<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to remove weak ciphers? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632239#M219624</link>
    <description>&lt;P&gt;It would seem that cypher is needed by Splunk and so shouldn't be removed from the cipherSuite setting.&amp;nbsp; You may want to submit a support request about this.&lt;/P&gt;</description>
    <pubDate>Fri, 24 Feb 2023 18:47:00 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2023-02-24T18:47:00Z</dc:date>
    <item>
      <title>How to remove weak ciphers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632228#M219621</link>
      <description>&lt;P&gt;I am trying to pair down the list of ciphers we are using.&amp;nbsp; When I remove&amp;nbsp;AES256-GCM-SHA384 I begin to get the below errors on our Search Head Cluster.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;02-24-2023 16:17:35.187 +0000 WARN SSLCommon [121742 TcpOutEloop] - Received fatal SSL3 alert. ssl_state='SSLv2/v3 read server hello A', alert_description='handshake failure'.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;02-24-2023 16:17:35.187 +0000 ERROR TcpOutputFd [121742 TcpOutEloop] - Connection to host=SH_IP_REMOVED:8999 failed. sock_error = 0. SSL Error = error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In server.conf, web.conf, inputs.conf and outputs.conf I have the below ciphers.&amp;nbsp; Once I remove&amp;nbsp;AES256-GCM-SHA384.&amp;nbsp; The errors begin.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cipherSuite = ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:AES256-GCM-SHA384&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 16:34:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632228#M219621</guid>
      <dc:creator>coreyCLI</dc:creator>
      <dc:date>2023-02-24T16:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to remove weak ciphers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632239#M219624</link>
      <description>&lt;P&gt;It would seem that cypher is needed by Splunk and so shouldn't be removed from the cipherSuite setting.&amp;nbsp; You may want to submit a support request about this.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 18:47:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632239#M219624</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-02-24T18:47:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to remove weak ciphers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632280#M219637</link>
      <description>&lt;P&gt;When was the last time you updated sslVersions in&amp;nbsp;&lt;SPAN&gt;server.conf, web.conf, inputs.conf and outputs.conf&lt;/SPAN&gt;? &amp;nbsp;Rather, why do you need to set cipherSuite locally in the first place? &lt;SPAN&gt;AES256-GCM-SHA384 is perhaps preferred or required for SSLv2/v3. &amp;nbsp;But&lt;/SPAN&gt;&amp;nbsp;SSLv2 and SSLv3 have been obsolete for very long. &amp;nbsp;In fact, TLSv1.0 is already deprecated; even TLSv1.1 is deemed inadequate these days. &amp;nbsp;In 9.x, default for sslVersions is 1.2 only.&lt;/P&gt;&lt;P&gt;If you have a good reason to localize cipherSuite, you need to eliminate SSLv2/v3 from sslVersions as well. (I had a weird situation two years ago where my Puppet server was so old it did not support TLS1.1. &amp;nbsp;So, I had to enable TLS1.0 in Splunk knowing it was insecure.) &amp;nbsp;But if you don't have to, just remove sslVersions and cipherSuite from local/ files. &amp;nbsp;default/ in 9.5 is&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;sslVersions = tls1.2
cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
ecdhCurves = prime256v1, secp384r1, secp521r1&lt;/LI-CODE&gt;&lt;P&gt;(Read the corresponding files in default/ directory will help. &amp;nbsp;Also read your version of &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/Serverconf" target="_blank" rel="noopener"&gt;server.conf&lt;/A&gt;, etc.)&lt;/P&gt;</description>
      <pubDate>Sun, 26 Feb 2023 07:19:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632280#M219637</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-02-26T07:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to remove weak ciphers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632367#M219671</link>
      <description>&lt;P&gt;I should have included this in my question but I have the below in server.conf, inputs.conf, outputs.conf and web.conf.&amp;nbsp; I don't have access to the system today but I am not sure where SSLv2/v3 would come from then?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;sslVersions = tls1.2
cipherSuite = ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:AES256-GCM-SHA384&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, we are at version 9.0.3&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2023 13:50:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/632367#M219671</guid>
      <dc:creator>coreyCLI</dc:creator>
      <dc:date>2023-02-27T13:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to remove weak ciphers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/635318#M220722</link>
      <description>&lt;P&gt;For anyone interested.&amp;nbsp; My particular issue required me to call out the ecdhCurves specifically.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[replication_port-ssl://8999]
cipherSuite = ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384
ecdhCurves = prime256v1, secp384r1, secp521r1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Everything worked once adding the ecdhCurves.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2023 13:24:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-remove-weak-ciphers/m-p/635318#M220722</guid>
      <dc:creator>coreyCLI</dc:creator>
      <dc:date>2023-03-21T13:24:51Z</dc:date>
    </item>
  </channel>
</rss>

