<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL anonymous ciphers supported in Security</title>
    <link>https://community.splunk.com/t5/Security/SSL-anonymous-ciphers-supported/m-p/567787#M15613</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We are using the Tenable Infrastructure Vulnerability scanner to scan regularly our complete infrastructure. Tenable reports following findings for the Splunk Server Ports:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.tenable.com/plugins/nessus/31705" target="_blank" rel="noopener"&gt;https://www.tenable.com/plugins/nessus/31705&lt;/A&gt; SSL Anonymous Cipher Suites Supported&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please find below the plugin output:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The following is a list of SSL anonymous ciphers supported by the remote TCP server :&lt;/P&gt;&lt;P&gt;&amp;nbsp; High Strength Ciphers (&amp;gt;= 112-bit key)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Code&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; KEX&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auth&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encryption&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----------------------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---------------------&amp;nbsp; ---&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; AECDH-AES128-SHA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xC0, 0x18&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ECDH&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AES-CBC(128)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SHA1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; AECDH-AES256-SHA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xC0, 0x19&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ECDH&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AES-CBC(256)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SHA1&lt;/P&gt;&lt;P&gt;The fields above are :&lt;/P&gt;&lt;P&gt;&amp;nbsp; {Tenable ciphername}&lt;/P&gt;&lt;P&gt;&amp;nbsp; {Cipher ID code}&lt;/P&gt;&lt;P&gt;&amp;nbsp; Kex={key exchange}&lt;/P&gt;&lt;P&gt;&amp;nbsp; Auth={authentication}&lt;/P&gt;&lt;P&gt;&amp;nbsp; Encrypt={symmetric encryption method}&lt;/P&gt;&lt;P&gt;&amp;nbsp; MAC={message authentication code}&lt;/P&gt;&lt;P&gt;&amp;nbsp; {export flag}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Could you please advise how to adjust the SSL Splunk configuration to fix this issue? Can this be fixed by setting certain value to cipherSuite in server.conf?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The above issue is reported for the ports (2)8191 and (2)8089.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Our server.conf (local) looks as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[kvstore]&lt;BR /&gt;port = 28191&lt;/P&gt;&lt;P&gt;[license]&lt;BR /&gt;master_uri = &lt;A href="https://splunk-license.xxx.corp:443" target="_blank" rel="noopener"&gt;https://splunk-license.xxx.corp:443&lt;/A&gt;&lt;/P&gt;&lt;P&gt;# Workaround to overcome the connection issues to the license server&lt;/P&gt;&lt;P&gt;[sslConfig]&lt;BR /&gt;# To address Vulnerability Scan:&lt;BR /&gt;# &lt;A href="https://serverfault.com/questions/1034107/how-to-configure-ssl-certificates-for-splunk-on-port-8089" target="_blank" rel="noopener"&gt;https://serverfault.com/questions/1034107/how-to-configure-ssl-certificates-for-splunk-on-port-8089&lt;/A&gt;&lt;BR /&gt;sslVersions = tls1.2&lt;BR /&gt;sslVersionsForClient = *,-ssl2&lt;BR /&gt;enableSplunkdSSL = true&lt;BR /&gt;serverCert = /etc/apache2/splunk.pem&lt;/P&gt;&lt;P&gt;# Workaround to overcome the connection issues to the license server&lt;BR /&gt;cipherSuite = TLSv1+HIGH:TLSv1.2+HIGH:@STRENGTH&lt;/P&gt;&lt;P&gt;# To address Vulnerability Scan:&lt;BR /&gt;# &lt;A href="https://community.splunk.com/t5/Archive/Splunk-shows-vulnerable-to-CVE-2012-4929-in-my-Nessus/m-p/29091" target="_blank" rel="noopener"&gt;https://community.splunk.com/t5/Archive/Splunk-shows-vulnerable-to-CVE-2012-4929-in-my-Nessus/m-p/29091&lt;/A&gt;&lt;BR /&gt;allowSslCompression = false&lt;BR /&gt;useClientSSLCompression = false&lt;BR /&gt;useSplunkdClientSSLCompression = false&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;sslPassword = xxx&lt;/P&gt;&lt;P&gt;[general]&lt;BR /&gt;pass4SymmKey = xxx&lt;BR /&gt;trustedIP = 127.0.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;cipherSuite in server.conf (default) looks as follows:&lt;/P&gt;&lt;P&gt;sslVersions = tls1.2&lt;BR /&gt;cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256&lt;BR /&gt;ecdhCurves = prime256v1, secp384r1, secp521r1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please advice?&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Kamil&lt;/P&gt;</description>
    <pubDate>Tue, 21 Sep 2021 07:35:33 GMT</pubDate>
    <dc:creator>damucka</dc:creator>
    <dc:date>2021-09-21T07:35:33Z</dc:date>
    <item>
      <title>SSL anonymous ciphers supported</title>
