Security

SSL "obsolete key" warning in chrome browser

Lucas_K
Motivator

Has anyone been able to get Splunk Web settings that do not trigger these browser reports?

web.conf

[settings]
enableSplunkWebSSL = 1
cipherSuite = TLSv1.2:!eNULL:!aNULL:!SHA1
supportSSLV3Only = False
sslVersions = tls1.2

I still get this

Obsolete Connection Settings
The connection to this site uses a strong protocol (TLS 1.2), an obsolete key exchange (RSA), and a strong cipher (AES_128_GCM).
0 Karma
1 Solution

Lucas_K
Motivator

Solved. No splunk settings were changed from the above to make this work.

alt text

This warning can be removed by using ellipitcal curve cert keys.

Old blog post with examples here : http://blogs.splunk.com/2014/06/03/generate-elliptical-curve-certkeys-for-splunk/

The down side is that your CA needs to be signing EC certs. If they aren't then you can't use ec keys.

View solution in original post

0 Karma

Lucas_K
Motivator

Solved. No splunk settings were changed from the above to make this work.

alt text

This warning can be removed by using ellipitcal curve cert keys.

Old blog post with examples here : http://blogs.splunk.com/2014/06/03/generate-elliptical-curve-certkeys-for-splunk/

The down side is that your CA needs to be signing EC certs. If they aren't then you can't use ec keys.

0 Karma
Get Updates on the Splunk Community!

Monitoring Postgres with OpenTelemetry

Behind every business-critical application, you’ll find databases. These behind-the-scenes stores power ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...