<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I force web clients to use only SSLv3 and TLSv1? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95421#M3141</link>
    <description>&lt;P&gt;Well I personally think that SSLv3 works OK. However, the tools to check security used by ISPs and DCs mostly see if the combination of SSLv3 and TLSv1 is enabled or not. I can't mention the name of the tool here but such tools usually check "SSLv3/TLS". And if the check fails, the operation team usually start considering alternative solutions that support "SSLv3/TLS". I hope this is fair reason for you to support "SSLv3/TLS".&lt;/P&gt;</description>
    <pubDate>Tue, 14 Dec 2010 10:13:01 GMT</pubDate>
    <dc:creator>melonman</dc:creator>
    <dc:date>2010-12-14T10:13:01Z</dc:date>
    <item>
      <title>How can I force web clients to use only SSLv3 and TLSv1?</title>
      <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95416#M3136</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I would like to know how to force web clients to use only SSLv3 and TLSv1? I found the following configuration in the documentation.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://www.splunk.com/base/Documentation/4.1.5/Admin/Webconf" rel="nofollow"&gt;http://www.splunk.com/base/Documentation/4.1.5/Admin/Webconf&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;supportSSLV3Only = [True | False]
   * Allow only SSLv3 connections if true
   * NOTE: Enabling this may cause some browsers problems
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Does this configuration force web clients to use only SSLv3 and TLSv1? 
* The splunk version is 4.1.4.&lt;/P&gt;

&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2010 15:28:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95416#M3136</guid>
      <dc:creator>melonman</dc:creator>
      <dc:date>2010-11-29T15:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: How can I force web clients to use only SSLv3 and TLSv1?</title>
      <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95417#M3137</link>
      <description>&lt;P&gt;With OpenSSL, when you support SSLv3 only, not only is SSLv2 support turned off but also TLSv1.&lt;/P&gt;

&lt;P&gt;Our app server, CherryPy, does not support specifying more complex OpenSSL contexts, so it is not possible to enable SSLv3 and TLSv1 without hacking at some python.  Even then, changes would not be upgrade-safe.&lt;/P&gt;

&lt;P&gt;We have had a few customers request that we support SSLv3 + TLSv1, so it is something that we are considering.  Can you let us know if this is important to you, and if so why?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2010 21:56:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95417#M3137</guid>
      <dc:creator>araitz</dc:creator>
      <dc:date>2010-11-29T21:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: How can I force web clients to use only SSLv3 and TLSv1?</title>
      <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95418#M3138</link>
      <description>&lt;P&gt;Aratiz,&lt;/P&gt;

&lt;P&gt;I would very much like to see SSLv3/TLS+ only support, mainly for these two reasons.&lt;/P&gt;

&lt;P&gt;i) SSLv2 is basically broken, its basic building blocks for Crypto has issues, so if the purpose of using SSL is to keep data safe (for example if login/password information could be pulled from logs) SSLv2 does not protect you.
 Since SSL handshake will pick the best security that both sides support, it is unlikely that in normal usage a browser would end up on v2, but weird things happen.&lt;/P&gt;

&lt;P&gt;ii) There have been a significant number of flaws found in the SSLv2 code that can be used to attack a server running in v2 mode, perhaps the Python used in the web server is not vulnerable to any known hacks, but there is always a chance of a zero day attack.&lt;/P&gt;

&lt;P&gt;A lot of hack attempts involve performing a v2 only handshake as that gives the attacker the most leverage, for that reason on all systems that I can, I disable v2 handshakes.&lt;/P&gt;

&lt;P&gt;Hope that helps.&lt;/P&gt;

