<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: When updating our certs between universal forwarders and indexers, why am I seeing the following SSL handshake failure? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438852#M76503</link>
    <description>&lt;P&gt;I will 2nd this. Is there a reason you aren't using the default CipherSuite?&lt;/P&gt;</description>
    <pubDate>Tue, 30 Oct 2018 21:33:55 GMT</pubDate>
    <dc:creator>cboillot</dc:creator>
    <dc:date>2018-10-30T21:33:55Z</dc:date>
    <item>
      <title>When updating our certs between universal forwarders and indexers, why am I seeing the following SSL handshake failure?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438848#M76499</link>
      <description>&lt;P&gt;I'm attempting to update our certs between our universal forwarders (UF) and indexers in our test environment. I believe I have the certs properly generated and in place. But when the UF attempts to forward, we see this error:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;10-19-2018 08:13:14.661 -0600 WARN  SSLCommon - Received fatal SSL3 alert. ssl_state='SSLv3 read server hello A', alert_description='handshake failure'.

10-19-2018 14:17:44.863 +0000 WARN  SSLCommon - Received fatal SSL3 alert. ssl_state='SSLv3 read client hello C', alert_description='handshake failure'.
10-19-2018 14:17:44.863 +0000 ERROR TcpInputProc - Error encountered for connection from src=nn.nn.nn.nn:38438. error:1408A0C1:SSL routines:ssl3_get_client_hello:no shared cipher
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This leads me to believe that the cipherSuite needs to be updated ... &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;indexer server.conf - ( Splunk 7.1.3 ]

[sslConfig]
sslVersions = tls1.2
sslVersionsForClient = tls1.2

cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDH-ECDSA-AES256-GCM-SHA384:ECDH-ECDSA-AES128-GCM-SHA256:ECDH-ECDSA-AES128-SHA256:AES256-GCM-SHA384:AES128-GCM-SHA256:AES128-SHA256

( etc/system/local/inputs.conf under [SSL] )
cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDH-ECDSA-AES256-GCM-SHA384:ECDH-ECDSA-AES128-GCM-SHA256:ECDH-ECDSA-AES128-SHA256:AES256-GCM-SHA384:AES128-GCM-SHA256:AES128-SHA256:TLSv1+HIGH:TLSv1.2+HIGH:@STRENGTH


    UF - Splunk 6.6.4 - etc/system/default/server.conf

    [sslConfig]
    cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256

    etc/system/default/outputs.conf

    [tcpout]
    sslVersions = tls1.2
    cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-GCM-SHA384:AES128-GCM-SHA256:AES128-SHA256:ECDH-ECDSA-AES256-GCM-SHA384:ECDH-ECDSA-AES128-GCM-SHA256:ECDH-ECDSA-AES256-SHA384:ECDH-ECDSA-AES128-SHA256
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've been using this link to generate and set up the new forwarding certs.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://wiki.splunk.com/images/f/fb/SplunkTrustApril-SSLipperySlopeRevisited.pdf"&gt;https://wiki.splunk.com/images/f/fb/SplunkTrustApril-SSLipperySlopeRevisited.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 14:45:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438848#M76499</guid>
      <dc:creator>pkeller</dc:creator>
      <dc:date>2018-10-19T14:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: When updating our certs between universal forwarders and indexers, why am I seeing the following SSL handshake failure?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438849#M76500</link>
      <description>&lt;P&gt;Couple of things to check, is the &lt;CODE&gt;sslPassword&lt;/CODE&gt; same on both UFs and Indexer? &lt;BR /&gt;
And stanza name in outputs.conf is &lt;CODE&gt;[tcpout]&lt;/CODE&gt; instead of &lt;CODE&gt;[tcpoutput]&lt;/CODE&gt;&lt;BR /&gt;
Indexers should be configured to accept encrypted data, meaning, inputs.conf on indexers should have a stanza defined as &lt;CODE&gt;[splunktcp-ssl:&amp;lt;port&amp;gt;]&lt;/CODE&gt;&lt;BR /&gt;
* Set  to the port on which the forwarder sends the encrypted data&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 18:21:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438849#M76500</guid>
      <dc:creator>sudosplunk</dc:creator>
      <dc:date>2018-10-19T18:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: When updating our certs between universal forwarders and indexers, why am I seeing the following SSL handshake failure?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438850#M76501</link>
      <description>&lt;P&gt;Thank you for your comments ... &lt;/P&gt;

