<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What are the default ciphers used for supportSSLV3Only=true in Security</title>
    <link>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125938#M14497</link>
    <description>&lt;P&gt;small update, these are the firsts default ciphers used:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:SRP-DSS-AES-256-CBC-SHA:SRP-RSA-AES-256-CBC-SHA:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-DSS-CAMELLIA256-SHA
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;the list is much longer and can be see with:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk cmd openssl ciphers
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 02 May 2014 07:07:40 GMT</pubDate>
    <dc:creator>MuS</dc:creator>
    <dc:date>2014-05-02T07:07:40Z</dc:date>
    <item>
      <title>What are the default ciphers used for supportSSLV3Only=true</title>
      <link>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125936#M14495</link>
      <description>&lt;P&gt;If I do not specify a cipherSuite entry explicitly what is used?&lt;/P&gt;

&lt;P&gt;For example, is it equivalent to 'SSLv3:!aNULL:!eNULL'?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2014 16:03:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125936#M14495</guid>
      <dc:creator>ashrafmr</dc:creator>
      <dc:date>2014-04-09T16:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: What are the default ciphers used for supportSSLV3Only=true</title>
      <link>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125937#M14496</link>
      <description>&lt;P&gt;Hi ashrafmr,&lt;/P&gt;

&lt;P&gt;I did some testing with &lt;CODE&gt;supportSSLV3Only = true&lt;/CODE&gt; and you need to have at least one cipherSuite set in &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.2/Admin/Webconf"&gt;web.conf&lt;/A&gt;. If you remove it &lt;CODE&gt;splunkweb&lt;/CODE&gt; will not start returning this error:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2014-04-10 10:16:39,534 ERROR   [5346535fe020bd8d0] root:555 - 'cipherSuite'
Traceback (most recent call last):
  File "/opt/splunk/lib/python2.7/site-packages/splunk/appserver/mrsparkle/root.py", line 550, in &amp;lt;module&amp;gt;
    run(blocking=True)
  File "/opt/splunk/lib/python2.7/site-packages/splunk/appserver/mrsparkle/root.py", line 250, in run
    ssl_ciphers = str(global_cfg['cipherSuite'])
KeyError: 'cipherSuite'
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In your default &lt;CODE&gt;web.conf&lt;/CODE&gt; there is a cipherSuite entry like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;# For the HTTP server, Diable ciphers lower than 128-bit and disallow ciphers that
# don't provide authentication and/or encryption.
# Use 'openssl ciphers -v' to generate a list of supported ciphers
cipherSuite = ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can check for any overlapping &lt;CODE&gt;.conf&lt;/CODE&gt; settings (I did not have any) with &lt;EM&gt;btool&lt;/EM&gt; like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;/opt/splunk/bin/splunk cmd btool --debug web list | grep cipher
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you now open up Splunk in your browser, you will see something like this:&lt;BR /&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Connection Encrypted: High-grade Encryption (TLS_RSA_WITH_AES_128_CBC_SHA, 128 bit keys)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The message may differ based on your browser (I used Firefox). Based on that the default cipher would be:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;AES_128_CBC
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;On the other hand chrome will display something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;TLS 1.0 AES_256_CBC SHA1 RSA
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;since I did not set any specific cipher in &lt;CODE&gt;web.conf&lt;/CODE&gt;, it just disables the weak ciphers.&lt;/P&gt;

&lt;P&gt;hope this helps ...&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 08:49:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125937#M14496</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-04-10T08:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: What are the default ciphers used for supportSSLV3Only=true</title>
      <link>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125938#M14497</link>
      <description>&lt;P&gt;small update, these are the firsts default ciphers used:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:SRP-DSS-AES-256-CBC-SHA:SRP-RSA-AES-256-CBC-SHA:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-DSS-CAMELLIA256-SHA
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;the list is much longer and can be see with:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk cmd openssl ciphers
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 02 May 2014 07:07:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125938#M14497</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-05-02T07:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: What are the default ciphers used for supportSSLV3Only=true</title>
      <link>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125939#M14498</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;just an update to make sure current options are set: v7.3+&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Security/Ciphersuites"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Security/Ciphersuites&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;HTH,&lt;/P&gt;

&lt;P&gt;Holger&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 13:09:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-are-the-default-ciphers-used-for-supportSSLV3Only-true/m-p/125939#M14498</guid>
      <dc:creator>hsesterhenn_spl</dc:creator>
      <dc:date>2019-07-29T13:09:41Z</dc:date>
    </item>
  </channel>
</rss>

