<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk using cipherSuite caused CLI command issues in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114546#M183826</link>
    <description>&lt;P&gt;I got this error whilst trying to disable the obsolete (according to Google Chrome) RSA key exchange ciphers by removing the "RSA+AESGCM:RSA+AES" from my cipherSuite. &lt;/P&gt;

&lt;P&gt;Upon investigating this issue, it seemed to be caused by the fact that out of the box, splunk cannot use the ECDH ciphers (ecdhCurves = ), so it always does a fallback to the ciphers with RSA as key exchange. But if you remove the RSA ciphers, there are no ciphers left for splunk to use, so it fails.&lt;/P&gt;

&lt;P&gt;By specifying "ecdhCurves = prime256v1,secp384r1,secp521r1" the ECDH ciphers can be used, and solves the problem.&lt;/P&gt;

&lt;P&gt;side-note;&lt;BR /&gt;
Using this in combination with the following config enables HSTS headers and Perfect Forward Secrecy:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256;
ecdhCurves = prime256v1,secp384r1,secp521r1
sendStictTransportSecurityHeader = true
sslVersions = tls1.2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The above configuration is applicable to server.conf under [sslConfig] for the mgmt and kv store port, and in web.conf under [settings] for splunkweb.&lt;BR /&gt;
(The ciperSuite is taken form the &lt;A href="https://mozilla.github.io/server-side-tls/ssl-config-generator/"&gt;Mozilla SSL Configuration Generator&lt;/A&gt; using the modern profile. Older browsers may not support this)&lt;/P&gt;</description>
    <pubDate>Fri, 10 Feb 2017 17:11:00 GMT</pubDate>
    <dc:creator>Action01</dc:creator>
    <dc:date>2017-02-10T17:11:00Z</dc:date>
    <item>
      <title>Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114534#M183814</link>
      <description>&lt;P&gt;I am on Splunk Version   : 6.1.3 and trying to use  splunk supported cipherSuite  from TLSv1.2, but it is causing the CLI command to fail and as a result he is unable to posh the cluster bundle or use the REST end point of the Peer.&lt;/P&gt;

&lt;P&gt;Here is   Configuration:&lt;/P&gt;

&lt;P&gt;../etc/system/local/server.conf                               [sslConfig]&lt;BR /&gt;
../etc/system/local/server.conf                               allowSslCompression = false&lt;BR /&gt;
../etc/system/default/server.conf                             allowSslRenegotiation = true&lt;BR /&gt;
../etc/system/default/server.conf                             caCertFile = cacert.pem&lt;BR /&gt;
../etc/system/default/server.conf                             caPath = ../etc/auth&lt;BR /&gt;
../etc/system/default/server.conf                             certCreateScript = ../bin/splunk, createssl, server-cert&lt;BR /&gt;
../etc/system/local/server.conf                               cipherSuite = AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDH-RSA-AES256-GCM-SHA384:ECDH-ECDSA-AES256-GCM-SHA384&lt;BR /&gt;
../etc/system/local/server.conf                               enableSplunkdSSL = true&lt;BR /&gt;
../etc/system/default/server.conf                             sendStrictTransportSecurityHeader = false&lt;BR /&gt;
../etc/system/default/server.conf                             sslKeysfile = server.pem&lt;BR /&gt;
../etc/system/local/server.conf                               sslKeysfilePassword = #####&lt;BR /&gt;
../etc/system/local/server.conf                               supportSSLV3Only = True&lt;BR /&gt;
../etc/system/local/server.conf                               useClientSSLCompression = false&lt;BR /&gt;
../etc/system/local/server.conf                               useSplunkdClientSSLCompression = false&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Issue is  that  CLI command or REST endpoints is failing with error :&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;./splunk list monitor result in error *&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Splunk is not running, and it must be for this operation. To start splunk, run "splunk start". (02)&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;CLI command to check the bundle status also result in error&lt;/STRONG&gt; &lt;BR /&gt;
splunk show  cluster-bundle-status&lt;/P&gt;

