mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-16 05:53:09 +01:00
Compare commits
40 Commits
2.3.90-AIR
...
2.3.90-202
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
4d6cd66d9d | ||
|
|
1946965c5f | ||
|
|
c9a14788ed | ||
|
|
ce963a02d9 | ||
|
|
dcd56de890 | ||
|
|
3d7b963912 | ||
|
|
09253b637e | ||
|
|
c81ce48bff | ||
|
|
73ec595baa | ||
|
|
04862fcc06 | ||
|
|
45346b6318 | ||
|
|
e48de18480 | ||
|
|
66c8cc6e86 | ||
|
|
8dcb64d87c | ||
|
|
ae3e980852 | ||
|
|
11f1fe7ab1 | ||
|
|
4561e13871 | ||
|
|
ea26e402c8 | ||
|
|
9f41df641e | ||
|
|
9f94ecfab7 | ||
|
|
4188282724 | ||
|
|
3945933dec | ||
|
|
73a1a3878f | ||
|
|
ff25d6f80b | ||
|
|
0571612ea1 | ||
|
|
f697d88090 | ||
|
|
ad03241910 | ||
|
|
f82d204c0e | ||
|
|
780daf8aa7 | ||
|
|
5008b647b0 | ||
|
|
65b1ab833d | ||
|
|
c6773a0bbc | ||
|
|
ff2d2c7c04 | ||
|
|
6c7a1f23f5 | ||
|
|
f5761c73a5 | ||
|
|
8448778ecd | ||
|
|
8d667795a7 | ||
|
|
7a664ab8f7 | ||
|
|
5e0ac89841 | ||
|
|
c571b2c499 |
@@ -1,6 +1,6 @@
|
||||
## Security Onion 2.3.90-WAZUH
|
||||
## Security Onion 2.3.90-20211210
|
||||
|
||||
Security Onion 2.3.90-AIRGAPFIX is here!
|
||||
Security Onion 2.3.90-20211210 is here!
|
||||
|
||||
## Screenshots
|
||||
|
||||
|
||||
@@ -1,18 +1,18 @@
|
||||
### 2.3.90-AIRGAPFIX ISO image built on 2021/12/01
|
||||
### 2.3.90-20211210 ISO image built on 2021/12/10
|
||||
|
||||
|
||||
|
||||
### Download and Verify
|
||||
|
||||
2.3.90-AIRGAPFIX ISO image:
|
||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.90-AIRGAPFIX.iso
|
||||
2.3.90-20211210 ISO image:
|
||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.90-20211210.iso
|
||||
|
||||
MD5: A87EEF66FEB2ED6E20ABD4ADDA4899C6
|
||||
SHA1: D1AD74D1481E9FF6F1A79D27DC569DA6749EC54B
|
||||
SHA256: E4FC40340357B098E881F13BC4960AA8CB5F5AC73C05E077C993078ED7F46D59
|
||||
MD5: 512C13089060EE17BC3FA275D62152DC
|
||||
SHA1: A70D3A3C4B74AD2EE9B1353BDE7E5DD327248511
|
||||
SHA256: 271DA7617FBA3549B1E496C60E9AD743B13CC8D0468DF3F7AC9A76B6D496D212
|
||||
|
||||
Signature for ISO image:
|
||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.90-AIRGAPFIX.iso.sig
|
||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.90-20211210.iso.sig
|
||||
|
||||
Signing key:
|
||||
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
||||
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
|
||||
|
||||
Download the signature file for the ISO:
|
||||
```
|
||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.90-AIRGAPFIX.iso.sig
|
||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.90-20211210.iso.sig
|
||||
```
|
||||
|
||||
Download the ISO image:
|
||||
```
|
||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.90-AIRGAPFIX.iso
|
||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.90-20211210.iso
|
||||
```
|
||||
|
||||
Verify the downloaded ISO image using the signature file:
|
||||
```
|
||||
gpg --verify securityonion-2.3.90-AIRGAPFIX.iso.sig securityonion-2.3.90-AIRGAPFIX.iso
|
||||
gpg --verify securityonion-2.3.90-20211210.iso.sig securityonion-2.3.90-20211210.iso
|
||||
```
|
||||
|
||||
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
||||
```
|
||||
gpg: Signature made Wed 01 Dec 2021 11:07:16 AM EST using RSA key ID FE507013
|
||||
gpg: Signature made Fri 10 Dec 2021 02:52:08 PM EST using RSA key ID FE507013
|
||||
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
||||
gpg: WARNING: This key is not certified with a trusted signature!
