Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

2.4.60 #12616

Merged
merged 205 commits into from
Mar 20, 2024
Merged

2.4.60 #12616

Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
205 commits
Select commit Hold shift + click to select a range
762a3be
Defaults and Annotations
TOoSmOotH Jan 25, 2024
1a2245a
Add so-minion modifications
TOoSmOotH Jan 29, 2024
5b05aec
Target sspecific minion
TOoSmOotH Jan 29, 2024
0c96931
Add Globals
TOoSmOotH Jan 29, 2024
88c01a2
Add annotation logic
TOoSmOotH Jan 29, 2024
ab551a7
Threads placeholder logic
TOoSmOotH Jan 29, 2024
88d2ddb
add placeholder for telegraf
TOoSmOotH Jan 29, 2024
d118ff4
add GLOBALS.pcap_engine
m0duspwnens Jan 29, 2024
37dcb84
add missing comma
m0duspwnens Jan 30, 2024
0522dc1
map pcap dir to container. enable pcap-log in map
m0duspwnens Jan 30, 2024
8ed66ea
disable stenographer if suricata is pcap engine
m0duspwnens Jan 30, 2024
f32cb1f
fix find to work with steno and suri pcap
m0duspwnens Jan 30, 2024
8b503e2
telegraf dont run stenoloss script if suricata is pcap engine
m0duspwnens Jan 30, 2024
8a25748
grammar
m0duspwnens Jan 30, 2024
0fa4d92
socsigmarepo
coreyogburn Oct 19, 2023
4be1214
pcap engine logic for sensoroni
m0duspwnens Jan 30, 2024
858166b
WIP: Detections Changes
coreyogburn Jan 30, 2024
00289c2
fix pcap paths
TOoSmOotH Jan 31, 2024
0d01d09
fix pcap paths
TOoSmOotH Jan 31, 2024
585147d
Added so-detection mapping in elasticsearch
coreyogburn Jan 31, 2024
db057b4
Merge pull request #12296 from Security-Onion-Solutions/cogburn/detec…
defensivedepth Jan 31, 2024
881d6b3
Update VERSION - kilo
defensivedepth Jan 31, 2024
49b5788
add bindings
defensivedepth Feb 1, 2024
fe196b5
Add SOC Config for Detections
defensivedepth Feb 1, 2024
8f81c9e
Updating config for Detection(s)
coreyogburn Feb 2, 2024
378c99a
Fix bindings
defensivedepth Feb 2, 2024
b7b501d
Add Sigma pipelines
defensivedepth Feb 7, 2024
7e3187c
Fixup sigma pipelines
defensivedepth Feb 7, 2024
81a3e95
Fixup sigma pipelines
defensivedepth Feb 7, 2024
2917456
WIP: Updated Detection Mappings, Changed Engine to Language
coreyogburn Feb 8, 2024
64f6d0f
Updated Detection's ES Mappings
coreyogburn Feb 9, 2024
5a4e11b
Update soup
TOoSmOotH Feb 12, 2024
5102269
Update defaults
defensivedepth Feb 12, 2024
ea80469
Detection Default queries
defensivedepth Feb 13, 2024
0c6c6ba
Various UI tweaks
defensivedepth Feb 13, 2024
0d29727
DetectionComment Mapping Defined
coreyogburn Feb 13, 2024
c933627
Merge branch 'kilo' of github.com:security-onion-solutions/securityon…
coreyogburn Feb 13, 2024
031ee07
socsigmarepo
coreyogburn Oct 19, 2023
8800b7e
WIP: Detections Changes
coreyogburn Jan 30, 2024
f321e73
Added so-detection mapping in elasticsearch
coreyogburn Jan 31, 2024
a5db9f8
Merge branch 'kilo' into cogburn/detection_playbooks
coreyogburn Feb 13, 2024
686304f
Merge remote-tracking branch 'origin/2.4/dev' into kilo
defensivedepth Feb 15, 2024
c64f37a
sigmaRulePackages is now a string array
coreyogburn Feb 15, 2024
e4dcb4a
Merge remote-tracking branch 'origin/cogburn/detection_playbooks' int…
defensivedepth Feb 15, 2024
ffb3cc8
Default ruleset; Descriptions
defensivedepth Feb 16, 2024
07fcfab
Update VERSION
TOoSmOotH Feb 20, 2024
ed07736
Merge pull request #12385 from Security-Onion-Solutions/TOoSmOotH-pat…
TOoSmOotH Feb 20, 2024
4b314c8
replace correlate icon to avoid confusion with searcheng.in
jertel Feb 20, 2024
78d41c5
Merge pull request #12386 from Security-Onion-Solutions/jertel/corricon
jertel Feb 20, 2024
89010da
Merge pull request #12348 from Security-Onion-Solutions/TOoSmOotH-pat…
TOoSmOotH Feb 20, 2024
6c6a362
add lock threads
jertel Feb 21, 2024
2977843
Merge pull request #12396 from Security-Onion-Solutions/jertel/glm
jertel Feb 21, 2024
9ca0f58
Manage the repos
TOoSmOotH Feb 21, 2024
1952f0f
Merge remote-tracking branch 'origin/2.4/dev' into kilo