&lt;P&gt;*Failed to contact the master. ERROR:&lt;BR /&gt;
Couldn't complete HTTP request: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshak*e failure&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;The REST endpoint gives error&lt;/STRONG&gt; &lt;BR /&gt;
 curl -u admin:changeme -k &lt;A href="https://localhost:8089/services/search/jobs" target="_blank"&gt;https://localhost:8089/services/search/jobs&lt;/A&gt; -d"search=search *"&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;curl: (35) SSL connect error&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:08:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114534#M183814</guid>
      <dc:creator>sat94541</dc:creator>
      <dc:date>2020-09-28T18:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114535#M183815</link>
      <description>&lt;P&gt;This issue has been fixed in Splunk Version 6.2. Please consider upgrade.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2014 19:48:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114535#M183815</guid>
      <dc:creator>rbal_splunk</dc:creator>
      <dc:date>2014-11-07T19:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114536#M183816</link>
      <description>&lt;P&gt;um...we just upgraded to splunk 6.2 and we are having the same issue as outlined above.  @rbal_splunk are you SURE this was fixed in 6.2 release because it does not seem to be:&lt;/P&gt;

&lt;P&gt;$ splunk list forward-server&lt;BR /&gt;
Couldn't complete HTTP request: Could not find SSL library&lt;/P&gt;

&lt;P&gt;$ splunk show cluster-bundle-status&lt;/P&gt;

&lt;P&gt;Failed to contact the master. ERROR: &lt;BR /&gt;
Couldn't complete HTTP request: Could not find SSL library&lt;/P&gt;

&lt;P&gt;Failed to contact the peers endpoint. ERROR: &lt;BR /&gt;
Couldn't complete HTTP request: Could not find SSL library&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 14:03:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114536#M183816</guid>
      <dc:creator>mookiie2005</dc:creator>
      <dc:date>2014-11-13T14:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114537#M183817</link>
      <description>&lt;P&gt;I've been able to recreate it on my side using the following:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt; Clean install of Splunk 6.2&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Update server.conf with the following:&lt;/P&gt;

&lt;P&gt;cipherSuite = AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDH-RSA-AES256-GCM-SHA384:ECDH-ECDSA-AES256-GCM-SHA384&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Restarted Splunk&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Ran the following command:&lt;/P&gt;

&lt;P&gt;[root@bporepo01 local]# /opt/splunk/bin/splunk list monitor&lt;BR /&gt;
Couldn't complete HTTP request: error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Re-opening the bug.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:12:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114537#M183817</guid>
      <dc:creator>bosburn_splunk</dc:creator>
      <dc:date>2020-09-28T18:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114538#M183818</link>
      <description>&lt;P&gt;For new install of Splunk 6.2 you need to add following to web.conf&lt;/P&gt;

&lt;P&gt;[settings]&lt;BR /&gt;
supportSSLV3Only = false&lt;BR /&gt;
cipherSuite = AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDH-RSA-AES256-GCM-SHA384:ECDH-ECDSA-AES256-GCM-SHA384&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 23:55:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114538#M183818</guid>
      <dc:creator>rbal_splunk</dc:creator>
      <dc:date>2014-11-14T23:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114539#M183819</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/203651"&gt;@mookiie2005&lt;/a&gt;&lt;/P&gt;

&lt;P&gt;There was some confusion with the postings on this question so I just cleaned everything up. Please refer to &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/143299"&gt;@bosburn_splunk&lt;/a&gt;'s answer and &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/72216"&gt;@rbal_splunk&lt;/a&gt;'s comment below that&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:11:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114539#M183819</guid>
      <dc:creator>ppablo</dc:creator>
      <dc:date>2020-09-28T18:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114540#M183820</link>
      <description>&lt;P&gt;My issue was a different issue - with HP-UX install, LD_LIBRARY has to be set before attempting any CLI commands.&lt;/P&gt;

