Hi Thorbjørn, Thanks for your comment. In simple terms, what we do for making these logs tamper-evident is to process each line and then chain-hashing them. This means that any tampering in any record (even a single byte in one record) equals to an interruption in the hash chain, which allow us to pinpoint exactly where (e.g. in what event) this tampering has occurred.
Are you thinking about any application for this type of solution? -----Original Message----- From: Thorbjørn Ravn Andersen [mailto:[email protected]] Sent: martes, 28 de abril de 2009 11:04 To: Log4J Users List Subject: Re: Call for feedback Roberto Blanc skrev den 25-04-2009 19:00: > while doing its job. It has the unique value of adding this > tamper-evident "digital fingerprint" at the record level, which is > impossible using other means such as digital signatures. > Interesting. Could you explain how this tamper-evident fingerprinting works? -- Thorbjørn Ravn Andersen "...plus... Tubular Bells!" --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
