• No results found

Standardized Syslog Processing: Revisiting Secure Reliable Data Transfer and Message Compression

N/A
N/A
Protected

Academic year: 2022

Share "Standardized Syslog Processing: Revisiting Secure Reliable Data Transfer and Message Compression"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

Ras mus Da hl ber g a nd To bia s P ulls | S ta nd ar dis ed Sys lo g P ro ces si ng

S tandard ised Sys log Process ing

Today ’s compu ter logs are l ike smok ing guns and treasure maps in case o f susp ic ious sys tem ac t iv i t ies : they documen t in trus ions , and log cruc ia l in forma t ion such as fa i led sys tem upda tes and crashed serv ices . An adversary thus has a c lear mo t ive to observe , a l ter , and de le te log en tr ies , cons ider ing tha t she cou ld ( i ) s tar t by us ing the log ’s con ten t to iden t i fy new secur i ty vu lnerab i l i t ies , and ( i i ) exp lo i t them w i thou t ever be ing de tec ted . W i th th is in m ind we cons ider sys log s tandards and open source pro jec ts tha t sa feguard even ts dur ing the s torage and trans i t phases , and exam ine how da ta compress ion e f fec ts secur i ty . W e conc lude tha t there are sys log s tandards in p lace tha t sa t is fy secur i ty on a hop -by -hop bas is , tha t there are no such s tandards for secure s torage , and tha t message compress ion is no t recommended dur ing trans i t .

Facu l ty o f Hea l th , Sc ience and Techno logy Facu l ty o f Hea l th , Sc ience and Techno logy

Rasmus Dah lberg and Tob ias Pu l ls

S tandard ised Sys log Process ing

Rev is i t ing Secure Re l iab le Da ta T rans fer and

Message Compress ion

(2)

Standard isedSys logProcess ing

Rev is i t ingSecureRe l iab leDa taT rans ferandMessageCompress ion

RasmusDah lberg

Kar ls tadUn ivers i ty ,Dep t .o fMa thema t icsand Compu terSc ience ,Sweden

Tob iasPu l ls

Kar ls tadUn ivers i ty ,Dep t .o fMa thema t icsand Compu terSc ience ,Sweden

ABSTRACT

Today ’scomputerlogsarel ikesmok inggunsandtreasure mapsincaseo fsusp ic ioussystemact iv it ies :theydocument intrus ions ,andlogcruc ia lin format ionsuchasfa i ledsystem updatesandcrashedserv ices . Anadversarythushasac lear mot ivetoobserve ,a lter ,andde letelogentr ies ,cons ider ing thatshecou ld( i)startbyus ingthelog ’scontenttoident i fy newsecur ityvu lnerab i l it ies ,and( i i)exp lo itthem w ithout everbe ingdetected . W ithth isin m indwecons idersys log standardsandopensourceprojectsthatsa feguardevents dur ingthestorageandtrans itphases ,andexam inehow datacompress ioneffectssecur ity . Weconc ludethatthere aresys logstandardsinp lacethatsat is fysecur ityonahop- by-hopbas is ,thattherearenosuchstandardsforsecure storage ,andthat messagecompress ionisnotrecommended dur ingtrans it .

Keywords

Sys log ,standard isedlogg ing ,securedatacompress ion

1 . INTRODUCTION

Acomputerlogw ithdescr ipt ionso fpastact iv itysuchas fi leaccess ,author isat iondec is ions ,andsystemd iagnost ics is ,andhavelongbeen ,aninva luab leresourceforsystem adm in istratorsdur ingtroub leshoot ing .Forexamp le ,legacy sys log[18]datesbackasfarasthe1980s ,andtobeg inw ith theor ig ina ldes ignhadl itt leinterestinsecur ity[13] . Th is contrad ictsthecurrentneeds ,cons ider ingthattoday ’slogs conta insens it ivedatathat mustnotbeobserved ,dropped , ora ltered :secur itynot ificat ions ,users ’systemtraces ,and soforth .Inotherwords ,itisessent ia ltoensuresecurelog managementonaprotoco landin frastructura lleve l ,asis ident ifiedinthesys logre latedrequestforcomments(RFCs) andinacomprehens ivesurveypub l ishedbythe Nat iona l Inst ituteo fStandardsandTechno logy(NIST)[14] .

Theconsequenceso funsecurelogmanagementisev ident ly devastat ing . Cons iderwhatwou ldhappeni flogentr ieswere tamperedw ith ,de leted ,or ma l ic ious lyinsertedintothelog byanadversary . Thetraceso fanent ireattackcou ldeas i ly beh idden ,andfa lseev idenceproducedforev i lpurposes . Even moresevere ly ,d isc losureo ftheusers ’sens it ivedata hasprev ious lydr ivenpeop letosu ic ide[2] . Thus ,asecure logg ingin frastructurecannotrunasi fitmere lyconta insde- bugg ingin format ion . Theimpacto f ,e .g . ,den ia lo fserv ice attacks ,confident ia l itybreaches ,andintegr itycomprom ises mustbecare fu l lycons ideredandaccountedforaccord ing ly , pre ferab lydepend ingonwe l l-definedpo l ic ies .

Current lythereare manysys logre latedstandards ,some o fwh ichareo ldorobso lete[23,30,31]andothersthatare qu iterecent[9,10,13,20,24] . Apartfromthestandards , mu lt ip leopensourceprojectsex istthatprov idesecurelog managementso lut ions[32,35] .Intheresearchcommun ity therehasa lsobeensevera lpreva lentadvancements , most notab lyinc lud ingforward-secureconstruct ions[4,19] . I f th isisapp l icab le ,however ,isdependentonthesett ing .For instance ,aforwardsecureschemeservesnopurposewhena system ’sdev iceshavetobetrustedata l lt imes .

