Best Practices for Splunk SSL Duane Waddle



Similar documents
Avoid the SSLippery Slope of Default SSL

DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION WITH CLIENTS

WEB SERVICES CERTIFICATE GUIDE

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Cisco Expressway Certificate Creation and Use

DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION AND TROUBLESHOOTING

Sun Java System Web Server 6.1 Using Self-Signed OpenSSL Certificate. Brent Wagner, Seeds of Genius October 2007

Cisco TelePresence VCS Certificate Creation and Use

LoadMaster SSL Certificate Quickstart Guide

NetApp Storage Encryption: Preinstallation Requirements and Procedures for SafeNet KeySecure

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

Cisco TelePresence VCS Certificate Creation and Use

Creating a Free Trusted SSL Cert with StartSSL for use with Synctuary

CERTIFICATE-BASED SINGLE SIGN-ON FOR EMC MY DOCUMENTUM FOR MICROSOFT OUTLOOK USING CA SITEMINDER

Cisco Expressway Certificate Creation and Use

KMIP installation Guide. DataSecure and KeySecure Version SafeNet, Inc

DoD Public Key Enablement (PKE) Quick Reference Guide. Securing Apache HTTP with mod_ssl for Linux

Enterprise SSL Support

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0

Implementing SSL Security on a PowerExchange Network

Domino and Internet. Security. IBM Collaboration Solutions. Ask the Experts 12/16/2014

Apache, SSL and Digital Signatures Using FreeBSD

BEA Weblogic Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Scenarios for Setting Up SSL Certificates for View

Obtaining SSL Certificates for VMware Horizon View Servers

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.7+

CHAPTER 7 SSL CONFIGURATION AND TESTING

A Brief Guide to Certificate Management

SSL Certificates in IPBrick

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

HTTPS Configuration for SAP Connector

Apache Security with SSL Using Ubuntu

Security Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2

Encrypted Connections

This section includes troubleshooting topics about certificates.

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide

Working with Certificate and Key Files in MatrixSSL

Obtaining SSL Certificates for VMware View Servers

CentOS. Apache. 1 de 8. Pricing Features Customers Help & Community. Sign Up Login Help & Community. Articles & Tutorials. Questions. Chat.

HOWTO. Configure Nginx for SSL with DoD CAC Authentication on CentOS 6.3. Joshua Penton Geocent, LLC

Enabling SSL and Client Certificates on the SAP J2EE Engine

Creation and Management of Certificates

Creating Certificate Authorities and self-signed SSL certificates

Customizing SSL in CA WCC r11.3 This document contains guidelines for customizing SSL access to CA Workload Control Center (CA WCC) r11.3.

McAfee Firewall Enterprise 8.2.1

Junio SSL WebLogic Oracle. Guía de Instalación. Junio, SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19

Certificate technology on Pulse Secure Access

In Depth with Deployment Server Sanford Owings

Certificate technology on Junos Pulse Secure Access

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

How-to-Guide: SAP Web Dispatcher for Fiori Applications

Implementing Secure Sockets Layer on iseries

Understanding SSL/TLS

App Orchestration 2.5

Using the Push Notifications Extension Part 1: Certificates and Setup

SBClient SSL. Ehab AbuShmais

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Using etoken for SSL Web Authentication. SSL V3.0 Overview

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

SSL Interception on Proxy SG

SolarWinds Technical Reference

Replacing VirtualCenter Server Certificates VMware Infrastructure 3

Implementing Secure Sockets Layer (SSL) on i

Setting Up SSL From Client to Web Server and Plugin to WAS

TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security

CA Nimsoft Unified Management Portal

Generating an Apple Push Notification Service Certificate

Acano solution. Certificate Guidelines R1.7. for Single Combined Acano Server Deployments. December H