&lt;P&gt;the stanza is definitely [tcpout] ... the error was due to my typing this out in haste. Indexers are definitely listening on the splunktcp-ssl port I configured. I'll edit the post to the correct setting.&lt;/P&gt;

&lt;P&gt;[splunk@somewhere ~]$ lsof -Pi :9998&lt;BR /&gt;
COMMAND   PID   USER   FD   TYPE    DEVICE SIZE/OFF NODE NAME&lt;BR /&gt;
splunkd 14568 splunk   47u  IPv4 150502287      0t0  TCP *:9998 (LISTEN)&lt;/P&gt;

&lt;P&gt;[splunk@somewhere ~]$ /opt/splunk/bin/splunk btool inputs list splunktcp-ssl&lt;BR /&gt;
[splunktcp-ssl://9998]&lt;BR /&gt;
_rcvbuf = 1572864&lt;BR /&gt;
evt_dc_name = &lt;BR /&gt;
evt_dns_name = &lt;/P&gt;

&lt;P&gt;[SSL]&lt;BR /&gt;
password = +-------redacted encrypted password ----+&lt;BR /&gt;
rootCA = $SPLUNK_HOME/etc/slave-apps/_cluster/auth/cacert.crt&lt;BR /&gt;
serverCert = $SPLUNK_HOME/etc/slave-apps/_cluster/auth/secidx.pem&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:43:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438850#M76501</guid>
      <dc:creator>pkeller</dc:creator>
      <dc:date>2020-09-29T21:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: When updating our certs between universal forwarders and indexers, why am I seeing the following SSL handshake failure?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438851#M76502</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;While looking at &lt;CODE&gt;$SPLUNK_HOME/default/etc/system/default/inputs.conf&lt;/CODE&gt; it has below ciphersuite, can you please remove &lt;CODE&gt;cipherSuite&lt;/CODE&gt; from &lt;CODE&gt;[SSL]&lt;/CODE&gt; stanza in &lt;CODE&gt;$SPLUNK_HOME/default/etc/system/local/inputs.conf&lt;/CODE&gt; on Indexer so that it will use default cipherSuite.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 22 Oct 2018 15:24:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438851#M76502</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2018-10-22T15:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: When updating our certs between universal forwarders and indexers, why am I seeing the following SSL handshake failure?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438852#M76503</link>
      <description>&lt;P&gt;I will 2nd this. Is there a reason you aren't using the default CipherSuite?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 21:33:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438852#M76503</guid>
      <dc:creator>cboillot</dc:creator>
      <dc:date>2018-10-30T21:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: When updating our certs between universal forwarders and indexers, why am I seeing the following SSL handshake failure?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438853#M76504</link>
      <description>&lt;P&gt;Thank you ...&lt;/P&gt;

&lt;P&gt;The default didn't work, so I went back and added the content at the end of the list as I'd seen that had solved different SSL issues when I upgraded beyond 6.5 ( guessing on the version )&lt;/P&gt;

&lt;P&gt;I've reverted everything back to the default and I'm still getting the same errors.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 23:20:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438853#M76504</guid>
      <dc:creator>pkeller</dc:creator>
      <dc:date>2018-10-30T23:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: When updating our certs between universal forwarders and indexers, why am I seeing the following SSL handshake failure?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438854#M76505</link>
      <description>&lt;P&gt;From the splunk docs i have observed server.conf ciphersuite is different from inputs.conf and outputs.conf. Check your cipheresuite. &lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.1.3/Security/Ciphersuites"&gt;https://docs.splunk.com/Documentation/Splunk/7.1.3/Security/Ciphersuites&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 06:47:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/When-updating-our-certs-between-universal-forwarders-and/m-p/438854#M76505</guid>
      <dc:creator>lavanyaanne</dc:creator>
      <dc:date>2018-11-02T06:47:00Z</dc:date>
    </item>
  </channel>
</rss>