1 .1 Term ino logyandSett ing

Wecons iderthreetypeso ftrusteddev ices ,name ly or ig i- nators,re lays,andco l lectors. Anor ig inatorgeneratesevents thataresentacrossanunre l iab leandunsecurenetwork . The eventsareformattedassys log messages ,and maybesent to mu lt ip lere laysandco l lectors . Uponrece ipto fanevent , are layispreconfiguredtoserveaforward ingfunct ion . The co l lectors ,ontheotherhand ,arch iveeventsandper form logana lys is . Adev icecanbeanycomb inat iono for ig inator , re layandco l lector .

F igure 1dep ictsoursett ing . Anact iveadversarythat iscomputat iona l lyboundedintercepts ,exam ines , mod ifies , de lays ,andrep layseventsintrans it .She maya lsoattempt tocauseava i lab i l ityissuesbyin ject ing ma l ic iouseventsto exhaustbothre laysandco l lectors . Further ,th irdpart ies thatareab letoauthent icatethemse lvesquerytheco l lectors forevents ,demand ingver ifiab leresponsesw ithregardtothe or ig inatorthatgeneratedwh icheventatrough lywhatt ime .

Col lector Re lay

Or ig inator

C lient query

answer m

2

m

1

m

1

m

2

F igure1 : Asketcho foursett ing .

Foror ig inatorsandre lays ,spaceisal im itedresourcein

theordero fafewg igabytes . Theco l lectorsareassumed

tobe morepower fu l ,anditisdes irab letosavebandw idth

w ithoutcomprom is inganysecur ity . Wedonotcons ider

rep l icat ionattheco l lectors ,butth isisinherent lysupported

bythe mode ls inceaco l lectorcana lsobeare lay .

(3)

1 .2 Goa landScope

Wew ishtoexam inesys logstandardsandre latedconcepts thatareapp l icab leto Un ix- l ikeenv ironments . Thea imis toprov idegu ide l inesbasedonoursett ingwherea l ldev ices havetobetrusted ,andwehopetofindso lut ionsthatoffer :

– Re l iab letransportbetweenthed ifferentdev ices ; – Confident ia l ity ,integr ity ,andava i lab i l ity ;

– Or ig inauthent icat iononaper-messagebas is ,i .e . ,wh ich or ig inatorgeneratedwhat message .

Itisa lsodes iredthatwecons idersecuredatacompress ion dur ingtrans itandlong-termstorage . Ourscopeisl im ited tostandard isedandwe l lestab l ishedopensourceprojects .

1 .3 Roadmap

Therema indero fthereportisstructuredasfo l lows .Sec- t ion2prov idesanoverv iewo fex ist ingsys logstandardsand thesecur itypropert iestheyen force . Sect ion3h igh l ights popu laropensourceprojectsre latedtosca lab leandsecure logg ingin frastructures .Sect ion4introducestechn iquesfor datacompress ionandhowtheyeffectsecur ity . Sect ion5 setsourd iscuss ionintocontext ,prov id inggu ide l inesbased onbestpract ices .F ina l ly ,Sect ion6conc ludesthereport .

2 . SYSLOGSTANDARDS

F irstweintroducepastdeve lopmentandimportantnotes regard ingthesys logprotoco l ,thenthelateststandardsfor re l iab ledatatrans ferandsecur ityareexam ined .

2 .1 TheSys logProtoco l

A fteraw ideuseacrossnetworksformanyyears ,observed behav iouro fBSDsys logwasdocumentedinRFC3164[18] . Theintent wastoprov ideas imp leprotoco ltransport ing eventsfromsourcestos inks ,resu lt ingintheuseo f UDP w ithoutacknow ledgementsandsecur itycons iderat ions .

RFC3164waslaterondec laredobso leteandprecededby astandardinRFC5424[9] . Alayeredarch itectureinterms o fanapp l icat ionandtransportlayerwasintroduced ,anda newstructureforthe messageformatdefined . Wh i lenone o fthetrad it iona lsecur itypropert ieswereaddressed ,severa l encod ingissueswerereso lvedandacommongroundtobu i ld uponprov ided . Inother words ,toatta inpropert iessuch asguaranteedde l ivery ,confident ia l ity ,andintegr ity ,other standardsorvendorspec ificso lut ions mustbecons idered .

2 .2 UDPandTCPTransport Mapp ings

Desp itethegenera linteresttosecuresys log ,except ions ex istwhere inatrad it iona ltransportlayersuffices .Forsuch purposestherearebothUserDatagramProtoco l(UDP)and T ransm iss ionContro lProtoco l(TCP) mapp ingsdefinedfor sys log[10,24] . Noneo ftheseopt ionsareent ire lyre l iab le , however ,becausesys logiss imp lexw ithoutanyapp l icat ion leve lacknow ledgements . Forinstance ,itcanbenontr iv ia l todeterm ine wh ich messageshavebeencorrect lyrece ived intheevento fapremature lyc losed TCP-connect ion . A separaterecovery mechan ism maythere forebenecessary .

