Compare commits

...

32 Commits

Author SHA1 Message Date
Mike Reeves
b756b8ea32 Merge pull request #9873 from Security-Onion-Solutions/hotfix/2.3.220
Hotfix/2.3.220
2023-03-01 16:32:49 -05:00
Mike Reeves
5b46e57ae1 Merge pull request #9875 from Security-Onion-Solutions/hotfix23220
Hotfix for 2.3.220
2023-03-01 16:14:26 -05:00
Mike Reeves
924009afb8 Hotfix for 2.3.220 2023-03-01 16:11:38 -05:00
Mike Reeves
8f5bacc510 Merge pull request #9874 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update init.sls
2023-03-01 14:52:04 -05:00
Mike Reeves
d5e48a7eca Update init.sls 2023-03-01 14:50:55 -05:00
Mike Reeves
6346a92f0f Merge pull request #9872 from Security-Onion-Solutions/hotfix23220
Hotfix for 2.3.220
2023-03-01 14:20:47 -05:00
Mike Reeves
13a566a9a2 Hotfix for 2.3.220 2023-03-01 14:19:04 -05:00
Mike Reeves
063c6599d8 Hotfix for 2.3.220 2023-03-01 14:17:22 -05:00
weslambert
9fb315c99d Merge pull request #9870 from Security-Onion-Solutions/fix/curator_configuration_update_8.0.x
Update Curator configuration to align with requirements for Curator 8.0.x
2023-03-01 10:19:32 -05:00
Wes
6e0891e586 Update Curator configuration to align with requirements for Curator 8.0.x 2023-03-01 15:16:52 +00:00
Mike Reeves
3a96d59899 Merge pull request #9869 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update HOTFIX
2023-03-01 10:10:47 -05:00
Mike Reeves
5fa945956e Update HOTFIX 2023-03-01 10:09:19 -05:00
Mike Reeves
2ca2724a4c Merge pull request #9857 from Security-Onion-Solutions/dev
2.3.220
2023-02-27 09:35:14 -05:00
Mike Reeves
884883a225 Merge pull request #9856 from Security-Onion-Solutions/2.3.220
2.3.220
2023-02-27 09:26:28 -05:00
Mike Reeves
5c8ba3af65 2.3.220 2023-02-27 09:23:33 -05:00
Josh Brower
4b5d314adf Merge pull request #9833 from Security-Onion-Solutions/FleetDMConfigFix
Remove unsupported config option
2023-02-21 16:36:58 -05:00
Josh Brower
6e637f559c Remove unsupported config option 2023-02-21 16:35:11 -05:00
Doug Burks
cc5304e9f7 Merge pull request #9806 from Security-Onion-Solutions/2.3/upgrade-elastic-8.6.2
2.3/upgrade elastic 8.6.2
2023-02-17 08:03:01 -05:00
Doug Burks
002403055d UPGRADE: Elastic 8.6.2 #9804 2023-02-17 07:04:57 -05:00
Doug Burks
b80b80e825 UPGRADE: Elastic 8.6.2 #9804 2023-02-17 07:03:47 -05:00
Josh Brower
c539d53a02 Merge pull request #9791 from Security-Onion-Solutions/fleetsapassword
Fix edge case
2023-02-15 15:30:49 -05:00
Josh Brower
3a22978c2b Fix password gen edge case 2023-02-15 15:25:35 -05:00
Doug Burks
5b1461e9a1 Merge pull request #9782 from Security-Onion-Solutions/dougburks-patch-1
Update soup for 2.3.220
2023-02-14 08:44:09 -05:00
Doug Burks
69f889dbd9 Update soup for 2.3.220 2023-02-14 08:42:35 -05:00
Josh Brower
aefe1cceb8 Merge pull request #9758 from Security-Onion-Solutions/fleetupgrade
Fix link for FleetDM standalone nodes
2023-02-09 14:10:45 -05:00
Josh Brower
b7e97eceb3 Fix link for FleetDM standalone nodes 2023-02-09 14:08:48 -05:00
Josh Brower
450e02e874 Merge pull request #9749 from Security-Onion-Solutions/fleetdm-fix
FleetDM Upgrade Fix
2023-02-09 09:30:22 -05:00
Josh Brower
09bebf08d6 Fix FleetDM SOC Link 2023-02-09 09:10:50 -05:00
Josh Brower
4dd54cea6c Use correct variable name 2023-02-08 16:58:47 -05:00
Josh Brower
e07f4bd0ed Workaround for FleetDM PW Req 2023-02-08 13:03:33 -05:00
Mike Reeves
6adb586bb4 Merge pull request #9734 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-02-07 09:07:06 -05:00
Mike Reeves
2f99821736 Update VERSION 2023-02-07 09:05:16 -05:00
15 changed files with 56 additions and 36 deletions

