<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need a list of all the locations of hashed password based on splunk.secret in Security</title>
    <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160219#M4789</link>
    <description>&lt;P&gt;This command (after you do &lt;CODE&gt;cd $SPLUNK_HOME&lt;/CODE&gt;) will show you any file which contains a splunk-encrypted password (and a whole bunch of other binary files, *.js files and other irrelevant junk).  The (properly filtered output) will show you which files WILL BREAK when you change the &lt;CODE&gt;secret&lt;/CODE&gt; file.  You then go figure out how to re-input the password for those "things".  For example, many people use &lt;CODE&gt;LDAP&lt;/CODE&gt; for authentication to get into Splunk search heads.  This means that the Search Head stored credentials to access AD.  This password is encrypted with the &lt;CODE&gt;secret&lt;/CODE&gt; and stored in &lt;CODE&gt;$SPLUNK_HOME/etc/system/local/authentication.conf&lt;/CODE&gt; as &lt;CODE&gt;bindDNpassword&lt;/CODE&gt;.  If this is the case for you, then this file will be identified by the &lt;CODE&gt;grep&lt;/CODE&gt; command. &lt;/P&gt;</description>
    <pubDate>Tue, 18 Jul 2017 16:09:23 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2017-07-18T16:09:23Z</dc:date>
    <item>
      <title>Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160216#M4786</link>
      <description>&lt;P&gt;Is there a list of all possible instances of hashed passwords in Splunk that are based on the splunk.secret?  I'm investigating what the effort is to get our splunk.secret in sync for existing servers that don't have matching splunk.secret.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2014 20:38:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160216#M4786</guid>
      <dc:creator>the_wolverine</dc:creator>
      <dc:date>2014-02-20T20:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160217#M4787</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;# grep -ri \$1\$. *
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 15 Mar 2014 13:23:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160217#M4787</guid>
      <dc:creator>the_wolverine</dc:creator>
      <dc:date>2014-03-15T13:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160218#M4788</link>
      <description>&lt;P&gt;care to expand on this?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2016 21:29:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160218#M4788</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2016-12-08T21:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160219#M4789</link>
      <description>&lt;P&gt;This command (after you do &lt;CODE&gt;cd $SPLUNK_HOME&lt;/CODE&gt;) will show you any file which contains a splunk-encrypted password (and a whole bunch of other binary files, *.js files and other irrelevant junk).  The (properly filtered output) will show you which files WILL BREAK when you change the &lt;CODE&gt;secret&lt;/CODE&gt; file.  You then go figure out how to re-input the password for those "things".  For example, many people use &lt;CODE&gt;LDAP&lt;/CODE&gt; for authentication to get into Splunk search heads.  This means that the Search Head stored credentials to access AD.  This password is encrypted with the &lt;CODE&gt;secret&lt;/CODE&gt; and stored in &lt;CODE&gt;$SPLUNK_HOME/etc/system/local/authentication.conf&lt;/CODE&gt; as &lt;CODE&gt;bindDNpassword&lt;/CODE&gt;.  If this is the case for you, then this file will be identified by the &lt;CODE&gt;grep&lt;/CODE&gt; command. &lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 16:09:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160219#M4789</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-07-18T16:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160220#M4790</link>
      <description>&lt;P&gt;I was looking for an explanation of the regex but your explanation of the issue is spot on. Still very useful for anyone stumbling upon this answer.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 17:50:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160220#M4790</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2017-07-18T17:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160221#M4791</link>
      <description>&lt;P&gt;I think that you should click &lt;CODE&gt;Accept&lt;/CODE&gt; to close the question since the answer is a good (if terse) one.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 00:12:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160221#M4791</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-07-19T00:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160222#M4792</link>
      <description>&lt;P&gt;Also, please contact me (email is in my profile) and let me know how your research turned out (I am trying to do the same thing: sync &lt;CODE&gt;splunk.secret&lt;/CODE&gt; on production system already up and running).&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 00:14:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160222#M4792</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-07-19T00:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160223#M4793</link>
      <description>&lt;P&gt;Ain't my question otherwise I would.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 16:15:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160223#M4793</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2017-07-19T16:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: Need a list of all the locations of hashed password based on splunk.secret</title>
      <link>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160224#M4794</link>
      <description>&lt;P&gt;I was able to accomplish this with little-to-no issues but I also wasn't doing it on a system with lots of additional hashed values. &lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 16:16:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Need-a-list-of-all-the-locations-of-hashed-password-based-on/m-p/160224#M4794</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2017-07-19T16:16:51Z</dc:date>
    </item>
  </channel>
</rss>