The TCPtransport mapp ingisnot w ithoutdrawbacks . Thereisl itt lecontro lregard ingwhenapacketissent ,and bydes ignthethroughputislessthanthato f UDP . The TCPpushflag m ighthe lptoensurethatimportantevents cannotres ideins idebuffersforlongper iodso ft ime ,but

extralatencyisinev itab ledueto ,e .g . ,thein it ia lhandshake andcongest ion mechan ism .Furthermore ,i fTCPisfeas ib le , itisl ike lythattheT ransportLayerSecur ity(TLS)mapp ing isapp l icab le(seeSect ion2 .3) . The Datagram T ransport LayerSecur ity(DTLS) mapp ingforsys logcou lda lsobe o finterestinc ircumstances wherere l iab ledatatrans feris irre levantortoocost lyintermso foverhead[ 34] .

2 .3 TLSTransport Mapp ing

Theuseo fTLSisrecommendedtoprotectsys logevents onahop-by-hopbas is ,i .e . ,intrans itfromor ig inatorsand re laystootherre laysandco l lectors[9,24] .Forth ispurpose , thereisa TLStransport mapp ingdefinedforsys log[20] . Mutua lauthent icat ionispre ferab lycert ificate-based ,and confident ia l ityandintegr ityispreservedbyencapsu lat inga l l sys log messagesasTLSapp l icat iondata . Notethatre l iab le datatrans ferisnotnecessar i lyprov ided(seeSect ion2 .2) , andden ia lo fserv iceison lypart ia l lyguardedaga instdue totheprov idedauthent icat ioncapab i l it ies . Wew i l ld iscuss se lect iono fTLSc iphersu iteslateroninSect ion5 .2.

2 .4 IPsecforSys log

InternetProtoco lSecur ity(IPsec)isasecur ityprotoco l thatoperatesonthenetworklayer[15] . A l ltransportlayer serv icesthatrunontopo fIPsecw i l lthusreaptheharvest fromtheprov idedsecur itypropert ies ,fo l low ingfromtwo assoc iatedIPsecprotoco ls . F irst ,anauthent icatedheader offersintegr ity ,or ig inauthent icat ion ,andopt iona lrep lay res istance . Second ,anencapsu latedsecur itypay loadoffers thesameseto fserv icesas we l lasconfident ia l ity . Botho f thetwoprotoco lssupportaccesscontro l ,andrunine ither transportortunne l mode. Thed ifferent modesdeterm ine deta i lsregard ing ,e .g . ,howadatagramshou ldbeprocessed .

Whatisnotapparentfromth isbr ie fintroduct ionisthat IPsecisacomp lexprotoco lw ith manyqu irks[26] .Itspans hundredso fpages ,andevensevera lRFCs . However ,wh i le comp lex ityiso ftencons ideredasecur ityconcern[8] ,IPsec doesaddress manysecur ityissuesi fimp lementedcorrect ly .

2 .5 S ignedSys log Messages

Sys log-s ign[13]usesthestructureddatae lementsdefined inRFC5424[ 9]toauthent icateastreamo fsys logmessages , introduc ings ignatureandcert ificateb locks. Asdep ictedin F igure2,as ignatureb lockconta inshasheso fprev ious lysent messagesandisd ig ita l lys igned . Theassoc iatedkey ma- ter ia lisd istr ibutedper iod ica l lythroughcert ificateb locks , and mustbeprotectedexterna l ly ,e .g . ,v iaTLS ,toprevent man- in-the-m idd leattacks .Itshou ldbenotedthatne ither s ignaturenorcert ificateb locksareinc ludedinthestream o fs igned messages . Theyare ,however ,encodedus ingthe sys log messageformat .

... s e H(m

s

) ... H(m

e

) σ p;σ← S ig(sk,p)

F igure2 : Therat iona lebeh inds ignatureb locks ; sande re fertothefirstandlast messageind ices ,respect ive ly .

Theresu lt ingsys log-s ignprotoco lprov idesintegr itycheck-

ing ,sequenc ingo fevents ,andor ig inauthent icat ion . Thus ,

rep layattacksand m iss ingeventscanbeaccountedfor .In

add it ion ,twoproceduresforon l ineandoffl inever ificat ion

(4)

aredefined ,andvendorspec ificver ificat ionissupported . F ina l ly ,duetos ignaturegroups,eventscanbegroupedand s ignedseparate lybytheor ig inator . Th isisanimportant feature whend ifferenteventsshou ldbeforwardedtovar i- oussetso fco l lectors ,e .g . ,depend ingonapp l icat ion ,pr ior ity , andrep l icat ionpo l icy .

3 . OPENSOURCEPROJECTS

Severa lopensourceprojectsex istthatarea imedtowards securelog management . Webr ieflydescr ibetwoo fthe most estab l ishedones ,name lysys lognewgenerat ion(sys log-ng) andtherocket- fastsystemforlogprocess ing(rsys log) . Then alogg ingut i l itythatres idesw ith insystemdish igh l ighted .

3 .1 Sys log-ng

Sys log-ng[35]isacentra l isedlogg ingin frastructurethat isava i lab leon manyhardwarearch itecturesandoperat ing systems ,inc lud ingx86andUn ix- l ikeenv ironments . Among otherfeatures ,suchasdatabase managementandfi lter ing , thereissupportforre l iab ledatatrans fer , messagesecrecy andintegr ity ,and mutua lauthent icat ion .Sys log-ngisa lso compat ib lew ithIPv4/IPv6networks ,andthec l ient ,re lay , andservermodesarepart icu lar lyconven ientforoursett ing . Notethatsys log-ngisnotintendedforlogana lys is :itcan per formru le-basedfi lter ingandtrans form messagesfrom oneformattoanother , butnotinterpretthe ir mean ing . Moreover ,thereiscurrent lyno mechan ismdefinedthatcan generateproo fsw ithregardtot imeandor ig in .

