<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations? in Security</title>
    <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218202#M6180</link>
    <description>&lt;P&gt;How would you enable SSL between Forwarders and the Deployment Server?  The deploymentclient.conf spec doesn't contain SSL attributes.&lt;/P&gt;</description>
    <pubDate>Mon, 02 May 2016 16:13:21 GMT</pubDate>
    <dc:creator>ericlarsen</dc:creator>
    <dc:date>2016-05-02T16:13:21Z</dc:date>
    <item>
      <title>For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218169#M6147</link>
      <description>&lt;P&gt;For Splunk Enterprise, Splunk Light and HUNK default root certificates prior to 6.3 will expire on July 21, 2016&lt;/P&gt;

&lt;P&gt;What are the suggested recommendations?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2016 23:56:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218169#M6147</guid>
      <dc:creator>Ellen</dc:creator>
      <dc:date>2016-04-18T23:56:01Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218170#M6148</link>
      <description>&lt;P&gt;&lt;STRONG&gt;PRODUCT ADVISORY: Pre 6.3, Splunk Enterprise, Splunk Light and HUNK default root certificates expire on July 21, 2016.&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;
(Updated: May 19, 2016)&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;&lt;STRONG&gt;SUMMARY&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Instances of Splunk Enterprise, Splunk Light and HUNK that are older than 6.3 &lt;STRONG&gt;AND&lt;/STRONG&gt; that are using the default certificates will no longer be able to communicate with each other after July 21, 2016 unless the certificates are replaced OR Splunk is upgraded to 6.3 or later.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Please note that for all Splunk Enterprise versions, the default root certificate that ships with Splunk is the same root certificate in every download.&lt;/STRONG&gt; &lt;BR /&gt;
That means that anyone who has downloaded Splunk has server certificates that have been signed by the same root certificate and would be able to authenticate to your certificates. To ensure that no one can easily snoop on your traffic or wrongfully send data to your indexers, we strongly recommend that you replace them with certificates signed by a reputable 3rd-party certificate authority.&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;&lt;STRONG&gt;IMPACT&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Failure to replace expired certificates prior to this will result in the immediate cessation of network traffic for any connection which uses them.&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Expiration of Splunk certificates does not affect:&lt;/P&gt;

&lt;P&gt;1)  Splunk instances that are in Splunk Cloud &lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;SSL certificates used for Splunk Cloud instances are not the default Splunk certificates&lt;/LI&gt;
&lt;LI&gt;Forwarder to Splunk Cloud traffic is not impacted, however, relay forwarders (forwarder to forwarder) can be impacted if you chose to use default Splunk certificates for this communication&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;2)  Splunk instances that use certificates that are internally generated (self-signed) or obtained from an external Certificate Authority (CA). &lt;/P&gt;

&lt;P&gt;3)  Splunk instances in your configuration that are upgraded to 6.3 or above and use that version’s root certificates.&lt;/P&gt;

&lt;P&gt;4)  Splunk instances that do NOT use SSL - (This is the default configuration for forwarder to indexer communication)&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Certificate expiration DOES affect Splunk deployments where&lt;/STRONG&gt;:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Any or all Splunk instances in your deployment run a release prior to 6.3 and use Splunk default certificates.&lt;/STRONG&gt; &lt;STRONG&gt;This includes&lt;/STRONG&gt;&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Search Heads&lt;/LI&gt;
&lt;LI&gt;Indexers&lt;/LI&gt;
&lt;LI&gt;License Masters&lt;/LI&gt;
&lt;LI&gt;Cluster Masters&lt;/LI&gt;
&lt;LI&gt;Deployers&lt;/LI&gt;
&lt;LI&gt;Forwarders&lt;/LI&gt;
&lt;/UL&gt;

&lt;HR /&gt;

&lt;P&gt;&lt;STRONG&gt;RECOMMENDATIONS&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;There are several options that you can take to resolve certificate expiration. &lt;STRONG&gt;You must take action prior to July 21, 2016.&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;1)  Remain at your current Splunk version (pre- 6.3) and manually upgrade the current default root certificates with the provided shell script that is appropriate for your operating system. &lt;STRONG&gt;Note that the shell script only replaces the current default root certificate with a new (cloned) certificate with a future expiration date.&lt;/STRONG&gt;  The script does not replace a Splunk default certificate with your own certificate.&lt;/P&gt;

