Compare commits

..

37 Commits

Author SHA1 Message Date
Mike Reeves 0baf8e9471 Merge pull request #10227 from Security-Onion-Solutions/dev
2.3.240
2023-04-26 14:31:56 -04:00
Mike Reeves e30fec7af0 Merge pull request #10226 from Security-Onion-Solutions/2.3.240
2.3.240
2023-04-26 09:58:18 -04:00
Mike Reeves 884f5cd3a6 2.3.240 2023-04-26 09:55:19 -04:00
Jason Ertel 11babd2f1c Merge pull request #10221 from Security-Onion-Solutions/jertel/imdsv2to
timeout more quickly on aws imdsv2 detection
2023-04-26 07:59:13 -04:00
Jason Ertel b440ab5c02 timeout more quickly on aws imdsv2 detection 2023-04-26 07:57:23 -04:00
Jason Ertel 91d667c3ad Merge pull request #10200 from Security-Onion-Solutions/jertel/imdsv2_23
Detect cloud install on forced imdsv2 instances
2023-04-25 09:46:39 -04:00
Jason Ertel f04c01b28c Merge pull request #10204 from Security-Onion-Solutions/jertel/2.3.240_soup
soup update for 2.3.240
2023-04-25 09:46:28 -04:00
Jason Ertel 71ab8ddf1d soup update for 2.3.240 2023-04-25 09:42:14 -04:00
Jason Ertel f1f79d55dc Detect cloud install on forced imdsv2 instances 2023-04-24 16:26:23 -04:00
Mike Reeves db1bd16758 Merge pull request #10142 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-04-17 10:56:59 -04:00
Mike Reeves ef73834d58 Update VERSION 2023-04-17 10:55:38 -04:00
Mike Reeves 3891548d6d Merge pull request #10141 from Security-Onion-Solutions/dev
2.3.230 Release
2023-04-17 10:47:32 -04:00
Mike Reeves 9d6ed8b9b2 Merge pull request #10140 from Security-Onion-Solutions/2.3.230
2.3.230
2023-04-17 10:26:59 -04:00
Mike Reeves ef92815a08 2.3.230 2023-04-17 10:22:39 -04:00
Doug Burks 19b5cdcb0e Merge pull request #10119 from Security-Onion-Solutions/2.3/fix-suricata-dns
FIX: Suricata DNS A and CNAME parsing #10117
2023-04-13 11:00:13 -04:00
Doug Burks 272b345892 FIX: Suricata DNS A and CNAME parsing #10117 2023-04-13 10:52:37 -04:00
Mike Reeves 7fad9d60ef Merge pull request #10113 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update init.sls
2023-04-12 10:32:43 -04:00
Mike Reeves 46fc62b8dc Update init.sls 2023-04-12 10:29:54 -04:00
Doug Burks ca9a93a4b0 Merge pull request #9998 from Security-Onion-Solutions/dougburks-patch-1
Update soup for 2.3.230
2023-03-24 12:38:39 -04:00
Doug Burks aa2e18fca9 Update soup for 2.3.230 2023-03-24 12:31:51 -04:00
Mike Reeves 7e4ce7b81d Merge pull request #9877 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update HOTFIX
2023-03-01 16:37:14 -05:00
Mike Reeves e5c0058dd1 Update HOTFIX 2023-03-01 16:36:08 -05:00
Mike Reeves 07c5b541a3 Merge pull request #9876 from Security-Onion-Solutions/master
Master to Dev
2023-03-01 16:35:48 -05:00
Mike Reeves b756b8ea32 Merge pull request #9873 from Security-Onion-Solutions/hotfix/2.3.220
Hotfix/2.3.220
2023-03-01 16:32:49 -05:00
Mike Reeves 5b46e57ae1 Merge pull request #9875 from Security-Onion-Solutions/hotfix23220
Hotfix for 2.3.220
2023-03-01 16:14:26 -05:00
Mike Reeves 924009afb8 Hotfix for 2.3.220 2023-03-01 16:11:38 -05:00
Mike Reeves 8f5bacc510 Merge pull request #9874 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update init.sls
2023-03-01 14:52:04 -05:00
Mike Reeves d5e48a7eca Update init.sls 2023-03-01 14:50:55 -05:00