3 .2 Rsys log

Rsys log[32]isacentra l isedlogg ingin frastructurethat isava i lab leonsevera lL inuxd istr ibut ion ,inc lud ingUbuntu andCentOS .Thereissupportforfeaturessuchasdatabases , fi lter ing ,andsecur ityadd-ons , where inre l iab leandsecure trans itisen forcedus ing TCP/TLS ,andakey lesss igna- turein frastructureguardsaga instunauthor isedlog mod i- ficat ions . L ikesys log-ng ,rsys logdoesnotincorporatethe sys log-s ignprotoco l . There fore ,ne ither messageor ig innor thet imeo feventgenerat ioncanbeproventoath irdparty . Interest ing ly ,rsys logsupportsdatacompress iondur ing trans itforstreamsandind iv idua l messages . Asdescr ibed furtherinSect ions4–5,th iscou ldbeasecur ityissue .

3 .3 Journa ldandSystemd

Thejourna ldisalogg ingut i l itythatisparto fthesystemd daemon .Itisre latedtosys log ,support ingstructuredb inary encod ings[37]andforwardsecuresea l ing[ 27] . Theformer increasesstorageandautomatedsearcheffic iency ,wh i lethe latterw i l ll ike lydetectanadversarythattampersw ithpast logentr ies .Itshou ldbenotedthattheeffect ivenesso fsuch integr ityprotect ionre l iesonacheckpo intfrequency ,i .e . , howo ftenkey mater ia lissecure lyincremented ,anditas- sumesthatde let iono ftheent irelogcanbedetectedbyother means . Asacaveat ,thecheckpo intfrequency m ightnotbe suffic ient lylargebyde fau lt . Thus ,ensurethatisconfigured proper lyforthesysteminquest ion .

4 . DATACOMPRESSION

Forthe we l l-be ingo ftheent ireInternet ,itiso fgenera l interesttoreducebandw idthrequ irements . L ikew ise ,there are manyga insinreduc ingstoragerequ irements . Inth is sect ion wea imtoh igh l ightpotent ia lsecur ityissues w ith

themostcommoncompress iontechn iques ,wh ichw i l lbeour bas iswhend iscuss ingthesubjectspec ifica l lyforoursett ing .

4 .1 HuffmanCod ing

Atrad it iona lcharacterencod ingrepresentseachsymbo l w ithequa l ly manyb its . Huffmancod inga imstoreduce thenumbero fb itsforthe mostfrequentsymbo ls ,thereby y ie ld ingasucc inctrepresentat iono ftheor ig ina lstr ing[12] . Forexamp le , w ith UTF-8 ,thestr ing“M iss iss ipp i”requ ires 88← 11·8b its . AsshowninF igure3,th iscanbereduced to21b itsus ingHuffmancod ingasfo l lows .F irst ,countthe frequencyo feachletterandordertheminincreas ingorder . Second ,repeated lybu i ldab inarytree ,bottom-up , where thetwonodes whosecomb inedsymbo lfrequenc iesarethe sma l lest . Eachle ftandr ighttraversa lisinterpretedaszero andone ,respect ive ly . F ina l ly ,theresu lt ingpathsdownto theleavesdefineanopt im isedcharacterencod ing .

(a) i 4 f p 2 s 4 M 1

(b)

ispM11 spM7

pM3 M 1 p2 s4 i4

(c) i 0 e s 10 p 110 M 111

F igure3 : AHuffmanencod ingfor“M iss iss ipp i” ,resu lt ingin theb inarystr ing111010100101001101100.

4 .2 TheLempe l-Z ivFam i ly

Thesem ina lpaperbyZ ivandLempe l[38]introduceda compress ionmechan ism(now)namedLZ77

1

. Asopposedto Huffmancod ingthattargetsind iv idua lsymbo ls ,repeated sequencesarerep laced w ithbackwardre ferencestoreduce redundancy . Thebas icpr inc ip leisasfo l lows . Acharacter streamisprocessed ,andas l id ingw indowisadvancedsuch thatthereisasearchbuffertothele ftandalook-ahead buffertother ight . Foreach w indowpos it ion ,thelongest prefix matchisfirstdeterm inedinthesearchbuffer . Next , itisrep lacedw ithare ferenceontheform<d ,l ,c>,where disad istancetotheprev iousoccurrence ,litslength ,and cthenextcharacterinthelook-aheadbuffer . F ina l ly ,the w indowisforwardedbyd+1steps .

Anexamp lebasedonthestr ing“M iss iss ipp i”isshown in Tab le1. Thelongestprefix matchinthesearchbuffer ish igh l ightedbyagraybackground ,thenextcharacter inthelook-aheadbufferisbo ld ,andtheresu lt ingstr ing is<0,0,m><0,0,i ><0,0,s><1,1,i ><3,3,p><1,1,i >.In pract ise ,thes izeo fthesearchandlook-aheadbuffersare fixedinadvance ,andnode l im it ingcharactersareused .

Thereisanent irefam i lyo fcompress iona lgor ithmsthat arere latedtothe worko fZ ivandLempe l . Thed ifferent var iat ionsoffertrade-offs w ithregardtocompress iont ime andrat io ,andcanbecomb inedw ithotherapproaches . One suchcomb inat ionis DEFLATE[5] : app lyLZ77 ,fo l lowed by Huffmancod ing . Forfurtherdeta i ls ,p leasere fertothe comprehens ivebookondatacompress ionbySa lomon[33] .