&lt;P&gt;The script is available at:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://download.splunk.com/products/certificates/renewcerts-2016-05-05.zip"&gt;http://download.splunk.com/products/certificates/renewcerts-2016-05-05.zip&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Update: minor script changes to update messages and remove redirect of stderr to /dev/null when checking OpenSSL version&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Please be sure to read the README.txt included in the zip file before running the script.&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;2)  Upgrade all Splunk instances in your environment to 6.3 or above and use self-signed or CA-signed certificate.  We strongly recommend this as the most secure option. Replace current default root certificates with your own certificates. Download the following document to learn about hardening your Splunk infrastructure: &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/index.php?title=Documentation:Splunk:Security:Hardeningstandards:5.0beta&amp;amp;action=pdfbook"&gt;Splunk Security: Hardening Standards&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;3)    Remain at your current Splunk version (pre- 6.3) and use self-signed or CA-signed certificate.  Replace current default root certificates with your own certificates. Download the following document to learn about hardening your Splunk infrastructure.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/index.php?title=Documentation:Splunk:Security:Hardeningstandards:5.0beta&amp;amp;action=pdfbook"&gt;Splunk Security: Hardening Standards&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;4)  Upgrade ALL Splunk instances to 6.3 or above and use those default root certificates.&lt;BR /&gt;&lt;BR /&gt;
&lt;STRONG&gt;Note: Prior to the upgrade, if in use please remove the existing Splunk default certificate copies of ca.pem and cacert.pem&lt;/STRONG&gt;&lt;BR /&gt;
Refer to: &lt;A href="https://answers.splunk.com/answers/403316/upgrading-my-splunk-enterprise-62x-to-63x-did-not-1.html"&gt;Upgrading my Splunk Enterprise 6.2.x to 6.3.x did not upgrade the expiration dates on my default SSL certs, why?&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;See the following link to learn about adding certificates:&lt;BR /&gt;
 &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.0/Security/AboutsecuringyourSplunkconfigurationwithSSL"&gt;Securing Splunk Enterprise&lt;/A&gt;&lt;BR /&gt;
Use the following procedure to configure default certificates:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.3.0/Security/ConfigureSplunkforwardingtousethedefaultcertificate"&gt;Configure Splunk forwarding to use the default certificate&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2016 00:06:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218170#M6148</guid>
      <dc:creator>Ellen</dc:creator>
      <dc:date>2016-04-19T00:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218171#M6149</link>
      <description>&lt;P&gt;Regarding option #2 above, I'm a big fan of &lt;A href="http://conf.splunk.com/session/2015/conf2015_DWaddle_DefensePointSecurity_deploying_SplunkSSLBestPractices.pdf"&gt;http://conf.splunk.com/session/2015/conf2015_DWaddle_DefensePointSecurity_deploying_SplunkSSLBestPractices.pdf&lt;/A&gt;  / &lt;A href="http://conf.splunk.com/session/2015/recordings/2015-splunk-115.mp4"&gt;http://conf.splunk.com/session/2015/recordings/2015-splunk-115.mp4&lt;/A&gt;  which goes through the whole process of removing self-signed certs from end to end.  &lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2016 02:29:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218171#M6149</guid>
      <dc:creator>dwaddle</dc:creator>
      <dc:date>2016-04-19T02:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218172#M6150</link>
      <description>&lt;P&gt;You can also do the following (based on the shell script that Ellen has linked.. Again this is for Splunk &amp;lt; 6.3..&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;openssl req -new -key ca.pem -x509 -config openssl.cnf -subj '/C=US/ST=CA/L=San Francisco/O=Splunk/CN=SplunkCommonCA/emailAddress=support@splunk.com/' -days 3650 &amp;gt; cacert.pem
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then copy the new cacert over the existing Splunk cert, and restart your Splunk Instance.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2016 03:55:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218172#M6150</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2016-04-19T03:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218173#M6151</link>
      <description>&lt;P&gt;How about server certificate(server.pem) ?&lt;BR /&gt;
Only required action is replacing default root certificate ?&lt;BR /&gt;
It seems that the script includes the option to replace the server certificate(s-renewcertssh -serverCert) , but what you mentioned above is only root certificate.&lt;/P&gt;