|
||||
gpg: There is no indication that the signature belongs to the owner.
|
||||
|
||||
@@ -16,6 +16,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
. /usr/sbin/so-common
|
||||
export LC_CTYPE="en_US.UTF-8"
|
||||
|
||||
UPDATE_DIR=/tmp/sogh/securityonion
|
||||
DEFAULT_SALT_DIR=/opt/so/saltstack/default
|
||||
@@ -599,18 +600,33 @@ up_to_2.3.80() {
|
||||
|
||||
up_to_2.3.90() {
|
||||
for i in manager managersearch eval standalone; do
|
||||
echo "Checking for compgen match of /opt/so/saltstack/local/pillar/minions/*_$i.sls"
|
||||
if compgen -G "/opt/so/saltstack/local/pillar/minions/*_$i.sls"; then
|
||||
echo "soc:" >> /opt/so/saltstack/local/pillar/minions/*_$i.sls
|
||||
sed -i "/^soc:/a \\ es_index_patterns: '*:so-*,*:endgame-*'" /opt/so/saltstack/local/pillar/minions/*_$i.sls
|
||||
echo "Found compgen match for /opt/so/saltstack/local/pillar/minions/*_$i.sls"
|
||||
for f in $(compgen -G "/opt/so/saltstack/local/pillar/minions/*_$i.sls"); do
|
||||
if grep -qozP "^soc:\n.*es_index_patterns: '\*:so-\*,\*:endgame-\*'" "$f"; then
|
||||
echo "soc:es_index_patterns already present in $f"
|
||||
else
|
||||
echo "Appending soc pillar data to $f"
|
||||
echo "soc:" >> "$f"
|
||||
sed -i "/^soc:/a \\ es_index_patterns: '*:so-*,*:endgame-*'" "$f"
|
||||
fi
|
||||
done
|
||||
fi
|
||||
done
|
||||
|
||||
# Create Endgame Hostgroup
|
||||
so-firewall addhostgroup endgame
|
||||
echo "Adding endgame hostgroup with so-firewall"
|
||||
if so-firewall addhostgroup endgame 2>&1 | grep -q 'Already exists'; then
|
||||
echo 'endgame hostgroup already exists'
|
||||
else
|
||||
echo 'endgame hostgroup added'
|
||||
fi
|
||||
|
||||
# Force influx to generate a new cert
|
||||
mv /etc/pki/influxdb.crt /etc/pki/influxdb.crt.2390upgrade
|
||||
mv /etc/pki/influxdb.key /etc/pki/influxdb.key.2390upgrade
|
||||
echo "Moving influxdb.crt and influxdb.key to generate new certs"
|
||||
mv -vf /etc/pki/influxdb.crt /etc/pki/influxdb.crt.2390upgrade
|
||||
mv -vf /etc/pki/influxdb.key /etc/pki/influxdb.key.2390upgrade
|
||||
|
||||
# remove old common ingest pipeline in default
|
||||
rm -vf /opt/so/saltstack/default/salt/elasticsearch/files/ingest/common
|
||||
@@ -838,7 +854,7 @@ verify_latest_update_script() {
|
||||
}
|
||||
|
||||
apply_hotfix() {
|
||||
if [[ "$INSTALLEDVERSION" == "2.3.90" && "$HOTFIXVERSION" == "WAZUH" ]] ; then
|
||||
if [[ "$INSTALLEDVERSION" == "2.3.90" ]] ; then
|
||||
FILE="/nsm/wazuh/etc/ossec.conf"
|
||||
echo "Detecting if ossec.conf needs corrected..."
|
||||
if head -1 $FILE | grep -q "xml version"; then
|
||||
@@ -849,7 +865,7 @@ apply_hotfix() {
|
||||
echo "$FILE does not have an XML header, so no changes are necessary."