1
HOTFIX
View File

@@ -0,0 +1 @@
20230301

View File

@@ -1,18 +1,18 @@
### 2.3.210-20230202 ISO image built on 2023/02/02
### 2.3.220-20230301 ISO image built on 2023/03/01
### Download and Verify
2.3.210-20230202 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.210-20230202.iso
2.3.220-20230301 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.220-20230301.iso
MD5: ED38C36DBE40509FC5E87D82B07141C0
SHA1: EDEBDBE75FF34DAD87E141CA8F8614295ED23FB5
SHA256: 30068D4B910E83B63287EAB98E49497A584BAE07854367716813E5D610D3E5E3
MD5: 76870CF09FF27893574FC104F9AC6642
SHA1: CBF5B407C5982CA40C7660FE5CD9E3C6C551D280
SHA256: 0719D441DF8B77266CE16F5FA182BF0680567BE7AD0AE36979D4FE8E0953F094
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.210-20230202.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.220-20230301.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.210-20230202.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.220-20230301.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.210-20230202.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.220-20230301.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.210-20230202.iso.sig securityonion-2.3.210-20230202.iso
gpg --verify securityonion-2.3.220-20230301.iso.sig securityonion-2.3.220-20230301.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Thu 02 Feb 2023 08:31:18 PM EST using RSA key ID FE507013
gpg: Signature made Wed 01 Mar 2023 03:50:25 PM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

View File

@@ -1 +1 @@
2.3.210
2.3.220

View File

@@ -53,8 +53,10 @@ if [[ $? -ne 0 ]]; then
exit 2
fi
TEMPPW=$FLEET_SA_PW!
# Create New User
CREATE_OUTPUT=$(docker exec so-fleet fleetctl user create --email $USER_EMAIL --name $USER_EMAIL --password $USER_PASS --global-role admin 2>&1)
CREATE_OUTPUT=$(docker exec so-fleet fleetctl user create --email $USER_EMAIL --name $USER_EMAIL --password $TEMPPW --global-role admin 2>&1)
if [[ $? -eq 0 ]]; then
echo "Successfully added user to Fleet"
@@ -64,6 +66,9 @@ else
exit 2
fi
# Reset New User Password to user supplied password
echo "$USER_PASS" | so-fleet-user-update "$USER_EMAIL"
# Disable forced password reset
MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PW fleet -e \
"UPDATE users SET admin_forced_password_reset = 0 WHERE email = '$USER_EMAIL'" 2>&1)

View File

@@ -553,6 +553,7 @@ preupgrade_changes() {
[[ "$INSTALLEDVERSION" == 2.3.182 ]] && up_to_2.3.190
[[ "$INSTALLEDVERSION" == 2.3.190 ]] && up_to_2.3.200
[[ "$INSTALLEDVERSION" == 2.3.200 ]] && up_to_2.3.210
[[ "$INSTALLEDVERSION" == 2.3.210 ]] && up_to_2.3.220
true
}
@@ -578,6 +579,7 @@ postupgrade_changes() {
[[ "$POSTVERSION" == 2.3.182 ]] && post_to_2.3.190
[[ "$POSTVERSION" == 2.3.190 ]] && post_to_2.3.200
[[ "$POSTVERSION" == 2.3.200 ]] && post_to_2.3.210
[[ "$POSTVERSION" == 2.3.210 ]] && post_to_2.3.220
true
}
@@ -706,6 +708,11 @@ post_to_2.3.210() {
POSTVERSION=2.3.210
}
post_to_2.3.220() {
echo "Nothing to do for .220"
POSTVERSION=2.3.220
}
stop_salt_master() {
# kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts
set +e
@@ -1041,6 +1048,11 @@ up_to_2.3.210() {
INSTALLEDVERSION=2.3.210
}
up_to_2.3.220() {
echo "Upgrading to 2.3.220"
INSTALLEDVERSION=2.3.220
}
verify_upgradespace() {
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
if [ "$CURRENTSPACE" -lt "10" ]; then

