Merge branch 'dev' into foxtrot

This commit is contained in:
William Wernert
2021-07-29 09:52:29 -04:00
9 changed files with 36 additions and 19 deletions

1
HOTFIX
View File

@@ -1 +0,0 @@

View File

@@ -1,18 +1,18 @@
### 2.3.61 ISO image built on 2021/07/22
### 2.3.61-STENODOCKER ISO image built on 2021/07/26
### Download and Verify
2.3.61 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.61.iso
2.3.61-STENODOCKER ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.61-STENODOCKER.iso
MD5: 538F29F3AB57087FC879108FFC81447C
SHA1: C2239206572CBEB697CFA2A4850A16A54BF5FB0D
SHA256: F5035361B63D1EE8D87CE7B0D8333E521A44453274785B62630CAC76C1BEA929
MD5: 10815F1F816E75BF15F331B39CB5EBEC
SHA1: 2D4F4ACA6FBA35563D76C1296A6A774FF73D67FD
SHA256: D9C927C07A2B29C0BD93B1349EB750D4E3CF7F553A14D3EF90593BA660936821
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.61.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.61-STENODOCKER.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.61.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.61-STENODOCKER.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.61.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.61-STENODOCKER.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.61.iso.sig securityonion-2.3.61.iso
gpg --verify securityonion-2.3.61-STENODOCKER.iso.sig securityonion-2.3.61-STENODOCKER.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Thu 22 Jul 2021 10:28:58 AM EDT using RSA key ID FE507013
gpg: Signature made Mon 26 Jul 2021 04:34:58 PM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

View File

@@ -0,0 +1,5 @@
kibana:
enabled: True
dashboard:
discover:
sampleSize: 100

File diff suppressed because one or more lines are too long

View File

@@ -6,6 +6,9 @@
{% set MANAGER = salt['grains.get']('master') %}
{% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %}
{% import_yaml 'kibana/defaults.yaml' as default_settings %}
{% set KIBANA_SETTINGS = salt['grains.filter_by'](default_settings, default='kibana', merge=salt['pillar.get']('kibana', {})) %}
# Add ES Group
kibanasearchgroup:
group.present:
@@ -94,9 +97,12 @@ append_so-kibana_so-status.conf:
kibanadashtemplate:
file.managed:
- name: /opt/so/conf/kibana/saved_objects.ndjson.template
- source: salt://kibana/files/saved_objects.ndjson
- source: salt://kibana/files/saved_objects.ndjson.jinja
- user: 932
- group: 939
- template: jinja
- defaults:
DASHBOARD: {{ KIBANA_SETTINGS.dashboard }}
so-kibana-config-load:
cmd.run:

View File

@@ -149,7 +149,7 @@ http {
root /opt/socore/html;
index index.html;
add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval' https: data: blob:; frame-ancestors 'self'";
add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval' https: data: blob: wss:; frame-ancestors 'self'";
add_header X-Frame-Options SAMEORIGIN;
add_header X-XSS-Protection "1; mode=block";
add_header X-Content-Type-Options nosniff;

View File

@@ -111,6 +111,7 @@ stenolog:
so-steno:
docker_container.{{ STENOOPTIONS.status }}:
{% if STENOOPTIONS.status == 'running' %}
- image: {{ MANAGER }}:5000/{{ IMAGEREPO }}/so-steno:{{ VERSION }}
- start: {{ STENOOPTIONS.start }}
- network_mode: host
@@ -126,6 +127,9 @@ so-steno:
- /opt/so/log/stenographer:/var/log/stenographer:rw
- watch:
- file: /opt/so/conf/steno/config
{% else %} {# if stenographer isn't enabled, then stop and remove the container #}
- force: True
{% endif %}
append_so-steno_so-status.conf:
file.append:
@@ -133,7 +137,6 @@ append_so-steno_so-status.conf:
- text: so-steno
- unless: grep -q so-steno /opt/so/conf/so-status/so-status.conf
{% if not STENOOPTIONS.start %}
so-steno_so-status.disabled:
file.comment:
@@ -152,4 +155,4 @@ delete_so-steno_so-status.disabled:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}
{% endif %}

View File

@@ -9,7 +9,7 @@
{% endif %}
{% if ENABLED is sameas false %}
{% do STENOOPTIONS.update({'status': 'stopped'}) %}
{% do STENOOPTIONS.update({'status': 'absent'}) %}
{% else %}
{% do STENOOPTIONS.update({'status': 'running'}) %}
{% endif %}
{% endif %}

Binary file not shown.