<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274022#M2163</link>
    <description>&lt;P&gt;mozilla_public_suffix_list is set to update every 3 hours and it keeps failing every time it tries to update. &lt;/P&gt;

&lt;P&gt;I checked the site and it is accessible -   &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;https://publicsuffix.org/list/effective_tld_names.dat
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What other information would you like to see to help diagnose? &lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 11:34:01 GMT</pubDate>
    <dc:creator>ttchorz</dc:creator>
    <dc:date>2020-09-29T11:34:01Z</dc:date>
    <item>
      <title>Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274020#M2161</link>
      <description>&lt;P&gt;After moving to Splunk 6.5 from Splunk 6.3.3, the following threat intelligence sources fail to download.  &lt;STRONG&gt;Splunk ES was upgraded to 4.5&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;I checked the server has internet access. I also excluded corresponding URLs from the proxy. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;msg="A threat intelligence download has failed" stanza="hailataxii_malware" status="Retrieved document from TAXII feed

msg="A threat intelligence download has failed" stanza="mozilla_public_suffix_list" status="threat list download failed after multiple retries
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 26 Oct 2016 17:24:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274020#M2161</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2016-10-26T17:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274021#M2162</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
The first message you have there is actually a success, but is a result of SOLNESS-10559.  This can be safely suppressed:&lt;BR /&gt;
/opt/splunk/etc/apps/DA-ESS-ThreatIntelligence/local&lt;BR /&gt;
Create a file called inputs.conf if one does not already exist.  If it does just add:&lt;/P&gt;

&lt;P&gt;[configuration_check://confcheck_failed_threat_download] &lt;BR /&gt;
suppress = (Retrieved document from TAXII feed) &lt;/P&gt;

&lt;P&gt;A restart will be required.&lt;/P&gt;

&lt;P&gt;Cause: a search string is off here in confcheck_failed_threat_download.py&lt;/P&gt;

&lt;P&gt;As far as your second error, I would need more information to try and work out the issue.  Perhaps the third party site was unavailable at the time the download was attempted.  Is the second error still happening for you?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:34:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274021#M2162</guid>
      <dc:creator>jwelch_splunk</dc:creator>
      <dc:date>2020-09-29T11:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274022#M2163</link>
      <description>&lt;P&gt;mozilla_public_suffix_list is set to update every 3 hours and it keeps failing every time it tries to update. &lt;/P&gt;

&lt;P&gt;I checked the site and it is accessible -   &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;https://publicsuffix.org/list/effective_tld_names.dat
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What other information would you like to see to help diagnose? &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:34:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274022#M2163</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2020-09-29T11:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274023#M2164</link>
      <description>&lt;P&gt;I would do a wget from the Splunk SH itself, and see what the behavior is:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; wget &lt;A href="https://publicsuffix.org/list/effective_tld_names.dat" target="test_blank"&gt;https://publicsuffix.org/list/effective_tld_names.dat&lt;/A&gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Also is this windows or Linux?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2016 14:12:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274023#M2164</guid>
      <dc:creator>jwelch_splunk</dc:creator>
      <dc:date>2016-10-27T14:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274024#M2165</link>
      <description>&lt;P&gt;I am running Windows &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; &lt;/P&gt;

&lt;P&gt;I will provide the output once I figure out an alternative to wget on Windows&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2016 17:11:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274024#M2165</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2016-10-27T17:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274025#M2166</link>
      <description>&lt;P&gt;There seems to be a problem with the certificate trust. It cold be something to do with TLS 1.2 &lt;/P&gt;