1

LZisanacronymfortheauthors ,Lempe landZ iv ,and

(19)77re ferstotheyearo fpub l icat ion .

(5)

Tab le1 : Der iv inganLZ77encod ingfor“M iss iss ipp i”

i Search Look-ahead Output 1 Miss iss ipp i <0,0,M>

2 M iss iss ipp i <0,0,i>

3 M i ss iss ipp i <0,0,s>

3 M is sisspp i <1,1,i>

4 M iss i ss ipp i <3,3,p>

5 M iss iss ip pi <1,1,i>

6 M iss iss ipp i

4 .3 Attack ingCompress ion Mechan isms

W ithoutdoubt ,thepastdecadesshowhownontr iv ia lthe des ignandimp lementat iono fsecurecomputersystemare . Yettodate ,newvu lnerab i l it iesarefoundinSSL/TLS[25] , cert ificateauthor it iesarecomprom ised[16,29] ,andnat iona l stateagenc iesbreaksupposed lysecuredev ices[21] . Wh i le iso latedcryptograph icpr im it ives m ightbesecureonthe ir own ,secur itydoesnotcompose . Infact ,proceduresthat wereneverintendedforsecur itycancausetroub le . Onesuch examp leisdatacompress ionwhenapp l iedtoTLS[11] .

Compress ionRat ioIn fo-Leak MadeEasy(CRIME)isan exp lo itdeve lopedbyR izzoand Doung[7] . Anadversaryis ab letoh i jacktheusers ’pr ivateTLSsess ionsbyguess ingthe authent icat ioncook iesi fthefo l low ingcond it ionsare met :

– Theadversarycanobservethenetworktraffic ,e .g . ,v ia aw ire less med ium .

– Theadversarycanin jectcodeintothev ict im ’sbrowser , e .g . ,byprov id inga ma l ic iousl inkthatisc l icked . – Thev ict imauthent icatesoveran HTTPSconnect ion

thatusesanLZ- l ikecompress ion mechan ism . Theattackproceedsasfo l lows . F irst ,theadversaryin jects codeintothev ict im ’sbrowser . Th isa l lowsforachosen p la intextattack . Next ,spec ia l HTTPrequestsarecra fted suchthatthesecretcook iecanbebrute- forcedonesymbo l atat ime . F ina l ly ,aguessiscons ideredcorrect whenthe observedc iphertextisreducedduetoincreasedredundancy . Inotherwords ,thetr ickisthatarb itrar i lychosenstr ingsare compressedtogetherw iththesecretin format ion ,andLZ77 causescorrectguessestoproducesma l lerc iphertexts .

Someo ftheproposedcountermeasuresaga inst CRIME inc ludenevercompress ingsecretsandadversarycontro l led data . Thesa festopt ion ,however ,appearstobed isab l ing compress iona l ltogether

2

. Forinstance ,inthefootstepso f CRIMEfo l low BREACH[28]and TIME[ 3] . Theytarget thecompress iono fHTTPresponses ,andTIMEre laxesthe prerequ is itestolaunchasuccess fu lattackbye l im inat ingthe needtoeavesdrop . Thus ,weconc ludethatdatacompress ion isasens it ivetop icthat mustbecare fu l lycons idered .

5 . RECOMMENDATIONS

F irstweprov ideanoverv iewo fwhattheex ist ingsys log standardscanandcannotaccomp l ishinoursett ing ,then add it iona ldeta i lsregard ingcryptograph icpr im it ives ,secure datacompress ion ,andver ifiab lequer iesared iscussed .

2

Thecurrentdra ftforTLS1 .3removesdatacompress ion .

5 .1 Overv iew

Inasett ingwherea l ldev iceshavetobetrusted ,theex- ist ingsys logstandardscansupportthefo l low ingpropert ies : –Confidentialityandintegrityduringtransit. Use

TCP ,anapp l icat ionleve lrecovery mechan ismforfu l l re l iab i l ity ,ande itherIPsecorTLS .

–Serverand mutualauthentication. Useastrong authent icat ion mechan ismbasedonTLSorIPsec . –Originauthenticationandreplaydetection. Use

sys log-s ign . Th isw i l la lsodetect m iss ingeventsdueto asequenc ingscheme ,andthes ignatureb locksw i l lbe theproo fso fcorrectnessforthequery ingc l ients . Desp itecomb in ingvar ioussys logstandards ,thefo l low ing propert iescannotbeprov ided :

–Securestorage. Ne itherconfident ia l ity ,integr ity , norava i lab i l ityisensureddur ingstorage .

–Secure Data Compression.Nosuchstandardsare definedforsys log .

–Availability . Wh i le mutua lauthent icat ionhe lpsto preventden ia lo fserv ice ,fi lter ingandlogrotat ionis necessarytoassurethatanadversarycannotexhaust thenetworkanditsdev ices . Forlogrotat ionthereis aL inuxserv icethat m ightbeuse fu l[36] .

F ina l ly ,itshou ldbenotedthatas ign ificantamounto f overheadw i l lbeintroducedwhenonesw itchesfromlegacy sys logtoasecurelogg ingin frastructure . Theopensource projectsm ightbeapp l icab leforsomevendors ,anditisl ike ly thatthejourna ldlogg ingut i l ityisworthcons ider ing .