&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2010 22:38:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95418#M3138</guid>
      <dc:creator>brianirwin</dc:creator>
      <dc:date>2010-11-29T22:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: How can I force web clients to use only SSLv3 and TLSv1?</title>
      <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95419#M3139</link>
      <description>&lt;P&gt;Based on your comments above, I am not sure I understand why setting supportSSLv3Only=true doesn't solve your use case.  To be clear, setting SSLv3 only disabled SSLv2 AS WELL AS TLSv1.  See the table a bit below: &lt;A href="http://docs.python.org/library/ssl.html#functions-constants-and-exceptions"&gt;http://docs.python.org/library/ssl.html#functions-constants-and-exceptions&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2010 22:57:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95419#M3139</guid>
      <dc:creator>araitz</dc:creator>
      <dc:date>2010-11-29T22:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: How can I force web clients to use only SSLv3 and TLSv1?</title>
      <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95420#M3140</link>
      <description>&lt;P&gt;Araitz,&lt;BR /&gt;
 Re-reading the question, I see that I was offbase, I ranted at a complete tangent to the actual question. Disabling v2 by saying SSLv3 only will resolve the issue I went off on.&lt;/P&gt;

&lt;P&gt;Is it considered good Splunk etiquette to leave my tangent in place, or should I remove it?&lt;/P&gt;

&lt;P&gt;I still think I see some value in the SSLv3 or better switch, I know TLS 1.0 and SSLv3 are very similar, but I believe some Python implementations are now starting to support TLSv1.1 and 1.2 can not be too far behind.&lt;BR /&gt;
 Per the RFC, 1.1 claims protection against some CBC attacks and several other attack vectors.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2010 22:08:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95420#M3140</guid>
      <dc:creator>brianirwin</dc:creator>
      <dc:date>2010-12-09T22:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: How can I force web clients to use only SSLv3 and TLSv1?</title>
      <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95421#M3141</link>
      <description>&lt;P&gt;Well I personally think that SSLv3 works OK. However, the tools to check security used by ISPs and DCs mostly see if the combination of SSLv3 and TLSv1 is enabled or not. I can't mention the name of the tool here but such tools usually check "SSLv3/TLS". And if the check fails, the operation team usually start considering alternative solutions that support "SSLv3/TLS". I hope this is fair reason for you to support "SSLv3/TLS".&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2010 10:13:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95421#M3141</guid>
      <dc:creator>melonman</dc:creator>
      <dc:date>2010-12-14T10:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: How can I force web clients to use only SSLv3 and TLSv1?</title>
      <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95422#M3142</link>
      <description>&lt;P&gt;With Splunk 4.3, cipher lists can now be specified in web.conf:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://blogs.splunk.com/2012/01/10/splunk4-3-shiny-new-security-features/"&gt;http://blogs.splunk.com/2012/01/10/splunk4-3-shiny-new-security-features/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;As a result, you can specify a cipher list that only allows TLSv1 and SSLv3 ciphers, even though strictly speaking SSLv3 and TLSv1 are protocols rather than simply lists of allowable ciphers that form its cryptographic attributes.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2012 05:48:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95422#M3142</guid>
      <dc:creator>araitz</dc:creator>
      <dc:date>2012-01-18T05:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: How can I force web clients to use only SSLv3 and TLSv1?</title>
      <link>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95423#M3143</link>
      <description>&lt;P&gt;since 4.3 the sslv3Only setting has expanded to the server.conf and web.conf. &lt;/P&gt;

&lt;P&gt;See in 6.0.2&lt;/P&gt;

&lt;P&gt;To force splunk to use only sslv3 protocol, &lt;BR /&gt;
see supportSSLV3Only = true under [sslConfig] in server.conf for splunkd&lt;BR /&gt;
  &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/serverconf"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Admin/serverconf&lt;/A&gt;&lt;BR /&gt;
and supportSSLV3Only = true under [settings] in web.conf for splunkweb&lt;BR /&gt;
  &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/Webconf"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Admin/Webconf&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;for the cipher level check this :&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Security/Determineyourciphersuite"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Security/Determineyourciphersuite&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2014 23:37:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-can-I-force-web-clients-to-use-only-SSLv3-and-TLSv1/m-p/95423#M3143</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2014-02-28T23:37:38Z</dc:date>
    </item>
  </channel>
</rss>