|
||||
fi
|
||||
else
|
||||
echo "Skipping ossec.conf check ($INSTALLEDVERSION/$HOTFIXVERSION)"
|
||||
echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)"
|
||||
fi
|
||||
}
|
||||
|
||||
@@ -857,6 +873,7 @@ apply_hotfix() {
|
||||
main() {
|
||||
trap 'check_err $?' EXIT
|
||||
|
||||
echo "### Preparing soup at $(date) ###"
|
||||
check_pillar_items
|
||||
|
||||
echo "Checking to see if this is an airgap install."
|
||||
@@ -1168,5 +1185,4 @@ EOF
|
||||
read -r input
|
||||
fi
|
||||
|
||||
echo "### Preparing soup at $(date) ###"
|
||||
main "$@" | tee -a $SOUP_LOG
|
||||
|
||||
@@ -258,7 +258,7 @@ so-elasticsearch:
|
||||
{% if TRUECLUSTER is sameas false or (TRUECLUSTER is sameas true and not salt['pillar.get']('nodestab', {})) %}
|
||||
- discovery.type=single-node
|
||||
{% endif %}
|
||||
- ES_JAVA_OPTS=-Xms{{ esheap }} -Xmx{{ esheap }} -Des.transport.cname_in_publish_address=true
|
||||
- ES_JAVA_OPTS=-Xms{{ esheap }} -Xmx{{ esheap }} -Des.transport.cname_in_publish_address=true -Dlog4j2.formatMsgNoLookups=true
|
||||
ulimits:
|
||||
- memlock=-1:-1
|
||||
- nofile=65536:65536
|
||||
@@ -327,7 +327,7 @@ so-elasticsearch-pipelines-file:
|
||||
|
||||
so-elasticsearch-pipelines:
|
||||
cmd.run:
|
||||
- name: /opt/so/conf/elasticsearch/so-elasticsearch-pipelines {{ esclustername }}
|
||||
- name: /opt/so/conf/elasticsearch/so-elasticsearch-pipelines {{ grains.host }}
|
||||
- onchanges:
|
||||
- file: esingestconf
|
||||
- file: esingestdynamicconf
|
||||
|
||||
File diff suppressed because one or more lines are too long
1
salt/logstash/etc/jvm.options
Normal file
1
salt/logstash/etc/jvm.options
Normal file
@@ -0,0 +1 @@
|
||||
-Dlog4j2.formatMsgNoLookups=true
|
||||
@@ -95,7 +95,7 @@ so-thehive-es:
|
||||
- /opt/so/conf/thehive/etc/es/log4j2.properties:/usr/share/elasticsearch/config/log4j2.properties:ro
|
||||
- /opt/so/log/thehive:/var/log/elasticsearch:rw
|
||||
- environment:
|
||||
- ES_JAVA_OPTS=-Xms512m -Xmx512m
|
||||
- ES_JAVA_OPTS=-Xms512m -Xmx512m -Dlog4j2.formatMsgNoLookups=true
|
||||
- port_bindings:
|
||||
- 0.0.0.0:9400:9400
|
||||
- 0.0.0.0:9500:9500
|
||||
|
||||
@@ -2016,10 +2016,10 @@ reinstall_init() {
|
||||
{
|
||||
if command -v salt-call &> /dev/null && grep -q "master:" /etc/salt/minion 2> /dev/null; then
|
||||
# Disable schedule so highstate doesn't start running during the install
|
||||
salt-call -l info schedule.disable
|
||||
salt-call -l info schedule.disable --local
|
||||
|
||||
# Kill any currently running salt jobs, also to prevent issues with highstate.
|
||||
salt-call -l info saltutil.kill_all_jobs
|
||||
salt-call -l info saltutil.kill_all_jobs --local
|
||||
fi
|
||||
|
||||
# Kill any salt processes (safely)
|
||||
|
||||
BIN
sigs/securityonion-2.3.90-20211206.iso.sig
Normal file
BIN
sigs/securityonion-2.3.90-20211206.iso.sig
Normal file
Binary file not shown.
BIN
sigs/securityonion-2.3.90-20211210.iso.sig
Normal file
BIN
sigs/securityonion-2.3.90-20211210.iso.sig
Normal file
Binary file not shown.
Reference in New Issue
Block a user