defensivedepth Feb 21, 2024
25570e6
add missing template
jertel Feb 21, 2024
152e793
Merge pull request #12408 from Security-Onion-Solutions/jertel/24temp…
jertel Feb 21, 2024
1627855
nest under policy
m0duspwnens Feb 21, 2024
927ea0c
Update VERSION
defensivedepth Feb 21, 2024
eb3432f
Merge pull request #12412 from Security-Onion-Solutions/kilo
coreyogburn Feb 21, 2024
d2f7946
Merge pull request #12411 from Security-Onion-Solutions/issue/12382
m0duspwnens Feb 21, 2024
0a9022b
Add hash mappings
defensivedepth Feb 21, 2024
c886e72
Imphash mappings
defensivedepth Feb 22, 2024
759b2ff
Manage the repos
TOoSmOotH Feb 22, 2024
e7914fc
Update stenoloss.sh
TOoSmOotH Feb 22, 2024
1824d7b
Merge pull request #12416 from Security-Onion-Solutions/TOoSmOotH-pat…
TOoSmOotH Feb 22, 2024
d04aa06
Fix source.ip
defensivedepth Feb 22, 2024
b8baca4
add endpoint_x_events_x_process to defaults.yaml
dougburks Feb 23, 2024
573d565
convert _x_ to . for soc ui to config
m0duspwnens Feb 23, 2024
65cdc1d
Merge pull request #12423 from Security-Onion-Solutions/jppfiec
dougburks Feb 23, 2024
7da0ccf
add more endpoint.events.x entries to merged.map.jinja
dougburks Feb 23, 2024
b7ef1e8
add more endpoint.events.x fields to soc_soc.yaml
dougburks Feb 23, 2024
58f4fb8
fix new eventFields in soc_soc.yaml
dougburks Feb 23, 2024
daf96d7
fix new eventFields in merged.map.jinja
dougburks Feb 23, 2024
d6cb8ab
update events_x_process in defaults.yaml
dougburks Feb 23, 2024
77cb574
Merge pull request #12430 from Security-Onion-Solutions/feature/sigma…
defensivedepth Feb 26, 2024
a6bb721
Add Detection AutoUpdate config
defensivedepth Feb 26, 2024
66b815d
Merge pull request #12431 from Security-Onion-Solutions/feature/browe…
defensivedepth Feb 26, 2024
ca24931
FEATURE: Add new SOC action for Process Info #12421
dougburks Feb 26, 2024
4df2114
FEATURE: Add default columns for endpoint.events datasets #12425
dougburks Feb 26, 2024
c8a95a8
FEATURE: Add new endpoint dashboards #12428
dougburks Feb 26, 2024
9a7e215
add classification.config
m0duspwnens Feb 26, 2024
f8424f3
Update defaults.yaml
dougburks Feb 26, 2024
1d099f9
Update pattern for endpoint diagnostic template
weslambert Feb 26, 2024
acf7dbd
Merge pull request #12432 from Security-Onion-Solutions/fix/endpoint_…
weslambert Feb 26, 2024
52580fb
Merge pull request #12434 from Security-Onion-Solutions/feature/impro…
dougburks Feb 26, 2024
466dac3
soup for classifications
m0duspwnens Feb 26, 2024
8b7f793
suricata container watch classification.config
m0duspwnens Feb 26, 2024
c6baa4b
Airgap Support - Detections module
defensivedepth Feb 26, 2024
a817bae
Merge pull request #12437 from Security-Onion-Solutions/feature/detec…
defensivedepth Feb 26, 2024
59af547
Fix download location
defensivedepth Feb 27, 2024
fcc0f9d
redo classifications
m0duspwnens Feb 27, 2024
d5fc6dd
Merge pull request #12449 from Security-Onion-Solutions/issue/12391
m0duspwnens Feb 27, 2024
df3943b
Daily rollover
weslambert Feb 27, 2024
d1e55d5
Merge pull request #12450 from Security-Onion-Solutions/fix/suricata_…
weslambert Feb 27, 2024
e2dd0f8
Only update rule files if AG
defensivedepth Feb 28, 2024
aa3b917
Merge pull request #12456 from Security-Onion-Solutions/feature/detec…
defensivedepth Feb 28, 2024
1fe8f3d
Merge pull request #12405 from Security-Onion-Solutions/repochange
TOoSmOotH Feb 29, 2024
53761d4
FIX: EA installers not downloadable from SOC + fix stg logging
reyesj2 Feb 29, 2024
d911b7b
Merge pull request #12469 from Security-Onion-Solutions/reyesj2-patch-4
reyesj2 Feb 29, 2024
b017157
Add antivirus mapping
defensivedepth Mar 1, 2024
d832158
Drop Hashes field
defensivedepth Mar 1, 2024
f3dce66
Merge pull request #12482 from Security-Onion-Solutions/2.4/sigma-pip…
defensivedepth Mar 1, 2024
f28f269
Fix FIM
defensivedepth Mar 4, 2024
9fd1653
Merge pull request #12487 from Security-Onion-Solutions/2.4/elastic-a…
