Compare commits

...

11 Commits

Author SHA1 Message Date
Mike Reeves
55af7eb541 Merge pull request #15732 from Security-Onion-Solutions/hotfix/2.4.211
Hotfix 2.4.211
2026-04-07 13:19:57 -04:00
Mike Reeves
ece7cdac04 Merge pull request #15731 from Security-Onion-Solutions/hf211
2.4.211 hotfix
2026-04-07 11:38:52 -04:00
Mike Reeves
b63d5e4c83 2.4.211 hotfix 2026-04-07 11:27:57 -04:00
Mike Reeves
0f97249009 Merge pull request #15726 from Security-Onion-Solutions/cherry-pick/suricata-bpf-hotfix-2.4.211
Cherry-pick suricata bpf fix and HOTFIX update
2026-04-06 14:29:00 -04:00
Josh Patterson
043feee4c0 update HOTFIX 2026-04-06 14:26:25 -04:00
Josh Patterson
c3707dc814 fix suricata bpf for transition mode 2026-04-06 14:26:25 -04:00
Mike Reeves
4afd186ec7 Merge pull request #15714 from Security-Onion-Solutions/soupfix2
Fix soup for 3.X.X installations
2026-04-01 17:20:37 -04:00
Mike Reeves
3f27d00dd1 Fix soup_scripts.sls to handle 3.X versions instead of falling back to 2.3 2026-04-01 16:12:07 -04:00
Mike Reeves
f2d6d8a3fe Fetch and replace soup scripts from 3/main before proceeding on 3.X.X 2026-04-01 15:43:21 -04:00
Mike Reeves
1355e8eb11 Re-exec soup with 3/main branch when running on 3.X.X 2026-04-01 15:27:24 -04:00
Mike Reeves
472769452c Default soup to 3/main branch for 3.X.X installations 2026-04-01 15:22:37 -04:00
7 changed files with 48 additions and 17 deletions

View File

@@ -1,17 +1,17 @@
### 2.4.211-20260312 ISO image released on 2026/03/12
### 2.4.211-20260407 ISO image released on 2026/04/07
### Download and Verify
2.4.211-20260312 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.211-20260312.iso
2.4.211-20260407 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.211-20260407.iso
MD5: 7082210AE9FF4D2634D71EAD4DC8F7A3
SHA1: F76E08C47FD786624B2385B4235A3D61A4C3E9DC
SHA256: CE6E61788DFC492E4897EEDC139D698B2EDBEB6B631DE0043F66E94AF8A0FF4E
MD5: 35ECDD0BC10E56874D9F5725CA6C5888
SHA1: 30CE6CB0ED0059A3260368E4F296B8DBA381F9CD
SHA256: 185D8CF49CD3BFDD8876B8DDE48343DA90804B0C0EC3EADF0AD90D29C55E72B7
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.211-20260312.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.211-20260407.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -25,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.211-20260312.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.211-20260407.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.211-20260312.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.211-20260407.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.4.211-20260312.iso.sig securityonion-2.4.211-20260312.iso
gpg --verify securityonion-2.4.211-20260407.iso.sig securityonion-2.4.211-20260407.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Wed 11 Mar 2026 03:05:09 PM EDT using RSA key ID FE507013
gpg: Signature made Mon 06 Apr 2026 02:58:51 PM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

2
HOTFIX
View File

@@ -1 +1 @@
20260407

View File

@@ -3,7 +3,8 @@
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% if '2.4' in salt['cp.get_file_str']('/etc/soversion') %}
{% set soversion = salt['cp.get_file_str']('/etc/soversion') %}
{% if '2.4' in soversion or soversion.startswith('3.') %}
{% import_yaml '/opt/so/saltstack/local/pillar/global/soc_global.sls' as SOC_GLOBAL %}
{% if SOC_GLOBAL.global.airgap %}

View File

@@ -2128,6 +2128,26 @@ failed_soup_restore_items() {
main() {
trap 'check_err $?' EXIT
# If running 3.X.X, we need to fetch the correct soup and supporting scripts
# from the 3/main branch before proceeding, otherwise we'll clone 2.4/main
# and end up with incompatible scripts.
if [[ "$INSTALLEDVERSION" == 3.* && "$BRANCH" != "3/main" ]]; then
echo "Detected Security Onion $INSTALLEDVERSION. Fetching soup from 3/main branch."
rm -rf /tmp/sogh
mkdir -p /tmp/sogh
cd /tmp/sogh
git clone -b 3/main https://github.com/Security-Onion-Solutions/securityonion.git
if [ ! -f "$UPDATE_DIR/VERSION" ]; then
echo "Unable to clone 3/main branch from Github. Please check your Internet access."
exit 1
fi
cp "$UPDATE_DIR/salt/manager/tools/sbin/soup" /usr/sbin/soup
cp "$UPDATE_DIR/salt/common/tools/sbin/so-common" /usr/sbin/so-common
cp "$UPDATE_DIR/salt/common/tools/sbin/so-image-common" /usr/sbin/so-image-common
echo "Updated soup scripts from 3/main. Restarting soup."
exec env BRANCH=3/main soup "$@"
fi
if [ -n "$BRANCH" ]; then
echo "SOUP will use the $BRANCH branch."
echo ""

View File

@@ -10,7 +10,7 @@
{% from 'suricata/map.jinja' import SURICATAMERGED %}
{% from 'bpf/suricata.map.jinja' import SURICATABPF, SURICATA_BPF_STATUS, SURICATA_BPF_CALC %}
{% if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
{% if GLOBALS.pcap_engine == "SURICATA" %}
{% from 'bpf/pcap.map.jinja' import PCAPBPF, PCAP_BPF_STATUS, PCAP_BPF_CALC %}
# BPF compilation and configuration
{% if PCAPBPF and not PCAP_BPF_STATUS %}

View File

@@ -11,9 +11,19 @@
{# before we change outputs back to list, enable pcap-log if suricata is the pcapengine #}
{% if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
{% from 'bpf/pcap.map.jinja' import PCAPBPF, PCAP_BPF_STATUS %}
{% if PCAPBPF and PCAP_BPF_STATUS %}
{% do SURICATAMERGED.config.outputs['pcap-log'].update({'bpf-filter': PCAPBPF|join(" ")}) %}
{% if GLOBALS.pcap_engine == "SURICATA" %}
{% from 'bpf/pcap.map.jinja' import PCAPBPF, PCAP_BPF_STATUS %}
{% if PCAPBPF and PCAP_BPF_STATUS %}
{% do SURICATAMERGED.config.outputs['pcap-log'].update({'bpf-filter': PCAPBPF|join(" ")}) %}
{% endif %}
{% elif GLOBALS.pcap_engine == "TRANSITION" %}
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% import 'bpf/macros.jinja' as MACROS %}
{{ MACROS.remove_comments(BPFMERGED, 'pcap') }}
{% if BPFMERGED.pcap %}
{% do SURICATAMERGED.config.outputs['pcap-log'].update({'bpf-filter': BPFMERGED.pcap|join(" ")}) %}
{% endif %}
{% endif %}
{% set PCAP = salt['pillar.get']('pcap', {'enabled': false}) %}

Binary file not shown.