Re: layered deception (timestamping logs)

2001-05-03 Thread Tim May

On Wednesday, May 2, 2001, at 10:12 PM, Anonymous wrote:

 At 11:00 PM 05/01/2001 -0500, Harmon Seaver wrote:
   Has anyone given any though to how log files could be accepted as
 evidence in the first place? They're just text files, and exceedingly
 trivial to alter, forge, erase, whatever. They get edited all the time
 by hackers -- how can anyone, even the sysadmin, swear that they are 
 true?


 Seems to me that secure digital timestamps on the logs
 would be really interesting to anyone wanting to preserve
 their usefulness as evidence.

 This would obvisouly cut both ways, could be used for either good or
 ill.  Any collective wisdom on the ramifications of such a technology?
 I'd put it into my messaging infrastructure if I cared about such 
 things.

The asymmetry arises this way: almost _never_ does an ISP/operator 
benefit from having logs, but prosecutors can use logs to prove various 
crimes and thoughtcrimes.

Like digital signatures, they are best used sparingly. (To see this, 
imagine the benefits of signing everything. What is gained by Joe 
Sixpack in using digital signatures ubiquitously? Very little. What is 
potentially lost? Ask Jeff Gordon.)

A digital signature, a timestamp, is not something to be given away 
lightly.


--Tim May




Re: layered deception (timestamping logs)

2001-05-03 Thread Harmon Seaver

Tim May wrote:

 The asymmetry arises this way: almost _never_ does an ISP/operator

 benefit from having logs, but prosecutors can use logs to prove various
 crimes and thoughtcrimes.


  Well, that's not quite true -- logs are pretty useful, in fact even
necessary, for a number of things. Troubleshooting system problems, for
instance. Every time you make a change to the named config on a DNS server,
then restart named, you then immediately look in the log to see if everything
worked okay. Or say someone is having problems getting to a website, and
blaming your firewall or proxy server, you can perhaps find in the DNS server
log that the real problem is at the ISP for the webserver they are trying to
hit. Mail is the same way. And some customers want the statistics from a
webserver's logs -- for a whole year or more, same with the proxy server.
  Another thing logs are useful for is if someone is trying to hack you,
and his IP# is showing up in your logs, so you can cut and paste that portion
of the log into email to the hacker's ISP and ask them to do something about
the guy -- although with my latest firewall and packet filtering that might
be a thing of the past.
  Other than the afore mentioned web and/or proxy logs for statistical
purposes, however, I can't see any rationale for keeping logs very long,
certainly not over 30 days, maybe not over a week, possibly just one day.  I
was at a meeting once with people from the state IT group (who were the ISP
for all the higher eds) who were insisting to us that everybody had to log
*everything*, including router traffic, and keep it for years. When I asked
what law required that, they said there wasn't any, but you'd be in trouble
with the FBI or Secret Service if you didn't and they needed those logs.


--
Harmon Seaver, MLIS
CyberShamanix
Work 920-203-9633   [EMAIL PROTECTED]
Home 920-233-5820 [EMAIL PROTECTED]




re: layered deception (timestamping logs)

2001-05-03 Thread David Honig

At 10:12 PM 5/2/01 -0700, Anonymous wrote:

Seems to me that secure digital timestamps on the logs
would be really interesting to anyone wanting to preserve
their usefulness as evidence. 


If you protected some logs (say, local user logins) really well,
and left other logs (say HTTP) unprotected then it would be *mighty easy*
to bring
up degrees-of-trust in a trial.  

I can imagine good operational reasons why lots of users might need write
access to an HTTP log.  
(E.g., different user-level CGIs writing to the same HTTP log) and why you
might
want to track user logins more reliably than http hits.




RE: layered deception

2001-05-03 Thread David Honig

At 11:36 AM 5/2/01 -0700, Greg Broiles wrote:
In any scenario, it seems like a few points are likely to be crucial -

1.  Was the logging foreseeable at the time the statement/promise 
regarding no logging was made?
If there was no intentional misrepresention, pretty much everything except 
breach of contract fails.

2.  Was the transaction between user and service provider a sale - 
e.g., was there consideration? a contract? If the activity between the 
parties did not involve the exchange of value, then it's hard to argue that 
there's been a fraud, a breached contract, or an unfair business practice.

