From owner-freebsd-security Mon Jul 12 12: 7:39 1999 Delivered-To: freebsd-security@freebsd.org Received: from yoshi.iq.org (yoshi.iq.org [203.4.184.224]) by hub.freebsd.org (Postfix) with ESMTP id F0258151F2 for ; Mon, 12 Jul 1999 12:07:24 -0700 (PDT) (envelope-from proff@yoshi.iq.org) Received: (from proff@localhost) by yoshi.iq.org (8.8.8/8.8.8) id UAA00264; Fri, 9 Jul 1999 20:06:04 +1000 (EST) To: Robert Watson Cc: Darren Reed , Alla Bezroutchko , security@FreeBSD.ORG Subject: Re: Syslog alternatives? References: Cc: proff@iq.org From: Julian Assange Date: 09 Jul 1999 20:06:04 +1000 In-Reply-To: Robert Watson's message of "Fri, 9 Jul 1999 04:20:13 -0400 (EDT)" Message-ID: Lines: 12 User-Agent: Gnus/5.070066 (Pterodactyl Gnus v0.66) XEmacs/21.1 (20 Minutes to Nikko) Mime-Version: 1.0 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Robert Watson writes: > don't have a reference for it. I believe Schneier coauthored a paper on > some of the cryptographic issues, also. Again, no references here as I'm > out of town. If you can rely on kernel integrity due to securelevels, > then presumably you can have it hold onto secrets and provide certain > cryptographic integrity services. I don't like Schneier's paper very much. Seems to be an over-engineered patent stalking horse. Darren's nsyslog does cryptographic verification and transmission of its log data -- and keeps the log-files human readable. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message