mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2026-05-06 03:17:53 +02:00
Compare commits
37 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 0baf8e9471 | |||
| e30fec7af0 | |||
| 884f5cd3a6 | |||
| 11babd2f1c | |||
| b440ab5c02 | |||
| 91d667c3ad | |||
| f04c01b28c | |||
| 71ab8ddf1d | |||
| f1f79d55dc | |||
| db1bd16758 | |||
| ef73834d58 | |||
| 3891548d6d | |||
| 9d6ed8b9b2 | |||
| ef92815a08 | |||
| 19b5cdcb0e | |||
| 272b345892 | |||
| 7fad9d60ef | |||
| 46fc62b8dc | |||
| ca9a93a4b0 | |||
| aa2e18fca9 | |||
| 7e4ce7b81d | |||
| e5c0058dd1 | |||
| 07c5b541a3 | |||
| b756b8ea32 | |||
| 5b46e57ae1 | |||
| 924009afb8 | |||
| 8f5bacc510 | |||
| d5e48a7eca | |||
| 6346a92f0f | |||
| 13a566a9a2 | |||
| 063c6599d8 | |||
| 9fb315c99d | |||
| 6e0891e586 | |||
| 3a96d59899 | |||
| 5fa945956e | |||
| b0aab96cf5 | |||
| 11def72790 |
+11
-11
@@ -1,18 +1,18 @@
|
|||||||
### 2.3.220-20230224 ISO image built on 2023/02/24
|
### 2.3.240-20230426 ISO image built on 2023/04/26
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Download and Verify
|
### Download and Verify
|
||||||
|
|
||||||
2.3.220-20230224 ISO image:
|
2.3.240-20230426 ISO image:
|
||||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.220-20230224.iso
|
https://download.securityonion.net/file/securityonion/securityonion-2.3.240-20230426.iso
|
||||||
|
|
||||||
MD5: 74CDCE07BC5787567E07C1CAC64DC381
|
MD5: 1935B559A9181522E83DA64C0A095A7A
|
||||||
SHA1: 8DA0E8541C46CBDCFA0FB9B60F3C95D027D4BB37
|
SHA1: 84A865A8F880036A5F04990CAAC36093744E8CF7
|
||||||
SHA256: E5EDB011693AC33C40CAB483400F72FAF9615053867FD9C80DDD1AACAD9100B3
|
SHA256: 1CC1173A403EE0CEA05EFB4708E7A4AEA70CEAAF1E3B51B861410F7634A776AF
|
||||||
|
|
||||||
Signature for ISO image:
|
Signature for ISO image:
|
||||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.220-20230224.iso.sig
|
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.240-20230426.iso.sig
|
||||||
|
|
||||||
Signing key:
|
Signing key:
|
||||||
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
||||||
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
|
|||||||
|
|
||||||
Download the signature file for the ISO:
|
Download the signature file for the ISO:
|
||||||
```
|
```
|
||||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.220-20230224.iso.sig
|
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.240-20230426.iso.sig
|
||||||
```
|
```
|
||||||
|
|
||||||
Download the ISO image:
|
Download the ISO image:
|
||||||
```
|
```
|
||||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.220-20230224.iso
|
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.240-20230426.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
Verify the downloaded ISO image using the signature file:
|
Verify the downloaded ISO image using the signature file:
|
||||||
```
|
```
|
||||||
gpg --verify securityonion-2.3.220-20230224.iso.sig securityonion-2.3.220-20230224.iso
|
gpg --verify securityonion-2.3.240-20230426.iso.sig securityonion-2.3.240-20230426.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
||||||
```
|
```
|
||||||
gpg: Signature made Fri 24 Feb 2023 02:32:08 PM EST using RSA key ID FE507013
|
gpg: Signature made Wed 26 Apr 2023 08:55:32 AM EDT using RSA key ID FE507013
|
||||||
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
||||||
gpg: WARNING: This key is not certified with a trusted signature!
|
gpg: WARNING: This key is not certified with a trusted signature!
|
||||||
gpg: There is no indication that the signature belongs to the owner.
|
gpg: There is no indication that the signature belongs to the owner.
