You're absolutely right regarding signing not being necessary for introduction of log evidence - thanks for digging up the citations. However, what I've heard from companies is a lot of trumped up "specific" evidence. On Aug 31, 2006, at 12:06 PM, Eric Fitzgerald wrote: > --> > Hi Christina, > > > > The federal rules of evidence actually point in the other > direction, that U.S. Federal courts look at the likelihood of > tampering having actually occurred rather than the possibility of > tampering. > > http://www.cybercrime.gov/usamarch2001_4.htm > > > > Here's an excerpt from an article by Orin S. Kerr (a DoJ attorney > when the article was written) on Computer Records and the Federal > Rules of Evidence: > > > > "Computer records can be altered easily, and opposing parties often > allege that computer records lack authenticity because they have > been tampered with or changed after they were created. For example, > in United States v. Whitaker, 127 F.3d 595, 602 (7th Cir. 1997), > the government retrieved computer files from the computer of a > narcotics dealer named Frost. The files from Frost's computer > included detailed records of narcotics sales by three aliases: > "Me" (Frost himself, presumably), "Gator" (the nickname of Frost's > co-defendant Whitaker), and "Cruz" (the nickname of another > dealer). After the government permitted Frost to help retrieve the > evidence from his computer and declined to establish a formal chain > of custody for the computer at trial, Whitaker argued that the > files implicating him through his alias were not properly > authenticated. Whitaker argued that "with a few rapid keystrokes, > Frost could have easily added Whitaker's alias, 'Gator' to the > printouts in order to finger Whitaker and to appear more helpful to > the government." Id. at 602." > > "The courts have responded with considerable skepticism to such > unsupported claims that computer records have been altered. Absent > specific evidence that tampering occurred, the mere possibility of > tampering does not affect the authenticity of a computer record. > See Whitaker, 127 F.3d at 602 (declining to disturb trial judge's > ruling that computer records were admissible because allegation of > tampering was "almost wild-eyed speculation . . . [without] > evidence to support such a scenario"); United States v. Bonallo, > 858 F.2d 1427, 1436 (9th Cir. 1988) ("The fact that it is possible > to alter data contained in a computer is plainly insufficient to > establish untrustworthiness."); United States v. Glasser, 773 F.2d > 1553, 1559 (11th Cir. 1985) ("The existence of an air-tight > security system [to prevent tampering] is not, however, a > prerequisite to the admissibility of computer printouts. If such a > prerequisite did exist, it would become virtually impossible to > admit computer-generated records; the party opposing admission > would have to show only that a better security system was > feasible."). Id. at 559. This is consistent with the rule used to > establish the authenticity of other evidence such as narcotics. See > United States v. Allen, 106 F.3d 695, 700 (6th Cir. 1997) ("Merely > raising the possibility of tampering is insufficient to render > evidence inadmissible."). Absent specific evidence of tampering, > allegations that computer records have been altered go to their > weight, not their admissibility. See Bonallo, 858 F.2d at 1436." > > > > I agree that signing (strong evidence collection & chain of custody > procedures) will help dismiss such accusations more briefly, but I > don't believe that signing is necessary for introduction of logs as > evidence. > > > > Cash register receipts, another kind of electronic evidence, won't > have digsig for probably decades yet are readily admissible > providing that receipts are part of normal business process. > > > > Now your last statement regarding best practices is the real heart > of the matter, and I think that's really the most important concern. > > > > Thank you very much for your detailed thoughts! > > > > Best regards, > > Eric > > > > > > > > > > From: Christina Noren [mailto:cfrln@private] > Sent: Thursday, August 31, 2006 11:50 AM > To: Eric Fitzgerald > Cc: loganalysis@private > Subject: Re: [logs] Re: Log integrity handling on central logsystem > > > > Eric, > > > > There are many regs out their that speak generally about taking > steps to prove the integrity of logs. (HIPAA, DCID, NISPOM, > FFIEC... the list goes on). Some mention log signing as a > technique. Many more focus on security of network transmission > (i.e. syslog-ng or similar) and controls over access to the log > data repository. > > > > However, real driver for signing is litigation risk, not regulations. > > > > When you present log data as evidence to prosecute intruders, or > you are subpoenaed for log evidence, opposing counsel will tend to > challenge its integrity on several points: > > > > - can't prove that there weren't additional exculpatory