View File

@@ -14,22 +14,25 @@
---
# Remember, leave a key empty if there is no value. None will be a string,
# not a Python "NoneType"
client:
hosts:
- {{elasticsearch}}
port: 9200
elasticsearch:
client:
hosts:
- https://{{elasticsearch}}:9200
cloud_id:
ca_certs:
client_cert:
client_key:
verify_certs: False
request_timeout: 30
other_settings:
api_key:
id:
api_key:
master_only: False
{%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
username: "{{ ES_USER }}"
password: "{{ ES_PASS }}"
username: "{{ ES_USER }}"
password: "{{ ES_PASS }}"
{%- endif %}
url_prefix:
use_ssl: True
certificate:
client_cert:
client_key:
ssl_no_validate: True
timeout: 30
master_only: False
logging:
loglevel: INFO

View File

@@ -139,6 +139,8 @@ so-curator:
- file: actionconfs
- file: curconf
- file: curlogdir
- watch:
- file: curconf
{% else %}
- force: True
{% endif %}

View File

@@ -26,9 +26,6 @@ spec:
distributed_tls_write_endpoint: /api/v1/osquery/distributed/write
enable_windows_events_publisher: true
enable_windows_events_subscriber: true
logger_plugin: tls
logger_tls_endpoint: /api/v1/osquery/log
logger_tls_period: 10
pack_delimiter: _
host_settings:
enable_software_inventory: false

View File

@@ -59,7 +59,7 @@ update() {
IFS=$'\r\n' GLOBIGNORE='*' command eval 'LINES=($(cat $1))'
for i in "${LINES[@]}"; do
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.6.1" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.6.2" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
echo $RESPONSE; if [[ "$RESPONSE" != *"\"success\":true"* ]] && [[ "$RESPONSE" != *"updated_at"* ]] ; then RETURN_CODE=1;fi
done

View File

@@ -1 +1 @@
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.6.1","id": "8.6.1","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.6.2","id": "8.6.2","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}

View File

@@ -319,7 +319,7 @@ http {
{%- if fleet_node %}
location /fleet/ {
return 307 https://{{ fleet_ip }}/fleet;
return 307 https://{{ fleet_ip }}/fleet/dashboard;
}
{%- else %}

View File

@@ -3,6 +3,6 @@
{ "name": "toolGrafana", "description": "toolGrafanaHelp", "icon": "fa-external-link-alt", "target": "so-grafana", "link": "/grafana/d/so_overview" },
{ "name": "toolCyberchef", "description": "toolCyberchefHelp", "icon": "fa-external-link-alt", "target": "so-cyberchef", "link": "/cyberchef/" },
{ "name": "toolPlaybook", "description": "toolPlaybookHelp", "icon": "fa-external-link-alt", "target": "so-playbook", "link": "/playbook/projects/detection-playbooks/issues/" },
{ "name": "toolFleet", "description": "toolFleetHelp", "icon": "fa-external-link-alt", "target": "so-fleet", "link": "/fleet/" },
{ "name": "toolFleet", "description": "toolFleetHelp", "icon": "fa-external-link-alt", "target": "so-fleet", "link": "/fleet/dashboard" },
{ "name": "toolNavigator", "description": "toolNavigatorHelp", "icon": "fa-external-link-alt", "target": "so-navigator", "link": "/navigator/" }
]
]

View File

@@ -1511,7 +1511,7 @@ generate_passwords(){
PLAYBOOKADMINPASS=$(get_random_value)
PLAYBOOKAUTOMATIONPASS=$(get_random_value)
FLEETPASS=$(get_random_value)
FLEETSAPASS=$(get_random_value)
FLEETSAPASS="$(get_random_value)!1"
FLEETJWT=$(get_random_value)
GRAFANAPASS=$(get_random_value)
SENSORONIKEY=$(get_random_value)

Binary file not shown.

Binary file not shown.