&lt;P&gt;Any ways to bypass the certificate verification in Splunk?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;C:\Program Files (x86)\GnuWin32\bin&amp;gt;wget &lt;A href="https://publicsuffix.org/list/effective" target="test_blank"&gt;https://publicsuffix.org/list/effective&lt;/A&gt;
_tld_names.dat
SYSTEM_WGETRC = c:/progra~1/wget/etc/wgetrc
syswgetrc = C:\Program Files (x86)\GnuWin32/etc/wgetrc
--2016-10-27 13:20:47--  &lt;A href="https://publicsuffix.org/list/effective_tld_names.dat" target="test_blank"&gt;https://publicsuffix.org/list/effective_tld_names.dat&lt;/A&gt;
Resolving publicsuffix.org... 63.245.213.24
Connecting to publicsuffix.org|63.245.213.24|:443... connected.
ERROR: cannot verify publicsuffix.org's certificate, issued by `/C=US/O=DigiCert
 Inc/CN=DigiCert SHA2 Secure Server CA':
  Unable to locally verify the issuer's authority.
ERROR: certificate common name `static-san.mozilla.org' doesn't match requested
host name `publicsuffix.org'.
To connect to publicsuffix.org insecurely, use `--no-check-certificate'.
Unable to establish SSL connection.
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 27 Oct 2016 17:26:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274025#M2166</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2016-10-27T17:26:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274026#M2167</link>
      <description>&lt;P&gt;When you do this wget command, it has nothing to do with splunk.  Splunk is not in the picture here.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2016 18:03:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274026#M2167</guid>
      <dc:creator>jwelch_splunk</dc:creator>
      <dc:date>2016-10-27T18:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274027#M2168</link>
      <description>&lt;P&gt;Understood. When used wget --no-check-certificate a file was downloaded with no issues.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;C:\Program Files (x86)\GnuWin32\bin&amp;gt;wget --no-check-certificate &lt;A href="https://publicsu" target="test_blank"&gt;https://publicsu&lt;/A&gt;
ffix.org/list/effective_tld_names.dat
SYSTEM_WGETRC = c:/progra~1/wget/etc/wgetrc
syswgetrc = C:\Program Files (x86)\GnuWin32/etc/wgetrc
--2016-10-27 14:06:13--  &lt;A href="https://publicsuffix.org/list/effective_tld_names.dat" target="test_blank"&gt;https://publicsuffix.org/list/effective_tld_names.dat&lt;/A&gt;
Resolving publicsuffix.org... 63.245.213.24
Connecting to publicsuffix.org|63.245.213.24|:443... connected.
WARNING: cannot verify publicsuffix.org's certificate, issued by `/C=US/O=DigiCe
rt Inc/CN=DigiCert SHA2 Secure Server CA':
  Unable to locally verify the issuer's authority.
WARNING: certificate common name `static-san.mozilla.org' doesn't match requeste
d host name `publicsuffix.org'.
HTTP request sent, awaiting response... 200 OK
Length: 190800 (186K) [text/plain]
Saving to: `effective_tld_names.dat'

100%[======================================&amp;gt;] 190,800      614K/s   in 0.3s

2016-10-27 14:06:13 (614 KB/s) - `effective_tld_names.dat' saved [190800/190800]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 27 Oct 2016 18:08:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274027#M2168</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2016-10-27T18:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274028#M2169</link>
      <description>&lt;P&gt;Do you have the addresses  of the CA servers removed from the proxy as well? It seems possible that the proxy is messing with the data inside of the cert validation request. &lt;/P&gt;

&lt;P&gt;I had a similar issue with the Splunk App for AWS (receiving invalid cert response, even though checking the cert with openssl showed it was valid)  and I had to force Splunk to ignore the proxy environment variable to correct the problem?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 18:02:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274028#M2169</guid>
      <dc:creator>goodsellt</dc:creator>
      <dc:date>2016-10-28T18:02:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: After upgrading from Splunk 6.3.3 to 6.5.0, why are these threat lists failing to download?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274029#M2170</link>
      <description>&lt;P&gt;This has been noted as a bag in ES 4.5 version. the bag has been fixed in the 4.5.1 version. &lt;/P&gt;

&lt;P&gt;Thanks jwelch for your help on that! &lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2017 15:01:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-After-upgrading-from-Splunk-6-3-3-to/m-p/274029#M2170</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2017-01-12T15:01:12Z</dc:date>
    </item>
  </channel>
</rss>

