Compare commits

...

29 Commits

Author SHA1 Message Date
Mike Reeves
d5d2b5fbc7 Merge pull request #11879 from Security-Onion-Solutions/dev
2.3.280
2023-11-28 15:21:56 -05:00
Mike Reeves
84d6fcb752 Merge pull request #11878 from Security-Onion-Solutions/2.3.280
2.3.280
2023-11-28 15:00:34 -05:00
Mike Reeves
de9e9a2716 2.3.280 2023-11-28 14:58:25 -05:00
Josh Patterson
cec6cff19d Merge pull request #11874 from Security-Onion-Solutions/23souphs
so-nginx watch managerssl to restart if changed
2023-11-27 12:48:06 -05:00
m0duspwnens
7311d6480c so-nginx watch managerssl to restart if changed 2023-11-27 12:15:09 -05:00
Josh Patterson
f967c8e362 Merge pull request #11873 from Security-Onion-Solutions/23souphs
enable highstate after starting minion
2023-11-27 11:12:45 -05:00
m0duspwnens
cfad6414d2 enable highstate after starting minion 2023-11-27 11:10:39 -05:00
Josh Patterson
0fdaed9cf7 Merge pull request #11864 from Security-Onion-Solutions/import/suriinterface
suricata interface None if so-import
2023-11-22 10:42:43 -05:00
m0duspwnens
1dc88781f1 suricata interface None if so-import 2023-11-22 10:11:34 -05:00
Mike Reeves
0cfb8b0816 Merge pull request #11834 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update signing_policies.conf
2023-11-20 15:59:21 -05:00
Mike Reeves
c0968d3843 Update signing_policies.conf 2023-11-20 15:57:29 -05:00
Mike Reeves
3b133e87cd Merge pull request #11831 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update signing_policies.conf
2023-11-20 15:19:42 -05:00
Mike Reeves
fee9b61ce9 Update soup 2023-11-20 15:14:25 -05:00
Mike Reeves
57612c69fe Update signing_policies.conf 2023-11-20 15:11:50 -05:00
Mike Reeves
94accb0e8c Update signing_policies.conf 2023-11-20 15:09:13 -05:00
Josh Patterson
3b8d1d470e Merge pull request #11798 from Security-Onion-Solutions/m0duspwnens-patch-1
Update soup
2023-11-15 15:23:46 -05:00
Josh Patterson
c624a44b0e Update soup
add quote
2023-11-15 15:19:54 -05:00
weslambert
bc509a0aa9 Merge pull request #11772 from Security-Onion-Solutions/upgrade/elastic_8_10_4
Elastic 8.10.4
2023-11-13 09:36:49 -05:00
Doug Burks
ee0ef3217f Merge pull request #11771 from Security-Onion-Solutions/dougburks-patch-1
Add EOL warning to README.md
2023-11-13 09:18:50 -05:00
weslambert
18e319cbe3 Elastic 8.10.4 2023-11-13 09:17:33 -05:00
Doug Burks
3316e1261d Add EOL warning to README.md 2023-11-13 09:16:25 -05:00
weslambert
b7cf44466c Elastic 8.10.4 2023-11-13 09:16:23 -05:00
Mike Reeves
e321aa52a5 Merge pull request #11749 from Security-Onion-Solutions/TOoSmOotH-patch-6
Update soup
2023-11-09 10:49:34 -05:00
Mike Reeves
07df045e79 Update soup 2023-11-09 10:38:53 -05:00
Mike Reeves
7b11ddb032 Update soup 2023-11-09 10:25:16 -05:00
Jorge Reyes
ac4428940e Merge pull request #11561 from Security-Onion-Solutions/2.3/zeek6
Zeek 6 upgrade
2023-10-23 09:25:21 -04:00
reyesj2
a9457d5f53 Remove external community-id replaced with Zeek 6 built in community-id.
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2023-10-17 16:02:16 -04:00
Jason Ertel
3672701dde Merge pull request #11506 from Security-Onion-Solutions/jertel-patch-1
Update VERSION
2023-10-11 09:26:32 -04:00
Jason Ertel
07ed2cb3da Update VERSION 2023-10-10 21:35:48 -04:00
11 changed files with 59 additions and 22 deletions

View File

@@ -2,6 +2,20 @@
Security Onion 2.3 is here!
## End Of Life Warning
Security Onion 2.3 reaches End Of Life (EOL) on April 6, 2024:
https://blog.securityonion.net/2023/10/6-month-eol-notice-for-security-onion-23.html
For new installations, please see the 2.4 branch of this repo:
https://github.com/Security-Onion-Solutions/securityonion/tree/2.4/main
If you have an existing 2.3 installation and would like to migrate to 2.4, please see:
https://docs.securityonion.net/en/2.4/appendix.html
## Screenshots
Alerts

View File

@@ -1,18 +1,18 @@
### 2.3.270-20231006 ISO image built on 2023/10/06
### 2.3.280-20231128 ISO image built on 2023/11/28
### Download and Verify
2.3.270-20231006 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.270-20231006.iso
2.3.280-20231128 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.280-20231128.iso
MD5: 3FC7A37EA402A5F0C6609D7431387575
SHA1: 979851603E431EE9670A1576E5DCCD838CEDA294
SHA256: 34F72EDEA9A62E1545347A31DEDEDD099D824466EC52B8674ACC7DB6D7E8B943
MD5: 0BC68BD73547B7E2FBA6F53BEC174590
SHA1: 1D33C565D37772FE7A3C3FE3ECB05FC1AC1EBFF1
SHA256: ADBD9DC9E1B266B18E0FDBDF084073EF926C565041858060D283CDAEF021EE11
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.270-20231006.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.280-20231128.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.270-20231006.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.280-20231128.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.270-20231006.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.280-20231128.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.270-20231006.iso.sig securityonion-2.3.270-20231006.iso
gpg --verify securityonion-2.3.280-20231128.iso.sig securityonion-2.3.280-20231128.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Thu 21 Sep 2023 10:43:13 AM EDT using RSA key ID FE507013
gpg: Signature made Mon 27 Nov 2023 05:09:34 PM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

