Reliable log data transfer



Similar documents
Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

NAS 272 Using Your NAS as a Syslog Server

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Chapter 8 Monitoring and Logging

Configuring Logging. Information About Logging CHAPTER

Logging on a Shoestring Budget

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory

Knowledge Base Articles

Lab 5.5 Configuring Logging

Network Monitoring & Management Log Management

An Introduction to Syslog. Rainer Gerhards Adiscon

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

RSA Authentication Manager

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Security Correlation Server Quick Installation Guide

Monitoring PostgreSQL database with Verax NMS

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013

Configuring Syslog Server on Cisco Routers with Cisco SDM

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Distributed syslog architectures with syslog-ng Premium Edition

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

Andrew Moore Amsterdam 2015

Lab Configure Syslog on AP

SOFTNIX LOGGER Centralized Logs Management

Cisco Setting Up PIX Syslog

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE page 1

System Log Setup (RTA1025W Rev2)

syslog-ng Store Box PRODUCT DESCRIPTION Copyright BalaBit IT Security All rights reserved.

MySQL Security: Best Practices

Network Monitoring & Management Log Management

Web Security Log Server Error Reference

Chapter 9 Monitoring System Performance

GlobalSCAPE DMZ Gateway, v1. User Guide

Security Correlation Server Quick Installation Guide

The syslog-ng Premium Edition 5LTS

Network Monitoring & Management Log Management

SYSLOG 1 Overview... 1 Syslog Events... 1 Syslog Logs... 4 Document Revision History... 5

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

logstash The Book Log management made easy James Turnbull

Oracle Database Security and Audit

Introduction. Background

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Using Logstash and Elasticsearch analytics capabilities as a BI tool

The syslog-ng Store Box 3 LTS

OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration

Management, Logging and Troubleshooting

Monitoring the Firewall Services Module

Chapter 3 Restricting Access From Your Network

Cisco Application Networking Manager Version 2.0

Assuria from ZeroDayLab

Runtime Monitoring & Issue Tracking

CSE 265: System and Network Administration

logstash The Book Log management made easy James Turnbull

Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics

Log management with Graylog2 Lennart Koopmann, FrOSCon Mittwoch, 29. August 12

Intrusion Detection Systems (IDS)

Configuring System Message Logging

RSA Event Source Configuration Guide. McAfee Database Security

Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP

EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS

Red Condor Syslog Server Configurations

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

The syslog-ng Premium Edition 5F2

IMPORTANCE OF CENTRALIZED LOG SERVER AND LOG ANALYZER SOFTWARE FOR AN ORGANIZATION

Configuring LocalDirector Syslog

Using Debug Commands

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

Cisco PIX vs. Checkpoint Firewall

A Universal Logging System for LHCb Online

Using etoken for SSL Web Authentication. SSL V3.0 Overview

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams

syslog - centralized logging

Blackboard Open Source Monitoring

Evolving Log Analysis. Jason McCord Jon Green

Integrated Cisco Products

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

CCNA Security 1.1 Instructional Resource

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Securing and Accelerating Databases In Minutes using GreenSQL

Chapter 11 Phase 5: Covering Tracks and Hiding

Application Intrusion Detection

Device Integration: CyberGuard SG565

The syslog-ng Store Box 3 F2

Tomcat Tuning. Mark Thomas April 2009

PIX/ASA 7.x with Syslog Configuration Example

Using Debug Commands

Computer System Management: Hosting Servers, Miscellaneous

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

AND Recorder 5.4. Overview. Benefits. Datenblatt

Fortinet Network Security NSE4 test questions and answers:

Accellion Secure File Transfer

Transcription:

OWASP Switzerland Chapter December 2015 Reliable log data transfer About (r)syslog, logstash, and log data signing A field report pascal.buchbinder@adnovum.ch

Agenda Why we need log data transfer Syslog UDP vs TCP Necessary tools (for Apache httpd) Reliability Logstash Log data signing (Apache httpd, Logstash)

Transferring log data Many distributed systems Need to collect log data centralized Prevention from data loss / manipulation Archiving (transaction audit, PCIDSS) Alerting / monitoring Viewing / troubleshooting Statistics (planning, trends, anomaly) Reporting / DWH Accounting Reliability: Are we losing any messages?

syslog vs proprietary - characteristics Syslog Embedded into your software: direct data transfer (via local syslogd or direct connection) to loghost. Software usually available on every (Unix) host. Standardized protocol, format, levels, facilities, etc. Proprietary External daemon: usually appending to files and forwarding the data to the loghost. Software needs to be installed on every host. Vendor specific software, configuration, and protocol (server and client side).