defensivedepth Mar 4, 2024
018e099
Modify setup
TOoSmOotH Mar 4, 2024
fe23875
Fix df
TOoSmOotH Mar 4, 2024
58d2222
Merge pull request #12271 from Security-Onion-Solutions/suripcap
TOoSmOotH Mar 4, 2024
b64d610
Add AWS Cloudfront template
weslambert Mar 5, 2024
1514f12
Add AWS GuardDuty template
weslambert Mar 5, 2024
d85ac39
Add AWS Inspector template
weslambert Mar 5, 2024
d8e8933
Add AWS Security Hub template
weslambert Mar 5, 2024
2a7e5b0
Change version for foxtrot
weslambert Mar 5, 2024
bed4220
Add journald integration
weslambert Mar 5, 2024
08f2b82
add GLOBALS.is_sensor
m0duspwnens Mar 5, 2024
1a58aa6
only import pcap and suricata if sensor
m0duspwnens Mar 5, 2024
c0d19e1
fix } placement
m0duspwnens Mar 5, 2024
781f96a
Merge pull request #12497 from Security-Onion-Solutions/jppsensoroni
m0duspwnens Mar 5, 2024
b9ebe6c
Update VERSION
weslambert Mar 5, 2024
6eb608c
Update so-minion
TOoSmOotH Mar 5, 2024
a686d46
Update so-minion
TOoSmOotH Mar 5, 2024
b9707fc
Merge pull request #12502 from Security-Onion-Solutions/TOoSmOotH-pat…
TOoSmOotH Mar 5, 2024
185a160
Merge pull request #12500 from Security-Onion-Solutions/feature/addit…
weslambert Mar 5, 2024
4b5f00c
fix oinkcodes with leading zeros
jertel Mar 5, 2024
d5b0814
Merge pull request #12507 from Security-Onion-Solutions/jertel/annota…
jertel Mar 5, 2024
5687fdc
fix pcapspace function
m0duspwnens Mar 5, 2024
ac9db8a
Merge branch '2.4/dev' into jppsensoroni
m0duspwnens Mar 5, 2024
eaef076
Update so-minion
m0duspwnens Mar 5, 2024
73b45cf
Merge pull request #12508 from Security-Onion-Solutions/jppsensoroni
m0duspwnens Mar 5, 2024
1b47537
Add Exclusion toggle
defensivedepth Mar 6, 2024
12653ee
add new pcap annotations
jertel Mar 6, 2024
0f12297
add new pcap annotations
jertel Mar 6, 2024
5acefb5
Merge pull request #12511 from Security-Onion-Solutions/jertel/annota…
jertel Mar 6, 2024
f58c104
Update so-minion
TOoSmOotH Mar 6, 2024
a63fca7
Update soc_suricata.yaml
TOoSmOotH Mar 6, 2024
f836d6a
Update so-minion
TOoSmOotH Mar 6, 2024
4dfa1a5
Move Suricata around
TOoSmOotH Mar 6, 2024
9e67162
Merge pull request #12510 from Security-Onion-Solutions/2.4/excludede…
defensivedepth Mar 6, 2024
167aff2
detections annotations
jertel Mar 6, 2024
ad12093
Fix percent calc
TOoSmOotH Mar 6, 2024
1cbac11
detections annotations
jertel Mar 6, 2024
8f36a8a
Merge pull request #12514 from Security-Onion-Solutions/jertel/annota…
jertel Mar 6, 2024
9a413a2
Fix location of repo
TOoSmOotH Mar 6, 2024
7f1e786
Consolidate PCAP settings
TOoSmOotH Mar 6, 2024
cf23253
move suricata.pcap to suricata.config.outputs.pcap-log
m0duspwnens Mar 6, 2024
5832272
fix max-files calc
m0duspwnens Mar 6, 2024
17a75d5
Run stig post remediate scan against default ol9 scap-security-guide.
reyesj2 Mar 6, 2024
70f3ce0
change how maxfiles is calculated
m0duspwnens Mar 6, 2024
b5f1733
Merge pull request #12513 from Security-Onion-Solutions/newsuripcap
TOoSmOotH Mar 7, 2024
005930f
Add error.message mapping for system.syslog
weslambert Mar 7, 2024
1633527
Merge pull request #12519 from Security-Onion-Solutions/fix/error_mes…
weslambert Mar 7, 2024
fffef9b
gracefully handle status check failure on ubuntu
jertel Mar 7, 2024
e2567dc
Merge pull request #12521 from Security-Onion-Solutions/jertel/status
jertel Mar 7, 2024
4057498
unswap files
jertel Mar 7, 2024
06257b9
Update so-minion
TOoSmOotH Mar 7, 2024
6d06aa8
Merge pull request #12526 from Security-Onion-Solutions/jertel/status
jertel Mar 7, 2024
3eb6fe2
allow managersearch to receiver redis and 5644
m0duspwnens Mar 8, 2024
7ec887a
Merge pull request #12537 from Security-Onion-Solutions/issue/12535
m0duspwnens Mar 8, 2024
4e32935
Add Strelka config back
weslambert Mar 8, 2024
fc66a54
Add Strelka download and update scripts back
weslambert Mar 8, 2024
e8ae609
Add Strelka rules watch back
weslambert Mar 8, 2024
6680e02
Update soc_pcap.yaml
dougburks Mar 8, 2024