&lt;P&gt;Thanks advance.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2016 11:33:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218173#M6151</guid>
      <dc:creator>jrlee</dc:creator>
      <dc:date>2016-04-26T11:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218174#M6152</link>
      <description>&lt;P&gt;The following steps will update the expiration date to 10 years into the future for existing key and append it to the existing cacert.pem certificate.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Stop Splunk&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Run the following:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;$ openssl req -new -key ca.pem -x509 -days 3650 &amp;gt; cacert.pem&lt;/CODE&gt;&lt;BR /&gt;
  &lt;CODE&gt;You are about to be asked to enter information that will be incorporated&lt;BR /&gt;
    into your certificate request.&lt;BR /&gt;
    What you are about to enter is what is called a Distinguished Name or a DN.&lt;BR /&gt;
    There are quite a few fields but you can leave some blank&lt;BR /&gt;
    For some fields there will be a default value,&lt;BR /&gt;
    If you enter '.', the field will be left blank.&lt;BR /&gt;
    -----&lt;BR /&gt;
    Country Name (2 letter code) [XX]:US&lt;BR /&gt;
    State or Province Name (full name) []:CA&lt;BR /&gt;
    Locality Name (eg, city) [Default City]:San Francisco&lt;BR /&gt;
    Organization Name (eg, company) [Default Company Ltd]:Splunk&lt;BR /&gt;
    Organizational Unit Name (eg, section) []:SplunkCommonCA&lt;BR /&gt;
    Common Name (eg, your name or your server's hostname) []:SplunkCommonCA&lt;BR /&gt;
    Email Address []:support@splunk.com&lt;/CODE&gt;&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;&lt;CODE&gt;$ cat cacert.pem &amp;gt; ca.pem&lt;/CODE&gt;&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Start Splunk. &lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Confirm by running the following: &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;$ openssl x509 -in "ca.pem" -text -noout&lt;/CODE&gt;&lt;BR /&gt;
&lt;CODE&gt;$ openssl x509 -in "cacert.pem" -text -noout&lt;/CODE&gt;&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 26 Apr 2016 20:05:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218174#M6152</guid>
      <dc:creator>weeb</dc:creator>
      <dc:date>2016-04-26T20:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218175#M6153</link>
      <description>&lt;P&gt;Will there be a problem with forwarders running pre-6.3 sending data  when the indexers and other infrastructure components are already at 6.3 or later?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 14:18:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218175#M6153</guid>
      <dc:creator>dsafian</dc:creator>
      <dc:date>2016-04-27T14:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218176#M6154</link>
      <description>&lt;P&gt;I second this question. Further, I am curious if it's a problem for Forwarders on a version prior to 6.3 where you are not using SSL communication between the Forwarders and Indexers. Or in other words, does the root cert expiring cause splunkd to not function even while not using SSL features?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 17:52:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218176#M6154</guid>
      <dc:creator>mcluver</dc:creator>
      <dc:date>2016-04-27T17:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218177#M6155</link>
      <description>&lt;P&gt;Pre-6.3 forwarders that are configured to use the default certificates will be impacted. If you are not using SSL, you will not be impacted by expiring root certs.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 20:03:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218177#M6155</guid>
      <dc:creator>jmaher_splunk</dc:creator>
      <dc:date>2016-04-27T20:03:53Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218178#M6156</link>
      <description>&lt;P&gt;From my understanding, if you're utilizing a deployment server with forwarders then you will also be impacted. Correct?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 21:09:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218178#M6156</guid>
      <dc:creator>mcluver</dc:creator>
      <dc:date>2016-04-27T21:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218179#M6157</link>
      <description>&lt;P&gt;mcluver: And if you are using SSL to encrypt between the DS server and the DS client.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 21:45:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218179#M6157</guid>
      <dc:creator>weeb</dc:creator>
      <dc:date>2016-04-27T21:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218180#M6158</link>
      <description>&lt;P&gt;Is using a self-signed certificate enough?  &lt;/P&gt;