Setup syslog

Apache httpd and syslog Piped logging qslogger: Writes data to syslogd and stdout (local file) Filtering by severity (don't forward debug messages to loghost) Severity detection: set message's level at syslog protocol

UDP vs TCP/TLS UDP has less overhead (faster) Non-blocking No flow control Plaintext: No confidentiality No key management TCP has more overhead (slower) Blocking Flow control and error handling Encrypted: Confidentiality Key management

Syslog: reliable transfer I UDP: Potential data loss. If your server (receiver) becomes too busy (thousands of log messes per second from many clients). When your server (receiver) is down. TCP: No data loss. As long as your server (receiver) is available. You may configure buffers (memory or file) to store messages temporary if receiver is not available. Syslog is still non-blocking, even we loose messages due to full buffers or an unavailable receiver.

Syslog: reliable transfer II Priority: rsyslogd may drop low priority (level) messages preferring high priority ones. $SystemLogRateLimitInterval 2 $SystemLogRateLimitBurst 5000 $SystemLogRateLimitSeverity 6 Know your infrastructure's limitation! Decide whether messages with low severity shall have lower priority. Mainly for UDP setup.

Syslog: reliable transfer III Cluster: setup a primary and secondary log host. local3.* @@logmaster.adnovum.ch $ActionExecOnlyWhenPreviousIsSuspended on &@@logslave.adnovum.ch & /var/log/syslogbuffer $ActionExecOnlyWhenPreviousIsSuspended off Allows you to maintain your log host (receiver), e.g. reboot the server. Makes only sense within a setup using TCP.

Setup syslog - cluster

Logstash forwarder Open Source (Apache license) Locally installed daemon Appends to files Free buffers: buffering works event when files are rotated while reading (no message loss until a rotated file gets deleted before the data has sent) Forward data using the lumberjack protocol Supports 2-way SSL (mutual authentication)

Logstash forwarder setup

Signatures How do you know not loosing log data? Easy in lab while testing (by counting messages). Difficult in real production environment. Signing log data solves this problem: Each message is signed (corrupt messages). Sequence number shows data loss (or injected messages).

Signatures - setup

Signatures - tools Sign each message using a dedicated tool (qssign, piped logging, PSK) Adds sequence number and signature. Verify signature by using a logstash filter plug-in Verifies each message at server (receiver): signature and sequence number. Potential problem: checking sequence within a cluster setup (switching multiple times).

Signatures - ELK

grok&qssign filter configuration filter { grok { match => [ "message", "%{GREEDYDATA:data} %{INT:sequence}#%{NOTSPACE:hmac}" ] tag_on_failure => [ ] } if [data] { qssign { message => "data" source => "path" sequence => "sequence" hmac => "hmac" secret => "/var/opt/keys/keypass.sh" } mutate { replace => [ "message", "%{data}" ] remove_field => [ "data" ] } } else { mutate { add_field => [ "signature", "missing" ] }}}

Summary Syslog Usually works out of the box UDP works well under normal conditions No data loss when using a TCP and a cluster/buffers Logstash forwarder Additional software, configuration, certificates No data loss even your log host is temporary down Signatures Know when loosing data No message injection or manipulation

Software http://opensource.adnovum.ch/mod_qos/qslogger.1.html http://opensource.adnovum.ch/mod_qos/qssign.1.html http://mod-qos.cvs.sourceforge.net/viewvc/modqos/src/tools/logstash-filter-qssign/ http://www.rsyslog.com/ https://www.elastic.co/products/logstash