Hi Thorbjørn,

Thanks for your comment. In simple terms, what we do for making these logs 
tamper-evident is to process each line and then chain-hashing them. This means 
that any tampering in any record (even a single byte in one record) equals to 
an interruption in the hash chain, which allow us to pinpoint exactly where 
(e.g. in what event) this tampering has occurred. 

Are you thinking about any application for this type of solution?



-----Original Message-----
From: Thorbjørn Ravn Andersen [mailto:[email protected]] 
Sent: martes, 28 de abril de 2009 11:04
To: Log4J Users List
Subject: Re: Call for feedback

Roberto Blanc skrev  den 25-04-2009 19:00:
> while doing its job. It has the unique value of adding this
> tamper-evident "digital fingerprint" at the record level, which is
> impossible using other means such as digital signatures.
>   
Interesting.  Could you explain how this tamper-evident fingerprinting 
works?

-- 
  Thorbjørn Ravn Andersen  "...plus... Tubular Bells!"


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to