[logs] Re: Log integrity handling on central logsystem

From: Anton Chuvakin (anton@private)
Date: Fri Sep 01 2006 - 12:25:30 PDT


All,

I would second what Eric said; my research also pointed me in a
similar direction - the burden of proof will likely be on the
"attacking" side which would need to proof that that the logs *were*
tampered with rather than the other way.

This DoJ paper is actually a bit more clear than their rules of
evidence: http://www.usdoj.gov/criminal/cybercrime/usamarch2001_4.htm

On 8/31/06, Eric Fitzgerald <Eric.Fitzgerald@private> wrote:
>
>
>
> Hi Christina,
>
>
>
> The federal rules of evidence actually point in the other direction, that
> U.S. Federal courts look at the likelihood of tampering having actually
> occurred rather than the possibility of tampering.
>
> http://www.cybercrime.gov/usamarch2001_4.htm
>
>
>
> Here's an excerpt from an article by Orin S. Kerr (a DoJ attorney when the
> article was written) on Computer Records and the Federal Rules of Evidence:
>
>
>
> "Computer records can be altered easily, and opposing parties often allege
> that computer records lack authenticity because they have been tampered with
> or changed after they were created. For example, in United States v.
> Whitaker, 127 F.3d 595, 602 (7th Cir. 1997), the government retrieved
> computer files from the computer of a narcotics dealer named Frost. The
> files from Frost's computer included detailed records of narcotics sales by
> three aliases: "Me" (Frost himself, presumably), "Gator" (the nickname of
> Frost's co-defendant Whitaker), and "Cruz" (the nickname of another dealer).
> After the government permitted Frost to help retrieve the evidence from his
> computer and declined to establish a formal chain of custody for the
> computer at trial, Whitaker argued that the files implicating him through
> his alias were not properly authenticated. Whitaker argued that "with a few
> rapid keystrokes, Frost could have easily added Whitaker's alias, 'Gator' to
> the printouts in order to finger Whitaker and to appear more helpful to the
> government." Id. at 602."
>
> "The courts have responded with considerable skepticism to such unsupported
> claims that computer records have been altered. Absent specific evidence
> that tampering occurred, the mere possibility of tampering does not affect
> the authenticity of a computer record. See Whitaker, 127 F.3d at 602
> (declining to disturb trial judge's ruling that computer records were
> admissible because allegation of tampering was "almost wild-eyed speculation
> . . . [without] evidence to support such a scenario"); United States v.
> Bonallo, 858 F.2d 1427, 1436 (9th Cir. 1988) ("The fact that it is possible
> to alter data contained in a computer is plainly insufficient to establish
> untrustworthiness."); United States v. Glasser, 773 F.2d 1553, 1559 (11th
> Cir. 1985) ("The existence of an air-tight security system [to prevent
> tampering] is not, however, a prerequisite to the admissibility of computer
> printouts. If such a prerequisite did exist, it would become virtually
> impossible to admit computer-generated records; the party opposing admission
> would have to show only that a better security system was feasible."). Id.
> at 559. This is consistent with the rule used to establish the authenticity
> of other evidence such as narcotics. See United States v. Allen, 106 F.3d
> 695, 700 (6th Cir. 1997) ("Merely raising the possibility of tampering is
> insufficient to render evidence inadmissible."). Absent specific evidence of
> tampering, allegations that computer records have been altered go to their
> weight, not their admissibility. See Bonallo, 858 F.2d at 1436."
>
>
>
> I agree that signing (strong evidence collection & chain of custody
> procedures) will help dismiss such accusations more briefly, but I don't
> believe that signing is necessary for introduction of logs as evidence.
>
>
>
> Cash register receipts, another kind of electronic evidence, won't have
> digsig for probably decades yet are readily admissible providing that
> receipts are part of normal business process.
>
>
>
> Now your last statement regarding best practices is the real heart of the
> matter, and I think that's really the most important concern.
>
>
>
> Thank you very much for your detailed thoughts!
>
>
>
> Best regards,
>
> Eric
>
>
>
>
>
>
>
>
> ________________________________
>
>
> From: Christina Noren [mailto:cfrln@private]
> Sent: Thursday, August 31, 2006 11:50 AM
> To: Eric Fitzgerald
> Cc: loganalysis@private
> Subject: Re: [logs] Re: Log integrity handling on central logsystem
>
>
>
>
> Eric,
>
>
>
>
>
> There are many regs out their that speak generally about taking steps to
> prove the integrity of logs. (HIPAA, DCID, NISPOM, FFIEC... the list goes
> on). Some mention log signing as a technique. Many more focus on security of
> network transmission (i.e. syslog-ng or similar) and controls over access to
> the log data repository.
>
>
>
>
>
> However, real driver for signing is litigation risk, not regulations.
>
>
>
>
>
> When you present log data as evidence to prosecute intruders, or you are
> subpoenaed for log evidence, opposing counsel will tend to challenge its
> integrity on several points:
>
>
>
>
>
> - can't prove that there weren't additional exculpatory records showing