SSL Peach Pit User Guide. Peach Fuzzer, LLC. Version

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING

EventTracker Windows syslog User Guide

McAfee Firewall Enterprise 8.3.1

Laboratory Exercises VI: SSL/TLS - Configuring Apache Server

EMC Data Protection Search

Introduction to Mobile Access Gateway Installation

Security certificate management

2014 IBM Corporation

How to configure SSL proxying in Zorp 3 F5

App Orchestration 2.0

HP OpenView Adapter for SSL Using Radia

Chapter 17. Transport-Level Security

Managing Web Server Certificates on idrac

Creating and Managing Certificates for My webmethods Server. Version 8.2 and Later

Marriott Enrollment Server for Web User Guide V1.4

Using Microsoft s CA Server with SonicWALL Devices

Yealink Technical White Paper. Contents. About VPN Types of VPN Access VPN Technology... 3 Example Use of a VPN Tunnel...

Go to Policy/Global Properties/SmartDashboard Customization, click Configure. In Certificates and PKI properties, change host_certs_key_size to 2048

How-to-Guide: Apache as Reverse Proxy for Fiori Applications

SSL Tunnels. Introduction

Displaying SSL Certificate and Key Pair Information

Security Digital Certificate Manager

Djigzo S/MIME setup guide

Apache Security with SSL Using Linux

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

SecuritySpy Setting Up SecuritySpy Over SSL

Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS

Transcription:

Copyright 2015 Splunk Inc. Best Practices for Splunk SSL Duane Waddle Defense Point Security

Duane About me and DPS Security Engineer at Defense Point Security Splunk admin since 2010, Splunk Certified Architect Occasionally masquerade as a fez-wearing duck on the Interwebs Defense Point Security Provider of cyber security services to commercial and gov't clients 2014 Splunk Partner of the year, ProServ Public Sector We're hiring! (https://www.defpoint.com) 2

SSL Refresher Authentication of the server (the server is who they say they are) Optional authentication of the client Bulk encryption of data in transit Several moving parts, CAs, keys, CSRs, certs We often say "SSL" when we mean "TLS". True SSL is effectively dead. 3

Splunk Architecture and SSL Splunkweb (SSL to browsers) Splunk-to-splunk data transfer (forwarders to indexers) Splunkd REST port (Inter-Splunk) Deployment Client / Deployment Server REST API / SDKs Distributed Search LDAP connections Clustering 4

Splunk s default SSL posture The out-of-the-box configuration: All certificates are generated on a default-shipped CA configuration Splunkweb does not use SSL Splunkd uses SSL for the REST port - with certificate verification disabled No SSL data inputs/outputs are defined Splunkd LDAP can use SSL - again with no certificate verification 5

http://docs.splunk.com/documentation/splunk/latest/security/aboutsecuringyoursplunkconfigurationwithssl Type of exchange Client function Server function Encryption Certificate Authentication Common Name checking Type of data exchanged Browser to Splunk Web Browser Splunk Web NOT enabled by dictated by client dictated by client search term results default (browser) (browser) Inter-Splunk communication Splunk Web splunkd enabled by default NOT enabled by default NOT enabled by default search term results Forwarding splunkd as a forwarder splunkd as an indexer NOT enabled by default NOT enabled by default NOT enabled by default data to be indexed Inter-Splunk splunkd as a deployment splunkd as deployment enabled by default NOT enabled by default NOT enabled by default configuration data communication client server Inter-Splunk communication splunkd as a search head splunkd as search peer Enabled by default NOT enabled by default NOT enabled by default search data 6

Why this stuff matters A DPS penetration tester found himself on a random Linux box as an unprivileged user. This box was: Running Splunk forwarder as root... with the default admin/changeme password... and default SSL configs, trusting any certificate 7

He was able to: Why this stuff matters Use the REST API to change the deployment server IP (to his box) Restart the forwarder Download an app to the forwarder that started a reverse root shell Pivot from root on that box to downloading the site's Chef repo Lift a copy of all of their recipes, including AWS API keys Moral of the story: Whoever controls your DS controls the users running your forwarders. 8

(some)best Practices Checklist Run Splunk forwarders as an unprivileged user Change forwarder admin passwords Enable strong SSL authentication between DS client and DS server Use host based firewall to limit outbound connections to trusted IPs Pick an appropriate ciphersuite Use wildcard SSL certs with caution Decide on FIPS mode early on and talk to Splunk first 9

