<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic cipherSuite in various .conf files in Security</title>
    <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150223#M4584</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;we know about the &lt;CODE&gt;cipherSuite&lt;/CODE&gt; option to set and configure the SSL cipher to be used. But since it can be set in various places it is not completely clear which config has what effect for an universal forwarder or an indexer in regards of the management port, web port and receiving port.&lt;/P&gt;

&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Fri, 02 May 2014 11:49:04 GMT</pubDate>
    <dc:creator>lcshared</dc:creator>
    <dc:date>2014-05-02T11:49:04Z</dc:date>
    <item>
      <title>cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150223#M4584</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;we know about the &lt;CODE&gt;cipherSuite&lt;/CODE&gt; option to set and configure the SSL cipher to be used. But since it can be set in various places it is not completely clear which config has what effect for an universal forwarder or an indexer in regards of the management port, web port and receiving port.&lt;/P&gt;

&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 02 May 2014 11:49:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150223#M4584</guid>
      <dc:creator>lcshared</dc:creator>
      <dc:date>2014-05-02T11:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150224#M4585</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;as you already know the &lt;CODE&gt;cipherSuite&lt;/CODE&gt; option can be set in &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.3/admin/Serverconf"&gt;server.conf&lt;/A&gt;, &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.3/admin/Webconf"&gt;web.conf&lt;/A&gt; and &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.3/admin/Inputsconf"&gt;inputs.conf&lt;/A&gt;. Now each cipherSuite in each .conf file has a different effect. After some testing I will share my results.&lt;/P&gt;

&lt;P&gt;All test were done on a default Splunk setup using a indexer and one universal forwarder. First lets get the SSL ciphers used by Splunk's openSSL, like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk cmd openssl ciphers

ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:SRP-DSS-AES-256-CBC-SHA:SRP-RSA-AES-256-CBC-SHA:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-DSS-CAMELLIA256-SHA:ECDH-RSA-AES256-GCM-SHA384:ECDH-ECDSA-AES256-GCM-SHA384:ECDH-RSA-AES256-SHA384:ECDH-ECDSA-AES256-SHA384:ECDH-RSA-AES256-SHA:ECDH-ECDSA-AES256-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:CAMELLIA256-SHA:PSK-AES256-CBC-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:SRP-DSS-3DES-EDE-CBC-SHA:SRP-RSA-3DES-EDE-CBC-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:ECDH-RSA-DES-CBC3-SHA:ECDH-ECDSA-DES-CBC3-SHA:DES-CBC3-SHA:PSK-3DES-EDE-CBC-SHA:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:SRP-DSS-AES-128-CBC-SHA:SRP-RSA-AES-128-CBC-SHA:DHE-DSS-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256:DHE-DSS-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:DHE-RSA-SEED-SHA:DHE-DSS-SEED-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-SHA:ECDH-RSA-AES128-GCM-SHA256:ECDH-ECDSA-AES128-GCM-SHA256:ECDH-RSA-AES128-SHA256:ECDH-ECDSA-AES128-SHA256:ECDH-RSA-AES128-SHA:ECDH-ECDSA-AES128-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:SEED-SHA:CAMELLIA128-SHA:PSK-AES128-CBC-SHA:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:ECDH-RSA-RC4-SHA:ECDH-ECDSA-RC4-SHA:RC4-SHA:RC4-MD5:PSK-RC4-SHA:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA:EXP-RC2-CBC-MD5:EXP-RC4-MD5
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So we see Splunk uses as first SSL cipher &lt;CODE&gt;AES256-GCM-SHA384&lt;/CODE&gt;. Okay lets verify this...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk cmd openssl s_client -connect myIDX:8089 | grep Cipher

depth=1 C = US, ST = CA, L = San Francisco, O = Splunk, CN = SplunkCommonCA, emailAddress = support@splunk.com
verify error:num=19:self signed certificate in certificate chain
verify return:0
New, TLSv1/SSLv3, Cipher is AES256-GCM-SHA384
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Bingo, we get back &lt;CODE&gt;AES256-GCM-SHA384&lt;/CODE&gt; as used SSL cipher.&lt;/P&gt;

&lt;P&gt;Now we change the used SSL cipher for the Splunk management port 8089, therefore I changed the &lt;CODE&gt;cipherSuite&lt;/CODE&gt; in server.conf on the indexer to &lt;CODE&gt;cipherSuite=CAMELLIA256-SHA&lt;/CODE&gt; restarted Splunk and did the above test again.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk cmd openssl s_client -connect myIDX:8089 | grep Cipher
depth=1 C = US, ST = CA, L = San Francisco, O = Splunk, CN = SplunkCommonCA, emailAddress = support@splunk.com
verify error:num=19:self signed certificate in certificate chain
verify return:0
New, TLSv1/SSLv3, Cipher is CAMELLIA256-SHA
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So I changed the SSL cipher successfully.&lt;/P&gt;