So, if I were designing a system which hoped to rely (only in part, 
hopefully) on legal impediments to the creation of logs, I would make that 
system one which (a) involved an exchange of value and (b) frequently 
restates the operator's promise not to keep logs, ideally as part of the 
transaction, such that the transaction can be aborted if the promise is 
missing or otherwise unsatisfactory .. and can be said to rely (perhaps 
detrimentally) on the statement about the lack of logging.

And conversely: there is no legal impediment for a self-claimed free
anonymizing
website to keep logs.  


Even so, that's pretty weak protection.


Yep, this is all academic, rely on math  physics not law.




RE: layered deception

2001-05-03 Thread Bill Stewart

At 07:45 AM 05/02/2001 -0700, David Honig wrote:
Yeah but is there a (contract etc.) *law* being broken or is this a
legally-null claim?  After all, if click-through EULAs are legally binding...

Maybe a real lawyer could tell you.  The answer may depend on whether
there's valuable consideration exchanged, and viewing banner ads
probably doesn't count (especially since the banner ads typically
come from banner ad companies who aren't giving you any
promises of keeping your information private.)

While occasionally there may be a web site deliberately lying
about whether they're keeping logs No, we won't sell your
information to spammers!, a more likely scenario is
- web site content provider isn't keeping logs of content access
 but they're using a shared hosting service.
- web hosting provider is keeping logs for technical support,
 debugging, problem resolution, etc.
- banner ad vendor keeps everything they can get
- web site's ISP keeps logs of connections (e.g. IP addresses and
 TCP port numbers, but not content of communications.)


Actually, many corps have explicitly decided to shred their email after a 
while.
You can thank Ollie North  the MS judges for cluing in the public.  So the
corp counsels are actively blowing off the suggestion you're claiming.

A long time ago, in a phone company far, far away, we had incredibly
detailed sets of requirements for record-keeping because of the
regulatory environment.  My wife had a summer job in college translating
one database from a hand-rolled mostly-undocumented format into
a (then-)current commercial database system so they could get the data
just in case they got sued about it - something along the lines of
promptness or pricing of wholesale telecom services in PacBellLand.
Of course, the commercially available database also rotted into
technical obsolescence after a few years, but by then nobody'd sued them
about it in enough years that there was no need to preserve it longer.




Re: layered deception

2001-05-02 Thread Greg Broiles

At 12:34 AM 5/2/2001 -0500, Harmon Seaver wrote:
Greg Broiles wrote:

  Hmm. Can you identify any problems with log files as evidence which aren't
  also present in, say, eyewitness testimony, audiotape recordings, video
  recordings, fingerprints, photographs, tool  die marks, paper records, and
  all of the other evidence which courts admit on a daily basis?

Not so with log files. I could totally delete and manufacture anew a
log file anyway I wished, and nobody could prove it.

You are making unreasonable assumptions about (a) evidentiary law and 
practice and (b) current capabilities regarding computer/electronic 
forensics, and those unreasonable assumptions are apparently limiting your 
ability to reason further.

You might see if you can find a copy of _Evidentiary Foundations_ by Edward 
Imwinkelried at a local law school's library, for part (a); and newspaper 
articles concerning the investigations and prosecutions of Aldrich Ames, 
Robert Hanssen, or CJ Parker for part (b). Or take a look at the materials 
collected regarding the investigation and prosecution (and conviction, and 
losing appeal) of Randal Schwartz (yeah, the Perl guy), the canonical I'm 
a smart computer guy, you stupid cops don't know nothin' case, at 
http://www.lightlink.com/spacenka/fors/.

This is not an area of the law where reasonable people differ. This is easy 
black-letter stuff that's only mysterious or controversial to people who 
aren't familiar with the field.

If you are trying to make the argument that a few hundred years' worth of 
evidence law ought to be discarded, your argument will probably be more 
favorably received if you can show that you at least understand that which 
you're trying to replace.