Commercial CA or Private CA? Commercial Root certs are in everyone's browser already Costs real money (potentially a LOT if you use ECC) Potential renewal nightmare Private You have to run a CA (likely already are...) Free (ish) Root certs must be distributed You can do very long expirations (in theory) 10

How many certs do I need? Splunkweb - Search Head: A 3rd party CA cert and its root / intermediates Splunkd: A root cert and its intermediates - (either 3rd party or private) One per Splunk Server non Search Head (or one per role in large envs) One throwaway certificate for all of the Splunk UFs to share 11

Our Example Architecture 12

Create Splunk Server Key & CSR $ mkdir $SPLUNK_HOME/etc/auth/myOrg $ cd $SPLUNK_HOME/etc/auth/myOrg $ openssl req -nodes -newkey rsa:2048 -keyout splunk-srv1.web.key -out splunk-srv1.csr $ openssl rsa -in splunk-srv1.web.key -des3 -out splunk-srv1.key Get the CA root certificate chain and put in auth/myorg as cacert.crt. Copy the CA-returned crt file to auth/myorg/splunk-srv1.crt 13

The Search Head - Splunk Web $ cd $SPLUNK_HOME/etc/auth/myOrg $ cat splunk-srv1.crt cacert.crt > splunk-srv1.web.pem $ vi $SPLUNK_HOME/etc/system/local/web.conf [settings] enablesplunkwebssl = 1 httpport = 8443 privkeypath = etc/auth/myorg/splunk-srv1.web.key cacertpath = etc/auth/myorg/splunk-srv1.web.pem sslversions = tls, -tls1.0 ciphersuite =? 14

Architecture - Status 15

Indexers First make certificates as you would for SplunkWeb. $ cd $SPLUNK_HOME/etc/auth/myOrg $ openssl req -nodes -newkey rsa:2048 -keyout splunkidx01.key -out splunk-idx01.csr $ openssl rsa -in splunk-idx01.web.key -des3 -out splunk-idx01.key To make the Indexer formatted.pem: $ cat splunk-idx01.crt splunk-idx01.key cacert.crt > splunk-idx01.pem 16

The Indexer - Inputs.conf vi $SPLUNK_HOME/etc/system/local/inputs.conf [splunktcp-ssl://9998] disabled = 0 [SSL] password = <REDACTED> rootca = $SPLUNK_HOME/etc/auth/myOrg/cacert.crt servercert = $SPLUNK_HOME/etc/auth/myOrg/splunk-idx01.pem sslversions = tls, -tls1.0 ciphersuite =? requireclientcert = true false 17

The Forwarder First make certificates as you would for SplunkWeb. This can be done on your deployment server. $ cd $SPLUNK_HOME/etc/auth/myOrg/forwarder $ openssl req -nodes -newkey rsa:2048 -keyout splunk-forwarder.web.key - out splunk-forwarder.csr On forwarders only, make the key password "password" for reasons... $ openssl rsa -in splunk-forwarder.web.key -des3 -out splunkforwarder.key Throw away splunk-forwarder.web.key $ cat splunk-forwarder.crt splunk-forwarder.key cacert.crt > splunkforwarder.pem Copy the splunk-forwarder.pem and cacert.crt to your Forwarder(s): Yes you could use an APP for this. 18

Forwarder to Indexer - Outputs.conf vi $SPLUNK_HOME/etc/system/local/outputs.conf [tcpout] defaultgroup = myindexers [tcpout:myindexers] server = splunk-idx01.myorg.com:9998 sslcertpath = $SPLUNK_HOME/etc/auth/myOrg/splunk-forwarder.pem sslpassword = password # For Reasons sslrootcapath = $SPLUNK_HOME/etc/auth/myOrg/cacert.crt sslverifyservercert = true sslcommonnametocheck = splunk-idx01.myorg.com 19

