mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2026-01-22 08:01:28 +01:00
Compare commits
62 Commits
2.3.220-20
...
2.3.250-20
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
c949101d0f | ||
|
|
7c1f19b91f | ||
|
|
598d6b025e | ||
|
|
4d0d0714a5 | ||
|
|
cb0c078955 | ||
|
|
aa426244bf | ||
|
|
97b2ae8d82 | ||
|
|
7047125759 | ||
|
|
43f73abd4d | ||
|
|
51a8684850 | ||
|
|
b3c5239787 | ||
|
|
0f562279ee | ||
|
|
834f45c0f2 | ||
|
|
d4cf9efeca | ||
|
|
c620983b4a | ||
|
|
ed19c139ea | ||
|
|
af85c6261b | ||
|
|
e9f58269cd | ||
|
|
208c3d96e9 | ||
|
|
1e888a5d9e | ||
|
|
f7ae8d449e | ||
|
|
195274bb11 | ||
|
|
a0ac1d2274 | ||
|
|
3dd39c7f59 | ||
|
|
ba846bbf35 | ||
|
|
0baf8e9471 | ||
|
|
e30fec7af0 | ||
|
|
884f5cd3a6 | ||
|
|
11babd2f1c | ||
|
|
b440ab5c02 | ||
|
|
91d667c3ad | ||
|
|
f04c01b28c | ||
|
|
71ab8ddf1d | ||
|
|
f1f79d55dc | ||
|
|
db1bd16758 | ||
|
|
ef73834d58 | ||
|
|
3891548d6d | ||
|
|
9d6ed8b9b2 | ||
|
|
ef92815a08 | ||
|
|
19b5cdcb0e | ||
|
|
272b345892 | ||
|
|
7fad9d60ef | ||
|
|
46fc62b8dc | ||
|
|
ca9a93a4b0 | ||
|
|
aa2e18fca9 | ||
|
|
7e4ce7b81d | ||
|
|
e5c0058dd1 | ||
|
|
07c5b541a3 | ||
|
|
b756b8ea32 | ||
|
|
5b46e57ae1 | ||
|
|
924009afb8 | ||
|
|
8f5bacc510 | ||
|
|
d5e48a7eca | ||
|
|
6346a92f0f | ||
|
|
13a566a9a2 | ||
|
|
063c6599d8 | ||
|
|
9fb315c99d | ||
|
|
6e0891e586 | ||
|
|
3a96d59899 | ||
|
|
5fa945956e | ||
|
|
b0aab96cf5 | ||
|
|
11def72790 |
@@ -1,18 +1,18 @@
|
||||
### 2.3.220-20230224 ISO image built on 2023/02/24
|
||||
### 2.3.250-20230519 ISO image built on 2023/05/19
|
||||
|
||||
|
||||
|
||||
### Download and Verify
|
||||
|
||||
2.3.220-20230224 ISO image:
|
||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.220-20230224.iso
|
||||
2.3.250-20230519 ISO image:
|
||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.250-20230519.iso
|
||||
|
||||
MD5: 74CDCE07BC5787567E07C1CAC64DC381
|
||||
SHA1: 8DA0E8541C46CBDCFA0FB9B60F3C95D027D4BB37
|
||||
SHA256: E5EDB011693AC33C40CAB483400F72FAF9615053867FD9C80DDD1AACAD9100B3
|
||||
MD5: EBECF635FB8CFDDD5C0559D01C14E215
|
||||
SHA1: 1C2BD45D080D6D99FD84C120827EA39817FCB078
|
||||
SHA256: 748E9740077BCCAFDC67D15BA2D6A4B0539A29E4527715973E5BDDE5DCF565AD
|
||||
|
||||
Signature for ISO image:
|
||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.220-20230224.iso.sig
|
||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.250-20230519.iso.sig
|
||||
|
||||
Signing key:
|
||||
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
||||
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
|
||||
|
||||
Download the signature file for the ISO:
|
||||
```
|
||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.220-20230224.iso.sig
|
||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.250-20230519.iso.sig
|
||||
```
|
||||
|
||||
Download the ISO image:
|
||||
```
|
||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.220-20230224.iso
|
||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.250-20230519.iso
|
||||
```
|
||||
|
||||
Verify the downloaded ISO image using the signature file:
|
||||
```
|
||||
gpg --verify securityonion-2.3.220-20230224.iso.sig securityonion-2.3.220-20230224.iso
|
||||
gpg --verify securityonion-2.3.250-20230519.iso.sig securityonion-2.3.250-20230519.iso
|
||||
```
|
||||
|
||||
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
||||
```
|
||||
gpg: Signature made Fri 24 Feb 2023 02:32:08 PM EST using RSA key ID FE507013
|
||||
gpg: Signature made Sat 20 May 2023 09:16:02 AM EDT using RSA key ID FE507013
|
||||
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
||||
gpg: WARNING: This key is not certified with a trusted signature!
