<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OKTA TLS requires TLS/cipher in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/544005#M90799</link>
    <description>&lt;P&gt;We were using the beta version but, decided to upgrade to latest and greatest.&amp;nbsp; The latest greatest pervious version had malformed URL issue with the proxy.&amp;nbsp; But, the current version doesn't have the issue and support the cipher without configuration.&amp;nbsp; Looks like OKTA notice the issue and resolved.&amp;nbsp; Thanks for you feedback.&lt;/P&gt;&lt;P&gt;Here are the version for reference for others:&amp;nbsp;&amp;nbsp;v 2.25.11 beta release&lt;/P&gt;&lt;P&gt;one with the malformed URL using proxy:&amp;nbsp; 2.25.17&lt;/P&gt;&lt;P&gt;Working version with malformed URL &amp;amp; Proxy:&amp;nbsp; 2.25.19&amp;nbsp; (works with DoD)&lt;/P&gt;</description>
    <pubDate>Tue, 16 Mar 2021 14:19:39 GMT</pubDate>
    <dc:creator>youngsuh</dc:creator>
    <dc:date>2021-03-16T14:19:39Z</dc:date>
    <item>
      <title>OKTA TLS requires TLS/cipher</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/542672#M90665</link>
      <description>&lt;P&gt;“BLUF: Looks like a TLS/cipher problem in addition to ca_bundel. I was able to connect without errors after specifying the ca_bundle file and explicitly specifying TLS version and ciphers.”&lt;/P&gt;&lt;P&gt;I'd then modified inputs.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[SSL]
cipherSuite = ecdhe-rsa-aes-128-gcm-sha-256&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition, I'd added ca_bundel&amp;nbsp;&lt;SPAN&gt;$splunk home dir%/etc/auth/&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am still getting SSL error.&amp;nbsp; Any idea how to get around getting the input working?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Mar 2021 01:26:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/542672#M90665</guid>
      <dc:creator>youngsuh</dc:creator>
      <dc:date>2021-03-06T01:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: OKTA TLS requires TLS/cipher</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/542701#M90668</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/32102"&gt;@youngsuh&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Assuming the cipher is the problem, try ECDHE-RSA-AES128-GCM-SHA256 (uppercase, no hyphen between AES and 128).&lt;/P&gt;&lt;P&gt;For Splunk-to-Okta connections, you can use&amp;nbsp;&lt;A href="https://www.ssllabs.com/ssltest/index.html" target="_blank" rel="noopener"&gt;https://www.ssllabs.com/ssltest/index.html&lt;/A&gt;&amp;nbsp;to easily see which ciphers your okta.com endpoint advertises.&lt;/P&gt;&lt;P&gt;For example, their AWS US West services support TLS 1.2 and the following ciphers (in this order with IANA names):&lt;/P&gt;&lt;P&gt;TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA&lt;BR /&gt;TLS_RSA_WITH_AES_128_GCM_SHA256&lt;BR /&gt;TLS_RSA_WITH_AES_128_CBC_SHA256&lt;BR /&gt;TLS_RSA_WITH_AES_128_CBC_SHA&lt;BR /&gt;TLS_RSA_WITH_AES_256_GCM_SHA384&lt;BR /&gt;TLS_RSA_WITH_AES_256_CBC_SHA256&lt;BR /&gt;TLS_RSA_WITH_AES_256_CBC_SHA&lt;/P&gt;&lt;P&gt;The default inputs.conf SSL cipherSuite value already contains supported ciphers (with OpenSSL names):&lt;/P&gt;&lt;P&gt;cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:&lt;STRONG&gt;ECDHE-RSA-AES256-GCM-SHA384&lt;/STRONG&gt;:ECDHE-ECDSA-AES128-GCM-SHA256:&lt;STRONG&gt;ECDHE-RSA-AES128-GCM-SHA256&lt;/STRONG&gt;:ECDHE-ECDSA-AES256-SHA384:&lt;STRONG&gt;ECDHE-RSA-AES256-SHA384&lt;/STRONG&gt;:ECDHE-ECDSA-AES128-SHA256:&lt;STRONG&gt;ECDHE-RSA-AES128-SHA256&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;That said, I'm not sure what you're trying to do. inputs.conf controls inbound connections, not outbound connections. Do you have an Okta service trying to &lt;EM&gt;push&lt;/EM&gt; data to a Splunk instance rather than a Splunk add-on pulling data from Okta?&lt;/P&gt;</description>
      <pubDate>Sat, 06 Mar 2021 20:54:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/542701#M90668</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2021-03-06T20:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: OKTA TLS requires TLS/cipher</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/542870#M90677</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Q: Do you have an OKTA service trying to&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;push&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;data to a Splunk instance rather than a Splunk add-on pulling data fromOKTA?&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A: We're using the add-on to pull data.&amp;nbsp; We have a CIPHER issue via CURL.&amp;nbsp; I'd try the upper case with no luck in the inputs.conf.&amp;nbsp; We're not pushing data into OKTA.&amp;nbsp; I know that it's a CIPHER issue because CURL doesn't work without the CIPHER arg.&amp;nbsp; &amp;nbsp;We're getting&amp;nbsp;ssl.c:742 via Okta add-on.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Q:&amp;nbsp; Should I input all the CIPHER you listed into inputs.conf?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 20:58:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/542870#M90677</guid>
      <dc:creator>youngsuh</dc:creator>
      <dc:date>2021-03-08T20:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: OKTA TLS requires TLS/cipher</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/543673#M90759</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/32102"&gt;@youngsuh&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which add-on are you using? There's more than one on Splunkbase. If you're using &lt;A href="https://splunkbase.splunk.com/app/3682/" target="_self"&gt;Okta Identity Cloud Add-on for Splunk&lt;/A&gt;, this issue is in the Okta add-on itself, not Splunk. You'll need to contact Okta directly. They may provide support for the add-on.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 19:01:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/543673#M90759</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2021-03-13T19:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: OKTA TLS requires TLS/cipher</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/544005#M90799</link>
      <description>&lt;P&gt;We were using the beta version but, decided to upgrade to latest and greatest.&amp;nbsp; The latest greatest pervious version had malformed URL issue with the proxy.&amp;nbsp; But, the current version doesn't have the issue and support the cipher without configuration.&amp;nbsp; Looks like OKTA notice the issue and resolved.&amp;nbsp; Thanks for you feedback.&lt;/P&gt;&lt;P&gt;Here are the version for reference for others:&amp;nbsp;&amp;nbsp;v 2.25.11 beta release&lt;/P&gt;&lt;P&gt;one with the malformed URL using proxy:&amp;nbsp; 2.25.17&lt;/P&gt;&lt;P&gt;Working version with malformed URL &amp;amp; Proxy:&amp;nbsp; 2.25.19&amp;nbsp; (works with DoD)&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 14:19:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/OKTA-TLS-requires-TLS-cipher/m-p/544005#M90799</guid>
      <dc:creator>youngsuh</dc:creator>
      <dc:date>2021-03-16T14:19:39Z</dc:date>
    </item>
  </channel>
</rss>

