<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why is the SDEE script showing my user/pass? in Security</title>
    <link>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59953#M2022</link>
    <description>&lt;P&gt;The current published release is intended to provide backward compatibility with Splunk 4.1.x, which doesn't include the new endpoint.  The next maintenance release of the app should include this.  Keep an eye out.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Mar 2011 10:37:35 GMT</pubDate>
    <dc:creator>jhansen</dc:creator>
    <dc:date>2011-03-22T10:37:35Z</dc:date>
    <item>
      <title>Why is the SDEE script showing my user/pass?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59950#M2019</link>
      <description>&lt;P&gt;I think it's ironic to see a security plugin doing something insecurely..  Anyway, here's a rough hack to fix this.  Instead of showing the username and password in both the manager-&amp;gt;data inputs-&amp;gt;scripts section as well as the processlist on the server itself, this reads the username and password from a text file.&lt;/P&gt;

&lt;P&gt;Note : This is a hack and not meant to be a final solution.  I'm not sure how to modify the setup scripts yet, but it would be much nicer if the final solution were to generate these password files on the fly or give the user the option to use password files or put the data directly in the CLI command.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;# Place this code at the bottom of the get_ips_feed.py.
# Comment out the last run() command in that file (it should be the last line)
# and append the following :

#run(sys.argv[1],sys.argv[2],sys.argv[3],"https","yes")

passwd_conf = '/opt/splunk/etc/apps/Splunk_CiscoIPS/local/.ids_passwd'
username = ""
password = ""

try:
        f = open(passwd_conf, 'r')
        user_passwd_arr = f.readline().strip().split(':')
        f.close()
        if (len(user_passwd_arr) != 2):
                sys.exit("The file "+ passwd_conf +" has the wrong syntax")
        else:
                username = user_passwd_arr[0]
                password = user_passwd_arr[1]
except OSError:
        sys.exit("The file "+ passwd_conf +" could not be opened")

run(username,password,sys.argv[3],"https","yes")
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 16 Mar 2011 03:13:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59950#M2019</guid>
      <dc:creator>XenoPhage</dc:creator>
      <dc:date>2011-03-16T03:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Why is the SDEE script showing my user/pass?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59951#M2020</link>
      <description>&lt;P&gt;Great suggestion and proof of concept. One nitpick though - personally, I'd lean against credentials in a hidden file. Security by obscurity and all that.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2011 04:08:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59951#M2020</guid>
      <dc:creator>southeringtonp</dc:creator>
      <dc:date>2011-03-16T04:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Why is the SDEE script showing my user/pass?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59952#M2021</link>
      <description>&lt;P&gt;There is an endpoint in 4.2 for storing credentials, which the SDEE app will likely be updated to use.&lt;/P&gt;

&lt;P&gt;See &lt;A href="http://answers.splunk.com/questions/9888/eai-endpoint-admin-passwords" rel="nofollow"&gt;this other question&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2011 21:35:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59952#M2021</guid>
      <dc:creator>dart</dc:creator>
      <dc:date>2011-03-17T21:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: Why is the SDEE script showing my user/pass?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59953#M2022</link>
      <description>&lt;P&gt;The current published release is intended to provide backward compatibility with Splunk 4.1.x, which doesn't include the new endpoint.  The next maintenance release of the app should include this.  Keep an eye out.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2011 10:37:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59953#M2022</guid>
      <dc:creator>jhansen</dc:creator>
      <dc:date>2011-03-22T10:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: Why is the SDEE script showing my user/pass?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59954#M2023</link>
      <description>&lt;P&gt;Agreed, however I'm not sure there was an alternative pre splunk 4.2.  I'm not familiar with the endpoint in 4.2 yet, so I'm looking forward to seeing how this will work.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2011 02:08:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-the-SDEE-script-showing-my-user-pass/m-p/59954#M2023</guid>
      <dc:creator>XenoPhage</dc:creator>
      <dc:date>2011-03-23T02:08:51Z</dc:date>
    </item>
  </channel>
</rss>

