Compare commits

..

18 Commits

Author SHA1 Message Date
Mike Reeves
93f3171a63 Merge pull request #14031 from Security-Onion-Solutions/patch/2.4.111
2.4.111
2024-12-18 10:05:48 -05:00
Mike Reeves
7d4c6b1174 Merge branch 'patch/2.4.111' of https://github.com/Security-Onion-Solutions/securityonion into patch/2.4.111 2024-12-18 09:29:08 -05:00
Mike Reeves
3e04bfbd21 2.4.111 2024-12-18 09:27:55 -05:00
Josh Brower
c6ebebc4d0 Merge pull request #14033 from Security-Onion-Solutions/patchfix
Delete uneeded files
2024-12-17 16:05:13 -05:00
defensivedepth
17405b849a Delete uneeded files 2024-12-17 16:01:31 -05:00
Mike Reeves
897e8f6883 2.4.111 2024-12-17 13:03:52 -05:00
Mike Reeves
7d06dd4b1d Update HOTFIX 2024-12-13 09:20:49 -05:00
Mike Reeves
5bc9fb19a8 Update VERSION 2024-12-13 09:18:58 -05:00
Mike Reeves
1cef75d6d3 Merge pull request #13797 from Security-Onion-Solutions/hotfix/2.4.110
Hotfix 2.4.110
2024-10-10 11:12:25 -04:00
Mike Reeves
0c4cb863a3 Merge pull request #13796 from Security-Onion-Solutions/2.4.110hf
2.4.110 Hotfix
2024-10-10 10:40:42 -04:00
Mike Reeves
404f9a4eb3 2.4.110 Hotfix 2024-10-10 10:37:12 -04:00
Jason Ertel
04e33a6443 Merge pull request #13794 from Security-Onion-Solutions/jertel/hf20241010
2.4.110 hotfix
2024-10-10 06:40:51 -04:00
Jason Ertel
787336725c 2.4.110 hotfix 2024-10-10 06:25:59 -04:00
Mike Reeves
b7255f72bb Merge pull request #13792 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update soup
2024-10-09 14:23:36 -04:00
Mike Reeves
e2da31c2b7 Update soup 2024-10-09 14:15:43 -04:00
weslambert
915c3f3c95 Merge pull request #13791 from Security-Onion-Solutions/fix/fleet_custom
Use ID instead of name for getting integrations from agent policies
2024-10-09 14:12:40 -04:00
weslambert
c58ed45cf0 Use ID instead of name 2024-10-08 10:55:16 -04:00
weslambert
69857b6b5c Use ID instead of name 2024-10-08 10:54:54 -04:00
8 changed files with 35 additions and 14 deletions

View File

@@ -1,17 +1,17 @@
### 2.4.110-20241004 ISO image released on 2024/10/07
### 2.4.111-20241217 ISO image released on 2024/12/18
### Download and Verify
2.4.110-20241004 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.110-20241004.iso
2.4.111-20241217 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.111-20241217.iso
MD5: 1641E4AFD65DB1C218BFAD22E33909C6
SHA1: 131E1115F7CA76302F72625CD80A212B91608114
SHA256: 8598EB03E52B332EF5445520445AD205C68A99BC030F8497F6EBDE1249B8B576
MD5: 767823D75EB76A6DC6132F799FD0E720
SHA1: 0A7B6918FE5D4BC89EE3F2E03B4F8F4D6255141D
SHA256: 394BFCED9B5EAA0788E2D04806231B3A170839394AAF8DD23B4CE0EB9D6EF727
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.110-20241004.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.111-20241217.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -25,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.110-20241004.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.111-20241217.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.110-20241004.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.111-20241217.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.4.110-20241004.iso.sig securityonion-2.4.110-20241004.iso
gpg --verify securityonion-2.4.111-20241217.iso.sig securityonion-2.4.111-20241217.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Sat 05 Oct 2024 09:31:57 AM EDT using RSA key ID FE507013
gpg: Signature made Tue 17 Dec 2024 04:33:10 PM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

