mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2026-04-26 06:27:50 +02:00
Compare commits
31 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 9f41df641e | |||
| 9f94ecfab7 | |||
| 4188282724 | |||
| 3945933dec | |||
| 73a1a3878f | |||
| ff25d6f80b | |||
| 0571612ea1 | |||
| f697d88090 | |||
| ad03241910 | |||
| f82d204c0e | |||
| 780daf8aa7 | |||
| 5008b647b0 | |||
| 65b1ab833d | |||
| c6773a0bbc | |||
| ff2d2c7c04 | |||
| 6c7a1f23f5 | |||
| f5761c73a5 | |||
| 8448778ecd | |||
| 8d667795a7 | |||
| 7a664ab8f7 | |||
| 5e0ac89841 | |||
| 8990a09d92 | |||
| 946673dc3b | |||
| c571b2c499 | |||
| 80c569317f | |||
| 5f121f3b99 | |||
| 63cb486698 | |||
| 1a31e60e47 | |||
| 168f860c87 | |||
| 8d87fae6a8 | |||
| 739efc22d2 |
@@ -1,6 +1,6 @@
|
|||||||
## Security Onion 2.3.90-WAZUH
|
## Security Onion 2.3.90-20211206
|
||||||
|
|
||||||
Security Onion 2.3.90-WAZUH is here!
|
Security Onion 2.3.90-20211206 is here!
|
||||||
|
|
||||||
## Screenshots
|
## Screenshots
|
||||||
|
|
||||||
|
|||||||
+11
-11
@@ -1,18 +1,18 @@
|
|||||||
### 2.3.90-WAZUH ISO image built on 2021/11/23
|
### 2.3.90-20211206 ISO image built on 2021/12/06
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Download and Verify
|
### Download and Verify
|
||||||
|
|
||||||
2.3.90-WAZUH ISO image:
|
2.3.90-20211206 ISO image:
|
||||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.90-WAZUH.iso
|
https://download.securityonion.net/file/securityonion/securityonion-2.3.90-20211206.iso
|
||||||
|
|
||||||
MD5: B7141C8627CDB45F4A8741B2ADE4A9F3
|
MD5: 8A5FDF731D548E27D123E5B711890AEC
|
||||||
SHA1: 16087B385CA651659EC98F139AFDF90922430FB6
|
SHA1: B4AF33FE1D64592D46C780AF0C5E7FBD21A22BDE
|
||||||
SHA256: 667AF11BBCFE3248AF59E45043703B55A543E059899AE387FF55EB8077304F04
|
SHA256: 091DA2D06C82447639D324EE32DBC385AE407078B3A55F4E0704B22DB6B29A7E
|
||||||
|
|
||||||
Signature for ISO image:
|
Signature for ISO image:
|
||||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.90-WAZUH.iso.sig
|
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.90-20211206.iso.sig
|
||||||
|
|
||||||
Signing key:
|
Signing key:
|
||||||
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
||||||
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
|
|||||||
|
|
||||||
Download the signature file for the ISO:
|
Download the signature file for the ISO:
|
||||||
```
|
```
|
||||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.90-WAZUH.iso.sig
|
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.90-20211206.iso.sig
|
||||||
```
|
```
|
||||||
|
|
||||||
Download the ISO image:
|
Download the ISO image:
|
||||||
```
|
```
|
||||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.90-WAZUH.iso
|
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.90-20211206.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
Verify the downloaded ISO image using the signature file:
|
Verify the downloaded ISO image using the signature file:
|
||||||
```
|
```
|
||||||
gpg --verify securityonion-2.3.90-WAZUH.iso.sig securityonion-2.3.90-WAZUH.iso
|
gpg --verify securityonion-2.3.90-20211206.iso.sig securityonion-2.3.90-20211206.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
||||||
```
|
```
|
||||||
gpg: Signature made Tue 23 Nov 2021 03:19:08 PM EST using RSA key ID FE507013
|
gpg: Signature made Mon 06 Dec 2021 10:14:29 AM EST using RSA key ID FE507013
|
||||||
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
||||||
gpg: WARNING: This key is not certified with a trusted signature!
|
gpg: WARNING: This key is not certified with a trusted signature!
|
||||||
gpg: There is no indication that the signature belongs to the owner.
|
gpg: There is no indication that the signature belongs to the owner.
