Our Splunk Enterprise installs are working properly, and the web apps show no certificate errors however Tenable Nessus scans are dinging all four servers with "SSL Certificate with Wrong Hostname (45411)" plugin, stating the common name in the certificate is SplunkServerDefaultCert which is not the same as the hostname of the server. The web apps are configured with proper certificates from our CA with the correct common name. However, the Splunkd service that is running is using this SplunkServerDefaultCert which is where the vulnerability comes from. I verified this by stopping the Splunkd service, rescanning the server and the vulnerability goes away and then comes back when it is restarted. I'm not very experience with certificates, so am figure a lot of this out as I go. I believe this is coming from the server.pem and ca.pem files in the $SPLUNK_HOME/etc/auth/ directory. I'm just not sure how I go about swapping those out with a certificate from our own CA with the correct common name.
... View more