No appropriate protocol (protocol is disabled or cipher suites are inappropriate)

使用HttpClient 请求https时报错 No appropriate protocol (protocol is disabled or cipher suites are inappropriate) 解决方法

背景:

	使用JDK8高版本做HTTPS数据推送时报错,数据无法推送,报No appropriate protocol (protocol is disabled or cipher suites are inappropriate) 此错误

解决方法

1、修改JDK 下的为 java.security文件

	打开文件所在目录 C:\Program Files\Java\jdk1.8.0_291\jre\lib\security
	修改文件:java.security
	搜索以下内容:
	jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, RC4, DES, MD5withRSA, \
	    DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \
	    include jdk.disabled.namedCurves
	去除SSLv3, TLSv1, TLSv1.1这三个选项,保存文件重启项目。

2、修改httpclient请求参数

SSLContext sc = SSLContext.getInstance("TLSv1.2");
  • 5
    点赞
  • 15
    收藏
    觉得还不错? 一键收藏
  • 3
    评论
MQTT Essentials - A Lightweight IoT Protocol by Gaston C. Hillar English | 14 Apr. 2017 | ASIN: B01MS9I105 | 280 Pages | AZW3 | 6.19 MB Key Features Make your connected devices less prone to attackers by understanding practical security mechanisms Dive deep into one of IoT's extremely lightweight machines to enable connectivity protocol with some real-world examples Learn to take advantage of the features included in MQTT for IoT and Machine-to-Machine communications with complete real-life examples Book Description This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We'll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages What you will learn Understand how MQTTv3.1 and v3.1.1 works in detail Install and secure a Mosquitto MQTT broker by following best practices Design and develop IoT solutions combined with mobile and web apps that use MQTT messages to communicate Explore the features included
This book introduces the reader to the principles used in the construction of a large range of modern data communication protocols. The approach we take is rather a formal one, primarily based on descriptions of protocols in the notation of CSP. This not only enables us to describe protocols in a concise manner, but also to reason about many of their interesting properties and formally to prove certain aspects of their correctness with respect to appropriate specifications. Only after considering the main principles do we go on to consider actual protocols where these principles are exploited. This is a completely new edition of a book which was first published in 1994, where the main focus of many international efforts to develop data communication systems was on OSI – Open Systems Interconnection – the standardised architecture for communication systems developed within the International Organisation for Standardization, ISO. In the intervening 13 years, many of the specific protocols developed as part of the OSI initiative have fallen into disuse. However, the terms and concepts introduced in the OSI Reference Model are still essential for a systematic and consistent analysis of data communication systems, and OSI terms are therefore used throughout. There are three significant changes in this second edition of the book which particularly reflect recent developments in computer networks and distributed systems. Firstly, the rise of the Internet has led to the development of large numbers of new protocols, particularly in the Application Layer, and a new chapter has been introduced focussing on some of the most important of these. These new protocols typically use new styles of encoding, particularly ASCII encodings such as MIME and XML, and rely on middleware solutions based on a variety of support protocols. Chapters 8 and 10 have therefore been extended to deal with these topics. Finally, there is today much more focus on security issues in networks. Chapter 6,

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值