mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 09:12:45 +01:00
Merge branch 'dev' into foxtrot
This commit is contained in:
@@ -1,18 +1,18 @@
|
||||
### 2.3.61 ISO image built on 2021/07/22
|
||||
### 2.3.61-STENODOCKER ISO image built on 2021/07/26
|
||||
|
||||
|
||||
|
||||
### Download and Verify
|
||||
|
||||
2.3.61 ISO image:
|
||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.61.iso
|
||||
2.3.61-STENODOCKER ISO image:
|
||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.61-STENODOCKER.iso
|
||||
|
||||
MD5: 538F29F3AB57087FC879108FFC81447C
|
||||
SHA1: C2239206572CBEB697CFA2A4850A16A54BF5FB0D
|
||||
SHA256: F5035361B63D1EE8D87CE7B0D8333E521A44453274785B62630CAC76C1BEA929
|
||||
MD5: 10815F1F816E75BF15F331B39CB5EBEC
|
||||
SHA1: 2D4F4ACA6FBA35563D76C1296A6A774FF73D67FD
|
||||
SHA256: D9C927C07A2B29C0BD93B1349EB750D4E3CF7F553A14D3EF90593BA660936821
|
||||
|
||||
Signature for ISO image:
|
||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.61.iso.sig
|
||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.61-STENODOCKER.iso.sig
|
||||
|
||||
Signing key:
|
||||
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
||||
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
|
||||
|
||||
Download the signature file for the ISO:
|
||||
```
|
||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.61.iso.sig
|
||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.61-STENODOCKER.iso.sig
|
||||
```
|
||||
|
||||
Download the ISO image:
|
||||
```
|
||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.61.iso
|
||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.61-STENODOCKER.iso
|
||||
```
|
||||
|
||||
Verify the downloaded ISO image using the signature file:
|
||||
```
|
||||
gpg --verify securityonion-2.3.61.iso.sig securityonion-2.3.61.iso
|
||||
gpg --verify securityonion-2.3.61-STENODOCKER.iso.sig securityonion-2.3.61-STENODOCKER.iso
|
||||
```
|
||||
|
||||
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
||||
```
|
||||
gpg: Signature made Thu 22 Jul 2021 10:28:58 AM EDT using RSA key ID FE507013
|
||||
gpg: Signature made Mon 26 Jul 2021 04:34:58 PM EDT using RSA key ID FE507013
|
||||
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
||||
gpg: WARNING: This key is not certified with a trusted signature!
|
||||
gpg: There is no indication that the signature belongs to the owner.
|
||||
|
||||
5
salt/kibana/defaults.yaml
Normal file
5
salt/kibana/defaults.yaml
Normal file
@@ -0,0 +1,5 @@
|
||||
kibana:
|
||||
enabled: True
|
||||
dashboard:
|
||||
discover:
|
||||
sampleSize: 100
|
||||
File diff suppressed because one or more lines are too long
@@ -6,6 +6,9 @@
|
||||
{% set MANAGER = salt['grains.get']('master') %}
|
||||
{% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %}
|
||||
|
||||
{% import_yaml 'kibana/defaults.yaml' as default_settings %}
|
||||
{% set KIBANA_SETTINGS = salt['grains.filter_by'](default_settings, default='kibana', merge=salt['pillar.get']('kibana', {})) %}
|
||||
|
||||
# Add ES Group
|
||||
kibanasearchgroup:
|
||||
group.present:
|
||||
@@ -94,9 +97,12 @@ append_so-kibana_so-status.conf:
|
||||
kibanadashtemplate:
|
||||
file.managed:
|
||||
- name: /opt/so/conf/kibana/saved_objects.ndjson.template
|
||||
- source: salt://kibana/files/saved_objects.ndjson
|
||||
- source: salt://kibana/files/saved_objects.ndjson.jinja
|
||||
- user: 932
|
||||
- group: 939
|
||||
- template: jinja
|
||||
- defaults:
|
||||
DASHBOARD: {{ KIBANA_SETTINGS.dashboard }}
|
||||
|
||||
so-kibana-config-load:
|
||||
cmd.run:
|
||||
|
||||
@@ -149,7 +149,7 @@ http {
|
||||
root /opt/socore/html;
|
||||
index index.html;
|
||||
|
||||
add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval' https: data: blob:; frame-ancestors 'self'";
|
||||
add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval' https: data: blob: wss:; frame-ancestors 'self'";
|
||||
add_header X-Frame-Options SAMEORIGIN;
|
||||
add_header X-XSS-Protection "1; mode=block";
|
||||
add_header X-Content-Type-Options nosniff;
|
||||
|
||||
@@ -111,6 +111,7 @@ stenolog:
|
||||
|
||||
so-steno:
|
||||
docker_container.{{ STENOOPTIONS.status }}:
|
||||
{% if STENOOPTIONS.status == 'running' %}
|
||||
- image: {{ MANAGER }}:5000/{{ IMAGEREPO }}/so-steno:{{ VERSION }}
|
||||
- start: {{ STENOOPTIONS.start }}
|
||||
- network_mode: host
|
||||
@@ -126,6 +127,9 @@ so-steno:
|
||||
- /opt/so/log/stenographer:/var/log/stenographer:rw
|
||||
- watch:
|
||||
- file: /opt/so/conf/steno/config
|
||||
{% else %} {# if stenographer isn't enabled, then stop and remove the container #}
|
||||
- force: True
|
||||
{% endif %}
|
||||
|
||||
append_so-steno_so-status.conf:
|
||||
file.append:
|
||||
@@ -133,7 +137,6 @@ append_so-steno_so-status.conf:
|
||||
- text: so-steno
|
||||
- unless: grep -q so-steno /opt/so/conf/so-status/so-status.conf
|
||||
|
||||
|
||||
{% if not STENOOPTIONS.start %}
|
||||
so-steno_so-status.disabled:
|
||||
file.comment:
|
||||
@@ -152,4 +155,4 @@ delete_so-steno_so-status.disabled:
|
||||
test.fail_without_changes:
|
||||
- name: {{sls}}_state_not_allowed
|
||||
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
|
||||
@@ -9,7 +9,7 @@
|
||||
{% endif %}
|
||||
|
||||
{% if ENABLED is sameas false %}
|
||||
{% do STENOOPTIONS.update({'status': 'stopped'}) %}
|
||||
{% do STENOOPTIONS.update({'status': 'absent'}) %}
|
||||
{% else %}
|
||||
{% do STENOOPTIONS.update({'status': 'running'}) %}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
|
||||
BIN
sigs/securityonion-2.3.61-STENODOCKER.iso.sig
Normal file
BIN
sigs/securityonion-2.3.61-STENODOCKER.iso.sig
Normal file
Binary file not shown.
Reference in New Issue
Block a user