Mike Reeves 6346a92f0f Merge pull request #9872 from Security-Onion-Solutions/hotfix23220
Hotfix for 2.3.220
2023-03-01 14:20:47 -05:00
Mike Reeves 13a566a9a2 Hotfix for 2.3.220 2023-03-01 14:19:04 -05:00
Mike Reeves 063c6599d8 Hotfix for 2.3.220 2023-03-01 14:17:22 -05:00
weslambert 9fb315c99d Merge pull request #9870 from Security-Onion-Solutions/fix/curator_configuration_update_8.0.x
Update Curator configuration to align with requirements for Curator 8.0.x
2023-03-01 10:19:32 -05:00
Wes 6e0891e586 Update Curator configuration to align with requirements for Curator 8.0.x 2023-03-01 15:16:52 +00:00
Mike Reeves 3a96d59899 Merge pull request #9869 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update HOTFIX
2023-03-01 10:10:47 -05:00
Mike Reeves 5fa945956e Update HOTFIX 2023-03-01 10:09:19 -05:00
Mike Reeves b0aab96cf5 Merge pull request #9858 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-02-27 09:40:39 -05:00
Mike Reeves 11def72790 Update VERSION 2023-02-27 09:39:52 -05:00
12 changed files with 84 additions and 43 deletions
+1
View File
@@ -0,0 +1 @@
+11 -11
View File
@@ -1,18 +1,18 @@
### 2.3.220-20230224 ISO image built on 2023/02/24 ### 2.3.240-20230426 ISO image built on 2023/04/26
### Download and Verify ### Download and Verify
2.3.220-20230224 ISO image: 2.3.240-20230426 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.220-20230224.iso https://download.securityonion.net/file/securityonion/securityonion-2.3.240-20230426.iso
MD5: 74CDCE07BC5787567E07C1CAC64DC381 MD5: 1935B559A9181522E83DA64C0A095A7A
SHA1: 8DA0E8541C46CBDCFA0FB9B60F3C95D027D4BB37 SHA1: 84A865A8F880036A5F04990CAAC36093744E8CF7
SHA256: E5EDB011693AC33C40CAB483400F72FAF9615053867FD9C80DDD1AACAD9100B3 SHA256: 1CC1173A403EE0CEA05EFB4708E7A4AEA70CEAAF1E3B51B861410F7634A776AF
Signature for ISO image: Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.220-20230224.iso.sig https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.240-20230426.iso.sig
Signing key: Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO: Download the signature file for the ISO:
``` ```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.220-20230224.iso.sig wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.240-20230426.iso.sig
``` ```
Download the ISO image: Download the ISO image:
``` ```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.220-20230224.iso wget https://download.securityonion.net/file/securityonion/securityonion-2.3.240-20230426.iso
``` ```
Verify the downloaded ISO image using the signature file: Verify the downloaded ISO image using the signature file:
``` ```
gpg --verify securityonion-2.3.220-20230224.iso.sig securityonion-2.3.220-20230224.iso gpg --verify securityonion-2.3.240-20230426.iso.sig securityonion-2.3.240-20230426.iso
``` ```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below: The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
``` ```
gpg: Signature made Fri 24 Feb 2023 02:32:08 PM EST using RSA key ID FE507013 gpg: Signature made Wed 26 Apr 2023 08:55:32 AM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>" gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature! gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner. gpg: There is no indication that the signature belongs to the owner.
