Hi Folks, I am currently working in an embedded project that uses Journal for logging. The logging data shall be protected by the Journal’s sealing mechanism FSS and for various reasons the verification key is located unprotected
in memory. Regarding this constellation, my first question is that:
If an attacker knows the verification key, is he able to modify the logging data in such a way that its tempering remains undetected, even if this has happened e.g. one day ago (which means that several new sealing keys
has been generated in the meantime) ? Since sealing is always done for a time interval, my second question is that:
What will happen to the logging data and sealing mechanism when the system clock is suddenly modified? This can e.g. happen, when the board starts first with a default time value and then synchronized after a while by
a time daemon. Regards, Andreas |