&lt;P&gt;I did more testing on &lt;CODE&gt;web.conf&lt;/CODE&gt; and &lt;CODE&gt;inputs.conf&lt;/CODE&gt; and here is effects those changes had:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;universal forwarder&lt;/STRONG&gt;&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;inputs.conf: has no effect&lt;/LI&gt;
&lt;LI&gt;web.conf: has no effect as well (which is no surprise at all &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; )&lt;/LI&gt;
&lt;LI&gt;server.conf: changes the SSL cipher used on the Splunks default management port 8089&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;&lt;STRONG&gt;indexer&lt;/STRONG&gt;&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;inputs.conf: changes the SSL cipher used on the Splunks splunk-to-splunk default receiving port 9997&lt;/LI&gt;
&lt;LI&gt;web.conf: changes the SSL cipher used on the Splunks default web port 8000&lt;/LI&gt;
&lt;LI&gt;server.conf: changes the SSL cipher used on the Splunks default management port 8089&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;One result of this tests is that one is able to change/define the &lt;CODE&gt;cipherSuite&lt;/CODE&gt; used on accepting a SSL connection, but I was unable to set/change the SSL cipher used to open a connection. &lt;/P&gt;

&lt;P&gt;hope this helps ...&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Fri, 02 May 2014 11:53:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150224#M4585</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-05-02T11:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150225#M4586</link>
      <description>&lt;P&gt;A year late to the party but ... no way was found to control outbound cipher selection?&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 05:59:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150225#M4586</guid>
      <dc:creator>Lucas_K</dc:creator>
      <dc:date>2015-05-11T05:59:01Z</dc:date>
    </item>
    <item>
      <title>Re: cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150226#M4587</link>
      <description>&lt;P&gt;Better late, than never &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; There is an option in &lt;CODE&gt;outputs.conf&lt;/CODE&gt; but the docs are a bit confusing:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sslCipher = &amp;lt;string&amp;gt;
* If set, uses the specified cipher string for the input processors.
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 02 Nov 2015 22:18:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150226#M4587</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-11-02T22:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150227#M4588</link>
      <description>&lt;P&gt;Even later to the party, and arriving with nothing more to offer than the bleeding obvious: the SSL stanza in inputs.conf changes the SSL cipher used for TCP inputs defined in tcp-ssl stanzas in inputs.conf.&lt;/P&gt;

&lt;P&gt;For example, using the OpenSSL (0.9.8zb) &lt;CODE&gt;s_client&lt;/CODE&gt; command to send a JSON-formatted event to a Splunk tcp-ssl input, without explicitly specifying &lt;CODE&gt;cipherSuite&lt;/CODE&gt; in the SSL stanza, the connection used AES256-SHA. Specifying the following in the SSL stanza:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;cipherSuite = DES-CBC3-SHA
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;caused the connection to use that cipher suite instead.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 06:23:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150227#M4588</guid>
      <dc:creator>Graham_Hanningt</dc:creator>
      <dc:date>2016-06-17T06:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150228#M4589</link>
      <description>&lt;P&gt;It also appears that the server.conf cipherSuite controls HTTP (HEC) inputs as well.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jun 2018 19:47:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150228#M4589</guid>
      <dc:creator>mhigginson</dc:creator>
      <dc:date>2018-06-12T19:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150229#M4590</link>
      <description>&lt;P&gt;Just remember you commented on a post from 2014, where things like HEC were devils black witchery &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jun 2018 07:35:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150229#M4590</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2018-06-14T07:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150230#M4591</link>
      <description>&lt;P&gt;After an upgrade to 7.0.4 my search-head did not connect to the older version deployment server (6.4) because it stated "handshake failure" in splunkd.log after restarting.&lt;/P&gt;

&lt;P&gt;I did try a lot of different things, but only after adding: cipherSuite = AES256-GCM-SHA384 to the web.conf, the search-head's outbound connection to the deployment server was successful.&lt;/P&gt;

&lt;P&gt;It therefore seems that the web.conf configuration controls the outbound connection to the deployment server.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jun 2018 06:22:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/150230#M4591</guid>
      <dc:creator>GVanhees</dc:creator>
      <dc:date>2018-06-20T06:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: cipherSuite in various .conf files</title>
      <link>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/560370#M12436</link>
      <description>&lt;P&gt;Thank you for this post. We had an issue with the ciphers occur and didn't have this in-depth knowledge of how all the configuration files worked. This will help us in the future with upgrades.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 15:55:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/cipherSuite-in-various-conf-files/m-p/560370#M12436</guid>
      <dc:creator>jnichols914</dc:creator>
      <dc:date>2021-07-21T15:55:27Z</dc:date>
    </item>
  </channel>
</rss>

