On Wed, 21 Jan 2009, RB wrote:

> On Tue, Jan 20, 2009 at 12:54,  <[email protected]> wrote:
>> I think that what he is asking about is what makes logs acceptable or not
>> acceptable when doing forensics, and what configurations of rsyslog would
>> be acceptable.
>
> That's still unclear as to whether the logging instances are being
> analyzed or they are part of the analysis process (i.e. logging
> investigator actions, "interesting" items, etc.).

I think it's the logs being analysed, not logging investigator actions 
(other than the extent that things the investigators do would be logged if 
anyone did them)

>> for example, rsyslog can be configured to use disk-based queues on
>> redundant drives and RELP for network communication, and the result will
>> be that rsyslog is _very_ reliable in terms of preserving messages that
>> get to it (at the cost of performance, but you can throw hardware at it to
>> deal with that)
>>
>> this is probably acceptable as a log for forensics type work.
>>
>> but what about the more normal settings? (tcp or udp network
>> communications with memory-based queues). those settings can loose data,
>> but won't under normal conditions (assuming the network isn't so busy that
>> it drops UDP packets)
>
> Generally speaking, forensics prefers the "save everything, impossible
> to lose" approach.  A single lost message probably won't break a given
> case, but the possibility is definitely there.

this is the most paranoid/conservative view, and by this definition there 
are basicly no logs in existance that meet the forensics requirements

> RELP with disk queues
> on hardware-redundant drives would probably be a good start if you're
> looking to ease future analysis, but it is my opinion that networked
> logging of the forensic process is both unlikely and overkill, as most
> analysis processes want their logs integrated instead of held as a
> separate source.
>
> One item I have had on my wish-list for quite some time is the ability
> to log directly to a UDF VAT filesystem (incremental writes on
> write-once optical media).  Poor man's WORM, if you will.  It would
> enable physical assurance that log data is unmodified up to the point
> of compromise.  Add in the idea of incremental checksums or signing,
> and you have an extremely controlled, verifiable log source.  Of
> course, it doesn't have to be solved in rsyslog-space, but it'd
> definitely be useful.

frankly, if you really need write-only media, the best thing to do (volume 
permitting) is to dump to a printer.

David Lang
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com

Reply via email to