      <link>https://community.splunk.com/t5/Security/SSL-anonymous-ciphers-supported/m-p/567787#M15613</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We are using the Tenable Infrastructure Vulnerability scanner to scan regularly our complete infrastructure. Tenable reports following findings for the Splunk Server Ports:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.tenable.com/plugins/nessus/31705" target="_blank" rel="noopener"&gt;https://www.tenable.com/plugins/nessus/31705&lt;/A&gt; SSL Anonymous Cipher Suites Supported&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please find below the plugin output:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The following is a list of SSL anonymous ciphers supported by the remote TCP server :&lt;/P&gt;&lt;P&gt;&amp;nbsp; High Strength Ciphers (&amp;gt;= 112-bit key)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Code&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; KEX&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auth&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encryption&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----------------------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---------------------&amp;nbsp; ---&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; AECDH-AES128-SHA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xC0, 0x18&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ECDH&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AES-CBC(128)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SHA1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; AECDH-AES256-SHA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xC0, 0x19&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ECDH&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AES-CBC(256)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SHA1&lt;/P&gt;&lt;P&gt;The fields above are :&lt;/P&gt;&lt;P&gt;&amp;nbsp; {Tenable ciphername}&lt;/P&gt;&lt;P&gt;&amp;nbsp; {Cipher ID code}&lt;/P&gt;&lt;P&gt;&amp;nbsp; Kex={key exchange}&lt;/P&gt;&lt;P&gt;&amp;nbsp; Auth={authentication}&lt;/P&gt;&lt;P&gt;&amp;nbsp; Encrypt={symmetric encryption method}&lt;/P&gt;&lt;P&gt;&amp;nbsp; MAC={message authentication code}&lt;/P&gt;&lt;P&gt;&amp;nbsp; {export flag}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Could you please advise how to adjust the SSL Splunk configuration to fix this issue? Can this be fixed by setting certain value to cipherSuite in server.conf?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The above issue is reported for the ports (2)8191 and (2)8089.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Our server.conf (local) looks as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[kvstore]&lt;BR /&gt;port = 28191&lt;/P&gt;&lt;P&gt;[license]&lt;BR /&gt;master_uri = &lt;A href="https://splunk-license.xxx.corp:443" target="_blank" rel="noopener"&gt;https://splunk-license.xxx.corp:443&lt;/A&gt;&lt;/P&gt;&lt;P&gt;# Workaround to overcome the connection issues to the license server&lt;/P&gt;&lt;P&gt;[sslConfig]&lt;BR /&gt;# To address Vulnerability Scan:&lt;BR /&gt;# &lt;A href="https://serverfault.com/questions/1034107/how-to-configure-ssl-certificates-for-splunk-on-port-8089" target="_blank" rel="noopener"&gt;https://serverfault.com/questions/1034107/how-to-configure-ssl-certificates-for-splunk-on-port-8089&lt;/A&gt;&lt;BR /&gt;sslVersions = tls1.2&lt;BR /&gt;sslVersionsForClient = *,-ssl2&lt;BR /&gt;enableSplunkdSSL = true&lt;BR /&gt;serverCert = /etc/apache2/splunk.pem&lt;/P&gt;&lt;P&gt;# Workaround to overcome the connection issues to the license server&lt;BR /&gt;cipherSuite = TLSv1+HIGH:TLSv1.2+HIGH:@STRENGTH&lt;/P&gt;&lt;P&gt;# To address Vulnerability Scan:&lt;BR /&gt;# &lt;A href="https://community.splunk.com/t5/Archive/Splunk-shows-vulnerable-to-CVE-2012-4929-in-my-Nessus/m-p/29091" target="_blank" rel="noopener"&gt;https://community.splunk.com/t5/Archive/Splunk-shows-vulnerable-to-CVE-2012-4929-in-my-Nessus/m-p/29091&lt;/A&gt;&lt;BR /&gt;allowSslCompression = false&lt;BR /&gt;useClientSSLCompression = false&lt;BR /&gt;useSplunkdClientSSLCompression = false&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;sslPassword = xxx&lt;/P&gt;&lt;P&gt;[general]&lt;BR /&gt;pass4SymmKey = xxx&lt;BR /&gt;trustedIP = 127.0.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;cipherSuite in server.conf (default) looks as follows:&lt;/P&gt;&lt;P&gt;sslVersions = tls1.2&lt;BR /&gt;cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256&lt;BR /&gt;ecdhCurves = prime256v1, secp384r1, secp521r1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please advice?&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Kamil&lt;/P&gt;</description>
      <pubDate>Tue, 21 Sep 2021 07:35:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-anonymous-ciphers-supported/m-p/567787#M15613</guid>
      <dc:creator>damucka</dc:creator>
      <dc:date>2021-09-21T07:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: SSL anonymous ciphers supported</title>
      <link>https://community.splunk.com/t5/Security/SSL-anonymous-ciphers-supported/m-p/568076#M15618</link>
      <description>&lt;P&gt;The solution is:&lt;/P&gt;&lt;DIV&gt;cipherSuite = TLSv1+HIGH:TLSv1.2+HIGH:!aNULL:@STRENGTH&lt;/DIV&gt;</description>
      <pubDate>Wed, 22 Sep 2021 15:23:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-anonymous-ciphers-supported/m-p/568076#M15618</guid>
      <dc:creator>damucka</dc:creator>
      <dc:date>2021-09-22T15:23:31Z</dc:date>
    </item>
  </channel>
</rss>

