On Mon, 16 Aug 1999, Vin McLellan wrote:

> been urging my clients to consider crypto-enhanced audit logs:  irreversible
> updating to log files with a one-way function, at a minimum.... Maybe with
> an option to write logs to a WORM drive? Maybe with a timestamp in the digest?  

Definitely the way to go.  Hardened hosts are good, but you still need
authentication and hashes work well for that.

> 
>         Anyone got any comments?  Cautions or suggestions for
> implementation? Hashed digests or digital signatures?

Signatures require a secret on the same machine, which is normally a big
problem.  I think you have to worry about how you refute false subsequent
logs with actual event-up-to-compromise logs.

> 
>          Isn't it about time for OS, NOS, and PKI vendors (all who sell or
> install access control systems?) to finally offer something in audit that
> can perhaps withstand Mr. Moore's threat scenario: "[If] someone gets root
> on your machine, they can do anything."  

That's an OS problem, and is best addressed by compartmented systems.  Not
that I think we'll see that, but I'm still holding out hope...

> 
>         "Irreversible" updates for audit logs may not withstand all attacks
> unless the records are stored offline -- and access controls without strong
> two-factor authentication is a joke -- but done right, I presume this sort
> of audit files could only be destroyed, not faked.  

You could fake subsequent logs if the authentication is on-machine, and
the machine is given in o complete compromise.  

> 
>         Traditionally, of course, records made in the normal course of
> business are admissible as forensic evidence in courts throughout the world.
> Testimony is usually required to show that these records meet this test.  I
> fear, however, that even with strong user authentication, and relatively
> weak controls over many types of computerized records  may allow them to be
> legitimately called into question if they are used as evidence in court,  or
> as  the justification for punitive action within the firm or organization.   

That's why cryptographic signatures/hashes are an important adjunct to a
strong log host.  The log host still has administrators.  

[snip]

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to