&lt;P&gt;Rajpal again rocks the house.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 21:02:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114540#M183820</guid>
      <dc:creator>bosburn_splunk</dc:creator>
      <dc:date>2014-11-26T21:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114541#M183821</link>
      <description>&lt;P&gt;Hope people in need will see this. Had the same issue while trying to enable Search Head Clustering and had to add the above configs to my web.conf &lt;STRONG&gt;&lt;EM&gt;as well&lt;/EM&gt;&lt;/STRONG&gt; as server.conf under [sslConfig]&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 21:04:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114541#M183821</guid>
      <dc:creator>glancaster</dc:creator>
      <dc:date>2014-11-26T21:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114542#M183822</link>
      <description>&lt;P&gt;Yes that also resolved the issue for us, Rajpal does indeed rock!&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 23:22:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114542#M183822</guid>
      <dc:creator>mookiie2005</dc:creator>
      <dc:date>2014-11-26T23:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114543#M183823</link>
      <description>&lt;P&gt;we also needed the settings in both web and server.conf. in addition to the LD_LIBRARY setting.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 23:23:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114543#M183823</guid>
      <dc:creator>mookiie2005</dc:creator>
      <dc:date>2014-11-26T23:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114544#M183824</link>
      <description>&lt;P&gt;So how do we do this LD Library Setting?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2015 17:31:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114544#M183824</guid>
      <dc:creator>jayojo</dc:creator>
      <dc:date>2015-01-15T17:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114545#M183825</link>
      <description>&lt;P&gt;For us it was "export LD_LIBRARY_PATH=/opt/splunk/splunkforwarder/lib"&lt;/P&gt;

&lt;P&gt;But it is based off of your install path for the splunk lib directory it would most likely be:&lt;BR /&gt;
export LD_LIBRARY_PATH=/opt/splunkforwarder/lib&lt;/P&gt;

&lt;P&gt;srry for the delay in response&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:50:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114545#M183825</guid>
      <dc:creator>mookiie2005</dc:creator>
      <dc:date>2020-09-28T18:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk using cipherSuite caused CLI command issues</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114546#M183826</link>
      <description>&lt;P&gt;I got this error whilst trying to disable the obsolete (according to Google Chrome) RSA key exchange ciphers by removing the "RSA+AESGCM:RSA+AES" from my cipherSuite. &lt;/P&gt;

&lt;P&gt;Upon investigating this issue, it seemed to be caused by the fact that out of the box, splunk cannot use the ECDH ciphers (ecdhCurves = ), so it always does a fallback to the ciphers with RSA as key exchange. But if you remove the RSA ciphers, there are no ciphers left for splunk to use, so it fails.&lt;/P&gt;

&lt;P&gt;By specifying "ecdhCurves = prime256v1,secp384r1,secp521r1" the ECDH ciphers can be used, and solves the problem.&lt;/P&gt;

&lt;P&gt;side-note;&lt;BR /&gt;
Using this in combination with the following config enables HSTS headers and Perfect Forward Secrecy:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256;
ecdhCurves = prime256v1,secp384r1,secp521r1
sendStictTransportSecurityHeader = true
sslVersions = tls1.2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The above configuration is applicable to server.conf under [sslConfig] for the mgmt and kv store port, and in web.conf under [settings] for splunkweb.&lt;BR /&gt;
(The ciperSuite is taken form the &lt;A href="https://mozilla.github.io/server-side-tls/ssl-config-generator/"&gt;Mozilla SSL Configuration Generator&lt;/A&gt; using the modern profile. Older browsers may not support this)&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2017 17:11:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-using-cipherSuite-caused-CLI-command-issues/m-p/114546#M183826</guid>
      <dc:creator>Action01</dc:creator>
      <dc:date>2017-02-10T17:11:00Z</dc:date>
    </item>
  </channel>
</rss>