|
||||
gpg: There is no indication that the signature belongs to the owner.
|
||||
|
||||
@@ -15,6 +15,7 @@ zeek:
|
||||
SpoolDir: /nsm/zeek/spool
|
||||
CfgDir: /opt/zeek/etc
|
||||
CompressLogs: 1
|
||||
ZeekPort: 27760
|
||||
local:
|
||||
'@load':
|
||||
- misc/loaded-scripts
|
||||
|
||||
@@ -212,7 +212,7 @@ check_local_mods() {
|
||||
if [[ -f $default_file ]]; then
|
||||
file_diff=$(diff "$default_file" "$local_file" )
|
||||
if [[ ! " ${local_ignore_arr[*]} " =~ " ${local_file} " ]]; then
|
||||
if [[ $(echo "$file_diff" | grep -c "^<") -gt 0 ]]; then
|
||||
if [[ $(echo "$file_diff" | grep -Ec "^[<>]") -gt 0 ]]; then
|
||||
local_mod_arr+=( "$local_file" )
|
||||
fi
|
||||
fi
|
||||
@@ -554,6 +554,10 @@ preupgrade_changes() {
|
||||
[[ "$INSTALLEDVERSION" == 2.3.190 ]] && up_to_2.3.200
|
||||
[[ "$INSTALLEDVERSION" == 2.3.200 ]] && up_to_2.3.210
|
||||
[[ "$INSTALLEDVERSION" == 2.3.210 ]] && up_to_2.3.220
|
||||
[[ "$INSTALLEDVERSION" == 2.3.220 ]] && up_to_2.3.230
|
||||
[[ "$INSTALLEDVERSION" == 2.3.230 ]] && up_to_2.3.240
|
||||
[[ "$INSTALLEDVERSION" == 2.3.240 ]] && up_to_2.3.250
|
||||
|
||||
true
|
||||
}
|
||||
|
||||
@@ -580,6 +584,9 @@ postupgrade_changes() {
|
||||
[[ "$POSTVERSION" == 2.3.190 ]] && post_to_2.3.200
|
||||
[[ "$POSTVERSION" == 2.3.200 ]] && post_to_2.3.210
|
||||
[[ "$POSTVERSION" == 2.3.210 ]] && post_to_2.3.220
|
||||
[[ "$POSTVERSION" == 2.3.220 ]] && post_to_2.3.230
|
||||
[[ "$POSTVERSION" == 2.3.230 ]] && post_to_2.3.240
|
||||
[[ "$POSTVERSION" == 2.3.240 ]] && post_to_2.3.250
|
||||
|
||||
true
|
||||
}
|
||||
@@ -713,6 +720,21 @@ post_to_2.3.220() {
|
||||
POSTVERSION=2.3.220
|
||||
}
|
||||
|
||||
post_to_2.3.230() {
|
||||
echo "Nothing to do for .230"
|
||||
POSTVERSION=2.3.230
|
||||
}
|
||||
|
||||
post_to_2.3.240() {
|
||||
echo "Nothing to do for .240"
|
||||
POSTVERSION=2.3.240
|
||||
}
|
||||
|
||||
post_to_2.3.250() {
|
||||
echo "Nothing to do for .250"
|
||||
POSTVERSION=2.3.250
|
||||
}
|
||||
|
||||
stop_salt_master() {
|
||||
# kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts
|
||||
set +e
|
||||
@@ -1053,6 +1075,21 @@ up_to_2.3.220() {
|
||||
INSTALLEDVERSION=2.3.220
|
||||
}
|
||||
|
||||
up_to_2.3.230() {
|
||||
echo "Upgrading to 2.3.230"
|
||||
INSTALLEDVERSION=2.3.230
|
||||
}
|
||||
|
||||
up_to_2.3.240() {
|
||||
echo "Upgrading to 2.3.240"
|
||||
INSTALLEDVERSION=2.3.240
|
||||
}
|
||||
|
||||
up_to_2.3.250() {
|
||||
echo "Upgrading to 2.3.250"
|
||||
INSTALLEDVERSION=2.3.250
|
||||
}
|
||||
|
||||
verify_upgradespace() {
|
||||
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
|
||||
if [ "$CURRENTSPACE" -lt "10" ]; then
|
||||
|
||||
@@ -14,22 +14,25 @@
|
||||
---
|
||||
# Remember, leave a key empty if there is no value. None will be a string,
|
||||
# not a Python "NoneType"
|
||||
client:
|
||||
hosts:
|
||||
- {{elasticsearch}}
|
||||
port: 9200
|
||||
elasticsearch:
|
||||
client:
|
||||
hosts:
|
||||
- https://{{elasticsearch}}:9200
|
||||
cloud_id:
|
||||
ca_certs:
|
||||
client_cert:
|
||||
client_key:
|
||||
verify_certs: False
|
||||
request_timeout: 30
|
||||
other_settings:
|
||||
api_key:
|
||||
id:
