Compare commits

...

39 Commits

Author SHA1 Message Date
Mike Reeves
d3802c1668 Merge pull request #11854 from Security-Onion-Solutions/hotfix/2.4.30
Hotfix/2.4.30
2023-11-21 16:39:40 -05:00
Mike Reeves
874618d512 Merge pull request #11853 from Security-Onion-Solutions/2.4.30hf2
2.4.30 hotfix
2023-11-21 14:32:53 -05:00
Mike Reeves
fa9032b323 2.4.30 hotfix 2023-11-21 14:28:23 -05:00
Mike Reeves
17942676c6 Merge pull request #11844 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update soup
2023-11-21 10:32:24 -05:00
Mike Reeves
458c6de39d Update soup 2023-11-21 10:30:21 -05:00
Mike Reeves
a39f696a34 Merge pull request #11843 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update soup
2023-11-21 10:19:21 -05:00
Mike Reeves
9aa193af3b Update soup 2023-11-21 10:18:02 -05:00
Mike Reeves
3f1f256748 Merge pull request #11842 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update HOTFIX
2023-11-21 10:01:13 -05:00
Mike Reeves
c78ea0183f Update HOTFIX 2023-11-21 09:59:51 -05:00
Mike Reeves
e9417dd437 Merge pull request #11841 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update soup
2023-11-21 09:56:45 -05:00
Mike Reeves
14b5aa476e Update soup 2023-11-21 09:55:44 -05:00
Mike Reeves
4b0033c60a Merge pull request #11827 from Security-Onion-Solutions/hotfix/2.4.30
Hotfix 2.4.30
2023-11-20 15:26:16 -05:00
Mike Reeves
c20004c210 Merge pull request #11826 from Security-Onion-Solutions/2.4.30hf
2.4.30 hotfix
2023-11-20 11:35:11 -05:00
Mike Reeves
45dc1ce036 2.4.30 hotfix 2023-11-20 11:32:21 -05:00
Jason Ertel
0cc10fbf80 Merge pull request #11823 from Security-Onion-Solutions/jertel/igwarn
ignore libwbclient upgrade warning
2023-11-19 19:46:19 -05:00
Jason Ertel
e71ee97717 ignore libwbclient upgrade warning 2023-11-19 19:03:23 -05:00
Mike Reeves
77d0a7277a Merge pull request #11818 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update soup
2023-11-17 17:07:54 -05:00
Mike Reeves
2ae87de409 Merge branch 'hotfix/2.4.30' into TOoSmOotH-patch-2 2023-11-17 17:05:11 -05:00
Josh Brower
a69a65c44f Merge pull request #11819 from Security-Onion-Solutions/hftesting
Remove state file
2023-11-17 16:54:08 -05:00
Mike Reeves
d89beefc8c Update soup 2023-11-17 16:53:11 -05:00
Josh Brower
9c371fc374 Remove state file 2023-11-17 16:52:34 -05:00
Mike Reeves
4fb9cce41c Update signing_policies.conf 2023-11-17 16:38:50 -05:00
Mike Reeves
e226efa799 Update soup 2023-11-17 16:35:12 -05:00
Josh Brower
82a41894f3 Merge pull request #11817 from Security-Onion-Solutions/hftesting
Hftesting
2023-11-17 13:12:06 -05:00
Josh Brower
7aadc3851f Remove state file 2023-11-17 13:08:15 -05:00
Josh Brower
ca1498fca1 Dont update Defend Integration 2023-11-17 12:19:22 -05:00
Josh Brower
15fc4f2655 Merge pull request #11815 from Security-Onion-Solutions/hftesting
use updated code
2023-11-17 11:23:45 -05:00
Josh Brower
089a111ae8 use updated code 2023-11-17 11:20:13 -05:00
Josh Brower
33bd04b797 Merge pull request #11811 from Security-Onion-Solutions/hftesting
Move API check logic
2023-11-17 06:02:26 -05:00
Josh Brower
5920a14478 Move API check logic 2023-11-16 20:34:01 -05:00
Josh Brower
3ede19a106 Merge pull request #11808 from Security-Onion-Solutions/2.4/defendhotfix2
Update HOTFIX
2023-11-16 15:25:24 -05:00
weslambert
b6e2df45c7 Update HOTFIX 2023-11-16 14:48:00 -05:00
Josh Brower
af98c8e2da Merge pull request #11805 from Security-Onion-Solutions/2.4/defendhotfix2
.30 hotfix
2023-11-16 11:42:49 -05:00
Josh Brower
6b8e48c973 Remove highstate 2023-11-16 11:41:20 -05:00
Josh Brower
109ee55d8c Add to pre for .30 soup 2023-11-16 11:37:38 -05:00
Josh Brower
ff8cd194f1 Make sure kibana API is up 2023-11-16 11:21:34 -05:00
Josh Brower
d5dd0d88ed .30 hotfix 2023-11-16 10:58:23 -05:00
weslambert
46c5bf40e0 Merge pull request #11804 from Security-Onion-Solutions/fix/kibana_corrupt_integration
Discard corrupt integration
2023-11-16 10:49:39 -05:00
Wes
3ed7b36865 Discard corrupt integration 2023-11-16 15:45:38 +00:00
9 changed files with 73 additions and 16 deletions