e1b27a9
Merge pull request #12540 from Security-Onion-Solutions/dougburks-pat…
dougburks Mar 8, 2024
b6b6fc4
Merge pull request #12527 from Security-Onion-Solutions/TOoSmOotH-pat…
dougburks Mar 8, 2024
6f05c39
Updated RulesRepo for New Strelka Structure
coreyogburn Mar 8, 2024
68ba9a8
Merge pull request #12542 from Security-Onion-Solutions/cogburn/yara-…
coreyogburn Mar 8, 2024
4a9e826
Merge remote-tracking branch 'origin/2.4/dev' into kilo
defensivedepth Mar 8, 2024
a55e04e
pcap improvements
jertel Mar 8, 2024
a892352
Update soc_pcap.yaml
dougburks Mar 8, 2024
b622cf8
Merge pull request #12545 from Security-Onion-Solutions/dougburks-pat…
dougburks Mar 8, 2024
f4725bf
Merge pull request #12553 from Security-Onion-Solutions/reyesj2-patch…
reyesj2 Mar 11, 2024
34d5954
Fix indent
weslambert Mar 11, 2024
a8403c6
Create local salt dir for stig
reyesj2 Mar 11, 2024
2ca96c7
Merge pull request #12555 from Security-Onion-Solutions/reyesj2-patch…
reyesj2 Mar 11, 2024
4355d5b
Merge pull request #12544 from Security-Onion-Solutions/jertel/status
m0duspwnens Mar 11, 2024
907cf9f
transition pcap
m0duspwnens Mar 11, 2024
b5d8df7
auto-convert email addresses to lowercase during setup
jertel Mar 11, 2024
cd28c00
auto-convert email addresses to lowercase during setup
jertel Mar 11, 2024
8c54a19
Merge pull request #12560 from Security-Onion-Solutions/jertel/email
jertel Mar 11, 2024
ba32b3e
fix bpf for transition
m0duspwnens Mar 11, 2024
61a183b
Add regex defaults
defensivedepth Mar 11, 2024
b7f058a
Merge pull request #12561 from Security-Onion-Solutions/jppnocap
m0duspwnens Mar 11, 2024
47ab1f5
Merge pull request #12563 from Security-Onion-Solutions/kilo
defensivedepth Mar 11, 2024
0f41f07
Merge remote-tracking branch 'origin/2.4/dev' into 2.4/detections-def…
defensivedepth Mar 11, 2024
72acb11
Update soc_suricata.yaml
TOoSmOotH Mar 11, 2024
197791f
Merge pull request #12565 from Security-Onion-Solutions/2.4/detection…
defensivedepth Mar 12, 2024
5deebe0
Merge pull request #12564 from Security-Onion-Solutions/TOoSmOotH-pat…
TOoSmOotH Mar 12, 2024
3e0fb3f
Update so-saltstack-update
TOoSmOotH Mar 12, 2024
6034831
Merge pull request #12567 from Security-Onion-Solutions/TOoSmOotH-pat…
TOoSmOotH Mar 12, 2024
06013e2
Gen packages post-SOUP
defensivedepth Mar 13, 2024
dc3eace
Merge pull request #12576 from Security-Onion-Solutions/2.4/regenpack…
defensivedepth Mar 13, 2024
1a82919
remove modules if detections disabled
m0duspwnens Mar 13, 2024
292ab0e
Merge pull request #12577 from Security-Onion-Solutions/jppsocerino
m0duspwnens Mar 13, 2024
b9702d0
Update init.sls
m0duspwnens Mar 13, 2024
3d33c99
Merge pull request #12579 from Security-Onion-Solutions/m0duspwnens-p…
m0duspwnens Mar 13, 2024
275a678
removed unused property
jertel Mar 13, 2024
cc1356c
Merge pull request #12581 from Security-Onion-Solutions/jertel/suripcap
jertel Mar 13, 2024
927fe90
handle airgap when detections not enabled
jertel Mar 14, 2024
844cfe5
handle airgap when detections not enabled
jertel Mar 14, 2024
09bff01
Merge pull request #12584 from Security-Onion-Solutions/jertel/suripcap
jertel Mar 14, 2024
284e0d8
Update soc_suricata.yaml
TOoSmOotH Mar 14, 2024
fd835f6
Update soc_suricata.yaml
TOoSmOotH Mar 14, 2024
4237210
Merge pull request #12587 from Security-Onion-Solutions/TOoSmOotH-pat…
TOoSmOotH Mar 14, 2024
bb3bbd7
2.4.260
TOoSmOotH Mar 20, 2024
68ea283
Merge pull request #12615 from Security-Onion-Solutions/2.4.60
TOoSmOotH Mar 20, 2024
7779a95
Merge pull request #12617 from Security-Onion-Solutions/2.4/main
TOoSmOotH Mar 20, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
190 changes: 190 additions & 0 deletions .github/DISCUSSION_TEMPLATE/2-4.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,190 @@
body:
- type: markdown
attributes:
value: |
⚠️ This category is solely for conversations related to Security Onion 2.4 ⚠️