> someone other than the defendant had the same opportunity, if the evidence
> is circumstantial, that were then deleted by the _real_ culprit
>
>
> - can't prove the specific events used as evidence weren't changed
>
>
>
>
>
> Signing (with a nonce that can be proven to have been protected) both
> individual log events and groups of consecutive log events is one of the
> best ways to address this type of challenge.
>
>
>
>
>
> Furthermore, to the extent that log signing becomes standard practice, a
> company who does not do it is exposed to civil litigation for not having
> taken due care, if outsiders, employees, customers, etc. are unable to
> pursue lawsuits against 3rd parties because of   the shakiness of the log
> evidence.
>
>
>
>
>
> - Christina
>
>
>
>
>
> On Aug 31, 2006, at 1:00 AM, Eric Fitzgerald wrote:
>
>
>
>
>
>
> Regarding log signing: is anyone aware of an actual regulatory or legal
> requirement for log signing?
>
>
>
>
>
>
> ________________________________
>
>
> From:
> loganalysis-bounces+ericf=windows.microsoft.com@private
> on behalf of Christopher L. Petersen
> Sent: Tue 8/22/2006 6:55 AM
> To: Patrick Debois; loganalysis@private
> Subject: [logs] Re: Log integrity handling on central logsystem
>
>
> I've always thought ensuring the integrity of the log begins at
> collection and ends at archival.  In defining integrity I would say it
> means no log entries are altered and the complete log is collected and
> centralized.  As for best practices, I would recommend the following:
>
> - Collect all logs as close to real-time as possible.  The longer the
> source log is on the source host, the more likely it can be altered.
> - When possible transport logs with a TCP based protocol and encrypt.
> TCP ensures reliability and combined with encryption, makes altering log
> entries as they traverse the network significantly more challenging.
> - If UDP Syslog is the only option and the central repository is across
> the WAN, try to collect close to the source and then forward via a TCP
> based protocol.
> - The central repository should utilize a strong access control
> mechanism at the operating system, database, and application layer to
> ensure that log data cannot be altered once written.
> - Ideally, an archive/backup copy of all centralized logs should be
> maintained.  This provides redundancy in the event the central log
> database fails or becomes corrupt.
> - When written to the central repository/archive, additional controls
> like hashsums or digital signatures can be used to validate integrity.
> If hashsums and/or signatures are used make sure the proper access
> controls exist around storing the hashes and signatures to ensure they
> cannot be modified.  This in itself is another line of thought...
> - If you want to get really serious (and spend some money), write
> archive copies of the logs to write-once storage.
>
> I'm not sure if/how Splunk addresses the above.  Vendors focused on log
> management (vs SIM) address most if not all of the above.
>
> Chris Petersen,
> CTO & Founder
> LogRhythm, Inc.
> www.LogRhythm.com
>
> > -----Original Message-----
> > From:
> loganalysis-bounces+chris=security-conscious.com@private
> >
> [mailto:loganalysis-bounces+chris=security-conscious.com@private
> ]
> > On Behalf Of Patrick Debois
> > Sent: Tuesday, August 22, 2006 12:44 AM
> > To: loganalysis@private
> > Subject: [logs] Log integrity handling on central logsystem
> >
> > I'm looking for feedback how centralized log solutions handle data
> > integrity; If you would log directly to a central system, that log is
> > the only source. So you would miss something to compare against.
> >
> > -Would you rely on taking checksums of the logs and storing them on
> > another system?
> > -How do you protect yourself from the fact that the central logging is
> > compromised with a still growing logfile?
> > Would you consider signing each log line? Signing within a text file
> is
> > fairly easy, but what about content stored in a database?
> >
> > My customer is currently looking at Splunk. It seems a great way to go
> > through the logfiles, but I'm not sure that we can fullfill his
> > dataintegrity requirements with it. But then again it does not stand
> in
> > the way of another solution doing it probable.
> >
> > Patrick
> >
> >
> > _______________________________________________
> > LogAnalysis mailing list
> > LogAnalysis@private
> > http://lists.shmoo.com/mailman/listinfo/loganalysis
> _______________________________________________
> LogAnalysis mailing list
> LogAnalysis@private
> http://lists.shmoo.com/mailman/listinfo/loganalysis
>
>
> _______________________________________________
>
>
> LogAnalysis mailing list
>
>
> LogAnalysis@private
>
>
> http://lists.shmoo.com/mailman/listinfo/loganalysis
>
>
>
> _______________________________________________
> LogAnalysis mailing list
> LogAnalysis@private
> http://lists.shmoo.com/mailman/listinfo/loganalysis
>
>
>


-- 
Anton Chuvakin, Ph.D., GCIA, GCIH, GCFA
     http://www.chuvakin.org
 http://chuvakin.blogspot.com
http://www.securitywarrior.com
_______________________________________________
LogAnalysis mailing list
LogAnalysis@private
http://lists.shmoo.com/mailman/listinfo/loganalysis



This archive was generated by hypermail 2.1.3 : Fri Sep 01 2006 - 15:56:31 PDT