Compare commits

...

11 Commits

Author SHA1 Message Date
Doug Burks
c39047666b Merge pull request #7082 from Security-Onion-Solutions/hotfix/2.3.100
Hotfix/2.3.100
2022-02-02 16:38:27 -05:00
Mike Reeves
5c75bb8e7a Merge pull request #7080 from Security-Onion-Solutions/23100hotfix
2.3.100 Hotfix
2022-02-02 16:30:46 -05:00
Mike Reeves
83683ec27e 2.3.100 Hotfix 2022-02-02 16:23:51 -05:00
Mike Reeves
b94cae0176 2.3.100 Hotfix 2022-02-02 16:22:44 -05:00
Mike Reeves
fc0824ceb0 2.3.100 Hotfix 2022-02-02 16:20:49 -05:00
Mike Reeves
73a43f3816 Merge pull request #7069 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update HOTFIX
2022-02-02 09:57:26 -05:00
Mike Reeves
8152aec22e Update HOTFIX 2022-02-02 09:49:19 -05:00
Mike Reeves
0e28e1e4cb Merge pull request #7066 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update acng.conf
2022-02-02 09:22:00 -05:00
Josh Patterson
13f87e4654 Merge pull request #7067 from Security-Onion-Solutions/m0duspwnens-patch-2.3.100
FIX: ssl state and manager hostname with uppercase
2022-02-02 09:21:54 -05:00
Josh Patterson
a02fb37493 Update init.sls 2022-02-02 09:18:02 -05:00
Mike Reeves
eaeed07fd4 Update acng.conf 2022-02-02 09:12:29 -05:00
5 changed files with 14 additions and 14 deletions

2
HOTFIX
View File

@@ -1 +1 @@
20220202

View File

@@ -1,18 +1,18 @@
### 2.3.100-20220131 ISO image built on 2022/01/31
### 2.3.100-20220202 ISO image built on 2022/02/02
### Download and Verify
2.3.100-20220131 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.100-20220131.iso
2.3.100-20220202 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.100-20220202.iso
MD5: 9B50774532B77A10E2F52A3F0492A780
SHA1: 3C50D2EF4AFFFA8929492C2FC3842FF3EEE0EA5F
SHA256: CDCBEE6B1FDFB4CAF6C9F80CCADC161366EC337746E8394BF4454FAA2FC11AA1
MD5: 170337342118DC32F8C2F687F332CA25
SHA1: 202235BFE37F1F2E129F5D5DE13173A27A9D8CC0
SHA256: F902C561D35F5B9DFB2D65BDAE97D30FD9E46F6822AFA36CA9C4043C50864484
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.100-20220131.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.100-20220202.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.100-20220131.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.100-20220202.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.100-20220131.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.100-20220202.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.100-20220131.iso.sig securityonion-2.3.100-20220131.iso
gpg --verify securityonion-2.3.100-20220202.iso.sig securityonion-2.3.100-20220202.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Mon 31 Jan 2022 11:41:30 AM EST using RSA key ID FE507013
gpg: Signature made Wed 02 Feb 2022 12:12:39 PM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

View File

@@ -80,7 +80,7 @@ RedirMax: 6
VfileUseRangeOps: -1
# PassThroughPattern: private-ppa\.launchpad\.net:443$
# PassThroughPattern: .* # this would allow CONNECT to everything
PassThroughPattern: (repo\.securityonion\.net:443|download\.docker\.com:443|mirrors\.fedoraproject\.org:443|packages\.wazuh\.com:443|repo\.saltstack\.com:443|yum\.dockerproject\.org:443|download\.docker\.com:443|registry\.npmjs\.org:443|registry\.yarnpkg\.com:443)$ # yarn/npm pkg, cant to http :/
PassThroughPattern: (repo\.securityonion\.net:443|download\.docker\.com:443|mirrors\.fedoraproject\.org:443|packages\.wazuh\.com:443|repo\.saltstack\.com:443|repo\.saltproject\.io:443|yum\.dockerproject\.org:443|download\.docker\.com:443|registry\.npmjs\.org:443|registry\.yarnpkg\.com:443)$ # yarn/npm pkg, cant to http :/
# ResponseFreezeDetectTime: 500
# ReuseConnections: 1
# PipelineDepth: 255

View File

@@ -23,7 +23,7 @@ include:
{% else %}
include:
- ca.dirs
{% set x509dict = salt['mine.get'](manager~'*', 'x509.get_pem_entries') %}
{% set x509dict = salt['mine.get'](manager | lower~'*', 'x509.get_pem_entries') %}
{% for host in x509dict %}
{% if 'manager' in host.split('_')|last or host.split('_')|last == 'standalone' %}
{% do global_ca_text.append(x509dict[host].get('/etc/pki/ca.crt')|replace('\n', '')) %}

Binary file not shown.