5 .2 Se lect ingCryptograph icPr im it ives

Itappearsthattherearenocurrentrecommendat ions whense lect ingcryptograph icpr im it ivesforsecurelogg ing : thepresentedopensourceprojectsprov idenohe lpinth is regard ,andthesys logstandardsareo ld . There fore , we suggestthatthegu ide l inesprov idedby Goog le ’ssecur ity researchersbefo l lowed ,andposs ib lythatthec iphersu ites supportedbyChromeandF ire foxcou ldbecons idered

3

.

Lang ley[17]d iscussedse lect iono fTLSc iphersu itesatthe Goog lesecur ityb log . Heconc ludedthatTLS1 .0shou ldbe avo idedduetosevera lknownflaws ,inc lud ingthosefoundin thestreamc ipherRC4 ,andthatTLS1 .1shou ldbeavo ided too ,i fposs ib le . Forinstance ,the CBCb lockc ipher mode isvu lnerab letotwoattacks : BEAST[ 6]andLucky13[ 1] . Theformertargetsthegenerat iono fin it ia l isat ionvectors andhasbeenpatched , whereasthelatterisat im ingat- tackthatcou ldbepreventedbyproperconfigurat iono fthe TLSserver . However ,itisimposs ib lefortheTLSc l ientsto knowni fthatisthecaseinadvance . Thus ,l ikeLang ley ,we donotrecommendsu itesbasedonRC4orCBC mode .

Instead ,thebetteropt ionistose lectsu itesofferedby TLS1 .2 ,inpart icu larthosebasedontheGCMb lockc ipher modeortheChaCha20-Po ly1305c ipher .Forexamp le ,ona W indows mach inethatrunsChromevers ion51 .0 .2704 .103 , 128-b itsecur ityw ithAESin GCM modeisthefirstcho ice ,

3

Todeterm inethec iphersu itessupportedbyapart icu lar arch itecture ,operat ingsystem ,andbrowser ,v is ithttps ://

cc .dcsec .un i-hannover .dew iththeset-upinquest ion .

(6)

thenChaCha20-Po ly1305 . E l l ipt iccurvesarea lsofavoured overRSAforkeyagreementandauthent icat ion ,andSHA-256 asthemessageauthent icat ionpr im it ive .Inotherwords ,the fo l low ingc iphersu itesw ith128-b itkeysarerecommended :

– ECDHE-ECDSA-AES128-GCM-SHA256 ; – ECDHE-RSA-AES128-GCM-SHA256 ;

– ECDHE-ECDSA-CHACHA20-POLY1305-SHA256 ; – ECDHE-RSA-CHACHA20-POLY1305-SHA256 . Furthermore ,avo ido ldsu itesthator ig inatefromTLS1 .0 , andpayc loseattent iontothere leaseo fTLS1 .3 .

S incethec iphersu itesa lreadyse lectahashfunct ionand ad ig ita ls ignaturescheme ,wesuggestthatthosepr im it ives areusedi fsys log-s ignisinp lace . Forcompat ib i l ity w ith RFC5848[13] ,newvers ionnumbers mustbedefined .

5 .3 SecureDataCompress ion

The morestructurethereisinthedatabe ingcompressed , theeas ieritistoseparatesecretsfromadversarycontro l led data .Forsys log ,espec ia l ly ,suchseparat ioncou ldbefeas ib le i fthestandard isedmessageformatisused .F irst ,somefie lds m ightnotbecons ideredconfident ia l ,inwh ichcasetheycan becompressed w ithoutlos inganysecur ity . Second ,i fan adversaryisunab letogeneratep la intextforcompress ion , a l lotherfie ldscou ldbecompressedsecure ly . Wh i lethe firstapproachisstra ightforwardandeas i ly mappedfroma secur itypo l icy ,thelatterisnontr iv ia lbecauseanadversary canl ike lyinfluencethegeneratedevents .

Cons ider ingtheinvo lvedcomp lex itywhenattempt ingto compressdatadur ingtrans it ,wedonotrecommendit .In add it ion ,eveni fone managestoseparatesecretsanduser contro l leddata ,itisquest ionab lewhethertheresu lt ingband- w idthga insares ign ificantenough . Dur ingstorage ,however , datacompress ionenta i lsnoknownissues . Werecommend itbecauseitfavoursava i lab i l ity .

5 .4 Ver ifiab leQuer ies

C l ientsthatqueryco l lectorsforeventsdemandproo fso f correctness .Forth ispurpose ,wesuggestaccompany ingthe retr ievedeventsw iththecorrespond ings ignatureb locks . A c l ientacceptssuchproo fsi ftheretr ievedeventsarehashed correct lyandi fthes ignaturesareauthent ic . Th issuffices becauseeveryth ingistrusted ,asbotht imeo fgenerat ion andor ig incanbevouchedforbytheor ig inator ’ss ignature . Itisquest ionab lewhethersys log-s ignisworthwh i lewhen a l ldev icesaretrustedand TCP/TLSisinp lace . C lear ly , each message w i l larr iveintacttotheco l lectors ,ands ince a l ldev icesaretrustedtheyshou ldnota ltertheor ig inators ’ ident ifiersandt imestamps . There foresequenc ingschemes ands ignaturesservel itt letonopurpose ,wh ichm ightbethe reasonwhynoneo fthepopu laropensourceprojectssupport it . Neverthe less ,NetBSDprov idesano ldimp lementat iono f sys log-s ignthatcou ldbeinterest ingtoexam ine[22] .