If your organization needs more immediate, enterprise grade professional support, with one-on-one virtual meetings and screensharing, contact us via our website: https://securityonion.com/support
- type: dropdown
attributes:
label: Version
description: Which version of Security Onion 2.4.x are you asking about?
options:
-
- 2.4 Pre-release (Beta, Release Candidate)
- 2.4.10
- 2.4.20
- 2.4.30
- 2.4.40
- 2.4.50
- 2.4.60
- 2.4.70
- 2.4.80
- 2.4.90
- 2.4.100
- Other (please provide detail below)
validations:
required: true
- type: dropdown
attributes:
label: Installation Method
description: How did you install Security Onion?
options:
-
- Security Onion ISO image
- Network installation on Red Hat derivative like Oracle, Rocky, Alma, etc.
- Network installation on Ubuntu
- Network installation on Debian
- Other (please provide detail below)
validations:
required: true
- type: dropdown
attributes:
label: Description
description: >
Is this discussion about installation, configuration, upgrading, or other?
options:
-
- installation
- configuration
- upgrading
- other (please provide detail below)
validations:
required: true
- type: dropdown
attributes:
label: Installation Type
description: >
When you installed, did you choose Import, Eval, Standalone, Distributed, or something else?
options:
-
- Import
- Eval
- Standalone
- Distributed
- other (please provide detail below)
validations:
required: true
- type: dropdown
attributes:
label: Location
description: >
Is this deployment in the cloud, on-prem with Internet access, or airgap?
options:
-
- cloud
- on-prem with Internet access
- airgap
- other (please provide detail below)
validations:
required: true
- type: dropdown
attributes:
label: Hardware Specs
description: >
Does your hardware meet or exceed the minimum requirements for your installation type as shown at https://docs.securityonion.net/en/2.4/hardware.html?
options:
-
- Meets minimum requirements
- Exceeds minimum requirements
- Does not meet minimum requirements
- other (please provide detail below)
validations:
required: true
- type: input
attributes:
label: CPU
description: How many CPU cores do you have?
validations:
required: true
- type: input
attributes:
label: RAM
description: How much RAM do you have?
validations:
required: true
- type: input
attributes:
label: Storage for /
description: How much storage do you have for the / partition?
validations:
required: true
- type: input
attributes:
label: Storage for /nsm
description: How much storage do you have for the /nsm partition?
validations:
required: true
- type: dropdown
attributes:
label: Network Traffic Collection
description: >
Are you collecting network traffic from a tap or span port?
options:
-
- tap
- span port
- other (please provide detail below)
validations:
required: true
- type: dropdown
attributes:
label: Network Traffic Speeds
description: >
How much network traffic are you monitoring?
options:
-
- Less than 1Gbps
- 1Gbps to 10Gbps
- more than 10Gbps
validations:
required: true
- type: dropdown
attributes:
label: Status
description: >
Does SOC Grid show all services on all nodes as running OK?
options:
-
- Yes, all services on all nodes are running OK
- No, one or more services are failed (please provide detail below)
validations:
required: true
- type: dropdown
attributes:
label: Salt Status
description: >
Do you get any failures when you run "sudo salt-call state.highstate"?
options:
-
- Yes, there are salt failures (please provide detail below)
- No, there are no failures
validations:
required: true
- type: dropdown
attributes:
label: Logs
description: >
Are there any additional clues in /opt/so/log/?
options:
-
- Yes, there are additional clues in /opt/so/log/ (please provide detail below)
- No, there are no additional clues
validations:
required: true
- type: textarea
attributes:
label: Detail
description: Please read our discussion guidelines at https://github.com/Security-Onion-Solutions/securityonion/discussions/1720 and then provide detailed information to help us help you.
placeholder: |-
STOP! Before typing, please read our discussion guidelines at https://github.com/Security-Onion-Solutions/securityonion/discussions/1720 in their entirety!

