<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Any handy way to know what cipher Splunk server supports? in Security</title>
    <link>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425647#M10054</link>
    <description>&lt;P&gt;Here is some script that you can use to test the Splunk port by using openssl.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;#!/usr/bin/env bash

# OpenSSL requires the server IP and port number
SERVER=127.0.0.1:8089
DELAY=1
ciphers=$(openssl ciphers 'ALL:eNULL' | sed -e 's/:/ /g')

echo Obtaining cipher list from $(openssl version).

for cipher in ${ciphers[@]}
do
echo -n Testing $cipher...
result=$(echo -n | openssl s_client -cipher "$cipher" -connect $SERVER 2&amp;gt;&amp;amp;1)
if [[ "$result" =~ ":error:" ]] ; then
  error=$(echo -n $result | cut -d':' -f6)
  echo NO \($error\)
else
  if [[ "$result" =~ "Cipher is ${cipher}" || "$result" =~ "Cipher    :" ]] ; then
    echo YES
  else
    echo UNKNOWN RESPONSE
    echo $result
  fi
fi
sleep $DELAY
done 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;A sample run again Splunk 7.1.2 with port 8089 will below result.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;# ./openssl.sh | grep YES
Testing ECDHE-RSA-AES256-GCM-SHA384...YES
Testing ECDHE-RSA-AES256-SHA384...YES
Testing AES256-GCM-SHA384...YES
Testing ECDHE-RSA-AES128-GCM-SHA256...YES
Testing ECDHE-RSA-AES128-SHA256...YES
Testing AES128-GCM-SHA256...YES
Testing AES128-SHA256...YES
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 24 Aug 2018 09:29:48 GMT</pubDate>
    <dc:creator>daniel_splunk</dc:creator>
    <dc:date>2018-08-24T09:29:48Z</dc:date>
    <item>
      <title>Any handy way to know what cipher Splunk server supports?</title>
      <link>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425646#M10053</link>
      <description>&lt;P&gt;I want to tighten the security by only allowing certain ciphers to be configured. Any handy tool to check what cipher Splunk currently supports?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Aug 2018 09:25:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425646#M10053</guid>
      <dc:creator>daniel_splunk</dc:creator>
      <dc:date>2018-08-24T09:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Any handy way to know what cipher Splunk server supports?</title>
      <link>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425647#M10054</link>
      <description>&lt;P&gt;Here is some script that you can use to test the Splunk port by using openssl.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;#!/usr/bin/env bash

# OpenSSL requires the server IP and port number
SERVER=127.0.0.1:8089
DELAY=1
ciphers=$(openssl ciphers 'ALL:eNULL' | sed -e 's/:/ /g')

echo Obtaining cipher list from $(openssl version).

for cipher in ${ciphers[@]}
do
echo -n Testing $cipher...
result=$(echo -n | openssl s_client -cipher "$cipher" -connect $SERVER 2&amp;gt;&amp;amp;1)
if [[ "$result" =~ ":error:" ]] ; then
  error=$(echo -n $result | cut -d':' -f6)
  echo NO \($error\)
else
  if [[ "$result" =~ "Cipher is ${cipher}" || "$result" =~ "Cipher    :" ]] ; then
    echo YES
  else
    echo UNKNOWN RESPONSE
    echo $result
  fi
fi
sleep $DELAY
done 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;A sample run again Splunk 7.1.2 with port 8089 will below result.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;# ./openssl.sh | grep YES
Testing ECDHE-RSA-AES256-GCM-SHA384...YES
Testing ECDHE-RSA-AES256-SHA384...YES
Testing AES256-GCM-SHA384...YES
Testing ECDHE-RSA-AES128-GCM-SHA256...YES
Testing ECDHE-RSA-AES128-SHA256...YES
Testing AES128-GCM-SHA256...YES
Testing AES128-SHA256...YES
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 24 Aug 2018 09:29:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425647#M10054</guid>
      <dc:creator>daniel_splunk</dc:creator>
      <dc:date>2018-08-24T09:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Any handy way to know what cipher Splunk server supports?</title>
      <link>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425648#M10055</link>
      <description>&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.1.2/Security/Ciphersuites"&gt;https://docs.splunk.com/Documentation/Splunk/7.1.2/Security/Ciphersuites&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;inputs.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;   sslVersions = tls1.2
    cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-
    SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-
    AES128-SHA256:ECDHE-RSA-AES128-SHA256
    ecdhCurves = prime256v1, secp384r1, secp521r1
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 24 Aug 2018 09:47:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425648#M10055</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2018-08-24T09:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Any handy way to know what cipher Splunk server supports?</title>
      <link>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425649#M10056</link>
      <description>&lt;P&gt;Hi @daniel_splunk  - Were you able to test out @inventsekar 's solution? Or, did your answer below solve the problem? If yes to either of those options, please don't forget to resolve this post by clicking on "Accept". If you still need more help, please provide a comment with some feedback. Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Aug 2018 21:09:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Any-handy-way-to-know-what-cipher-Splunk-server-supports/m-p/425649#M10056</guid>
      <dc:creator>mstjohn_splunk</dc:creator>
      <dc:date>2018-08-24T21:09:27Z</dc:date>
    </item>
  </channel>
</rss>

