<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to remediate when running testssl.sh against Splunk server reveals vulnerability to &amp;quot;Secure Client-Initiated Renegotiation&amp;quot;? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355130#M8909</link>
    <description>&lt;P&gt;Hi xavierashe,&lt;/P&gt;

&lt;P&gt;Not sure if you got the solution to this or not but you can disable client renegotiation in the web.conf file by using;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;allowSslRenegotiation = false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Remember to restart Splunk web;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk restart splunkweb
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;According to the docs, this setting is set to true by default. Testing this now I no longer get the vulnerable message in testssl.sh and my manual testing also shows the same.&lt;/P&gt;</description>
    <pubDate>Thu, 14 Dec 2017 15:50:33 GMT</pubDate>
    <dc:creator>mvillene</dc:creator>
    <dc:date>2017-12-14T15:50:33Z</dc:date>
    <item>
      <title>How to remediate when running testssl.sh against Splunk server reveals vulnerability to "Secure Client-Initiated Renegotiation"?</title>
      <link>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355127#M8906</link>
      <description>&lt;P&gt;I ran the &lt;A href="https://testssl.sh/" target="_blank"&gt;testssl.sh&lt;/A&gt; tool against my Splunk server and it came back saying that I was vulnerable to "Secure Client-Initiated Renegotiation", a DoS threat.  I can't find anything on how to remediate this.  &lt;/P&gt;

&lt;P&gt;Splunk Version 6.5.3&lt;BR /&gt;
Splunk Build 36937ad027d4&lt;BR /&gt;
Red Hat Enterprise Linux Server release 6.8 (Santiago)&lt;BR /&gt;
openssl098e-0.9.8e-20.el6_7.1.x86_64&lt;/P&gt;

&lt;P&gt;Here's my web.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;enableSplunkWebSSL = 1
privKeyPath = /opt/splunk/etc/auth/mycerts/splunk.key
serverCert = /opt/splunk/etc/auth/mycerts/splunk.pem
sslVersions = tls1.1, tls1.2
cipherSuite = ALL:!ADH:!NULL:!RC4:!3DES:!ANON
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:52:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355127#M8906</guid>
      <dc:creator>xavierashe</dc:creator>
      <dc:date>2020-09-29T13:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to remediate when running testssl.sh against Splunk server reveals vulnerability to "Secure Client-Initiated Renegotiation"?</title>
      <link>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355128#M8907</link>
      <description>&lt;P&gt;Hi xavierashe,&lt;/P&gt;

&lt;P&gt;Not sure if this is helpful or not, but a quick google check on this &lt;CODE&gt;testssl.sh&lt;/CODE&gt; script showed a known bug which reports fault positives generated by Secure Client-Initiated Renegotiation &lt;A href="https://github.com/drwetter/testssl.sh/issues/234"&gt;https://github.com/drwetter/testssl.sh/issues/234&lt;/A&gt; also another quick google about &lt;CODE&gt;Secure Client-Initiated Renegotiation&lt;/CODE&gt; itself returned this page &lt;A href="https://securingtomorrow.mcafee.com/technical-how-to/tips-securing-ssl-renegotiation/"&gt;https://securingtomorrow.mcafee.com/technical-how-to/tips-securing-ssl-renegotiation/&lt;/A&gt; where you can find commands to test if there is a real problem or not.&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Sun, 30 Apr 2017 23:42:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355128#M8907</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2017-04-30T23:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to remediate when running testssl.sh against Splunk server reveals vulnerability to "Secure Client-Initiated Renegotiation"?</title>
      <link>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355129#M8908</link>
      <description>&lt;P&gt;Following that second link, I ran the test it suggested and it looks like Secure Renegotiation is supported.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;---
R
RENEGOTIATING
depth=2 C = US, O = DigiCert Inc, OU = &lt;A href="https://community.splunk.com/www.digicert.com" target="test_blank"&gt;www.digicert.com&lt;/A&gt;, CN = DigiCert High Assurance EV Root CA
verify return:1
depth=1 C = US, O = [REDACTED], CN = [REDACTED]
verify return:1
depth=0 C = US, ST = [REDACTED], L = [REDACTED], O = [REDACTED], CN = [REDACTED]
verify return:1
read:errno=0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 01 May 2017 12:32:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355129#M8908</guid>
      <dc:creator>xavierashe</dc:creator>
      <dc:date>2017-05-01T12:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to remediate when running testssl.sh against Splunk server reveals vulnerability to "Secure Client-Initiated Renegotiation"?</title>
      <link>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355130#M8909</link>
      <description>&lt;P&gt;Hi xavierashe,&lt;/P&gt;

&lt;P&gt;Not sure if you got the solution to this or not but you can disable client renegotiation in the web.conf file by using;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;allowSslRenegotiation = false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Remember to restart Splunk web;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk restart splunkweb
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;According to the docs, this setting is set to true by default. Testing this now I no longer get the vulnerable message in testssl.sh and my manual testing also shows the same.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 15:50:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-remediate-when-running-testssl-sh-against-Splunk-server/m-p/355130#M8909</guid>
      <dc:creator>mvillene</dc:creator>
      <dc:date>2017-12-14T15:50:33Z</dc:date>
    </item>
  </channel>
</rss>