If your organization needs more immediate, enterprise grade professional support, with one-on-one virtual meetings and screensharing, contact us via our website: https://securityonion.com/support
validations:
required: true
- type: checkboxes
attributes:
label: Guidelines
options:
- label: I have read the discussion guidelines at https://github.com/Security-Onion-Solutions/securityonion/discussions/1720 and assert that I have followed the guidelines.
required: true
42 changes: 42 additions & 0 deletions .github/workflows/lock-threads.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
name: 'Lock Threads'

on:
schedule:
- cron: '50 1 * * *'
workflow_dispatch:

permissions:
issues: write
pull-requests: write
discussions: write

concurrency:
group: lock-threads

jobs:
close-threads:
runs-on: ubuntu-latest
permissions:
issues: write
pull-requests: write
steps:
- uses: actions/stale@v5
with:
days-before-issue-stale: -1
days-before-issue-close: 60
stale-issue-message: "This issue is stale because it has been inactive for an extended period. Stale issues convey that the issue, while important to someone, is not critical enough for the author, or other community members to work on, sponsor, or otherwise shepherd the issue through to a resolution."
close-issue-message: "This issue was closed because it has been stale for an extended period. It will be automatically locked in 30 days, after which no further commenting will be available."
days-before-pr-stale: 45
days-before-pr-close: 60
stale-pr-message: "This PR is stale because it has been inactive for an extended period. The longer a PR remains stale the more out of date with the main branch it becomes."
close-pr-message: "This PR was closed because it has been stale for an extended period. It will be automatically locked in 30 days. If there is still a commitment to finishing this PR re-open it before it is locked."