&lt;P&gt;Under recommendations, option 2 states: "Upgrade all Splunk instances in your environment to 6.3 or above and use self-signed or CA-signed certificate." &lt;/P&gt;

&lt;P&gt;Why the need to upgrade Splunk to 6.3 or above for option 2?  Why isn't the second part sufficient? Especially since under impact it explicitly states "[...] does NOT affect Splunk deployments where:  1) Your configuration uses certificates that are internally generated (self-signed) or obtained from an external Certificate Authority (CA)" &lt;/P&gt;

&lt;P&gt;My assumption is using self-signed certificates would be enough; my concern is there's a place where we aren't replacing the certificate (e.g. mongo or on 8065). &lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2016 03:09:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218180#M6158</guid>
      <dc:creator>triest</dc:creator>
      <dc:date>2016-04-28T03:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218181#M6159</link>
      <description>&lt;P&gt;Good question.  I would say it's an oversight.  If you've converted over to where you are using your own internal CA, or a public CA - then the expiration of Splunk's certs truly doesn't matter at all, regardless of your Splunk version.  Now, when your own certificates expire you'll be in a pickle.  But you should know how to manage that already.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2016 05:20:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218181#M6159</guid>
      <dc:creator>dwaddle</dc:creator>
      <dc:date>2016-04-28T05:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218182#M6160</link>
      <description>&lt;P&gt;When the automatically generated root certificate -- and all of its child certificates -- expires, all things using SSL will be broken.  By DEFAULT, this does NOT include the forwarding of data but DOES include DS client -&amp;gt; DS server.  &lt;/P&gt;

&lt;P&gt;Good timing I suppose for the Splunk Trust virtual.conf Webex on SSL best practices!  We cover ALL of this, in detail.  April 28, 2016 at 9AM PT / 12PM ET / 16:00 GMT.  &lt;A href="http://www.meetup.com/Splunk-Meetups/events/230551134/"&gt;http://www.meetup.com/Splunk-Meetups/events/230551134/&lt;/A&gt;  &lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2016 05:23:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218182#M6160</guid>
      <dc:creator>dwaddle</dc:creator>
      <dc:date>2016-04-28T05:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218183#M6161</link>
      <description>&lt;P&gt;Is $SPLUNK_HOME/etc/auth/openssl really correct?&lt;BR /&gt;&lt;BR /&gt;
Just FYI that doesn't exist on our systems; I would use &lt;CODE&gt;/opt/splunk/bin/splunk cmd openssl&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The executable is typically /opt/splunk/bin/openssl ; on some systems that works, but others I have to use /opt/splunk/bin/splunk cmd openssl due to needing to have the correct path to load libraries.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2016 15:44:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218183#M6161</guid>
      <dc:creator>triest</dc:creator>
      <dc:date>2016-04-28T15:44:29Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218184#M6162</link>
      <description>&lt;P&gt;If you get an error about command not found, Splunk bundles openssl&lt;/P&gt;

&lt;P&gt;IMHO that best way to use the bundled version is &lt;CODE&gt;$SPLUNK_HOME/bin/splunk cmd openssl&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2016 15:49:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218184#M6162</guid>
      <dc:creator>triest</dc:creator>
      <dc:date>2016-04-28T15:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218185#M6163</link>
      <description>&lt;P&gt;If you have bash installed, its easy to check certificate expiration dates:&lt;/P&gt;

&lt;P&gt;ports="8089 8443 8191 8065 5100 5555 9997"; SPLUNK_HOME="/opt/splunk"; openssl="${SPLUNK_HOME}/bin/openssl"; timeout=15 ;   for port in ${ports} ; do expiration=$(echo | timeout ${timeout} ${openssl} s_client -connect 127.0.0.1:${port} 2&amp;gt;/dev/null | ${openssl} x509 -noout -dates 2&amp;gt;/dev/null | grep notAfter); echo ${port} ${expiration:-non-SSL, timeout, or error} ; done&lt;/P&gt;