View File

@@ -1,18 +1,18 @@
### 2.4.30-20231113 ISO image released on 2023/11/13
### 2.4.30-20231121 ISO image released on 2023/11/21
### Download and Verify
2.4.30-20231113 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231113.iso
2.4.30-20231121 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231121.iso
MD5: 15EB5A74782E4C2D5663D29E275839F6
SHA1: BBD4A7D77ADDA94B866F1EFED846A83DDFD34D73
SHA256: 4509EB8E11DB49C6CD3905C74C5525BDB1F773488002179A846E00DE8E499988
MD5: 09DB0A6B3A75435C855E777272FC03F8
SHA1: A68868E67A3F86B77E01F54067950757EFD3BA72
SHA256: B3880C0302D9CDED7C974585B14355544FC9C3279F952EC79FC2BA9AEC7CB749
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231113.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231121.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231113.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231121.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231113.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231121.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.4.30-20231113.iso.sig securityonion-2.4.30-20231113.iso
gpg --verify securityonion-2.4.30-20231121.iso.sig securityonion-2.4.30-20231121.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Mon 13 Nov 2023 09:23:21 AM EST using RSA key ID FE507013
gpg: Signature made Tue 21 Nov 2023 01:21:38 PM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

2
HOTFIX
View File

@@ -1 +1 @@
20231121

View File

@@ -37,7 +37,7 @@ x509_signing_policies:
- ST: Utah
- L: Salt Lake City
- basicConstraints: "critical CA:false"
- keyUsage: "critical keyEncipherment"
- keyUsage: "critical keyEncipherment digitalSignature"
- subjectKeyIdentifier: hash
- authorityKeyIdentifier: keyid,issuer:always
- extendedKeyUsage: serverAuth

View File

@@ -21,8 +21,10 @@ kibana:
appenders:
- default
- file
migrations:
discardCorruptObjects: "8.10.4"
telemetry:
enabled: False
enabled: False
security:
showInsecureClusterWarning: False
xpack:

View File

@@ -0,0 +1,20 @@
#!/bin/bash
#
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
echo "Checking to make sure that Kibana API is up & ready..."
RETURN_CODE=0
wait_for_web_response "http://localhost:5601/api/fleet/settings" "fleet" 300 "curl -K /opt/so/conf/elasticsearch/curl.config"
RETURN_CODE=$?
if [[ "$RETURN_CODE" != "0" ]]; then
echo "Kibana API not accessible, exiting script..."
exit 1
fi

View File

@@ -450,6 +450,13 @@ post_to_2.4.20() {
post_to_2.4.30() {
echo "Regenerating Elastic Agent Installers"
/sbin/so-elastic-agent-gen-installers
salt-call state.apply ca queue=True
stop_salt_minion
mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old
mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old
systemctl_func "start" "salt-minion"
salt-call state.apply nginx queue=True
enable_highstate
POSTVERSION=2.4.30
}
@@ -529,6 +536,16 @@ up_to_2.4.20() {
}
up_to_2.4.30() {
# Remove older defend integration json & installed integration
rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json
. $UPDATE_DIR/salt/elasticfleet/tools/sbin/so-elastic-fleet-common
elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints
rm -f /opt/so/state/eaintegrations.txt
# Elastic Update for this release, so download Elastic Agent files
determine_elastic_agent_upgrade
rm -f /opt/so/state/estemplates*.txt
@@ -735,8 +752,23 @@ apply_hotfix() {
. /usr/sbin/so-elastic-fleet-common
elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints
/usr/sbin/so-elastic-fleet-integration-policy-elastic-defend
# elif [[ "$INSTALLEDVERSION" == "2.3.110" ]] ; then
# 2_3_10_hotfix_1
elif [[ "$INSTALLEDVERSION" == "2.4.30" ]] ; then
if [[ -f /etc/pki/managerssl.key.old ]]; then
echo "Skipping Certificate Generation"
else
rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json
so-kibana-restart --force
so-kibana-api-check
. /usr/sbin/so-elastic-fleet-common
elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints
rm -f /opt/so/state/eaintegrations.txt
salt-call state.apply ca queue=True
stop_salt_minion
mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old
mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old
systemctl_func "start" "salt-minion"
fi
else
echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)"
fi

View File

@@ -38,6 +38,8 @@ log_has_errors() {
# may be requested by dependency only (it is configured to refuse manual start/stop).
# Command failed with exit code is output during retry loops.
# "remove failed" is caused by a warning generated by upgrade of libwbclient
grep -E "FAILED|Failed|failed|ERROR|Result: False|Error is not recoverable" "$setup_log" | \
grep -vE "The Salt Master has cached the public key for this node" | \
@@ -53,6 +55,7 @@ log_has_errors() {
grep -vE "code: 100" | \
grep -vE "/nsm/rules/sigma*" | \
grep -vE "/nsm/rules/yara*" | \
grep -vE "remove failed" | \
grep -vE "Failed to restart snapd" | \
grep -vE "Login Failed Details" | \
grep -vE "response from daemon: unauthorized" | \

Binary file not shown.

Binary file not shown.