<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Self Signed SSL Certs on Index Servers in Security</title>
    <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248612#M14913</link>
    <description>&lt;P&gt;There does seems to be a header:&lt;/P&gt;

&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;

&lt;P&gt;And there is no ^M (CR) in the file.... This cannot be that difficult!&lt;/P&gt;</description>
    <pubDate>Wed, 31 Aug 2016 12:02:41 GMT</pubDate>
    <dc:creator>brent_weaver</dc:creator>
    <dc:date>2016-08-31T12:02:41Z</dc:date>
    <item>
      <title>Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248603#M14904</link>
      <description>&lt;P&gt;I am trying to setup SSL security from the fwd clients to the index servers. I am looking at the atricle &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.2/Security/ConfigureSplunkforwardingtousesignedcertificates"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.2/Security/ConfigureSplunkforwardingtousesignedcertificates&lt;/A&gt; but cannot figure it out. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[SSL]
rootCA = $SPLUNK_HOME/etc/auth/mycerts/myCACertificate.pem
serverCert = $SPLUNK_HOME/etc/auth/mycerts/myNewServerCertificate.pem
password = &amp;lt;server certificate private key password&amp;gt;
cipherSuite = &amp;lt;your chosen cipher suite (optional)&amp;gt;

[splunktcp-ssl:9997]
compressed = true
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What file is what? What file should rootCA point to? I assume the cert authority file. It seems that the serverCert is chained in some way. &lt;/P&gt;

&lt;P&gt;Any help is MUCH appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 17:15:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248603#M14904</guid>
      <dc:creator>brent_weaver</dc:creator>
      <dc:date>2016-08-26T17:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248604#M14905</link>
      <description>&lt;P&gt;Hello There,&lt;/P&gt;

&lt;P&gt;It is certificate authority file  (Root file from Certifacate authority you used to sign the certificate). Please have a look at the SSL stanza of inputs.conf for description&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[SSL]
* Set the following specifications for SSL underneath this stanza name:

serverCert = &amp;lt;path&amp;gt;
* Full path to the server certificate.

password = &amp;lt;string&amp;gt;
* Server certificate password, if any.

rootCA = &amp;lt;string&amp;gt;
* Certificate authority list (root file).

requireClientCert = [true|false]
* Determines whether a client must authenticate.
* Defaults to false.

sslVersions = &amp;lt;string&amp;gt;
* Comma-separated list of SSL versions to support
* The versions available are "ssl2", "ssl3", "tls1.0", "tls1.1", and "tls1.2"
* The special version "*" selects all supported versions.  The version "tls"
  selects all versions tls1.0 or newer
* If a version is prefixed with "-" it is removed from the list
* When configured in FIPS mode ssl2 and ssl3 are always disabled regardless of this configuration
* Defaults to "*,-ssl2".  (anything newer than SSLv2)

supportSSLV3Only = [true|false]
* DEPRECATED.  SSLv2 is now always disabled by default.  The exact set of
  SSL versions allowed is now configurable via the "sslVersions" setting above

