<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL LDAP breaks from 6.3.3 to 6.3.5 in Security</title>
    <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265070#M7265</link>
    <description>&lt;P&gt;Considering that 6.3.4 and 6.3.5 now use a new openssl version, due to new vulnerabilities found, the LDAP server needs to have the most up-to-date default cipher list in order to be approved by the splunk default cipher list. &lt;/P&gt;

&lt;P&gt;If it is not possible to update the default cipher list on the LDAP server (AD 2003 for instance is buggy and update won't be possible - SPL-109427), then following workaround should be applied: &lt;/P&gt;

&lt;P&gt;1) obtain Ciphers configured on your LDAP server. &lt;BR /&gt;
2) tweak &lt;CODE&gt;TLS_CIPHER_SUITE&lt;/CODE&gt; command in etc/openldap/ldap.conf to match it.&lt;/P&gt;

&lt;P&gt;HTH.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Jul 2016 17:16:33 GMT</pubDate>
    <dc:creator>mgaraventa_splu</dc:creator>
    <dc:date>2016-07-19T17:16:33Z</dc:date>
    <item>
      <title>SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265061#M7256</link>
      <description>&lt;P&gt;Hi forum,&lt;/P&gt;

&lt;P&gt;I updated my search head from 6.3.3 to 6.3.5. After the update, LDAP with SSL isn't working anymore.&lt;BR /&gt;
splunkd.log tells me:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;07-19-2016 13:02:23.647 +0200 ERROR ScopedLDAPConnection - strategy="LDAP" Error binding to LDAP. reason="Can't contact LDAP server".
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;LDAP server is surely reachable. In log of the LDAP server we see that the client is terminating the connection. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sudo /opt/splunk/bin/splunk  cmd openssl s_client -showcerts -host ldapserver -port 636 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;tells me at a certain point&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;---
No client certificate CA names sent
Peer signing digest: SHA512
Server Temp Key: DH, 768 bits
---
SSL handshake has read 7139 bytes and written 7 bytes
---
New, (NONE), Cipher is (NONE)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This is different to 6.3.3...&lt;/P&gt;

&lt;P&gt;Any hints?!&lt;/P&gt;

&lt;P&gt;Thanks for your help in advance,&lt;/P&gt;

&lt;P&gt;Andreas&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 11:10:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265061#M7256</guid>
      <dc:creator>schose</dc:creator>
      <dc:date>2016-07-19T11:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265062#M7257</link>
      <description>&lt;P&gt;fyi: same issue with v6.3.4 &lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 11:25:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265062#M7257</guid>
      <dc:creator>schose</dc:creator>
      <dc:date>2016-07-19T11:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265063#M7258</link>
      <description>&lt;P&gt;Can you share your ldap configuration ?  Have you added configuration in authentication.conf file under auth app?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 12:06:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265063#M7258</guid>
      <dc:creator>hardikJsheth</dc:creator>
      <dc:date>2016-07-19T12:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265064#M7259</link>
      <description>&lt;P&gt;We does not change any LDAP configuration, however we see that openssl have been updated to 1.0.2g. It seems that ldap client could be configured with etc/openldap/ldap.conf ?! We are pretty sure that the current openldap release does not execept DH with 768bit server keys and we need to adjust cipher suites.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 12:37:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265064#M7259</guid>
      <dc:creator>schose</dc:creator>
      <dc:date>2016-07-19T12:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265065#M7260</link>
      <description>&lt;P&gt;We know this issue, using a special LDAP-environment.&lt;BR /&gt;
Specs are described at&lt;BR /&gt;
&lt;A href="https://www.openssl.org/docs/manmaster/apps/ciphers.html" target="_blank"&gt;https://www.openssl.org/docs/manmaster/apps/ciphers.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;We had to add in /etc/openldap/ldap.conf something like this:&lt;BR /&gt;
TLS_CIPHER_SUITE HIGH:!DHE&lt;/P&gt;