&lt;P&gt;There may be a couple of things you need to modify&lt;BR /&gt;
ports="8089 8443 8191 8065 5100 5555 9997";&lt;/P&gt;

&lt;P&gt;ports needs to be a space separated list of ports to check; I pulled this from a combination of our search heads and indexers.  &lt;/P&gt;

&lt;P&gt;SPLUNK_HOME="/opt/splunk"; &lt;BR /&gt;
This one should be completely foreign to any Splunk administrator &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; but update the path if need be&lt;/P&gt;

&lt;P&gt;timeout=15&lt;BR /&gt;
I use the timeout command so openssl won't hang if a port isn't open or doesn't use SSL.  This gives the openssl's s_client 15 seconds to return the cert.  That was plenty of time on our systems, but you may need to increase it.&lt;/P&gt;

&lt;P&gt;It shouldn't be hard to write a very similar thing for Windows since Splunk bundles openssl; I just don't have a windows box handy to use to attempt to write one.  If there's a request and no one else volunteers I'll spin up a VM tonight.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:34:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218185#M6163</guid>
      <dc:creator>triest</dc:creator>
      <dc:date>2020-09-29T09:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218186#M6164</link>
      <description>&lt;P&gt;Will this have any impact on Splunk Cloud customers?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2016 15:59:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218186#M6164</guid>
      <dc:creator>JScordo</dc:creator>
      <dc:date>2016-04-28T15:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218187#M6165</link>
      <description>&lt;P&gt;Remark specific for SplunkCloud customers.&lt;BR /&gt;
The SSL certificates used for the outputs.conf are not the stock splunk certificate, therefore will not expire. And the forwarding to splunkcloud will continue.&lt;/P&gt;

&lt;P&gt;For non cloud customer, the forwarding will be impacted by the expiration of the default cert if you are using splunktcp-ssl.&lt;/P&gt;

&lt;P&gt;[EDIT after keen remarks and testing from joshd]&lt;/P&gt;

&lt;P&gt;The splunkd and splunkweb processes will still work using the expired certificate on the forwarders.&lt;BR /&gt;
The only situation to be aware is if you have setup your servers to validate the certificates (by example a deployment-server, or an API connector).  If this is the case, we can assume that this is not the default behavior, and that you already switched the certificates to your own, and are already managing them.&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;Be healthy upgrade your forwarders.&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/1275iA1E4B5CB15C6D348/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2016 18:40:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218187#M6165</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2016-04-28T18:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: For Splunk Enterprise, Splunk Light, and Hunk pre 6.3, default root certificates expire on July 21, 2016 - Recommendations?</title>
      <link>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218188#M6166</link>
      <description>&lt;P&gt;Are you sure about the side issues with the Universal Forwarders? What level of testing has been performed?&lt;/P&gt;

&lt;P&gt;Right now in my lab we have the following:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Universal Forwarder v6.2.9 (ip-172-31-17-125)&lt;/LI&gt;
&lt;LI&gt;Deployment Server v6.2.9 (ip-172.31.17.127)&lt;/LI&gt;
&lt;LI&gt;Search Head v6.3.2 (ip-172.31.17.128)&lt;/LI&gt;
&lt;LI&gt;Indexer v6.3.2 (ip-172.31.17.124)&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;The system time on all instances have been set to beyond the expiry date of the certificate (July 21).&lt;/P&gt;

&lt;P&gt;[root@ip-172-31-17-125 auth]# openssl x509 -enddate -noout -in cacert.pem&lt;BR /&gt;
notAfter=Jul 21 17:12:19 2016 GMT&lt;BR /&gt;
[root@ip-172-31-17-125 auth]# date&lt;BR /&gt;
Fri Jul 22 22:46:21 UTC 2016&lt;/P&gt;

&lt;P&gt;As expected the Splunk SSL forwarding fails connectivity to the Indexer with the Indexer returning a message to check the certificate expiry:&lt;/P&gt;