Gotcha - Forwarder to Indexer If you mistype the sslrootcapath argument in outputs.conf, the forwarder will default to not-ssl when trying to talk to indexer. The error on the indexer will look like the following: 6-23-2014 20:46:48.918 +0000 ERROR TcpInputProc - Error encountered for connection from src=10.0.1.57:41778. error: 140760FC:SSL routines:ssl23_get_client_hello:unknown protocol 20

Architecture - Status 21

The Deployment Server First make certificates as you would for SplunkWeb. $ cd $SPLUNK_HOME/etc/auth/myOrg $ openssl req -nodes -newkey rsa:2048 -keyout splunkd.web.key -out splunk-d.csr $ openssl rsa -in splunk-d.web.key -des3 -out splunk-d.key To make the Deployment Server formatted pem: $ cat splunk-d.crt splunk-d.key cacert.crt > splunk-d.pem 22

The Deployment Server - server.conf vi $SPLUNK_HOME/etc/system/local/server.conf [sslconfig] cacertfile = cacert.crt capath = $SPLUNK_HOME/etc/auth/myOrg sslkeysfile = splunk-d.pem sslkeysfilepassword = <REDACTED> sslversions = tls, -tls1.0 ciphersuite =? requireclientcert = false 23

Splunk Forwarder - DS Clients vi $SPLUNK_HOME/etc/system/local/server.conf [sslconfig] cacertfile = cacert.crt capath = $SPLUNK_HOME/etc/auth/myOrg sslkeysfile = splunk-forwarder.pem sslkeysfilepassword = password # Reasons sslversions = tls, -tls1.0 sslverifyservercert = true sslcommonnametocheck = splunk-d.myorg.com 24

Architecture - Status 25

Splunk - Server to Server vi $SPLUNK_HOME/etc/system/local/server.conf [sslconfig] cacertfile = cacert.crt capath = $SPLUNK_HOME/etc/auth/myOrg sslkeysfile = splunk-srvxx.pem sslkeysfilepassword = <REDACTED> sslversions = tls, -tls1.0 ciphersuite =? requireclientcert = false sslverifyservercert = true sslcommonnamelist = splunk-srv01.myorg.com, splunk-d.myorg.com, splunkidx01.myorg.com, splunk-idx02.myorg.com,... 26

Architecture - Status 27

Splunk LDAPS Each LDAP strategy has an SSL toggle on/off In GUI, it s a checkbox In authentication.conf, each LDAP stanza needs SSLEnabled=1 Minimum Certificate settings in $SPLUNK_HOME/etc/openldap/ldap.conf TLS_REQCERT demand TLS_CACERT /opt/splunk/etc/auth/ldaprootcert.crt TLS_CIPHER_SUITE (equivalent to ciphersuite) 28

Indexer Clustering Indexer clustering uses both REST API and a dedicated cluster data transfer port Certs & config for REST API are all covered above SSL signature and common name checking occur BEFORE pass4symmkey checking Protip: If building a cluster from scratch, use the same splunk.secret on all cluster nodes Converting a cluster from default certs to production certs can be brittle Enable sslverifyservercert and sslcommonnamelist LAST sslcommonnamelist needs to list all possible REST communications partners All indexers, cluster master, license server, and search heads... 29

Indexer Clustering - SSL Data Transfer Minimal documentation - only one reference to it in the docs http://docs.splunk.com/documentation/splunk/latest/admin/serverconf In server.conf comment out replication-port stanza and add: [replication_port-ssl://8002] password = <REDACTED> rootca = $SPLUNK_HOME/etc/auth/myOrg/cacert.crt servercert = $SPLUNK_HOME/etc/auth/myOrg/splunk-idx01.pem Try this out in a test cluster first! This is NOT a common setting in the wild 30

SHC and KVStore SHC - same REST port rules apply as with indexer clustering KVStore has its own SSL config stanza in server.conf: [KVstore] cacertpath = sslkeyspath = sslkeyspassword = Docs mention these ONLY work in FIPS mode - needs more testing 31