cipherSuite = &amp;lt;cipher suite string&amp;gt;
* If set, uses the specified cipher string for the input processors.
* If not set, the default cipher string is used.
* Provided by OpenSSL. This is used to ensure that the server does not
  accept connections using weak encryption protocols.
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 28 Aug 2016 03:26:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248604#M14905</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2016-08-28T03:26:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248605#M14906</link>
      <description>&lt;P&gt;Here is a script that will create all the certs you need:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;echo "Create CA Private Key"
openssl genrsa -des3 -out myCAPrivateKey.key 2048
echo
echo "Create CA  myCACertificate.csr"
openssl req -new -key myCAPrivateKey.key -out myCACertificate.csr
echo
echo "Create myCACertificate.pem"
openssl x509 -req -in myCACertificate.csr -sha256 -signkey myCAPrivateKey.key -CAcreateserial -out myCACertificate.pem -days 1095
echo
echo "Create myServerPrivateKey.key"
openssl genrsa -des3 -out myServerPrivateKey.key 2048
echo
echo "Gen myServerCertificate.csr"
openssl req -new -key myServerPrivateKey.key -out myServerCertificate.csr
echo
echo "Gen myServerCertificate.pem"
openssl x509 -req -in myServerCertificate.csr -sha256 -CA myCACertificate.pem -CAkey myCAPrivateKey.key -CAcreateserial -out myServerCertificate.pem -days 1095
echo
echo "Gen myClientPrivateKey.key"
openssl genrsa -des3 -out myClientPrivateKey.key 2048
echo
echo "Gen myClientCertificate.csr" 
openssl req -new -key myClientPrivateKey.key -out myClientCertificate.csr
echo
echo "Gen myClientCertificate.pem"
openssl x509 -req -in myClientCertificate.csr -sha256 -CA myCACertificate.pem -CAkey myCAPrivateKey.key -CAcreateserial -out myClientCertificate.pem -days 1095
echo
echo "Concatinating private key to end of client cert"
cat myClientPrivateKey.key &amp;gt;&amp;gt; myClientCertificate.pem
echo
echo "Concatinating private key to end of server cert"
cat myServerPrivateKey.key &amp;gt;&amp;gt; myServerCertificate.pem
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Your root CA will be "myCACertificate.pem"&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2016 04:46:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248605#M14906</guid>
      <dc:creator>svenwendler</dc:creator>
      <dc:date>2016-08-29T04:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248606#M14907</link>
      <description>&lt;P&gt;Guys thank you VERY much for your response, I have certificates issues from a certificate authority and am not creating them on the splunk servers. &lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2016 12:11:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248606#M14907</guid>
      <dc:creator>brent_weaver</dc:creator>
      <dc:date>2016-08-29T12:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248607#M14908</link>
      <description>&lt;P&gt;Hey thank you for the response. So if the rootCA is the certificate auth file, what is the serverCert file? Is that the chained file? I have this running on an existing splunk cluster and the serverCert file seems to be a chain of 5 ssl keys?!?!? &lt;/P&gt;

&lt;P&gt;As much as I love splunk, this documentation is not very detailed! Any help is much appreciated, and remember I got official certs from a cert authority, i am not looking to create self signed certs&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2016 12:23:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248607#M14908</guid>
      <dc:creator>brent_weaver</dc:creator>
      <dc:date>2016-08-29T12:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248608#M14909</link>
      <description>&lt;P&gt;The what is serverCert file?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2016 12:24:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248608#M14909</guid>
      <dc:creator>brent_weaver</dc:creator>
      <dc:date>2016-08-29T12:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248609#M14910</link>
      <description>&lt;P&gt;Server cert is the cert you have written for the server. The server cert pem file will have both cert and your private key and the rootCA is the trusted certificate which will have the root ca or sub ca cert chain.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    For eg: If you have p12 file from your provider,

    openssl pkcs12 -in &amp;lt;your cert&amp;gt;.p12 -cacerts -out rootCA.pem

    openssl pkcs12 -in &amp;lt;your cert&amp;gt;.p12 -clcerts -out serverCert.pem
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 29 Aug 2016 12:48:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248609#M14910</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2016-08-29T12:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248610#M14911</link>
      <description>&lt;P&gt;Now I am seeing this on the FWD servers from splunkd.log&lt;/P&gt;

&lt;P&gt;08-30-2016 18:03:19.804 +0000 ERROR SSLCommon - Can't read key file /opt/splunk/etc/auth/fwd/star_gehccloud_com_public.pem errno=151441516 error:0906D06C:PEM routines:PEM_read_bio:no start line.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:51:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248610#M14911</guid>
      <dc:creator>brent_weaver</dc:creator>
      <dc:date>2020-09-29T10:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248611#M14912</link>
      <description>&lt;P&gt;Splunk is not able to read your file due to issues in PEM format. Check if it has valid header line and also check if there are any special characters like ^M&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 02:00:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248611#M14912</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2016-08-31T02:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Using Self Signed SSL Certs on Index Servers</title>
      <link>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248612#M14913</link>
      <description>&lt;P&gt;There does seems to be a header:&lt;/P&gt;

&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;

&lt;P&gt;And there is no ^M (CR) in the file.... This cannot be that difficult!&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 12:02:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Using-Self-Signed-SSL-Certs-on-Index-Servers/m-p/248612#M14913</guid>
      <dc:creator>brent_weaver</dc:creator>
      <dc:date>2016-08-31T12:02:41Z</dc:date>
    </item>
  </channel>
</rss>