1
HOTFIX
View File

@@ -0,0 +1 @@

View File

@@ -1 +1 @@
2.4.110
2.4.111

View File

@@ -102,6 +102,14 @@ elastic_fleet_package_is_installed() {
curl -s -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET -H 'kbn-xsrf: true' "localhost:5601/api/fleet/epm/packages/$PACKAGE" | jq -r '.item.status'
}
elastic_fleet_agent_policy_ids() {
curl -s -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/agent_policies" | jq -r .items[].id
if [ $? -ne 0 ]; then
echo "Error: Failed to retrieve agent policies."
exit 1
fi
}
elastic_fleet_agent_policy_names() {
curl -s -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/agent_policies" | jq -r .items[].name
if [ $? -ne 0 ]; then

View File

@@ -13,7 +13,7 @@ if [ $? -ne 0 ]; then
fi
IFS=$'\n'
agent_policies=$(elastic_fleet_agent_policy_names)
agent_policies=$(elastic_fleet_agent_policy_ids)
if [ $? -ne 0 ]; then
echo "Error: Failed to retrieve agent policies."
exit 1

View File

@@ -402,6 +402,7 @@ preupgrade_changes() {
[[ "$INSTALLEDVERSION" == 2.4.70 ]] && up_to_2.4.80
[[ "$INSTALLEDVERSION" == 2.4.80 ]] && up_to_2.4.90
[[ "$INSTALLEDVERSION" == 2.4.90 ]] && up_to_2.4.100
[[ "$INSTALLEDVERSION" == 2.4.100 ]] && up_to_2.4.110
true
}
@@ -422,6 +423,7 @@ postupgrade_changes() {
[[ "$POSTVERSION" == 2.4.70 ]] && post_to_2.4.80
[[ "$POSTVERSION" == 2.4.80 ]] && post_to_2.4.90
[[ "$POSTVERSION" == 2.4.90 ]] && post_to_2.4.100
[[ "$POSTVERSION" == 2.4.100 ]] && post_to_2.4.110
true
}
@@ -509,6 +511,11 @@ post_to_2.4.100() {
POSTVERSION=2.4.100
}
post_to_2.4.110() {
echo "Nothing to apply"
POSTVERSION=2.4.110
}
repo_sync() {
echo "Sync the local repo."
su socore -c '/usr/sbin/so-repo-sync' || fail "Unable to complete so-repo-sync."
@@ -691,6 +698,11 @@ up_to_2.4.100() {
determine_elastic_agent_upgrade
INSTALLEDVERSION=2.4.100
}
up_to_2.4.110() {
echo "Nothing to do for 2.4.110"
INSTALLEDVERSION=2.4.110
}
add_detection_test_pillars() {
if [[ -n "$SOUP_INTERNAL_TESTING" ]]; then
@@ -889,7 +901,7 @@ update_airgap_rules() {
rsync -av $UPDATE_DIR/agrules/detect-sigma/* /nsm/rules/detect-sigma/
rsync -av $UPDATE_DIR/agrules/detect-yara/* /nsm/rules/detect-yara/
# Copy the securityonion-resorces repo over for SOC Detection Summaries and checkout the published summaries branch
rsync -av --chown=socore:socore $UPDATE_DIR/agrules/securityonion-resources /opt/so/conf/soc/ai_summary_repos
rsync -av --delete --chown=socore:socore $UPDATE_DIR/agrules/securityonion-resources /opt/so/conf/soc/ai_summary_repos
git config --global --add safe.directory /opt/so/conf/soc/ai_summary_repos/securityonion-resources
git -C /opt/so/conf/soc/ai_summary_repos/securityonion-resources checkout generated-summaries-published
# Copy the securityonion-resorces repo over to nsm

Binary file not shown.

Binary file not shown.