The mere possibility of tampering or fabrication is nowhere near sufficient 
to render evidence inadmissible - in fact, it's not even a start. Most 
trials feature conflicting evidence, all of which was admitted under oath, 
which cannot all simultaneously be accurate. Life goes on, and the jury or 
judge (as appropriate) pick out the bits of truth they choose to rely upon, 
discarding the rest.

You're arguing about admissibility when you ought to be arguing about 
credibility - but even if you make that shift, what you're not seeing is 
that the you can't trust evidence which might conceivably be false 
argument is a big loser, practically speaking. Sure, you can make it - just 
like CJ did, as did Jim Bell, twice. That argument is 0-for-3, in recent 
cypherpunk experience. Maybe Keith Henson tried it too, I don't know - but 
it's a dead end, especially without a plausible explanation for the 
fabrication/modification. (Not only is it unconvincing, it shifts the 
defense away from a was a crime actually committed? argument onto a a 
crime was committed, but the defendant isn't the guy who did it argument, 
which is frequently harder to make .. especially if the defendant looks and 
acts like the sort of person who would do the sort of thing they're accused 
of. The rest of the defense's case has got to fit that theory, too - you 
can't mix no crime occurred and it wasn't me and it was an accident 
in front of a jury ..)

I don't care - believe what you want. But the mutability of electronic 
evidence argument is not going to keep anyone's butt out of jail, no 
matter how many sysadmins you put on the witness stand. If you can show 
actual tampering with evidence in a specific case - sure, that's 
interesting. If not, look for a better issue to fight over.


--
Greg Broiles
[EMAIL PROTECTED]
Organized crime is the price we pay for organization. -- Raymond Chandler




RE: layered deception

2001-05-02 Thread Sandy Sandfort

Eric Murray wrote:

 ...I most definitely agree with Tim
 and Bill that the best way to deal
 with this is [keeping logs] thru
 technology. 

Careful, you're beginning to sound like a Cypherpunk.  :-D


 S a n d y




RE: layered deception

2001-05-01 Thread Aimee Farr

Honig:

 Is it in fact a crime of fraud to advertise that you don't keep logs
 when in fact you do?

Seems deceptive...



I look for the continued development of tortious evidentiary spoliation in a
digital context, which includes negative legal presumptions, sanctions up to
default judgment, takes into account prior acts/decisions, and has proven
most painful for some companies. So, if you get caught datahavening - under
the right facts - there could be more at issue than mere 'contempt.' For
example, while there is no 'requirement' or 'reg' to keep email, American
courts have '$trongly $ugge$ted' doing so pursuant to a good faith
electronic document retention policy. See Lewy, Prudential.

~Aimee




Re: layered deception

2001-05-01 Thread Tim May

On Tuesday, May 1, 2001, at 06:05 PM, Aimee Farr wrote:

 Honig:

 Is it in fact a crime of fraud to advertise that you don't keep logs
 when in fact you do?

 Seems deceptive...


A profound new insight.

We still await some real insights from a real graduate student (!), 
beyond her saying that we don't know as much as she says she knows.

BTW, I have removed the additional addresses (David Honig 
[EMAIL PROTECTED], Declan@Well. Com [EMAIL PROTECTED], Steve 
Schear [EMAIL PROTECTED]). When a list is replied to, there is no need 
to carry along the baggage of everyone who has added to a thread.


--Tim May




RE: layered deception

2001-05-01 Thread David Honig

At 12:13 AM 4/30/01 -0400, Phillip H. Zakas wrote:
i agree...unless you're specifically directed to do so, maintaining log
files is completely optional.  

Is it in fact a crime of fraud to advertise that you don't keep logs
when in fact you do?




RE: layered deception

2001-05-01 Thread Ray Dillinger

On Tue, 1 May 2001, David Honig wrote:

Is it in fact a crime of fraud to advertise that you don't keep logs
when in fact you do?

If someone winds up losing money (or suffering other damages) 
because of it, it is at least a tort.  If you were planning 
some kind of money-making scam that hinged on the deception, 
I'm pretty sure it would be fraud as well.  

I wonder whether evidence from logfiles could be excluded in 
a court case on the grounds that the logfiles were collected 
under false pretenses?  *That* would be a laugh riot... 

(I am not a lawyer, nor studying to become one - 
 these are just my opinions.)

