Merge pull request #9121 from Security-Onion-Solutions/dev

Update foxtrot from dev
This commit is contained in:
Peter Di Giorgio
2022-11-11 07:25:26 -08:00
committed by GitHub
4 changed files with 27 additions and 15 deletions

View File

@@ -1,6 +1,6 @@
## Security Onion 2.3.180
## Security Onion 2.3.182
Security Onion 2.3.180 is here!
Security Onion 2.3.182 is here!
## Screenshots

View File

@@ -1,18 +1,18 @@
### 2.3.181-20221021 ISO image built on 2022/10/21
### 2.3.182-20221109 ISO image built on 2022/11/09
### Download and Verify
2.3.181-20221021 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.181-20221021.iso
2.3.182-20221109 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.182-20221109.iso
MD5: 9389B35233DCA42AC5061053D772E922
SHA1: 83A162756136198CF1FABE7D94BA1D99650379B2
SHA256: FED4D7B27C16889F9588FE9568B0B10E0DAD551C34619DFED7801F18B1739040
MD5: E472D5A7C64662435F84FD56491D8967
SHA1: D2069317553AF0A1FB4FB6FE15583FF4E8CB2973
SHA256: A074EB38B88C0A00BDFD7FB75B4ECB7C46CB0B4CC993CAB81EFDC708B0075D2C
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.181-20221021.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.182-20221109.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.181-20221021.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.182-20221109.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.181-20221021.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.182-20221109.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.181-20221021.iso.sig securityonion-2.3.181-20221021.iso
gpg --verify securityonion-2.3.182-20221109.iso.sig securityonion-2.3.182-20221109.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Fri 21 Oct 2022 02:11:18 PM EDT using RSA key ID FE507013
gpg: Signature made Wed 09 Nov 2022 07:30:32 AM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

View File

@@ -549,7 +549,8 @@ preupgrade_changes() {
[[ "$INSTALLEDVERSION" == 2.3.160 ]] && up_to_2.3.170
[[ "$INSTALLEDVERSION" == 2.3.170 ]] && up_to_2.3.180
[[ "$INSTALLEDVERSION" == 2.3.180 ]] && up_to_2.3.181
[[ "$INSTALLEDVERSION" == 2.3.181 ]] && up_to_2.3.190
[[ "$INSTALLEDVERSION" == 2.3.181 ]] && up_to_2.3.182
[[ "$INSTALLEDVERSION" == 2.3.182 ]] && up_to_2.3.190
true
}
@@ -571,7 +572,8 @@ postupgrade_changes() {
[[ "$POSTVERSION" == 2.3.160 ]] && post_to_2.3.170
[[ "$POSTVERSION" == 2.3.170 ]] && post_to_2.3.180
[[ "$POSTVERSION" == 2.3.180 ]] && post_to_2.3.181
[[ "$POSTVERSION" == 2.3.181 ]] && post_to_2.3.190
[[ "$POSTVERSION" == 2.3.181 ]] && post_to_2.3.182
[[ "$POSTVERSION" == 2.3.182 ]] && post_to_2.3.190
true
}
@@ -680,6 +682,11 @@ post_to_2.3.181() {
POSTVERSION=2.3.181
}
post_to_2.3.182() {
echo "Nothing to do for .182"
POSTVERSION=2.3.182
}
post_to_2.3.190() {
echo "Nothing to do for .190"
POSTVERSION=2.3.190
@@ -984,6 +991,11 @@ up_to_2.3.181() {
INSTALLEDVERSION=2.3.181
}
up_to_2.3.182() {
echo "Upgrading to 2.3.182"
INSTALLEDVERSION=2.3.182
}
up_to_2.3.190() {
echo "Upgrading to 2.3.190"
chown -R zeek:socore /nsm/zeek/extracted/complete

Binary file not shown.