View File

@@ -1 +1 @@
2.3.270
2.3.280

View File

@@ -42,12 +42,13 @@ zeek:
- frameworks/files/hash-all-files
- frameworks/files/detect-MHR
- policy/frameworks/notice/extend-email/hostnames
- policy/frameworks/notice/community-id
- policy/protocols/conn/community-id-logging
- ja3
- hassh
- intel
- cve-2020-0601
- securityonion/bpfconf
- securityonion/communityid
- securityonion/file-extraction
- oui-logging
- icsnpp-modbus

View File

@@ -37,7 +37,7 @@ x509_signing_policies:
- ST: Utah
- L: Salt Lake City
- basicConstraints: "critical CA:false"
- keyUsage: "critical keyEncipherment"
- keyUsage: "critical keyEncipherment, digitalSignature"
- subjectKeyIdentifier: hash
- authorityKeyIdentifier: keyid,issuer:always
- extendedKeyUsage: serverAuth

View File

@@ -580,6 +580,7 @@ preupgrade_changes() {
[[ "$INSTALLEDVERSION" == 2.3.240 ]] && up_to_2.3.250
[[ "$INSTALLEDVERSION" == 2.3.250 ]] && up_to_2.3.260
[[ "$INSTALLEDVERSION" == 2.3.260 ]] && up_to_2.3.270
[[ "$INSTALLEDVERSION" == 2.3.270 ]] && up_to_2.3.280
true
}
@@ -612,6 +613,7 @@ postupgrade_changes() {
[[ "$POSTVERSION" == 2.3.240 ]] && post_to_2.3.250
[[ "$POSTVERSION" == 2.3.250 ]] && post_to_2.3.260
[[ "$POSTVERSION" == 2.3.260 ]] && post_to_2.3.270
[[ "$POSTVERSION" == 2.3.270 ]] && post_to_2.3.280
true
}
@@ -772,6 +774,17 @@ post_to_2.3.270() {
POSTVERSION=2.3.270
}
post_to_2.3.280() {
salt-call state.apply ca queue=True
stop_salt_minion
mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old
mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old
systemctl_func "start" "salt-minion"
enable_highstate
POSTVERSION=2.3.280
}
stop_salt_master() {
# kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts
set +e
@@ -1137,6 +1150,11 @@ up_to_2.3.270() {
INSTALLEDVERSION=2.3.270
}
up_to_2.3.280() {
echo "Upgrading to 2.3.280"
INSTALLEDVERSION=2.3.280
}
verify_upgradespace() {
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
if [ "$CURRENTSPACE" -lt "10" ]; then
@@ -1720,8 +1738,12 @@ if [[ -z $UNATTENDED ]]; then
SOUP - Security Onion UPdater
**WARNING** Security Onion 2.3 reaches End Of Life (EOL) on April 6, 2024.
Please make plans to migrate to Security Onion 2.4:
https://blog.securityonion.net/2023/10/6-month-eol-notice-for-security-onion-23.html
Please review the following for more information about the update process and recent updates:
https://docs.securityonion.net/soup
https://docs.securityonion.net/en/2.3/soup.html
https://blog.securityonion.net
EOF

View File

@@ -59,7 +59,7 @@ update() {
IFS=$'\r\n' GLOBIGNORE='*' command eval 'LINES=($(cat $1))'
for i in "${LINES[@]}"; do
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.8.2" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.10.4" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
echo $RESPONSE; if [[ "$RESPONSE" != *"\"success\":true"* ]] && [[ "$RESPONSE" != *"updated_at"* ]] ; then RETURN_CODE=1;fi
done

View File

@@ -1 +1 @@
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.8.2","id": "8.8.2","references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.10.4","id": "8.10.4","references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}

View File

@@ -118,6 +118,10 @@ so-nginx:
- watch:
- file: nginxconf
- file: nginxconfdir
{% if grains.role in ['so-manager', 'so-managersearch', 'so-eval', 'so-standalone', 'so-import', 'so-fleet'] %}
- x509: managerssl_key
- x509: managerssl_crt
{% endif %}
- require:
- file: nginxconf
{% if grains.role in ['so-manager', 'so-managersearch', 'so-eval', 'so-standalone', 'so-import', 'so-fleet'] %}

View File

@@ -1,6 +1,6 @@
{% load_yaml as afpacket %}
af-packet:
- interface: {{ salt['pillar.get']('sensor:interface', 'bond0') }}
- interface: {{ None if grains.role == 'so-import' else salt['pillar.get']('sensor:interface', 'bond0') }}
cluster-id: 59
cluster-type: cluster_flow
defrag: yes
@@ -8,8 +8,4 @@ af-packet:
threads: {{ salt['pillar.get']('sensor:suriprocs', salt['pillar.get']('sensor:suripins') | length) }}
tpacket-v3: yes
ring-size: {{ salt['pillar.get']('sensor:suriringsize', '5000') }}
- interface: default
#threads: auto
#use-mmap: no
#tpacket-v3: yes
{% endload %}

Binary file not shown.