<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk SSL renegotiation in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Splunk-SSL-renegotiation/m-p/89833#M22616</link>
    <description>&lt;P&gt;Openssl doesn't consider this an actual vulnerability which is why it hasn't been fixed in v0.9.8x. It's a way of DoS'ing a server by requesting lots of expensive crypto operations. If you have unfettered access to the REST port you can flood Splunk with plenty of other types of requests that consume just as much CPU. &lt;/P&gt;

&lt;P&gt;Any app that allows an operation like SSL negotiation to an untrusted host is subject to resource exhaustion. The correct answer is to restrict hosts if this is an issue.&lt;/P&gt;

&lt;P&gt;Note also that if the OS firewall is not enabled, any OS is subject to a DOS through resource exhaustion some how, even if it's just TCP port exhaustion.&lt;/P&gt;

&lt;P&gt;This was brought up to Engineering in SPL-58707 and the information provided here serves as an official answer on the topic. &lt;/P&gt;</description>
    <pubDate>Thu, 31 Jan 2013 17:57:16 GMT</pubDate>
    <dc:creator>jbsplunk</dc:creator>
    <dc:date>2013-01-31T17:57:16Z</dc:date>
    <item>
      <title>Splunk SSL renegotiation</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Splunk-SSL-renegotiation/m-p/89831#M22614</link>
      <description>&lt;P&gt;I got report from Nessus saying Splunk is vulnerable to CVE-2011-1473 - renegotiation DoS over SSLv3.&lt;BR /&gt;
How can I fix this?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Oct 2012 11:54:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Splunk-SSL-renegotiation/m-p/89831#M22614</guid>
      <dc:creator>mpavlas</dc:creator>
      <dc:date>2012-10-15T11:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk SSL renegotiation</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Splunk-SSL-renegotiation/m-p/89832#M22615</link>
      <description>&lt;P&gt;I also have found the same vulnerability after running Nessus Security scan.  We are running v4.3.4, is there any update to this issue in v5.0?&lt;/P&gt;

&lt;P&gt;53491 (1) - SSL / TLS Renegotiation DoS&lt;BR /&gt;
Synopsis&lt;BR /&gt;
The remote service allows repeated renegotiation of TLS / SSL connections.&lt;BR /&gt;
Description&lt;BR /&gt;
The remote service encrypts traffic using TLS / SSL and permits clients to renegotiate connections. The computational&lt;BR /&gt;
requirements for renegotiating a connection are asymmetrical between the client and the server, with the server&lt;BR /&gt;
performing several times more work. Since the remote host does not appear to limit the number of renegotiations&lt;BR /&gt;
for a single TLS / SSL connection, this permits a client to open several simultaneous connections and repeatedly&lt;BR /&gt;
renegotiate them, possibly leading to a denial of service condition.&lt;BR /&gt;
See Also&lt;BR /&gt;
&lt;A href="http://orchilles.com/2011/03/ssl-renegotiation-dos.html"&gt;http://orchilles.com/2011/03/ssl-renegotiation-dos.html&lt;/A&gt;&lt;BR /&gt;
&lt;A href="http://www.ietf.org/mail-archive/web/tls/current/msg07553.html"&gt;http://www.ietf.org/mail-archive/web/tls/current/msg07553.html&lt;/A&gt;&lt;BR /&gt;
Solution&lt;BR /&gt;
Contact the vendor for specific patch information.&lt;BR /&gt;
Risk Factor&lt;BR /&gt;
Medium&lt;BR /&gt;
CVSS Base Score&lt;BR /&gt;
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)&lt;BR /&gt;
CVSS Temporal Score&lt;BR /&gt;
3.9 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)&lt;BR /&gt;
References&lt;BR /&gt;
BID 48626&lt;BR /&gt;
CVE CVE-2011-1473&lt;BR /&gt;
XREF OSVDB:73894&lt;BR /&gt;
Plugin Information:&lt;BR /&gt;
Publication date: 2011/05/04, Modification date: 2012/10/04&lt;BR /&gt;
Hosts&lt;BR /&gt;
10.20.22.140 (tcp/8089)&lt;BR /&gt;
The remote host is vulnerable to renegotiation DoS over TLSv1 / SSLv3.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2013 20:00:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Splunk-SSL-renegotiation/m-p/89832#M22615</guid>
      <dc:creator>beaumaris</dc:creator>
      <dc:date>2013-01-29T20:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk SSL renegotiation</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Splunk-SSL-renegotiation/m-p/89833#M22616</link>
      <description>&lt;P&gt;Openssl doesn't consider this an actual vulnerability which is why it hasn't been fixed in v0.9.8x. It's a way of DoS'ing a server by requesting lots of expensive crypto operations. If you have unfettered access to the REST port you can flood Splunk with plenty of other types of requests that consume just as much CPU. &lt;/P&gt;

&lt;P&gt;Any app that allows an operation like SSL negotiation to an untrusted host is subject to resource exhaustion. The correct answer is to restrict hosts if this is an issue.&lt;/P&gt;

&lt;P&gt;Note also that if the OS firewall is not enabled, any OS is subject to a DOS through resource exhaustion some how, even if it's just TCP port exhaustion.&lt;/P&gt;

&lt;P&gt;This was brought up to Engineering in SPL-58707 and the information provided here serves as an official answer on the topic. &lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2013 17:57:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Splunk-SSL-renegotiation/m-p/89833#M22616</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2013-01-31T17:57:16Z</dc:date>
    </item>
  </channel>
</rss>