&lt;P&gt;To use secific ssl-parameter for the LDAP-connection&lt;/P&gt;

&lt;P&gt;This issue was described within RN 6.3.5 SPL-109427 &lt;/P&gt;

&lt;P&gt;Matthias&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:16:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265065#M7260</guid>
      <dc:creator>msche</dc:creator>
      <dc:date>2020-09-29T10:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265066#M7261</link>
      <description>&lt;P&gt;We know this issue, using a special LDAP-environment.&lt;BR /&gt;
Specs are described at&lt;BR /&gt;
&lt;A href="https://www.openssl.org/docs/manmaster/apps/ciphers.html" target="_blank"&gt;https://www.openssl.org/docs/manmaster/apps/ciphers.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;We had to add in /etc/openldap/ldap.conf something like this:&lt;BR /&gt;
TLS_CIPHER_SUITE HIGH:!DHE&lt;/P&gt;

&lt;P&gt;To use secific ssl-parameter for the LDAP-connection&lt;/P&gt;

&lt;P&gt;This issue was described within RN 6.3.5 SPL-109427&lt;/P&gt;

&lt;P&gt;Matthias&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:16:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265066#M7261</guid>
      <dc:creator>msche</dc:creator>
      <dc:date>2020-09-29T10:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265067#M7262</link>
      <description>&lt;P&gt;Put the string below in your ldap.conf file ($SPLUNK_HOME/etc/openldap/certs) and see if this is fixed.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;TLS_CIPHER_SUITE HIGH:MEDIUM:@STRENGTH:+3DES:+RC4:!aNULL:!MD5:!SRP:!PSK:!aDSS:!kECDH:!kDH:!SEED,!IDEA:!RC2:!RC5&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 13:58:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265067#M7262</guid>
      <dc:creator>rafamss</dc:creator>
      <dc:date>2016-07-19T13:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265068#M7263</link>
      <description>&lt;P&gt;Hi Matthias,&lt;/P&gt;

&lt;P&gt;thx. this fixes our issue!&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 14:23:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265068#M7263</guid>
      <dc:creator>schose</dc:creator>
      <dc:date>2016-07-19T14:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265069#M7264</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;

&lt;P&gt;as matthias wrote adding:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;TLS_CIPHER_SUITE HIGH:!DHE
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to etc/openldap/ldap.conf fixes the issue. It seems if openssl 1.0.2g does not accept DH with short key sizes.&lt;/P&gt;

&lt;P&gt;Thx all for your help!&lt;/P&gt;

&lt;P&gt;Andreas&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 14:25:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265069#M7264</guid>
      <dc:creator>schose</dc:creator>
      <dc:date>2016-07-19T14:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL LDAP breaks from 6.3.3 to 6.3.5</title>
      <link>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265070#M7265</link>
      <description>&lt;P&gt;Considering that 6.3.4 and 6.3.5 now use a new openssl version, due to new vulnerabilities found, the LDAP server needs to have the most up-to-date default cipher list in order to be approved by the splunk default cipher list. &lt;/P&gt;

&lt;P&gt;If it is not possible to update the default cipher list on the LDAP server (AD 2003 for instance is buggy and update won't be possible - SPL-109427), then following workaround should be applied: &lt;/P&gt;

&lt;P&gt;1) obtain Ciphers configured on your LDAP server. &lt;BR /&gt;
2) tweak &lt;CODE&gt;TLS_CIPHER_SUITE&lt;/CODE&gt; command in etc/openldap/ldap.conf to match it.&lt;/P&gt;

&lt;P&gt;HTH.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 17:16:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/SSL-LDAP-breaks-from-6-3-3-to-6-3-5/m-p/265070#M7265</guid>
      <dc:creator>mgaraventa_splu</dc:creator>
      <dc:date>2016-07-19T17:16:33Z</dc:date>
    </item>
  </channel>
</rss>

