Date: 19 Jul 1998 17:29:57 +1000 From: Julian Assange <proff@iq.org> To: Bruce Schneier <schneier@counterpane.com> Cc: coderpunks@toad.com, aucrypto@suburbia.net, cryptography@c2.net, freebsd-security@FreeBSD.ORG Subject: cryptographically secure logging Message-ID: <wxlnpqfgcq.fsf@polysynaptic.iq.org>
next in thread | raw e-mail | index | archive | help
"Cryptographic Support for Secure Logs on Untrusted Machines" B. Schneier and J. Kelsey, The Seventh USENIX Security Symposium Proceedings, USENIX Press, January 1998, pp. 53-62. In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captures this machine, we would like to guarantee that he will gain little or no information from the log files and limit his ability to corrupt the log files. This paper describes an efficient method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to read, and also impossible to undetectably modify or destroy. I haven't read Bruce's paper, but Bruce (and others) might be interested to know that Darren Reed and I have actually implemented one of these for unix. It's also a very flexible syslogd replacement in it's own right (thanks to Darren). It's called nsyslog and is available from http://cheops.anu.edu.au/~avalon/nsyslog.html. It will be included in the default NetBSD distribution (although it should run on most unix platforms). It uses only secure hashes, and essentially does for logs what S/KEY does for authentication. Cheers, Julian. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?wxlnpqfgcq.fsf>