6 . CONCLUDINGREMARKS

Ourgoa l wastoexam ineex ist ingstandardsthatsecure sys log ,bothdur ingthestorageandtrans itphases . Wefound thatthereex istnosuchstandardsforstorage ,butava i l- ab i l ity ,integr ity ,andconfident ia l itycanbeguardedaga inst dur ingtrans it . Astandard isedprotoco lfors ign ingsys log

messageswasa lsod iscovered ,andcanbeusedtoprovethe dev icesthatgeneratedwh icheventsatrough lywhatt imes . Ita lsodetects m iss ingevents ,anddefinesacountermeasure aga instrep layattacks .

Thesys logre latedstandardsfa i ltoprov idegu ide l ineson howtose lectcryptograph icpr im it ives ,andtheyarenot asuse fu lun lessa l ldev icesaretrusted . L ikew ise ,theopen sourceprojectsfa i linth isregardtoo ,buttheyareapp l icab le foroursett ingi fsys log-s ignisimp lemented . Inadd it ion , weexam inedhow messagecompress ioneffectssecur ity ,and conc ludedthatit m ightbedangerousbecauseitintroduces comp lex ityw ithpresumab lysma l lga ins .

F ina l ly , weencouragethereadertocons iderasett ing wherethedev icescanbecomprom isedatsomepo intin t ime . Thenjourna ldisapreva lentfirststeptoprotectthe log ’sintegr ity ,ands im i larapproachescanbeusedtoensure confident ia l ity .

7 . ACKNOWLEDGEMENT

Wewou ldl iketothankSte fanL indskogforh isva luab le feedback . RasmusDah lbergandTob iasPu l lshaverece ived fund ingfromtheHITSresearchprofi lefundedbytheSwed ish Know ledgeFoundat ion .

8 . REFERENCES

[1 ] N .J .A lFardanand K . G .Paterson .Luckyth irteen : Break ingtheTLSandDTLSrecordprotoco ls .In IEEESympos iumonSecur ityandPr ivacy,pages 526–540 , May2013 .

[2 ] C .Baran iuk .Ash ley mad ison :’su ic ides ’overwebs ite hack .BBCNews,August2015 .

http ://www .bbc .com/news/techno logy-34044506.

[3 ] T .Be ’eryandA .Shu lman .Aper fectCRIME? On ly TIMEw i l lte l l .B lackHatEurope, March2013 . [4 ] K .D .Bowers ,C .Hart ,A .Jue ls ,and

N .T r iandopou los .P i l larBox : Combat ing

next-generat ion ma lwarew ithfastforward-secure logg ing .InResearchinA ttacks ,Intrus ionsand De fenses—17thInternat iona lSympos ium,pages 46–67 ,September2014 .

[5 ] P .Deutsch .DEFLATEcompresseddataformat spec ificat ionvers ion1 .3 .RFC1951 , May1996 . InternetRequestsforComments .

[6 ] T .DuongandJ .R izzo .BEAST :Surpr is ingcrypto attackaga instHTTPS .ekopartySecur ityCon ference, September2011 .

[7 ] T .DuongandJ .R izzo .TheCRIMEattack .ekoparty Secur ityCon ference,September2012 .

[8 ] N .FergusonandB .Schne ier .Acryptograph ic eva luat iono fIPsec ,December2003 .https ://www . schne ier .com/academ ic/paperfi les/paper-ipsec .pd f.

[9 ] R . Gerhards .Thesys logprotoco l .RFC5424 , March 2009 .InternetRequestsforComments .

[10 ] R . GerhardsandC .Lonv ick .T ransm iss iono fsys log messagesoverTCP .RFC6587 ,Apr i l2012 .Internet RequestsforComments .

[11 ] R .Ho lz ,Y .Sheffer ,andP .Sa int-Andre .Summar iz ing knownattacksontransportlayersecur ity(TLS)and datagramTLS(DTLS) .RFC7457 ,February2015 . InternetRequestsforComments .

[12 ] D .A .Huffman .A methodfortheconstruct iono f

(7)

m in imum-redundancycodes . Proceed ingso ftheIRE, 40(9) :1098–1101 ,September1952 .

[13 ]J . Ke lsey ,J .Ca l las ,andA .C lemm .S ignedsys log messages .RFC5848 , May2010 .InternetRequestsfor Comments .

[14 ] K . Kent . Gu idetocomputersecur itylog management . Techn ica lReportSP800-92 ,September2006 .

Nat iona lInst ituteo fStandardsandTechno logy . [15 ]S . Kentand K .Seo .Secur ityarch itectureforthe

Internetprotoco l .RFC4301 ,December2005 .Internet RequestsforComments .

[16 ] A .Lange ly .Enhanc ingd ig ita lcert ificatesecur ity . Goog leResearch,January2013 .

https ://secur ity .goog leb log .com/2013/01/

enhanc ing-d ig ita l-cert ificate-secur ity .htm l.

[17 ] A .Lange ly .Arostero ft lsc iphersu itesweaknesses . Goog leResearch,November2013 .

https ://secur ity .goog leb log .com/2013/11/

a-roster-o f-t ls-c ipher-su ites-weaknesses .htm l.

