Stephen Pain wrote:
A better approach would be to generate a random key for symmetric encryption on
the fly - you use this key to encrypt the log, then encrypt this key using a
public key encryption method and include the encrypted key somewhere near the
beginning of the log. To decrypt, you fi
[EMAIL PROTECTED]>
m> cc:
Subjec
TECTED]>
cc
Subject
RE: Encrypted logs
Can the logs be encrypted using a public key and private key used to
decrypt them?
-Original Message-
From: Paul Smith [mailto:[EMAIL PROTECTED]
Sent: Wednesday, November 17, 2004 4:31 PM
To: Log4J Developers List
Subject:
could see what the algorithm was and duplicate
it.
Mark Durman
"Chapko, Vadim"
<[EMAIL PROTECTED]>
11/17/2004 01:47 PM
Please respond to
"Log4J Developers List" <[EMAIL PROTECTED]>
To
"Log4J Developers List"
<[EMAIL PROTECTED]>
cc
Can the logs be encrypted using a public key and private key used to decrypt
them?
-Original Message-
From: Paul Smith [mailto:[EMAIL PROTECTED]
Sent: Wednesday, November 17, 2004 4:31 PM
To: Log4J Developers List
Subject: Re: Encrypted logs
Curt Arnold wrote:
> I had a g
Curt Arnold wrote:
I had a good discussion with some of the Apache Derby team about their
possible use of log4j. One of their concerns is sensitive information
appearing in plain-text log files. They don't have support for that
in their current internal logging framework, so it isn't a migrati
I had a good discussion with some of the Apache Derby team about their
possible use of log4j. One of their concerns is sensitive information
appearing in plain-text log files. They don't have support for that in
their current internal logging framework, so it isn't a migration
barrier
Any th