Thank You! Other resources Splunk IRC ( EFNet #splunk ) Splunk Answers ( http://answers.splunk.com ) Splunk community wiki ( http://wiki.splunk.com ) Splunk User Group Slack ( http://splunk-usergroups.slack.com ) http://www.georgestarcher.com/ http://www.duanewaddle.com/ And here's a plug for some other excellent.conf sessions... Beyond the Lookup Glass The 'State' of Splunk - Using the KVStore to Maintain App State Creating and Using Custom Alert Actions Optimizing Splunk Knowledge Objects - A Tale of Unintended Consequences Hold Me Closer Tiny Data 32

Bonus Material Deleted Scenes

Be your own Certificate Authority We will use ECC crypto for higher performance Start out by making a CA Root key and certificate. Very helpful Splunk Blogs post by Jose Hernandez http://blogs.splunk.com/2014/06/03/generate-elliptical-curve-certkeys-for-splunk/ You will be prompted for passphrases for multiple keys Keep them secret Keep them safe Use a different passphrase for every key 34

Create the CA Root Key & Cert - ECC $ cd $SPLUNK_HOME/etc/auth/myOrg $ splunk cmd openssl ecparam -name "prime256v1" -genkey splunk cmd openssl ec -des3 -out CAroot.key Enter PEM pass phrase: <abc123> Verifying - Enter PEM pass phrase: <abc123> $ splunk cmd openssl req -key CAroot.key -sha1 -subj "/CN=Splunk Root CA/O=myOrg" -new -x509 -days 3650 -set_serial 1 -out cacert.crt Enter pass phrase for CAroot.key: <abc123> 35

Create Splunk Server Key & CSR - ECC $ splunk cmd openssl ecparam -name "prime256v1" -genkey -out splunk-d.web.key $ splunk cmd openssl ec -des3 -in splunk-d.web.key -out splunk-d.key Enter PEM pass phrase: <def234> Verifying - Enter PEM pass phrase: <def234> $ splunk cmd openssl req -key splunk-d.key -subj "/CN=splunk-d.myorg.com/O=myOrg" -new -out splunk-d.csr 36

Sign the Splunk Cert using Root Cert - ECC $ splunk cmd openssl x509 -req -days 1095 -in splunk-d.csr -CA cacert.crt -CAkey CAroot.key -set_serial 02 -out splunk-d.crt Signature ok subject=/cn=splunk-d.myorg.com/o=myorg Getting CA Private Key Enter pass phrase for CAroot.key: <abc123> Now we have a keyfile (both encrypted and not) and a cert issued by our CA 37

Some other ways to be your own CA Active Directory Certificate Services Fedora Certificate Server http://pki.fedoraproject.org/wiki/pki_main_page Also a part of the FreeIPA suite (Commercially as Red Hat Directory Server) 38

Bonus Material Splunk Blog: http://blogs.splunk.com/2014/06/03/generate-elliptical-curve-certkeys-forsplunk/ Troubleshooting: http://mikeberggren.com/post/28429473721/chain-check 39

Test connectivity with openssl s_client OpenSSL has a built-in SSL client that you can use to do basic connectivity testing. Works just like TELNET but over SSL No certificate verification by default, but you can get it to dump the presented certs so you can check them by hand. It will also dump TLS protocol version and negotiated cipher specification $ openssl s_client -connect 10.10.10.10:8089 -showcerts The returned certs can be checked in plaintext by copypasting into a file and running $ openssl x509 -text -noout -in xxxx.crt 40

Forwarder to LB Indexers - Outputs.conf -1 vi $SPLUNK_HOME/etc/system/local/outputs.conf (or use an app) [tcpout] defaultgroup = myindexers [tcpout:myindexers] maxqueuesize = 128MB useack = true autolb = true server = splunk-idx01.myorg.com:9998, splunk-idx02.myorg.com:9998 sslcertpath = $SPLUNK_HOME/etc/auth/myOrg/splunk-forwarder.pem sslpassword = <REDACTED> sslrootcapath = $SPLUNK_HOME/etc/auth/myOrg/cacert.crt 41

