Ori
Ori
@Niegi , I have the same issue with Redis (AWS ElastiCache). Have you found any solution / workaround ? @peterdettman , We use Lettuce client for Redis , SpringBoot 2.6.4,...
I have an update. I've been writing a tester that simply loads AWS redis with 10 threads, and the issue is reproduced after **few hours**. See tester code : https://github.com/oridool/redistest...
> @oridool We still try to figure it out. If we'll find anything I'll let know Thanks. If it helps, I reproduced the error also with a single thread. See...
@peterdettman , I was trying to reproduce the issue with bcprov+bctls 1.71 and even 1.69 but with no success. It doesn't occur when using these jars. I didn't change anything...
@peterdettman , I've run my test with the 1.7b15 version. It runs OK with no error. Version confirmation from my logs: ``` 022-09-07 09:50:16.603 WARN 1 --- [ main] org.redistest.RedistestApplication...
@peterdettman , For TLS 1.3 I don't get any clear error. Here it is: TLS 1.3 exception ``` org.springframework.data.redis.RedisConnectionFailureException: Unable to connect to Redis; nested exception is org.springframework.data.redis.connection.PoolException: Could not...
@peterdettman , > Can you disable GCM cipher suites in TLS 1.2 and try that please (e.g. configure your client so that only TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is supported, or some other non-GCM...
@peterdettman , I've just noticed that even after setting the property `jdk.tls.client.cipherSuites` as you requested, my test application is creating the TLS connection with the GCM cypher suite, and not...
@peterdettman , I was able to force the cipher suite `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256` by doing the following in Redis client builder: ``` .sslOptions(SslOptions.builder().cipherSuites("TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256").protocols(tlsVersion).build()) ``` I can confirm that the issue **does not...
@peterdettman , After doing the tests as you requested, here are my findings: The error occur sporadically only when running on Java 17 and using BC FIPS and GCM cipher...