|
||||||
|
|||||||
@@ -15,6 +15,7 @@ zeek:
|
|||||||
SpoolDir: /nsm/zeek/spool
|
SpoolDir: /nsm/zeek/spool
|
||||||
CfgDir: /opt/zeek/etc
|
CfgDir: /opt/zeek/etc
|
||||||
CompressLogs: 1
|
CompressLogs: 1
|
||||||
|
ZeekPort: 27760
|
||||||
local:
|
local:
|
||||||
'@load':
|
'@load':
|
||||||
- misc/loaded-scripts
|
- misc/loaded-scripts
|
||||||
|
|||||||
@@ -554,6 +554,9 @@ preupgrade_changes() {
|
|||||||
[[ "$INSTALLEDVERSION" == 2.3.190 ]] && up_to_2.3.200
|
[[ "$INSTALLEDVERSION" == 2.3.190 ]] && up_to_2.3.200
|
||||||
[[ "$INSTALLEDVERSION" == 2.3.200 ]] && up_to_2.3.210
|
[[ "$INSTALLEDVERSION" == 2.3.200 ]] && up_to_2.3.210
|
||||||
[[ "$INSTALLEDVERSION" == 2.3.210 ]] && up_to_2.3.220
|
[[ "$INSTALLEDVERSION" == 2.3.210 ]] && up_to_2.3.220
|
||||||
|
[[ "$INSTALLEDVERSION" == 2.3.220 ]] && up_to_2.3.230
|
||||||
|
[[ "$INSTALLEDVERSION" == 2.3.230 ]] && up_to_2.3.240
|
||||||
|
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -580,6 +583,8 @@ postupgrade_changes() {
|
|||||||
[[ "$POSTVERSION" == 2.3.190 ]] && post_to_2.3.200
|
[[ "$POSTVERSION" == 2.3.190 ]] && post_to_2.3.200
|
||||||
[[ "$POSTVERSION" == 2.3.200 ]] && post_to_2.3.210
|
[[ "$POSTVERSION" == 2.3.200 ]] && post_to_2.3.210
|
||||||
[[ "$POSTVERSION" == 2.3.210 ]] && post_to_2.3.220
|
[[ "$POSTVERSION" == 2.3.210 ]] && post_to_2.3.220
|
||||||
|
[[ "$POSTVERSION" == 2.3.220 ]] && post_to_2.3.230
|
||||||
|
[[ "$POSTVERSION" == 2.3.230 ]] && post_to_2.3.240
|
||||||
|
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
@@ -713,6 +718,16 @@ post_to_2.3.220() {
|
|||||||
POSTVERSION=2.3.220
|
POSTVERSION=2.3.220
|
||||||
}
|
}
|
||||||
|
|
||||||
|
post_to_2.3.230() {
|
||||||
|
echo "Nothing to do for .230"
|
||||||
|
POSTVERSION=2.3.230
|
||||||
|
}
|
||||||
|
|
||||||
|
post_to_2.3.240() {
|
||||||
|
echo "Nothing to do for .240"
|
||||||
|
POSTVERSION=2.3.240
|
||||||
|
}
|
||||||
|
|
||||||
stop_salt_master() {
|
stop_salt_master() {
|
||||||
# kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts
|
# kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts
|
||||||
set +e
|
set +e
|
||||||
@@ -1053,6 +1068,16 @@ up_to_2.3.220() {
|
|||||||
INSTALLEDVERSION=2.3.220
|
INSTALLEDVERSION=2.3.220
|
||||||
}
|
}
|
||||||
|
|
||||||
|
up_to_2.3.230() {
|
||||||
|
echo "Upgrading to 2.3.230"
|
||||||
|
INSTALLEDVERSION=2.3.230
|
||||||
|
}
|
||||||
|
|
||||||
|
up_to_2.3.240() {
|
||||||
|
echo "Upgrading to 2.3.240"
|
||||||
|
INSTALLEDVERSION=2.3.240
|
||||||
|
}
|
||||||
|
|
||||||
verify_upgradespace() {
|
verify_upgradespace() {
|
||||||
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
|
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
|
||||||
if [ "$CURRENTSPACE" -lt "10" ]; then
|
if [ "$CURRENTSPACE" -lt "10" ]; then
|
||||||
|
|||||||
@@ -14,22 +14,25 @@
|
|||||||
---
|
---
|
||||||
# Remember, leave a key empty if there is no value. None will be a string,
|
# Remember, leave a key empty if there is no value. None will be a string,
|
||||||
# not a Python "NoneType"
|
# not a Python "NoneType"
|
||||||
client:
|
elasticsearch:
|
||||||
hosts:
|
client:
|
||||||
- {{elasticsearch}}
|
hosts:
|
||||||
port: 9200
|
- https://{{elasticsearch}}:9200
|
||||||
|
cloud_id:
|
||||||
|
ca_certs:
|
||||||
|
client_cert:
|
||||||
|
client_key:
|
||||||
|
verify_certs: False
|
||||||
|
request_timeout: 30
|
||||||
|
other_settings:
|
||||||
|
api_key:
|
||||||
|
id:
|
||||||
|
api_key:
|
||||||
|
master_only: False
|
||||||
{%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
|
{%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
|
||||||
username: "{{ ES_USER }}"
|
username: "{{ ES_USER }}"
|
||||||
password: "{{ ES_PASS }}"
|
password: "{{ ES_PASS }}"
|
||||||
{%- endif %}
|
{%- endif %}
|
||||||
url_prefix:
|
|
||||||
use_ssl: True
|
|
||||||
certificate:
|
|
||||||
client_cert:
|
|
||||||
client_key:
|
|
||||||
ssl_no_validate: True
|
|
||||||
timeout: 30
|
|
||||||
master_only: False
|
|
||||||
|
|
||||||
logging:
|
logging:
|
||||||
loglevel: INFO
|
loglevel: INFO
|
||||||
|
|||||||
@@ -139,6 +139,8 @@ so-curator:
|
|||||||
- file: actionconfs
|
- file: actionconfs
|
||||||
- file: curconf
|
- file: curconf
|
||||||
- file: curlogdir
|
- file: curlogdir
|
||||||
|
- watch:
|
||||||
|
- file: curconf
|
||||||
{% else %}
|
{% else %}
|
||||||
- force: True
|
- force: True
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|||||||