|
||||
api_key:
|
||||
master_only: False
|
||||
{%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
|
||||
username: "{{ ES_USER }}"
|
||||
password: "{{ ES_PASS }}"
|
||||
username: "{{ ES_USER }}"
|
||||
password: "{{ ES_PASS }}"
|
||||
{%- endif %}
|
||||
url_prefix:
|
||||
use_ssl: True
|
||||
certificate:
|
||||
client_cert:
|
||||
client_key:
|
||||
ssl_no_validate: True
|
||||
timeout: 30
|
||||
master_only: False
|
||||
|
||||
logging:
|
||||
loglevel: INFO
|
||||
|
||||
@@ -139,6 +139,8 @@ so-curator:
|
||||
- file: actionconfs
|
||||
- file: curconf
|
||||
- file: curlogdir
|
||||
- watch:
|
||||
- file: curconf
|
||||
{% else %}
|
||||
- force: True
|
||||
{% endif %}
|
||||
|
||||
@@ -1,21 +1,21 @@
|
||||
{
|
||||
"description" : "suricata.dns",
|
||||
"processors" : [
|
||||
{ "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.type", "target_field": "dns.query.type", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.tx_id", "target_field": "dns.id", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.version", "target_field": "dns.version", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.rrname", "target_field": "dns.query.name", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.rrtype", "target_field": "dns.query.type_name", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.flags", "target_field": "dns.flags", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.qr", "target_field": "dns.qr", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.rd", "target_field": "dns.recursion.desired", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.ra", "target_field": "dns.recursion.available", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.rcode", "target_field": "dns.response.code_name", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.grouped.A", "target_field": "dns.answers.data", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.grouped.CNAME", "target_field": "dns.answers.name", "ignore_missing": true } },
|
||||
{ "pipeline": { "if": "ctx.dns.query?.name != null && ctx.dns.query.name.contains('.')", "name": "dns.tld" } },
|
||||
{ "pipeline": { "name": "common" } }
|
||||
{ "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.type", "target_field": "dns.query.type", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.tx_id", "target_field": "dns.id", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.version", "target_field": "dns.version", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.rrname", "target_field": "dns.query.name", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.rrtype", "target_field": "dns.query.type_name", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.flags", "target_field": "dns.flags", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.qr", "target_field": "dns.qr", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.rd", "target_field": "dns.recursion.desired", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.ra", "target_field": "dns.recursion.available", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.rcode", "target_field": "dns.response.code_name", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.grouped.A", "target_field": "dns.answers.data", "ignore_missing": true } },
