<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security - ssl rest api not closed on /dev/zero stream input in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277315#M53151</link>
    <description>&lt;P&gt;@lmcphpe - Did one of the answers below help provide a solution your question? If yes, please click “Accept” below the best answer to resolve this post and upvote anything that was helpful. If no, please leave a comment with more feedback. Thanks.&lt;/P&gt;</description>
    <pubDate>Sat, 11 Mar 2017 17:12:16 GMT</pubDate>
    <dc:creator>aaraneta_splunk</dc:creator>
    <dc:date>2017-03-11T17:12:16Z</dc:date>
    <item>
      <title>security - ssl rest api not closed on /dev/zero stream input</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277312#M53148</link>
      <description>&lt;P&gt;If you run the command&lt;BR /&gt;
openssl s_client -connect ip:port &amp;lt; /dev/zero 2&amp;gt;&amp;amp;1&lt;BR /&gt;
towards the rest api (port 8089) with ssl enabled, the tcp connection stays up forever after ssl handshake is done.&lt;/P&gt;

&lt;P&gt;is there a way to mitigate this vulnerability?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2017 12:45:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277312#M53148</guid>
      <dc:creator>lmcphpe</dc:creator>
      <dc:date>2017-02-04T12:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: security - ssl rest api not closed on /dev/zero stream input</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277313#M53149</link>
      <description>&lt;P&gt;I would suggest that you look at how to report a possible vulnerability at &lt;A href="https://www.splunk.com/page/securityportal"&gt;https://www.splunk.com/page/securityportal&lt;/A&gt;.  Report it there, and the ProdSec team will review as needed and get back to you.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 15:23:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277313#M53149</guid>
      <dc:creator>dwaddle</dc:creator>
      <dc:date>2017-02-07T15:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: security - ssl rest api not closed on /dev/zero stream input</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277314#M53150</link>
      <description>&lt;P&gt;This reminds me of the Slowloris [&lt;A href="https://en.wikipedia.org/wiki/Slowloris_(computer_security)"&gt;https://en.wikipedia.org/wiki/Slowloris_(computer_security)&lt;/A&gt;] attack that takes advantage of web servers that can't handle a lot of open connections. I haven't tested to see how vulnerable Splunk is but I would seriously consider placing some kind of reverse proxy in front of any user-facing services. I'm sure nginx is a popular option for this but if you already have F5 load balancers you may be able to use HTTP and OneConnect profiles to separate the client and server side connections. I'm sure other load balancers have similar options.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 23:47:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277314#M53150</guid>
      <dc:creator>jtacy</dc:creator>
      <dc:date>2017-02-07T23:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: security - ssl rest api not closed on /dev/zero stream input</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277315#M53151</link>
      <description>&lt;P&gt;@lmcphpe - Did one of the answers below help provide a solution your question? If yes, please click “Accept” below the best answer to resolve this post and upvote anything that was helpful. If no, please leave a comment with more feedback. Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2017 17:12:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/security-ssl-rest-api-not-closed-on-dev-zero-stream-input/m-p/277315#M53151</guid>
      <dc:creator>aaraneta_splunk</dc:creator>
      <dc:date>2017-03-11T17:12:16Z</dc:date>
    </item>
  </channel>
</rss>