Forwarder to LB Indexers - Outputs.conf -2 vi $SPLUNK_HOME/etc/system/local/outputs.conf (or use an app) [splunk-idx01.myorg.com] sslverifyservercert = true sslcommonnametocheck = splunk-idx01.myorg.com [splunk-idx02.myorg.com] sslverifyservercert = true sslcommonnametocheck = splunk-idx02.myorg.com 42

File formats can and will trip you up Different areas of Splunk use SSL key files / cert files formatted slightly differently Splunk always expects PEM encoded certs & keys Some CAs will send DER and you ll have to convert Some will send PKCS7, PKCS12, or even stranger files Splunkweb v6.1.x and older has CherryPy dependencies SSL key file must be unencrypted SSL key and SSL cert must be in separate files Splunkd expects key / cert / root-cert all in one file 43

Handling PKCS7 packaged certs Sometimes happens from a SSL admin grabbing certs from Comodo and often has the whole certificate chain. Yeah, this happened to George helping someone rebuild their Splunk. Starts like: -----BEGIN PKCS7----- MIIOewYJKoZIhvc To change the format: openssl pkcs7 -inform PEM -in $PKCS7_FILE -outform PEM -print_certs > splunk-srv1.pem Copy the file splunk-srv1.pem to cacert.pem vi cacert.pem and delete the first certificate and save the file Copy the file splunk-srv1.pem to splunk-srv1.crt and delete the last two certificates and save the file 44

Handling PKCS12 formatted certs Sometimes you ll even get PKCS12 (.pfx) files back from the certificate authority / SSL admin PKCS12 files may contain both certs and keys To change the format: openssl pkcs12 -in $PKCS7_FILE -out splunk-srv1.pem Take the resulting.pem file, and break it up into different files for each part CA Root / Intermediate certs Your issued certs Keys (if any) You should be able to tell which is which by the common name and issuer If not, run each through openssl x509 -text -noout -in <file> 45

Certificate verification vs common-name matching Unique, but complementary, parts of the SSL authentication scheme Splunk can do same CA verification without common-name matching Splunk CN matching does require CA verification be true Certificate verification is a cryptographic operation. Does a cert s signature by its issuer cryptographically verify when checked using the issuer s public key? Common-Name matching comes next Does the CN= in the certificate match the CN you are expecting? Browsers do this comparison against the DNS host name in the URL Splunk does this by hard coded configuration entry 46

errors :) This is from enabling sslverifyservercert = true and screwing up a cluster peer s cert on purpose 09-07-2014 00:51:55.619-0400 ERROR SSLCommon - Certificate doesn't verify, err=19 09-07-2014 00:51:55.619-0400 INFO NetUtils - SSL Connection could not be made - server authentication error 09-07-2014 00:51:55.619-0400 WARN HTTPClient - SSL_ServerAuthError connecting to=104.131.13.214:8089 09-07-2014 00:51:55.619-0400 WARN HTTPClient - Connect to=104.131.13.214:8089 timed out; exceeded 30sec 47

more errors This is from (again on purpose) putting in a false CommonNameToCheck 09-07-2014 15:53:33.771-0400 ERROR SSLCommon - Common name doesn't match server cert common name=splunk-d.myorg.com. Tried to match aaa.bbb.cc. 09-07-2014 15:53:33.771-0400 WARN HTTPClient - SSL Connection could not be made - server authentication failed 09-07-2014 15:53:33.771-0400 WARN HTTPClient - SSL_ServerAuthError connecting to=splunk-d.myorg.com:8089 09-07-2014 15:53:33.771-0400 WARN HTTPClient - Connect to=splunkd.myorg.com:8089 timed out; exceeded 30sec 48

CipherSuite Errors Ran into an error setting up SSL on indexer cluster. After enabling new cert on the CM, error doing a 'splunk apply cluster-bundle' Splunkd.log on CM shows error:1408a0c1:ssl routines:ssl3_get_client_hello:no shared cipher Some wiresharking later... ciphersuite = HIGH fixed it 49

FIN