<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Forwader to Indexer in Security</title>
    <link>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445656#M10453</link>
    <description>&lt;P&gt;Correct!&lt;BR /&gt;
well.. sort of.&lt;BR /&gt;
You can use the default client.pem that comes with Splunk if you disable SSLVerification - or create your own.&lt;BR /&gt;
I'd say recommended is to create your own to avoid "man in the middle" attacks but depending on your environment you may not need to.&lt;/P&gt;</description>
    <pubDate>Tue, 04 Sep 2018 12:13:18 GMT</pubDate>
    <dc:creator>moesaidi</dc:creator>
    <dc:date>2018-09-04T12:13:18Z</dc:date>
    <item>
      <title>SSL Forwader to Indexer</title>
      <link>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445651#M10448</link>
      <description>&lt;P&gt;Windows Server 2012&lt;BR /&gt;
Splunk 7.0&lt;BR /&gt;
Self Signed certificates&lt;BR /&gt;
Followed document: &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.1.1/Security/Howtoself-signcertificates"&gt;https://docs.splunk.com/Documentation/Splunk/7.1.1/Security/Howtoself-signcertificates&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;We're not requiring client cert, we set 'verifyServerCert' to false&lt;/P&gt;

&lt;P&gt;The document isn't clear about the files that are generated, which have to be defined in what configuration..&lt;/P&gt;

&lt;P&gt;for example:&lt;BR /&gt;
The files that were created, where exactly should they be used and how ? (In inputs.conf VS outputs.conf VS server.conf...)&lt;BR /&gt;
When we read on, we reach: &lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.1/Security/ConfigureSplunkforwardingtousesignedcertificates"&gt;http://docs.splunk.com/Documentation/Splunk/7.1.1/Security/ConfigureSplunkforwardingtousesignedcertificates&lt;/A&gt;&lt;BR /&gt;
It states we should create client.pem - but I thought we already created this in the earlier steps using the above document.&lt;/P&gt;

&lt;P&gt;Has anyone successfully been able to follow the documentation and get SSL encryption using self-signed certificates to work between the forwarder/indexer ? &lt;BR /&gt;
If so what steps did you take and / or any advice?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 14:04:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445651#M10448</guid>
      <dc:creator>moesaidi</dc:creator>
      <dc:date>2018-06-13T14:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Forwader to Indexer</title>
      <link>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445652#M10449</link>
      <description>&lt;P&gt;Let's try to summarize it:&lt;BR /&gt;
By following the instructions &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.1.1/Security/Howtoself-signcertificates"&gt;https://docs.splunk.com/Documentation/Splunk/7.1.1/Security/Howtoself-signcertificates&lt;/A&gt;, you created the following certificates and key :&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Root Certificate  : myCACertificate.pem :- This is your Certificate Authority which could now act as a CA for generating other certificates&lt;/LI&gt;
&lt;LI&gt;Server certificate : myServerCertificate.pem : - This is the certificate for the indexer(s).&lt;/LI&gt;
&lt;LI&gt;myServerPrivateKey.key :- Key used to sign the server certificate. 2 &amp;amp; 3 could be included in a file as mentioned in the next step&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;These certificates have to be configured in indexer :  &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt; (myServerCertificate.pem which includes both cert and key as mentioned in &lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.1/Security/HowtoprepareyoursignedcertificatesforSplunk#Create_a_single_PEM_file"&gt;Create Single PEM&lt;/A&gt;  and in &lt;STRONG&gt;server.conf&lt;/STRONG&gt;  configure the CA certificate(sslRootCAPath -&amp;gt; the RootCA certificate)&lt;/P&gt;

&lt;P&gt;Now on forwarder, you need to create a client cert as mentioned in &lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.1/Security/ConfigureSplunkforwardingtousesignedcertificates#Configure_your_forwarders_to_use_your_certificates"&gt;configure forwarder certificate&lt;/A&gt; and configure it in outputs.conf of the forwarder as explained in the document. Also configure the CA certificate in the server.conf of the forwarder .&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 15:21:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445652#M10449</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-06-13T15:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Forwader to Indexer</title>
      <link>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445653#M10450</link>
      <description>&lt;P&gt;Based on what you described:&lt;BR /&gt;
&lt;STRONG&gt;INDEXER:&lt;/STRONG&gt;&lt;BR /&gt;
- INPUTS.CONF&lt;BR /&gt;
serverCert = myNewServerCertificate.pem     #As Described in "Create single PEM", the created file is used here&lt;BR /&gt;
- SERVER.CONF&lt;BR /&gt;
sslRootCAPath = myCACertificate.pem   # As described iny our #1... which is odd because documentation says ignore this for windows. So where do we use this in Windows since we're running Windows Server 2012.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;FORWARDER&lt;/STRONG&gt;&lt;BR /&gt;
- OUTPUTS.CONF&lt;/P&gt;

&lt;H1&gt;How exactly do we create a client.pem (Client cert) and do we do it using the CA from earlier steps?&lt;/H1&gt;

&lt;P&gt;SERVER.CONF&lt;/P&gt;

&lt;H1&gt;The document says: skip this for Windows configurations - so nothing gets defined in server.conf ?&lt;/H1&gt;

&lt;P&gt;Thanks for all your help! Still trying to sort this out - if I define the entries in server.conf I get a warning in the logs saying it is being ignored.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 16:39:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445653#M10450</guid>
      <dc:creator>moesaidi</dc:creator>
      <dc:date>2018-06-13T16:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Forwader to Indexer</title>
      <link>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445654#M10451</link>
      <description>&lt;P&gt;finally got it working!&lt;/P&gt;

&lt;P&gt;TUrns out mutual authentication is required - so we DID need to have a client.pem created on the forwarder (no need for the root ca though if it's windows).&lt;BR /&gt;
If we properly defined it on the forwarder, it attempted to use SSL when communicating with the indexer.&lt;BR /&gt;
TUrns out the "Wrong Version" error we kept getting was ambiguous and meant the forwarder was not communicating with SSL while the indexer was trying to communicate with SSL. &lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 17:37:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445654#M10451</guid>
      <dc:creator>moesaidi</dc:creator>
      <dc:date>2018-06-13T17:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Forwader to Indexer</title>
      <link>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445655#M10452</link>
      <description>&lt;P&gt;So does that mean, we need to create client.pem on each universal forwarder ?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 09:04:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445655#M10452</guid>
      <dc:creator>damode</dc:creator>
      <dc:date>2018-09-04T09:04:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Forwader to Indexer</title>
      <link>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445656#M10453</link>
      <description>&lt;P&gt;Correct!&lt;BR /&gt;
well.. sort of.&lt;BR /&gt;
You can use the default client.pem that comes with Splunk if you disable SSLVerification - or create your own.&lt;BR /&gt;
I'd say recommended is to create your own to avoid "man in the middle" attacks but depending on your environment you may not need to.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 12:13:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-Forwader-to-Indexer/m-p/445656#M10453</guid>
      <dc:creator>moesaidi</dc:creator>
      <dc:date>2018-09-04T12:13:18Z</dc:date>
    </item>
  </channel>
</rss>