Bear




Re: layered deception

2001-05-01 Thread Harmon Seaver

  Has anyone given any though to how log files could be accepted as
evidence in the first place? They're just text files, and exceedingly
trivial to alter, forge, erase, whatever. They get edited all the time
by hackers -- how can anyone, even the sysadmin, swear that they are
true? We just saw a case of FBI hackers breaking into a computer in
Russia -- why couldn't they break into a server as an ISP and alter the
logs? It would be quite easy for them to do that, even easier if they
had a Carnivore box in house.

--
Harmon Seaver, MLIS
CyberShamanix
Work 920-203-9633   [EMAIL PROTECTED]
Home 920-233-5820 [EMAIL PROTECTED]




Re: layered deception

2001-05-01 Thread Jon Beets

One thing to also remember is that standard log files are nothing more than
text files and can be faked fairly easily... Which would make it wide open
for a defending attorney to argue against..

Jon

- Original Message -
From: Ray Dillinger [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Tuesday, May 01, 2001 10:03 PM
Subject: RE: layered deception


 On Tue, 1 May 2001, David Honig wrote:

 Is it in fact a crime of fraud to advertise that you don't keep logs
 when in fact you do?

 If someone winds up losing money (or suffering other damages)
 because of it, it is at least a tort.  If you were planning
 some kind of money-making scam that hinged on the deception,
 I'm pretty sure it would be fraud as well.

 I wonder whether evidence from logfiles could be excluded in
 a court case on the grounds that the logfiles were collected
 under false pretenses?  *That* would be a laugh riot...

 (I am not a lawyer, nor studying to become one -
 these are just my opinions.)

 Bear




Re: layered deception

2001-04-30 Thread Steve Schear

At 12:04 AM 4/30/2001 -0500, Kevin L Prigge wrote:
On Mon, Apr 30, 2001 at 12:13:01AM -0400, Phillip H. Zakas wrote:
  i agree...unless you're specifically directed to do so, maintaining log
  files is completely optional.  there are no regs requiring isps or websites
  or mail providers to do so, other than the standard 'you need to comply 
 with
  a court order or search warrant, etc.'

 From recent experience, LE provides us with an order to preserve
certain logged information.  The order is in advance of obtaining
a search warrant, and specifies what information will be requested
in the warrant.  In an incident earlier this year, we received the
order six weeks before the warrant was issued. The existance of
the order was sealed.

What if the sysadmin is intentionally located in an offshore location so 
that they cannot be kept from notifying all users of the logging order?

steve




Re: layered deception

2001-04-30 Thread Declan McCullagh

On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote:
 What if the sysadmin is intentionally located in an offshore location so 
 that they cannot be kept from notifying all users of the logging order?

Then we pass a cybercrime treaty to require them to follow U.S. laws.

Law enforcement has a long time horizon.

-Declan




Re: layered deception

2001-04-30 Thread Steve Schear

At 10:56 AM 4/30/2001 -0400, Declan McCullagh wrote:

On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote:
  What if the sysadmin is intentionally located in an offshore location so
  that they cannot be kept from notifying all users of the logging order?

Then we pass a cybercrime treaty to require them to follow U.S. laws.

Ahhh, but who is the them?  My understanding is that under state and 
Federal law only executives and those with signature authority can be held 
criminally responsible for their actions.  U.S. corporations can be created 
and administered solely by non-residents (only an in-state legal service 
point is generally required.).  Nevada corporations can be held in bearer 
form shielding beneficial owners.

steve




Re: layered deception

2001-04-30 Thread Declan McCullagh

Steve,
Even assuming that what you say is true, and I suspect it is,
you'd be relying on protections enshrined in the law. The purpose
of this treaty, of course, is to change the law. :)

-Declan


On Mon, Apr 30, 2001 at 10:07:33AM -0700, Steve Schear wrote:
 At 10:56 AM 4/30/2001 -0400, Declan McCullagh wrote:
 
 On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote:
   What if the sysadmin is intentionally located in an offshore location so
   that they cannot be kept from notifying all users of the logging order?
 
 Then we pass a cybercrime treaty to require them to follow U.S. laws.
 
