /path/to/ssl/something.key;location / {auth_basic "Restriced";auth_basic_user_file /path/to/auth/pass;proxy_set_header X-Real-IP $remote_addr;proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;proxy_set_header Host $http_host;proxy_redirect off;proxy_buffering off;proxy_set_header X_FORWARDED_PROTO https;proxy_pass https://localhost:7473/;}}Anyway don't know if that will help you out. I wound up going with java-7 in the end even though it throws a warning. If there are other ways you found I would be intrested.Che
--