Open
Description
From [email protected] on November 10, 2010 22:10:43
(From Kevin Wall)
Built utilities for tamper resistant audit logs.
Schneier and Kelsey have a good paper on how to do this using various crypto primitives. The advantage is that once an entry is made in a log file, it is possible to use cryptographic primitives to detect if these logs have been tampered with in any way. This can be something that is important with presenting audit logs as forensics evidence as you can have assurance that the logs were not tampered with.
Original issue: http://code.google.com/p/owasp-esapi-java/issues/detail?id=180