lock-threads:
runs-on: ubuntu-latest
steps:
- uses: jertel/lock-threads@main
with:
include-discussion-currently-open: true
discussion-inactive-days: 90
issue-inactive-days: 30
pr-inactive-days: 30
22 changes: 11 additions & 11 deletions DOWNLOAD_AND_VERIFY_ISO.md
Original file line number Diff line number Diff line change
@@ -1,17 +1,17 @@
### 2.4.50-20240220 ISO image released on 2024/02/20
### 2.4.60-20240320 ISO image released on 2024/03/20


### Download and Verify

2.4.50-20240220 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.50-20240220.iso
2.4.60-20240320 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.60-20240320.iso

MD5: BCA6476EF1BF79773D8EFB11700FDE8E
SHA1: 9FF0A304AA368BCD2EF2BE89AD47E65650241927
SHA256: 49D7695EFFF6F3C4840079BF564F3191B585639816ADE98672A38017F25E9570
MD5: 178DD42D06B2F32F3870E0C27219821E
SHA1: 73EDCD50817A7F6003FE405CF1808A30D034F89D
SHA256: DD334B8D7088A7B78160C253B680D645E25984BA5CCAB5CC5C327CA72137FC06

Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.50-20240220.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.60-20240320.iso.sig

Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
Expand All @@ -25,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.

Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.50-20240220.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.60-20240320.iso.sig
```

Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.50-20240220.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.60-20240320.iso
```

Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.4.50-20240220.iso.sig securityonion-2.4.50-20240220.iso
gpg --verify securityonion-2.4.60-20240320.iso.sig securityonion-2.4.60-20240320.iso
```

The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Fri 16 Feb 2024 11:36:25 AM EST using RSA key ID FE507013
gpg: Signature made Tue 19 Mar 2024 03:17:58 PM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <[email protected]>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Expand Down
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.4.50
2.4.60
17 changes: 10 additions & 7 deletions salt/bpf/pcap.map.jinja
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% import 'bpf/macros.jinja' as MACROS %}

{{ MACROS.remove_comments(BPFMERGED, 'pcap') }}

{% set PCAPBPF = BPFMERGED.pcap %}
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% if GLOBALS.pcap_engine == "TRANSITION" %}
{% set PCAPBPF = ["ip and host 255.255.255.1 and port 1"] %}
{% else %}
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% import 'bpf/macros.jinja' as MACROS %}
{{ MACROS.remove_comments(BPFMERGED, 'pcap') }}
{% set PCAPBPF = BPFMERGED.pcap %}
{% endif %}
16 changes: 10 additions & 6 deletions salt/common/tools/sbin/so-common-status-check
Original file line number Diff line number Diff line change
Expand Up @@ -47,12 +47,16 @@ def check_for_fps():
fps = 1
except FileNotFoundError:
fn = '/proc/sys/crypto/' + feat_full + '_enabled'
with open(fn, 'r') as f:
contents = f.read()
if '1' in contents:
fps = 1
try:
with open(fn, 'r') as f:
contents = f.read()
if '1' in contents:
fps = 1
except:
# Unknown, so assume 0
fps = 0

with open('/opt/so/log/sostatus/lks_enabled', 'w') as f:
with open('/opt/so/log/sostatus/fps_enabled', 'w') as f:
f.write(str(fps))

def check_for_lks():
Expand All @@ -76,7 +80,7 @@ def check_for_lks():
lks = 1
if lks:
break
with open('/opt/so/log/sostatus/fps_enabled', 'w') as f:
with open('/opt/so/log/sostatus/lks_enabled', 'w') as f:
f.write(str(lks))

def fail(msg):
Expand Down
1 change: 1 addition & 0 deletions salt/elasticfleet/defaults.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,7 @@ elasticfleet:
- http_endpoint
- httpjson
- iis
- journald
- juniper
- juniper_srx
- kafka_log
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ do
done

printf "\n### Stripping out unused components"
find /nsm/elastic-agent-workspace/elastic-agent-*/data/elastic-agent-*/components -maxdepth 1 -regex '.*fleet.*\|.*packet.*\|.*apm.*\|.*audit.*\|.*heart.*\|.*cloud.*' -delete
find /nsm/elastic-agent-workspace/elastic-agent-*/data/elastic-agent-*/components -maxdepth 1 -regex '.*fleet.*\|.*packet.*\|.*apm.*\|.*heart.*\|.*cloud.*' -delete

printf "\n### Tarring everything up again"
for OS in "${OSARCH[@]}"
Expand Down
Loading
Loading