|
||||
{ "rename": { "field": "message2.dns.grouped.CNAME", "target_field": "dns.answers.name", "ignore_missing": true } },
|
||||
{ "pipeline": { "if": "ctx.dns.query?.name != null && ctx.dns.query.name.contains('.')", "name": "dns.tld" } },
|
||||
{ "pipeline": { "name": "common" } }
|
||||
]
|
||||
}
|
||||
|
||||
@@ -59,7 +59,7 @@ update() {
|
||||
|
||||
IFS=$'\r\n' GLOBIGNORE='*' command eval 'LINES=($(cat $1))'
|
||||
for i in "${LINES[@]}"; do
|
||||
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.6.2" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
|
||||
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.7.1" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
|
||||
echo $RESPONSE; if [[ "$RESPONSE" != *"\"success\":true"* ]] && [[ "$RESPONSE" != *"updated_at"* ]] ; then RETURN_CODE=1;fi
|
||||
done
|
||||
|
||||
|
||||
@@ -1 +1 @@
|
||||
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.6.2","id": "8.6.2","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}
|
||||
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.7.1","id": "8.7.1","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}
|
||||
|
||||
File diff suppressed because one or more lines are too long
@@ -1 +1,2 @@
|
||||
requests==2.27.1
|
||||
whoisit>=2.5.3
|
||||
|
||||
@@ -17,3 +17,5 @@ strelka:
|
||||
- gen_susp_xor.yar
|
||||
- gen_webshells_ext_vars.yar
|
||||
- configured_vulns_ext_vars.yar
|
||||
- expl_outlook_cve_2023_23397.yar
|
||||
- gen_mal_3cx_compromise_mar23.yar
|
||||
|
||||
@@ -1123,8 +1123,17 @@ create_repo() {
|
||||
}
|
||||
|
||||
detect_cloud() {
|
||||
echo "Testing if setup is running on a cloud instance..." | tee -a "$setup_log"
|
||||
if ( curl --fail -s -m 5 http://169.254.169.254/latest/meta-data/instance-id > /dev/null ) || ( dmidecode -s bios-vendor | grep -q Google > /dev/null) || [ -f /var/log/waagent.log ]; then export is_cloud="true"; fi
|
||||
echo "Testing if setup is running on a cloud instance..." | tee -a "$setup_log"
|
||||
if dmidecode -s bios-version | grep -q amazon || \
|
||||
dmidecode -s bios-vendor | grep -q Amazon || \
|
||||
dmidecode -s bios-vendor | grep -q Google || \
|
||||
[ -f /var/log/waagent.log ]; then
|
||||
|
||||
echo "Detected a cloud installation." | tee -a "$setup_log"
|
||||
export is_cloud="true"
|
||||
else
|
||||
echo "This does not appear to be a cloud installation." | tee -a "$setup_log"
|
||||
fi
|
||||
}
|
||||
|
||||
detect_os() {
|
||||
|
||||
BIN
sigs/securityonion-2.3.220-20230301.iso.sig
Normal file
BIN
sigs/securityonion-2.3.220-20230301.iso.sig
Normal file
Binary file not shown.
BIN
sigs/securityonion-2.3.230-20230417.iso.sig
Normal file
BIN
sigs/securityonion-2.3.230-20230417.iso.sig
Normal file
Binary file not shown.
BIN
sigs/securityonion-2.3.240-20230426.iso.sig
Normal file
BIN
sigs/securityonion-2.3.240-20230426.iso.sig
Normal file
Binary file not shown.
BIN
sigs/securityonion-2.3.250-20230519.iso.sig
Normal file
BIN
sigs/securityonion-2.3.250-20230519.iso.sig
Normal file
Binary file not shown.
Reference in New Issue
Block a user