|
||||||
|
|||||||
@@ -16,6 +16,7 @@
|
|||||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
. /usr/sbin/so-common
|
. /usr/sbin/so-common
|
||||||
|
export LC_CTYPE="en_US.UTF-8"
|
||||||
|
|
||||||
UPDATE_DIR=/tmp/sogh/securityonion
|
UPDATE_DIR=/tmp/sogh/securityonion
|
||||||
DEFAULT_SALT_DIR=/opt/so/saltstack/default
|
DEFAULT_SALT_DIR=/opt/so/saltstack/default
|
||||||
@@ -599,18 +600,33 @@ up_to_2.3.80() {
|
|||||||
|
|
||||||
up_to_2.3.90() {
|
up_to_2.3.90() {
|
||||||
for i in manager managersearch eval standalone; do
|
for i in manager managersearch eval standalone; do
|
||||||
if compgen -G "/opt/so/saltstack/local/pillar/minions/*_$i.sls" > /dev/null; then
|
echo "Checking for compgen match of /opt/so/saltstack/local/pillar/minions/*_$i.sls"
|
||||||
echo "soc:" >> /opt/so/saltstack/local/pillar/minions/*_$i.sls
|
if compgen -G "/opt/so/saltstack/local/pillar/minions/*_$i.sls"; then
|
||||||
sed -i "/^soc:/a \\ es_index_patterns: '*:so-*,*:endgame-*'" /opt/so/saltstack/local/pillar/minions/*_$i.sls
|
echo "Found compgen match for /opt/so/saltstack/local/pillar/minions/*_$i.sls"
|
||||||
|
for f in $(compgen -G "/opt/so/saltstack/local/pillar/minions/*_$i.sls"); do
|
||||||
|
if grep -qozP "^soc:\n.*es_index_patterns: '\*:so-\*,\*:endgame-\*'" "$f"; then
|
||||||
|
echo "soc:es_index_patterns already present in $f"
|
||||||
|
else
|
||||||
|
echo "Appending soc pillar data to $f"
|
||||||
|
echo "soc:" >> "$f"
|
||||||
|
sed -i "/^soc:/a \\ es_index_patterns: '*:so-*,*:endgame-*'" "$f"
|
||||||
|
fi
|
||||||
|
done
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
|
||||||
# Create Endgame Hostgroup
|
# Create Endgame Hostgroup
|
||||||
so-firewall addhostgroup endgame
|
echo "Adding endgame hostgroup with so-firewall"
|
||||||
|
if so-firewall addhostgroup endgame 2>&1 | grep -q 'Already exists'; then
|
||||||
|
echo 'endgame hostgroup already exists'
|
||||||
|
else
|
||||||
|
echo 'endgame hostgroup added'
|
||||||
|
fi
|
||||||
|
|
||||||
# Force influx to generate a new cert
|
# Force influx to generate a new cert
|
||||||
mv /etc/pki/influxdb.crt /etc/pki/influxdb.crt.2390upgrade
|
echo "Moving influxdb.crt and influxdb.key to generate new certs"
|
||||||
mv /etc/pki/influxdb.key /etc/pki/influxdb.key.2390upgrade
|
mv -vf /etc/pki/influxdb.crt /etc/pki/influxdb.crt.2390upgrade
|
||||||
|
mv -vf /etc/pki/influxdb.key /etc/pki/influxdb.key.2390upgrade
|
||||||
|
|
||||||
# remove old common ingest pipeline in default
|
# remove old common ingest pipeline in default
|
||||||
rm -vf /opt/so/saltstack/default/salt/elasticsearch/files/ingest/common
|
rm -vf /opt/so/saltstack/default/salt/elasticsearch/files/ingest/common
|
||||||
@@ -838,7 +854,7 @@ verify_latest_update_script() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
apply_hotfix() {
|
apply_hotfix() {
|
||||||
if [[ "$INSTALLEDVERSION" == "2.3.90" && "$HOTFIXVERSION" == "WAZUH" ]] ; then
|
if [[ "$INSTALLEDVERSION" == "2.3.90" ]] ; then
|
||||||
FILE="/nsm/wazuh/etc/ossec.conf"
|
FILE="/nsm/wazuh/etc/ossec.conf"
|
||||||
echo "Detecting if ossec.conf needs corrected..."
|
echo "Detecting if ossec.conf needs corrected..."
|
||||||
if head -1 $FILE | grep -q "xml version"; then
|
if head -1 $FILE | grep -q "xml version"; then
|
||||||
@@ -849,7 +865,7 @@ apply_hotfix() {
|
|||||||
echo "$FILE does not have an XML header, so no changes are necessary."
