Security

SSL "obsolete key" warning in chrome browser

Lucas_K
Motivator

Has anyone been able to get Splunk Web settings that do not trigger these browser reports?

web.conf

[settings]
enableSplunkWebSSL = 1
cipherSuite = TLSv1.2:!eNULL:!aNULL:!SHA1
supportSSLV3Only = False
sslVersions = tls1.2

I still get this

Obsolete Connection Settings
The connection to this site uses a strong protocol (TLS 1.2), an obsolete key exchange (RSA), and a strong cipher (AES_128_GCM).
0 Karma
1 Solution

Lucas_K
Motivator

Solved. No splunk settings were changed from the above to make this work.

alt text

This warning can be removed by using ellipitcal curve cert keys.

Old blog post with examples here : http://blogs.splunk.com/2014/06/03/generate-elliptical-curve-certkeys-for-splunk/

The down side is that your CA needs to be signing EC certs. If they aren't then you can't use ec keys.

View solution in original post

0 Karma

Lucas_K
Motivator

Solved. No splunk settings were changed from the above to make this work.

alt text

This warning can be removed by using ellipitcal curve cert keys.

Old blog post with examples here : http://blogs.splunk.com/2014/06/03/generate-elliptical-curve-certkeys-for-splunk/

The down side is that your CA needs to be signing EC certs. If they aren't then you can't use ec keys.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...