mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Merge pull request #11855 from Security-Onion-Solutions/jertel/hfm
Jertel/hfm
This commit is contained in:
@@ -1,18 +1,18 @@
|
|||||||
### 2.4.30-20231117 ISO image released on 2023/11/20
|
### 2.4.30-20231121 ISO image released on 2023/11/21
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Download and Verify
|
### Download and Verify
|
||||||
|
|
||||||
2.4.30-20231117 ISO image:
|
2.4.30-20231121 ISO image:
|
||||||
https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231117.iso
|
https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231121.iso
|
||||||
|
|
||||||
MD5: DF7E2540AFF2A233A9B0EEC78B37D0EA
|
MD5: 09DB0A6B3A75435C855E777272FC03F8
|
||||||
SHA1: 93DB33A46C6F9C7D7CB8031C0A4F8738F4F14E89
|
SHA1: A68868E67A3F86B77E01F54067950757EFD3BA72
|
||||||
SHA256: 48C7BD1C664F545554490B8F191BCD7808C519488DCC85984760400F4F68E2DA
|
SHA256: B3880C0302D9CDED7C974585B14355544FC9C3279F952EC79FC2BA9AEC7CB749
|
||||||
|
|
||||||
Signature for ISO image:
|
Signature for ISO image:
|
||||||
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231117.iso.sig
|
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231121.iso.sig
|
||||||
|
|
||||||
Signing key:
|
Signing key:
|
||||||
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
|
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
|
||||||
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
|
|||||||
|
|
||||||
Download the signature file for the ISO:
|
Download the signature file for the ISO:
|
||||||
```
|
```
|
||||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231117.iso.sig
|
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231121.iso.sig
|
||||||
```
|
```
|
||||||
|
|
||||||
Download the ISO image:
|
Download the ISO image:
|
||||||
```
|
```
|
||||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231117.iso
|
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231121.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
Verify the downloaded ISO image using the signature file:
|
Verify the downloaded ISO image using the signature file:
|
||||||
```
|
```
|
||||||
gpg --verify securityonion-2.4.30-20231117.iso.sig securityonion-2.4.30-20231117.iso
|
gpg --verify securityonion-2.4.30-20231121.iso.sig securityonion-2.4.30-20231121.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
||||||
```
|
```
|
||||||
gpg: Signature made Sun 19 Nov 2023 08:11:53 PM EST using RSA key ID FE507013
|
gpg: Signature made Tue 21 Nov 2023 01:21:38 PM EST using RSA key ID FE507013
|
||||||
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
||||||
gpg: WARNING: This key is not certified with a trusted signature!
|
gpg: WARNING: This key is not certified with a trusted signature!
|
||||||
gpg: There is no indication that the signature belongs to the owner.
|
gpg: There is no indication that the signature belongs to the owner.
|
||||||
|
|||||||
@@ -455,6 +455,8 @@ post_to_2.4.30() {
|
|||||||
mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old
|
mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old
|
||||||
mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old
|
mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old
|
||||||
systemctl_func "start" "salt-minion"
|
systemctl_func "start" "salt-minion"
|
||||||
|
salt-call state.apply nginx queue=True
|
||||||
|
enable_highstate
|
||||||
POSTVERSION=2.4.30
|
POSTVERSION=2.4.30
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -751,6 +753,9 @@ apply_hotfix() {
|
|||||||
elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints
|
elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints
|
||||||
/usr/sbin/so-elastic-fleet-integration-policy-elastic-defend
|
/usr/sbin/so-elastic-fleet-integration-policy-elastic-defend
|
||||||
elif [[ "$INSTALLEDVERSION" == "2.4.30" ]] ; then
|
elif [[ "$INSTALLEDVERSION" == "2.4.30" ]] ; then
|
||||||
|
if [[ -f /etc/pki/managerssl.key.old ]]; then
|
||||||
|
echo "Skipping Certificate Generation"
|
||||||
|
else
|
||||||
rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json
|
rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json
|
||||||
so-kibana-restart --force
|
so-kibana-restart --force
|
||||||
so-kibana-api-check
|
so-kibana-api-check
|
||||||
@@ -763,8 +768,7 @@ apply_hotfix() {
|
|||||||
mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old
|
mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old
|
||||||
mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old
|
mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old
|
||||||
systemctl_func "start" "salt-minion"
|
systemctl_func "start" "salt-minion"
|
||||||
echo "Applying Salt Highstate"
|
fi
|
||||||
salt-call state.highstate queue=True
|
|
||||||
else
|
else
|
||||||
echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)"
|
echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)"
|
||||||
fi
|
fi
|
||||||
|
|||||||
BIN
sigs/securityonion-2.4.30-20231121.iso.sig
Normal file
BIN
sigs/securityonion-2.4.30-20231121.iso.sig
Normal file
Binary file not shown.
Reference in New Issue
Block a user