mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2026-04-09 22:32:35 +02:00
Compare commits
6 Commits
patch/2.4.
...
2.4.211-20
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
55af7eb541 | ||
|
|
ece7cdac04 | ||
|
|
b63d5e4c83 | ||
|
|
0f97249009 | ||
|
|
043feee4c0 | ||
|
|
c3707dc814 |
@@ -1,17 +1,17 @@
|
|||||||
### 2.4.211-20260312 ISO image released on 2026/03/12
|
### 2.4.211-20260407 ISO image released on 2026/04/07
|
||||||
|
|
||||||
|
|
||||||
### Download and Verify
|
### Download and Verify
|
||||||
|
|
||||||
2.4.211-20260312 ISO image:
|
2.4.211-20260407 ISO image:
|
||||||
https://download.securityonion.net/file/securityonion/securityonion-2.4.211-20260312.iso
|
https://download.securityonion.net/file/securityonion/securityonion-2.4.211-20260407.iso
|
||||||
|
|
||||||
MD5: 7082210AE9FF4D2634D71EAD4DC8F7A3
|
MD5: 35ECDD0BC10E56874D9F5725CA6C5888
|
||||||
SHA1: F76E08C47FD786624B2385B4235A3D61A4C3E9DC
|
SHA1: 30CE6CB0ED0059A3260368E4F296B8DBA381F9CD
|
||||||
SHA256: CE6E61788DFC492E4897EEDC139D698B2EDBEB6B631DE0043F66E94AF8A0FF4E
|
SHA256: 185D8CF49CD3BFDD8876B8DDE48343DA90804B0C0EC3EADF0AD90D29C55E72B7
|
||||||
|
|
||||||
Signature for ISO image:
|
Signature for ISO image:
|
||||||
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.211-20260312.iso.sig
|
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.211-20260407.iso.sig
|
||||||
|
|
||||||
Signing key:
|
Signing key:
|
||||||
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
|
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
|
||||||
@@ -25,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
|
|||||||
|
|
||||||
Download the signature file for the ISO:
|
Download the signature file for the ISO:
|
||||||
```
|
```
|
||||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.211-20260312.iso.sig
|
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.211-20260407.iso.sig
|
||||||
```
|
```
|
||||||
|
|
||||||
Download the ISO image:
|
Download the ISO image:
|
||||||
```
|
```
|
||||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.211-20260312.iso
|
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.211-20260407.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
Verify the downloaded ISO image using the signature file:
|
Verify the downloaded ISO image using the signature file:
|
||||||
```
|
```
|
||||||
gpg --verify securityonion-2.4.211-20260312.iso.sig securityonion-2.4.211-20260312.iso
|
gpg --verify securityonion-2.4.211-20260407.iso.sig securityonion-2.4.211-20260407.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
||||||
```
|
```
|
||||||
gpg: Signature made Wed 11 Mar 2026 03:05:09 PM EDT using RSA key ID FE507013
|
gpg: Signature made Mon 06 Apr 2026 02:58:51 PM EDT using RSA key ID FE507013
|
||||||
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
||||||
gpg: WARNING: This key is not certified with a trusted signature!
|
gpg: WARNING: This key is not certified with a trusted signature!
|
||||||
gpg: There is no indication that the signature belongs to the owner.
|
gpg: There is no indication that the signature belongs to the owner.
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
{% from 'suricata/map.jinja' import SURICATAMERGED %}
|
{% from 'suricata/map.jinja' import SURICATAMERGED %}
|
||||||
{% from 'bpf/suricata.map.jinja' import SURICATABPF, SURICATA_BPF_STATUS, SURICATA_BPF_CALC %}
|
{% from 'bpf/suricata.map.jinja' import SURICATABPF, SURICATA_BPF_STATUS, SURICATA_BPF_CALC %}
|
||||||
|
|
||||||
{% if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
|
{% if GLOBALS.pcap_engine == "SURICATA" %}
|
||||||
{% from 'bpf/pcap.map.jinja' import PCAPBPF, PCAP_BPF_STATUS, PCAP_BPF_CALC %}
|
{% from 'bpf/pcap.map.jinja' import PCAPBPF, PCAP_BPF_STATUS, PCAP_BPF_CALC %}
|
||||||
# BPF compilation and configuration
|
# BPF compilation and configuration
|
||||||
{% if PCAPBPF and not PCAP_BPF_STATUS %}
|
{% if PCAPBPF and not PCAP_BPF_STATUS %}
|
||||||
|
|||||||
@@ -11,10 +11,20 @@
|
|||||||
{# before we change outputs back to list, enable pcap-log if suricata is the pcapengine #}
|
{# before we change outputs back to list, enable pcap-log if suricata is the pcapengine #}
|
||||||
{% if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
|
{% if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
|
||||||
|
|
||||||
|
{% if GLOBALS.pcap_engine == "SURICATA" %}
|
||||||
{% from 'bpf/pcap.map.jinja' import PCAPBPF, PCAP_BPF_STATUS %}
|
{% from 'bpf/pcap.map.jinja' import PCAPBPF, PCAP_BPF_STATUS %}
|
||||||
{% if PCAPBPF and PCAP_BPF_STATUS %}
|
{% if PCAPBPF and PCAP_BPF_STATUS %}
|
||||||
{% do SURICATAMERGED.config.outputs['pcap-log'].update({'bpf-filter': PCAPBPF|join(" ")}) %}
|
{% do SURICATAMERGED.config.outputs['pcap-log'].update({'bpf-filter': PCAPBPF|join(" ")}) %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
{% elif GLOBALS.pcap_engine == "TRANSITION" %}
|
||||||
|
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
|
||||||
|
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
|
||||||
|
{% import 'bpf/macros.jinja' as MACROS %}
|
||||||
|
{{ MACROS.remove_comments(BPFMERGED, 'pcap') }}
|
||||||
|
{% if BPFMERGED.pcap %}
|
||||||
|
{% do SURICATAMERGED.config.outputs['pcap-log'].update({'bpf-filter': BPFMERGED.pcap|join(" ")}) %}
|
||||||
|
{% endif %}
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
{% set PCAP = salt['pillar.get']('pcap', {'enabled': false}) %}
|
{% set PCAP = salt['pillar.get']('pcap', {'enabled': false}) %}
|
||||||
{% if PCAP.enabled and GLOBALS.role != 'so-import'%}
|
{% if PCAP.enabled and GLOBALS.role != 'so-import'%}
|
||||||
|
|||||||
BIN
sigs/securityonion-2.4.211-20260407.iso.sig
Normal file
BIN
sigs/securityonion-2.4.211-20260407.iso.sig
Normal file
Binary file not shown.
Reference in New Issue
Block a user