 Ahhh, but who is the them?  My understanding is that under state and 
 Federal law only executives and those with signature authority can be held 
 criminally responsible for their actions.  U.S. corporations can be created 
 and administered solely by non-residents (only an in-state legal service 
 point is generally required.).  Nevada corporations can be held in bearer 
 form shielding beneficial owners.
 
 steve




RE: layered deception

2001-04-29 Thread Sandy Sandfort

Declan wrote:

 I rather like the idea of encrypting
 the logs on the fly and shipping them
 offshore. Your offshore partner will
 be instructed to turn over the logs
 only if you are not asking for them
 under duress. (A reasonable protocol
 can probably be worked out. Would a
 court order instruct you to lie? If so,
 would it be valid?)

The only protocol that works 100% is to require that the client of the
datahaven show up in person in a jurisdiction with no extradition treaty
with the client's home country.  Even then, a judge might be spiteful with
respect to holding the client in contempt for setting up such an
arrangement.


 S a n d y




Re: layered deception

2001-04-29 Thread Tim May

On Sunday, April 29, 2001, at 07:41 PM, Declan McCullagh wrote:

 I think Matt is a bit too quick to conclude a court will charge the 
 operator with contempt and that the contempt charge will stick on 
 appeal. Obviously judges have a lot of discretion, but it doesn't seem 
 to me like the question is such a clear one if a system is set up in 
 the proper cypherpunkish manner.

As there are no ex post facto laws, setting up an offshore/non-duress 
log haven in 2001 cannot result in a charge in 2003 that this was 
illegal or contempt of court.

Not even today's fool judges will claim that is contempt.

(It is only contempt if a judge orders an action which a witness is 
_able_ to comply with but which he does not...and of course not always 
then.)

Judges cannot require time machines be used to undo past actions.


--Tim May




RE: layered deception

2001-04-29 Thread Phillip H. Zakas

i agree...unless you're specifically directed to do so, maintaining log
files is completely optional.  there are no regs requiring isps or websites
or mail providers to do so, other than the standard 'you need to comply with
a court order or search warrant, etc.'

as for the 'encrypt it' or 'store it overseas' method, i'd be concerned that
a court would force the isp to produce the key or produce the decrypted or
stored log files.  would prefer to see no log files or daily deleted log
files (which is good enough for most ids needs anyway.)

if one doesn't collect log files at all, i wonder if LE could force an isp
to turn on logging for all users (then munge the results) or if the isp
would be allowed to selectively log only the information sought in an
investigation. plus, what happens to the entire log files turned over in an
investigation?  do the unrelevant entries get destroyed, or does munging a
file destroy the cyber forensics value?

phillip

 Tim May responds:
  On Sunday, April 29, 2001, at 07:41 PM, Declan McCullagh wrote:

  I think Matt is a bit too quick to conclude a court will charge the
  operator with contempt and that the contempt charge will stick on
  appeal. Obviously judges have a lot of discretion, but it doesn't seem
  to me like the question is such a clear one if a system is set up in
  the proper cypherpunkish manner.

 As there are no ex post facto laws, setting up an offshore/non-duress
 log haven in 2001 cannot result in a charge in 2003 that this was
 illegal or contempt of court.

 Not even today's fool judges will claim that is contempt.

 (It is only contempt if a judge orders an action which a witness is
 _able_ to comply with but which he does not...and of course not always
 then.)

 Judges cannot require time machines be used to undo past actions.


 --Tim May




Re: layered deception

2001-04-29 Thread Kevin L Prigge

On Mon, Apr 30, 2001 at 12:13:01AM -0400, Phillip H. Zakas wrote:
 i agree...unless you're specifically directed to do so, maintaining log
 files is completely optional.  there are no regs requiring isps or websites
 or mail providers to do so, other than the standard 'you need to comply with
 a court order or search warrant, etc.'

From recent experience, LE provides us with an order to preserve 
certain logged information.  The order is in advance of obtaining
a search warrant, and specifies what information will be requested
in the warrant.  In an incident earlier this year, we received the
order six weeks before the warrant was issued. The existance of
the order was sealed.

We keep email transaction logs for seven days based on disk
considerations. Each of our popmail machines (45000 users) generates
350MB of compressed logs per week.