+1 -1
View File
@@ -1 +1 @@
2.3.220 2.3.240
+1
View File
@@ -15,6 +15,7 @@ zeek:
SpoolDir: /nsm/zeek/spool SpoolDir: /nsm/zeek/spool
CfgDir: /opt/zeek/etc CfgDir: /opt/zeek/etc
CompressLogs: 1 CompressLogs: 1
ZeekPort: 27760
local: local:
'@load': '@load':
- misc/loaded-scripts - misc/loaded-scripts
+25
View File
@@ -554,6 +554,9 @@ preupgrade_changes() {
[[ "$INSTALLEDVERSION" == 2.3.190 ]] && up_to_2.3.200 [[ "$INSTALLEDVERSION" == 2.3.190 ]] && up_to_2.3.200
[[ "$INSTALLEDVERSION" == 2.3.200 ]] && up_to_2.3.210 [[ "$INSTALLEDVERSION" == 2.3.200 ]] && up_to_2.3.210
[[ "$INSTALLEDVERSION" == 2.3.210 ]] && up_to_2.3.220 [[ "$INSTALLEDVERSION" == 2.3.210 ]] && up_to_2.3.220
[[ "$INSTALLEDVERSION" == 2.3.220 ]] && up_to_2.3.230
[[ "$INSTALLEDVERSION" == 2.3.230 ]] && up_to_2.3.240
true true
} }
@@ -580,6 +583,8 @@ postupgrade_changes() {
[[ "$POSTVERSION" == 2.3.190 ]] && post_to_2.3.200 [[ "$POSTVERSION" == 2.3.190 ]] && post_to_2.3.200
[[ "$POSTVERSION" == 2.3.200 ]] && post_to_2.3.210 [[ "$POSTVERSION" == 2.3.200 ]] && post_to_2.3.210
[[ "$POSTVERSION" == 2.3.210 ]] && post_to_2.3.220 [[ "$POSTVERSION" == 2.3.210 ]] && post_to_2.3.220
[[ "$POSTVERSION" == 2.3.220 ]] && post_to_2.3.230
[[ "$POSTVERSION" == 2.3.230 ]] && post_to_2.3.240
true true
} }
@@ -713,6 +718,16 @@ post_to_2.3.220() {
POSTVERSION=2.3.220 POSTVERSION=2.3.220
} }
post_to_2.3.230() {
echo "Nothing to do for .230"
POSTVERSION=2.3.230
}
post_to_2.3.240() {
echo "Nothing to do for .240"
POSTVERSION=2.3.240
}
stop_salt_master() { stop_salt_master() {
# kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts # kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts
set +e set +e
@@ -1053,6 +1068,16 @@ up_to_2.3.220() {
INSTALLEDVERSION=2.3.220 INSTALLEDVERSION=2.3.220
} }
up_to_2.3.230() {
echo "Upgrading to 2.3.230"
INSTALLEDVERSION=2.3.230
}
up_to_2.3.240() {
echo "Upgrading to 2.3.240"
INSTALLEDVERSION=2.3.240
}
verify_upgradespace() { verify_upgradespace() {
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//') CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
if [ "$CURRENTSPACE" -lt "10" ]; then if [ "$CURRENTSPACE" -lt "10" ]; then
+17 -14
View File
@@ -14,22 +14,25 @@
--- ---
# Remember, leave a key empty if there is no value. None will be a string, # Remember, leave a key empty if there is no value. None will be a string,
# not a Python "NoneType" # not a Python "NoneType"
client: elasticsearch:
hosts: client:
- {{elasticsearch}} hosts:
port: 9200 - https://{{elasticsearch}}:9200
cloud_id:
ca_certs:
client_cert:
client_key:
verify_certs: False
request_timeout: 30
other_settings:
api_key:
id:
api_key:
master_only: False
{%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %} {%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
username: "{{ ES_USER }}" username: "{{ ES_USER }}"
password: "{{ ES_PASS }}" password: "{{ ES_PASS }}"
{%- endif %} {%- endif %}
url_prefix:
use_ssl: True
certificate:
client_cert:
client_key:
ssl_no_validate: True
timeout: 30
master_only: False
logging: logging:
loglevel: INFO loglevel: INFO
+2
View File
@@ -139,6 +139,8 @@ so-curator:
- file: actionconfs - file: actionconfs
- file: curconf - file: curconf
- file: curlogdir - file: curlogdir
- watch:
- file: curconf
{% else %} {% else %}
- force: True - force: True
{% endif %} {% endif %}
+16 -16
View File
@@ -1,21 +1,21 @@
{ {
"description" : "suricata.dns", "description" : "suricata.dns",
"processors" : [ "processors" : [
{ "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } }, { "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } },
{ "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } }, { "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.type", "target_field": "dns.query.type", "ignore_missing": true } }, { "rename": { "field": "message2.dns.type", "target_field": "dns.query.type", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.tx_id", "target_field": "dns.id", "ignore_missing": true } }, { "rename": { "field": "message2.dns.tx_id", "target_field": "dns.id", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.version", "target_field": "dns.version", "ignore_missing": true } }, { "rename": { "field": "message2.dns.version", "target_field": "dns.version", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.rrname", "target_field": "dns.query.name", "ignore_missing": true } }, { "rename": { "field": "message2.dns.rrname", "target_field": "dns.query.name", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.rrtype", "target_field": "dns.query.type_name", "ignore_missing": true } }, { "rename": { "field": "message2.dns.rrtype", "target_field": "dns.query.type_name", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.flags", "target_field": "dns.flags", "ignore_missing": true } }, { "rename": { "field": "message2.dns.flags", "target_field": "dns.flags", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.qr", "target_field": "dns.qr", "ignore_missing": true } }, { "rename": { "field": "message2.dns.qr", "target_field": "dns.qr", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.rd", "target_field": "dns.recursion.desired", "ignore_missing": true } }, { "rename": { "field": "message2.dns.rd", "target_field": "dns.recursion.desired", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.ra", "target_field": "dns.recursion.available", "ignore_missing": true } }, { "rename": { "field": "message2.dns.ra", "target_field": "dns.recursion.available", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.rcode", "target_field": "dns.response.code_name", "ignore_missing": true } }, { "rename": { "field": "message2.dns.rcode", "target_field": "dns.response.code_name", "ignore_missing": true } },
{ "rename": { "field": "message2.grouped.A", "target_field": "dns.answers.data", "ignore_missing": true } }, { "rename": { "field": "message2.dns.grouped.A", "target_field": "dns.answers.data", "ignore_missing": true } },
{ "rename": { "field": "message2.grouped.CNAME", "target_field": "dns.answers.name", "ignore_missing": true } }, { "rename": { "field": "message2.dns.grouped.CNAME", "target_field": "dns.answers.name", "ignore_missing": true } },
{ "pipeline": { "if": "ctx.dns.query?.name != null && ctx.dns.query.name.contains('.')", "name": "dns.tld" } }, { "pipeline": { "if": "ctx.dns.query?.name != null && ctx.dns.query.name.contains('.')", "name": "dns.tld" } },
{ "pipeline": { "name": "common" } } { "pipeline": { "name": "common" } }
] ]
} }
+10 -1
View File
@@ -1124,7 +1124,16 @@ create_repo() {
detect_cloud() { detect_cloud() {
echo "Testing if setup is running on a cloud instance..." | tee -a "$setup_log" echo "Testing if setup is running on a cloud instance..." | tee -a "$setup_log"
if ( curl --fail -s -m 5 http://169.254.169.254/latest/meta-data/instance-id > /dev/null ) || ( dmidecode -s bios-vendor | grep -q Google > /dev/null) || [ -f /var/log/waagent.log ]; then export is_cloud="true"; fi if ( curl --fail -s -m 5 http://169.254.169.254/latest/meta-data/instance-id > /dev/null ) || \
( curl --fail -s -m 5 -H "X-aws-ec2-metadata-token: $(curl -s -X PUT -m 5 'http://169.254.169.254/latest/api/token' -H 'X-aws-ec2-metadata-token-ttl-seconds: 30')" http://169.254.169.254/latest/meta-data/instance-id > /dev/null) || \
(dmidecode -s bios-vendor | grep -q Google > /dev/null) || \
[ -f /var/log/waagent.log ]; then
echo "Detected a cloud installation." | tee -a "$setup_log"
export is_cloud="true"
else
echo "This does not appear to be a cloud installation." | tee -a "$setup_log"
fi
} }
detect_os() { detect_os() {
Binary file not shown.
Binary file not shown.
Binary file not shown.