@@ -1,21 +1,21 @@
|
|||||||
{
|
{
|
||||||
"description" : "suricata.dns",
|
"description" : "suricata.dns",
|
||||||
"processors" : [
|
"processors" : [
|
||||||
{ "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } },
|
{ "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } },
|
{ "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.type", "target_field": "dns.query.type", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.type", "target_field": "dns.query.type", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.tx_id", "target_field": "dns.id", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.tx_id", "target_field": "dns.id", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.version", "target_field": "dns.version", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.version", "target_field": "dns.version", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.rrname", "target_field": "dns.query.name", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.rrname", "target_field": "dns.query.name", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.rrtype", "target_field": "dns.query.type_name", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.rrtype", "target_field": "dns.query.type_name", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.flags", "target_field": "dns.flags", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.flags", "target_field": "dns.flags", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.qr", "target_field": "dns.qr", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.qr", "target_field": "dns.qr", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.rd", "target_field": "dns.recursion.desired", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.rd", "target_field": "dns.recursion.desired", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.ra", "target_field": "dns.recursion.available", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.ra", "target_field": "dns.recursion.available", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.dns.rcode", "target_field": "dns.response.code_name", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.rcode", "target_field": "dns.response.code_name", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.grouped.A", "target_field": "dns.answers.data", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.grouped.A", "target_field": "dns.answers.data", "ignore_missing": true } },
|
||||||
{ "rename": { "field": "message2.grouped.CNAME", "target_field": "dns.answers.name", "ignore_missing": true } },
|
{ "rename": { "field": "message2.dns.grouped.CNAME", "target_field": "dns.answers.name", "ignore_missing": true } },
|
||||||
{ "pipeline": { "if": "ctx.dns.query?.name != null && ctx.dns.query.name.contains('.')", "name": "dns.tld" } },
|
{ "pipeline": { "if": "ctx.dns.query?.name != null && ctx.dns.query.name.contains('.')", "name": "dns.tld" } },
|
||||||
{ "pipeline": { "name": "common" } }
|
{ "pipeline": { "name": "common" } }
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|||||||
+10
-1
@@ -1124,7 +1124,16 @@ create_repo() {
|
|||||||
|
|
||||||
detect_cloud() {
|
detect_cloud() {
|
||||||
echo "Testing if setup is running on a cloud instance..." | tee -a "$setup_log"
|
echo "Testing if setup is running on a cloud instance..." | tee -a "$setup_log"
|
||||||
if ( curl --fail -s -m 5 http://169.254.169.254/latest/meta-data/instance-id > /dev/null ) || ( dmidecode -s bios-vendor | grep -q Google > /dev/null) || [ -f /var/log/waagent.log ]; then export is_cloud="true"; fi
|
if ( curl --fail -s -m 5 http://169.254.169.254/latest/meta-data/instance-id > /dev/null ) || \
|
||||||
|
( curl --fail -s -m 5 -H "X-aws-ec2-metadata-token: $(curl -s -X PUT -m 5 'http://169.254.169.254/latest/api/token' -H 'X-aws-ec2-metadata-token-ttl-seconds: 30')" http://169.254.169.254/latest/meta-data/instance-id > /dev/null) || \
|
||||||
|
(dmidecode -s bios-vendor | grep -q Google > /dev/null) || \
|
||||||
|
[ -f /var/log/waagent.log ]; then
|
||||||
|
|
||||||
|
echo "Detected a cloud installation." | tee -a "$setup_log"
|
||||||
|
export is_cloud="true"
|
||||||
|
else
|
||||||
|
echo "This does not appear to be a cloud installation." | tee -a "$setup_log"
|
||||||
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
detect_os() {
|
detect_os() {
|
||||||
|
|||||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Reference in New Issue
Block a user