Until a warrant is received we don't turn over anything.

 as for the 'encrypt it' or 'store it overseas' method, i'd be concerned that
 a court would force the isp to produce the key or produce the decrypted or
 stored log files.  would prefer to see no log files or daily deleted log
 files (which is good enough for most ids needs anyway.)

Actually, seven days works out well for us.  Sometimes it takes 
several days for a user to report a problem.

 if one doesn't collect log files at all, i wonder if LE could force an isp
 to turn on logging for all users (then munge the results) or if the isp
 would be allowed to selectively log only the information sought in an
 investigation. plus, what happens to the entire log files turned over in an
 investigation?  do the unrelevant entries get destroyed, or does munging a
 file destroy the cyber forensics value?

When we turn over information persuant to a warrant, we only turn over
that specific information, not entire logfiles.  We do keep the logs
the information was extracted from, in case there is some question
of the validity of the information.

-- 
Kevin L. Prigge  
Internet Services  
U of MN, Twin Cities 




RE: layered deception

2001-04-29 Thread Sandy Sandfort

Kevin wrote:

 From recent experience, LE provides us
 with an order to preserve certain logged
 information.  The order is in advance of
 obtaining a search warrant...

What form do these orders take?  Who, specifically, makes the order?  What
authority is cited to back up the power to make such orders?  What does
your lawyer say about the validity of these orders?


 S a n d y




Re: layered deception

2001-04-29 Thread Kevin L Prigge

On Sun, Apr 29, 2001 at 10:11:40PM -0700, Sandy Sandfort wrote:
 Kevin wrote:
 
  From recent experience, LE provides us
  with an order to preserve certain logged
  information.  The order is in advance of
  obtaining a search warrant...
 
 What form do these orders take?  Who, specifically, makes the order?  What
 authority is cited to back up the power to make such orders?  What does
 your lawyer say about the validity of these orders?

It's a written notice that a search warrant is being prepared.
The ECPA allows for orders to preserve electronic evidence
(section 2704 deals with this).

I'm one step removed from the paperwork, but our
lawyers make the call on validity of all the 
paperwork and what we're required to turn over.

In this specific case, they wanted mail transaction logs and
mailbox contents including backups.  These were turned over
when we recieved the warrant.  I think the delay was due to
jurisdiction issues (Federal/State) and they were trying to
decide if they should get a wiretap order for the users PC.
 
Usually the order precedes the warrant by a few days, this
took 6 weeks.

-- 
Kevin L. Prigge  
Internet Services  
U of MN, Twin Cities 




Re: layered deception

2001-04-29 Thread Tim May

On Sunday, April 29, 2001, at 10:59 PM, Kevin L Prigge wrote:

 On Sun, Apr 29, 2001 at 10:11:40PM -0700, Sandy Sandfort wrote:
 Kevin wrote:

 From recent experience, LE provides us
 with an order to preserve certain logged
 information.  The order is in advance of
 obtaining a search warrant...

 What form do these orders take?  Who, specifically, makes the 
 order?  What
 authority is cited to back up the power to make such orders?  What 
 does
 your lawyer say about the validity of these orders?

 It's a written notice that a search warrant is being prepared.
 The ECPA allows for orders to preserve electronic evidence
 (section 2704 deals with this).

I think the issue is one of basic Bill of Rights issues. The 
Constitution refers to search warrants--it does NOT say that acts of 
Congress may cause actions BEFORE a search warrant is duly authorized by 
a judge.

I have no doubt that the ECPA (and probably the Digital Telephony Act 
and other such recent abridgements of freedom) _say_ that citizen-units 
must begin organizing their papers in advance of a raid and must begin 
compiling logs of various things in advance of a court order, warrant, 
etc.

Someday maybe a Supreme Court case will be heard. It is unlikely that 
any modern court will strike down these acts of Congres, but they should.

The language about due process and freedom from unreasonable searches 
and seizures does not say a ministerial (non-court) agent may do these 
things.

This goes for Carnivore, too. What part of the Fourth Amendment are they 
missing?

But all of these things show how far down the road to a police state we 
have gone.

--Tim May