[18 ] C .Lonv ick .TheBSDsys logprotoco l .RFC3164 , August2001 .InternetRequestsforComments . [19 ] G .A . MarsonandB .Poetter ing .Pract ica lsecure

logg ing :Seekab lesequent ia lkeygenerators .In ESORICS,pages111–128 ,September2013 . [20 ] F . M iao ,Y . Ma ,andJ .Sa lowey .T ransportlayer

secur ity(TLS)transport mapp ingforsys log .RFC 5425 , March2009 .InternetRequestsforComments . [21 ] E .Nakash ima .FBIpa idpro fess iona lhackersone-t ime

feetocracksanbernard inoiPhone ,Apr i l2016 . https ://www. wash ingtonpost. com/wor ld/nat iona l- secur ity/ fb i-pa id-pro fess iona l-hackers-one-t ime-fee-to- crack-san-bernard ino-iphone/2016/04/12/5397814a- 00de-11e6-9d36-33d198ea26c5story. htm l.

[22 ] NetBSD .sys logdconfigurat ionfi le—sys log .con f(5) . manpages .

[23 ] D .Newand M .T .Rose .Re l iab lede l iveryforsys log . RFC3195 ,November2001 .InternetRequestsfor Comments .

[24 ] A . Okm iansk i .T ransm iss iono fsys log messagesover UDP .RFC5426 , March2009 .InternetRequestsfor Comments .

[25 ] OpenSSL .Vu lnerab i l it ies .

https ://www. openss l. org/news/vu lnerab i l it ies. htm l, Retr ievedJu ly2016 .

[26 ] K . G .Paterson .Acryptograph ictouro ftheIPsec standards .In format ionSecur ityTechn ica lReport, 11(2) :72–81 ,2006 .

[27 ] L .Poetter ing .Forwardsecuresea l ingisfina l ly compo ingtosystemd ’sjourna l .Goog le+B log,August 2012 .https ://p lus. goog le. com/

+LennartPoetter ingTheOneAndOn ly/posts/

g1E6AxVKtyc.

[28 ] A .Prado ,N .Harr is ,andY . G luck .SSL ,gonein30 seconds .B lackHatUSA,Ju ly2012 .

[29 ] R .Pr ins .D ig inotarcert ificateauthor ity

breach—“operat ionb lacktu l ip” .Fox-IT,September 2011 .

[30 ] M .Rose .Theb locksextens ib leexchangeprotoco l core .RFC3080 , March2001 .InternetRequestsfor Comments .

[31 ] M .Rose . Mapp ingtheBEEPcoreontoTCP .RFC

3081 , March2001 .InternetRequestsforComments . [32 ] Rsys log .Therocket- fastsystemforlogprocess ing .

http ://www. rsys log. com/,Retr ievedJu ly2016 . [33 ] D .Sa lomon .DataCompress ion : TheComp lete

Re ference.Spr inger-Ver lagLondon ,4ed it ion ,2007 . [34 ]J .Sa lowey ,T .Petch ,R . Gerhards ,andF .H .

Datagramtransportlayersecur ity(DTLS)transport mapp ingforsys log .RFC6012 , October2010 .Internet RequestsforComments .

[35 ]Sys log-ng . Opensourcelog managementso lut ionw ith overa m i l l ionuserswor ldw ide .https ://sys log-ng. org/, Retr ievedJu ly2016 .

[36 ] E .T roanandP .Brown .logrotate—rotates , compresses ,and ma i lssystemlogs ,November2002 . [37 ] Ubuntu-16 .04 .Spec ia ljourna l

fie lds—systemd . journa l-fie lds(7) . manpages . [38 ]J .Z ivandA .Lempe l .Aun iversa la lgor ithmfor

sequent ia ldatacompress ion .IEEETransact ionson

In format ionTheory,23(3) :337–343 ,1977 .

(8)

Ras mus Da hl ber g a nd To bia s P ulls | S ta nd ar dis ed Sys lo g P ro ces si ng

S tandard ised Sys log Process ing

Today ’s compu ter logs are l ike smok ing guns and treasure maps in case o f susp ic ious sys tem ac t iv i t ies : they documen t in trus ions , and log cruc ia l in forma t ion such as fa i led sys tem upda tes and crashed serv ices . An adversary thus has a c lear mo t ive to observe , a l ter , and de le te log en tr ies , cons ider ing tha t she cou ld ( i ) s tar t by us ing the log ’s con ten t to iden t i fy new secur i ty vu lnerab i l i t ies , and ( i i ) exp lo i t them w i thou t ever be ing de tec ted . W i th th is in m ind we cons ider sys log s tandards and open source pro jec ts tha t sa feguard even ts dur ing the s torage and trans i t phases , and exam ine how da ta compress ion e f fec ts secur i ty . W e conc lude tha t there are sys log s tandards in p lace tha t sa t is fy secur i ty on a hop -by -hop bas is , tha t there are no such s tandards for secure s torage , and tha t message compress ion is no t recommended dur ing trans i t .

Facu l ty o f Hea l th , Sc ience and Techno logy Facu l ty o f Hea l th , Sc ience and Techno logy

Rasmus Dah lberg and Tob ias Pu l ls

S tandard ised Sys log Process ing

Rev is i t ing Secure Re l iab le Da ta T rans fer and

Message Compress ion

References

Related documents

[r]

června 201l. podpis

[r]

Tidskrift för Kriminalvård har bara haft tre olika utseenden genom åren – det ur- sprungliga från 1946, med text också på första sidan, och dagens grönvita utseende, med bild

För att konfigurera armaturen med smarttelefon eller surfplatta måste STEINEL Smart Remote App laddas ner från AppStore.. Det krävs en Bluetooth- förberedd smartphone

Den här enheten har utformats för användning i stationära uppvärmnings-, ventilations- och luftbehandlingssysten och får inte användas utanför det specificerade

[r]

• Påverkad cirkulation, skallskada, droger, vissa sjukdomar.