(From Kevin Wall)
Built utilities for tamper resistant audit logs.
Schneier and Kelsey have a good paper on how to do this using various crypto
primitives. The advantage is that once an entry is made in a log file, it is
possible to use cryptographic primitives to detect if these logs have been
tampered with in any way. This can be something that is important with
presenting audit logs as forensics evidence as you can have assurance that the
logs were not tampered with.
Original issue reported on code.google.com by manico.james@gmail.com on 11 Nov 2010 at 3:10
Original issue reported on code.google.com by
manico.james@gmail.com
on 11 Nov 2010 at 3:10