records > showing someone other than the defendant had the same opportunity, > if the evidence is circumstantial, that were then deleted by the > _real_ culprit > > - can't prove the specific events used as evidence weren't changed > > > > Signing (with a nonce that can be proven to have been protected) > both individual log events and groups of consecutive log events is > one of the best ways to address this type of challenge. > > > > Furthermore, to the extent that log signing becomes standard > practice, a company who does not do it is exposed to civil > litigation for not having taken due care, if outsiders, employees, > customers, etc. are unable to pursue lawsuits against 3rd parties > because of the shakiness of the log evidence. > > > > - Christina > > > > On Aug 31, 2006, at 1:00 AM, Eric Fitzgerald wrote: > > > > > Regarding log signing: is anyone aware of an actual regulatory or > legal requirement for log signing? > > > > > > From: loganalysis-bounces > +ericf=windows.microsoft.com@private on behalf of > Christopher L. Petersen > Sent: Tue 8/22/2006 6:55 AM > To: Patrick Debois; loganalysis@private > Subject: [logs] Re: Log integrity handling on central logsystem > > I've always thought ensuring the integrity of the log begins at > collection and ends at archival. In defining integrity I would say it > means no log entries are altered and the complete log is collected and > centralized. As for best practices, I would recommend the following: > > - Collect all logs as close to real-time as possible. The longer the > source log is on the source host, the more likely it can be altered. > - When possible transport logs with a TCP based protocol and encrypt. > TCP ensures reliability and combined with encryption, makes > altering log > entries as they traverse the network significantly more challenging. > - If UDP Syslog is the only option and the central repository is > across > the WAN, try to collect close to the source and then forward via a TCP > based protocol. > - The central repository should utilize a strong access control > mechanism at the operating system, database, and application layer to > ensure that log data cannot be altered once written. > - Ideally, an archive/backup copy of all centralized logs should be > maintained. This provides redundancy in the event the central log > database fails or becomes corrupt. > - When written to the central repository/archive, additional controls > like hashsums or digital signatures can be used to validate integrity. > If hashsums and/or signatures are used make sure the proper access > controls exist around storing the hashes and signatures to ensure they > cannot be modified. This in itself is another line of thought... > - If you want to get really serious (and spend some money), write > archive copies of the logs to write-once storage. > > I'm not sure if/how Splunk addresses the above. Vendors focused on > log > management (vs SIM) address most if not all of the above. > > Chris Petersen, > CTO & Founder > LogRhythm, Inc. > www.LogRhythm.com > > > -----Original Message----- > > From: loganalysis-bounces+chris=security- > conscious.com@private > > > [mailto:loganalysis-bounces+chris=security- > conscious.com@private > ] > > On Behalf Of Patrick Debois > > Sent: Tuesday, August 22, 2006 12:44 AM > > To: loganalysis@private > > Subject: [logs] Log integrity handling on central logsystem > > > > I'm looking for feedback how centralized log solutions handle data > > integrity; If you would log directly to a central system, that > log is > > the only source. So you would miss something to compare against. > > > > -Would you rely on taking checksums of the logs and storing them on > > another system? > > -How do you protect yourself from the fact that the central > logging is > > compromised with a still growing logfile? > > Would you consider signing each log line? Signing within a text file > is > > fairly easy, but what about content stored in a database? > > > > My customer is currently looking at Splunk. It seems a great way > to go > > through the logfiles, but I'm not sure that we can fullfill his > > dataintegrity requirements with it. But then again it does not stand > in > > the way of another solution doing it probable. > > > > Patrick > > > > > > _______________________________________________ > > LogAnalysis mailing list > > LogAnalysis@private > > http://lists.shmoo.com/mailman/listinfo/loganalysis > _______________________________________________ > LogAnalysis mailing list > LogAnalysis@private > http://lists.shmoo.com/mailman/listinfo/loganalysis > > _______________________________________________ > > LogAnalysis mailing list > > LogAnalysis@private > > http://lists.shmoo.com/mailman/listinfo/loganalysis > > > _______________________________________________ LogAnalysis mailing list LogAnalysis@private http://lists.shmoo.com/mailman/listinfo/loganalysis
This archive was generated by hypermail 2.1.3 : Thu Aug 31 2006 - 14:30:15 PDT