1. Computers
  2. Display Drivers
  3. Graphics Cards
  4. Memory
  5. Motherboards
  6. Processors
  7. Software
  8. Storage
  9. Operating Systems


Facebook RSS Twitter Twitter Google Plus


Phoronix Test Suite

OpenBenchmarking.org

Systemd To Secure Logs With "Forward Secure Sealing"

systemd

Published on 21 August 2012 08:36 AM EDT
Written by Michael Larabel in systemd
30 Comments

Systemd has picked up a new feature -- Forward Secure Sealing (FSS) -- in an attempt to better secure system logs on the local file-system in the event a hacker penetrates the system the logs cannot be modified.

Lennart Poettering has written about systemd's Forward Secure Sealing functionality on his Google+ page. Hackers can still delete the log history to cover-up their intrusion, but they cannot alter them as systemd's FSS uses a cryptographic seal of the system logs at regular intervals. "It works by generating a key pair of "sealing key" and "verification key". The former stays on the machine whose logs are to be protected and is automatically changed in regular intervals (and the previous one securely deleted), the latter should be written down on a piece of paper or stored on your phone or some other secure location (that means: not on the machine whose logs are to be protected). With the verification key at hand you can verify the journals on the machine and be sure that -- if the verification is successful -- log history until the point where the machine was cracked has not been altered a posteriori."

The Forward Secure Sealing is interesting, but many will still need to rely upon an external secured log server since systemd cannot guard against the system log files on the local machine from simply being removed. The FSS feature is based upon the Forward Secure Pseudo Random Generator, which is a cryptography project being done by Lennart's brother at university.

The FSS code is already living in systemd's Git code-base for its next release.

About The Author
Michael Larabel is the principal author of Phoronix.com and founded the web-site in 2004 with a focus on enriching the Linux hardware experience and being the largest web-site devoted to Linux hardware reviews, particularly for products relevant to Linux gamers and enthusiasts but also commonly reviewing servers/workstations and embedded Linux devices. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics hardware drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated testing software. He can be followed via and or contacted via .
Latest Linux Hardware Reviews
  1. AMD R600g/RadeonSI Performance On Linux 3.16 With Mesa 10.3-devel
  2. Intel Pentium G3258 On Linux
  3. SilverStone Precision PS10
  4. ASRock Z97 Extreme6
Latest Linux Articles
  1. Nouveau vs. Radeon vs. Intel Tests On Linux 3.16, Mesa 10.3-devel
  2. KVM Benchmarks On Ubuntu 14.10
  3. X.Org Server 1.16 Officially Released With Terrific Features
  4. Ubuntu With Linux 3.16 Smashes OS X 10.9.4 On The MacBook Air
Latest Linux News
  1. A New Video Has Us Real Excited About The New UT For Linux
  2. CoreOS Experiences Its First Stable Release
  3. GNOME 3.13.4 Continues Working On Wayland & More
  4. Wine 1.7.23 Has Initial Support For 64-bit Android Builds
  5. FreeBSD Developing A New Automounter, Other Features
  6. Guix 0.7 Can Now Install The GNU Operating System
  7. X.Org Foundation Still Works Towards Becoming An SPI Project
  8. Open-Source AMD Hawaii Support Should Now Be Working!
  9. KDE Developers Continue Working Toward Wayland Support
  10. Ubuntu 14.04.1 LTS Released
Latest Forum Discussions
  1. Updated and Optimized Ubuntu Free Graphics Drivers
  2. AMD "Hawaii" Open-Source GPU Acceleration Still Not Working Right
  3. Radeon related kernel bug??
  4. how the US intellegentia operates:
  5. AMD Publishes Open-Source Linux HSA Kernel Driver
  6. Next-Gen OpenGL To Be Announced Next Month
  7. Open-Source Radeon Performance Boosted By Linux 3.16
  8. Remote gui not accessible in Phoronix Test Suite 5.2