|
echo "$FILE does not have an XML header, so no changes are necessary."
|
||||||
fi
|
fi
|
||||||
else
|
else
|
||||||
echo "Skipping ossec.conf check ($INSTALLEDVERSION/$HOTFIXVERSION)"
|
echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -857,6 +873,7 @@ apply_hotfix() {
|
|||||||
main() {
|
main() {
|
||||||
trap 'check_err $?' EXIT
|
trap 'check_err $?' EXIT
|
||||||
|
|
||||||
|
echo "### Preparing soup at $(date) ###"
|
||||||
check_pillar_items
|
check_pillar_items
|
||||||
|
|
||||||
echo "Checking to see if this is an airgap install."
|
echo "Checking to see if this is an airgap install."
|
||||||
@@ -1168,5 +1185,4 @@ EOF
|
|||||||
read -r input
|
read -r input
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "### Preparing soup at $(date) ###"
|
|
||||||
main "$@" | tee -a $SOUP_LOG
|
main "$@" | tee -a $SOUP_LOG
|
||||||
|
|||||||
@@ -327,7 +327,7 @@ so-elasticsearch-pipelines-file:
|
|||||||
|
|
||||||
so-elasticsearch-pipelines:
|
so-elasticsearch-pipelines:
|
||||||
cmd.run:
|
cmd.run:
|
||||||
- name: /opt/so/conf/elasticsearch/so-elasticsearch-pipelines {{ esclustername }}
|
- name: /opt/so/conf/elasticsearch/so-elasticsearch-pipelines {{ grains.host }}
|
||||||
- onchanges:
|
- onchanges:
|
||||||
- file: esingestconf
|
- file: esingestconf
|
||||||
- file: esingestdynamicconf
|
- file: esingestdynamicconf
|
||||||
|
|||||||
File diff suppressed because one or more lines are too long
@@ -65,6 +65,10 @@ yumconf:
|
|||||||
- mode: 644
|
- mode: 644
|
||||||
- template: jinja
|
- template: jinja
|
||||||
- show_changes: False
|
- show_changes: False
|
||||||
|
|
||||||
|
cleanairgap:
|
||||||
|
file.absent:
|
||||||
|
- name: /etc/yum.repos.d/airgap_repo.repo
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
cleanyum:
|
cleanyum:
|
||||||
|
|||||||
+2
-2
@@ -2016,10 +2016,10 @@ reinstall_init() {
|
|||||||
{
|
{
|
||||||
if command -v salt-call &> /dev/null && grep -q "master:" /etc/salt/minion 2> /dev/null; then
|
if command -v salt-call &> /dev/null && grep -q "master:" /etc/salt/minion 2> /dev/null; then
|
||||||
# Disable schedule so highstate doesn't start running during the install
|
# Disable schedule so highstate doesn't start running during the install
|
||||||
salt-call -l info schedule.disable
|
salt-call -l info schedule.disable --local
|
||||||
|
|
||||||
# Kill any currently running salt jobs, also to prevent issues with highstate.
|
# Kill any currently running salt jobs, also to prevent issues with highstate.
|
||||||
salt-call -l info saltutil.kill_all_jobs
|
salt-call -l info saltutil.kill_all_jobs --local
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Kill any salt processes (safely)
|
# Kill any salt processes (safely)
|
||||||
|
|||||||
+1
-1
@@ -318,7 +318,7 @@ if ! [[ -f $install_opt_file ]]; then
|
|||||||
elif [[ $is_minion && $is_iso ]]; then
|
elif [[ $is_minion && $is_iso ]]; then
|
||||||
$sshcmd -i /root/.ssh/so.key soremote@"$MSRV" [[ -f /etc/yum.repos.d/airgap_repo.repo ]] >> $setup_log 2>&1
|
$sshcmd -i /root/.ssh/so.key soremote@"$MSRV" [[ -f /etc/yum.repos.d/airgap_repo.repo ]] >> $setup_log 2>&1
|
||||||
airgap_check=$?
|
airgap_check=$?
|
||||||
[[ $airgap_check ]] && is_airgap=true >> $setup_log 2>&1
|
[[ $airgap_check == 0 ]] && is_airgap=true >> $setup_log 2>&1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
reset_proxy
|
reset_proxy
|
||||||
|
|||||||
Binary file not shown.
Binary file not shown.
Reference in New Issue
Block a user