&lt;P&gt;07-22-2016 22:59:00.941 +0000 ERROR TcpOutputFd - Connection to host=172.31.17.124:9997 failed. sock_error = 0. SSL Error = error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed&lt;/P&gt;

&lt;P&gt;But I am not observing any issues with DS communication. It actually completes the handshake succesfully with the DS:&lt;/P&gt;

&lt;P&gt;[splunk@ip-172-31-17-125 ~]$ splunk display deploy-client&lt;BR /&gt;
Deployment Client is enabled.&lt;BR /&gt;
[splunk@ip-172-31-17-125 ~]$ splunk show deploy-poll&lt;BR /&gt;
Deployment Server URI is set to "172.31.17.127:8089".&lt;/P&gt;

&lt;P&gt;07-22-2016 22:58:12.841 +0000 INFO  DC:DeploymentClient - channel=tenantService/handshake Will retry sending handshake message to DS; err=not_connected&lt;BR /&gt;
07-22-2016 22:58:17.846 +0000 INFO  HttpPubSubConnection - SSL connection with id: connection_172.31.17.125_8089_ip-172-31-17-125.us-west-2.compute.internal_ip-172-31-17-125_uf-6.2&lt;BR /&gt;
07-22-2016 22:58:17.850 +0000 INFO  HttpPubSubConnection - Running phone uri=/services/broker/phonehome/connection_172.31.17.125_8089_ip-172-31-17-125.us-west-2.compute.internal_ip-172-31-17-125_uf-6.2&lt;BR /&gt;
07-22-2016 22:58:24.842 +0000 INFO  HttpPubSubConnection - Running phone uri=/services/broker/phonehome/connection_172.31.17.125_8089_ip-172-31-17-125.us-west-2.compute.internal_ip-172-31-17-125_uf-6.2&lt;BR /&gt;
07-22-2016 22:58:24.843 +0000 INFO  DC:HandshakeReplyHandler - Handshake done.&lt;/P&gt;

&lt;P&gt;On the DS side I can see the client phone in, I can assign it to serverclasses and successfully have it download and install deployment applications, even performing a restart after install.&lt;/P&gt;

&lt;P&gt;From the CLI/API perspective, I can run commands on the Universal Forwarder to interact as a normal admin might without issue:&lt;/P&gt;

&lt;P&gt;[splunk@ip-172-31-17-125 ~]$ splunk disable deploy-client&lt;BR /&gt;
Your session is invalid.  Please login.&lt;BR /&gt;
Splunk username: admin&lt;BR /&gt;
Password: &lt;BR /&gt;
Deployment Client is disabled.&lt;BR /&gt;
You need to restart the Splunk Server (splunkd) for your changes to take effect.&lt;BR /&gt;
[splunk@ip-172-31-17-125 ~]$ splunk edit user admin -password doesthiswork&lt;BR /&gt;
Your session is invalid.  Please login.&lt;BR /&gt;
Splunk username: admin&lt;BR /&gt;
Password: &lt;BR /&gt;
User admin edited.&lt;/P&gt;

&lt;P&gt;From the Search Head I can actually add the DS as a search peer, further showing splunk-to-splunk API access across 8089 is successful:&lt;/P&gt;

&lt;P&gt;[splunk@ip-172-31-17-128 ~]$ splunk list search-server&lt;BR /&gt;
Server at URI "172.31.17.124:8089" with status as "Up"&lt;BR /&gt;
Server at URI "172.31.17.127:8089" with status as "Up"&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;UPDATE 1&lt;/STRONG&gt;: Forgot to add, that we also in the lab spun up a DS with 6.3.2 and observe the same success with communication between the UF on 6.2.9 and DS on 6.3.2.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:35:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/For-Splunk-Enterprise-Splunk-Light-and-Hunk-pre-6-3-default-root/m-p/218188#M6166</guid>
      <dc:creator>joshd</dc:creator>
      <dc:date>2020-09-29T09:35:00Z</dc:date>
    </item>
  </channel>
</rss>

