Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

kstewart33

(6,551 posts)
Thu Mar 3, 2016, 11:55 PM Mar 2016

Breaking News: Clinton email server secure - never hacked.

New York Times:

WASHINGTON — A former aide to Hillary Clinton has turned over to the F.B.I. computer security logs from Mrs. Clinton’s private server, records that showed no evidence of foreign hacking, according to people close to a federal investigation into Mrs. Clinton’s emails.

The security logs bolster Mrs. Clinton’s assertion that her use of a personal email account to conduct State Department business while she was the secretary of state did not put American secrets into the hands of hackers or foreign governments.


[link:http://www.nytimes.com/2016/03/04/us/politics/security-logs-of-hillary-clintons-email-server-are-said-to-show-no-evidence-of-hacking.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=a-lede-package-region&region=top-news&WT.nav=top-news&_r=0|
81 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Breaking News: Clinton email server secure - never hacked. (Original Post) kstewart33 Mar 2016 OP
Because malware writes to the syslog. jeff47 Mar 2016 #1
malware on a enterprise grade Fortinet firewall, I don't think so BlueStateLib Mar 2016 #8
Read the story. They're talking about the mailserver's logs. jeff47 Mar 2016 #9
article says "he provided agents the security logs" BlueStateLib Mar 2016 #19
Doesn't say which security logs AgerolanAmerican Mar 2016 #34
Wouldn't the FBI have recovered any security log files on the Server HDD BlueStateLib Mar 2016 #39
Security logs from the potentially compromised system tells you nothing. jeff47 Mar 2016 #49
Exactly: compromised systems' logs are useless. Lizzie Poppet Mar 2016 #63
Maybe on your home computer MaggieD Mar 2016 #10
Reading. Try it this time. jeff47 Mar 2016 #11
I read it MaggieD Mar 2016 #12
Again, do you think nation-state-level attacks would write to log files? jeff47 Mar 2016 #13
I think they wouldn't have a chance to.... MaggieD Mar 2016 #14
Of course they have a choice. jeff47 Mar 2016 #16
No, not with the proper security MaggieD Mar 2016 #22
There's no way that can be said for sure AgerolanAmerican Mar 2016 #35
The state department server was never hacked either. jeff47 Mar 2016 #42
State was hacked pretty severely about 18 months ago (nt) Recursion Mar 2016 #71
Digital certificate analysis for clintonemail.com BlueStateLib Mar 2016 #38
That's a wonderful thing, not a flaw, as far as that goes Recursion Mar 2016 #43
Then you can't authenticate the remote server. jeff47 Mar 2016 #47
Of course you can. What a ridiculous claim. You *manage key exchange* Recursion Mar 2016 #48
That would be the pre-shared keys I talked about. jeff47 Mar 2016 #51
You're half right Recursion Mar 2016 #53
Not quite. jeff47 Mar 2016 #56
You're nearly understanding it Recursion Mar 2016 #58
Nope, you're still missing a certificate. jeff47 Mar 2016 #66
And the government root CA cert is installed by the government IT admins on the client computers Recursion Mar 2016 #68
We started it because Clinton's server used a self-signed certificate jeff47 Mar 2016 #72
We have absolutely zero evidence of that Recursion Mar 2016 #74
We don't have any evidence of a non-self-signed certificate either. jeff47 Mar 2016 #75
Well, my web server and mail server are at the same IP address and use different certificates Recursion Mar 2016 #77
Yeah, but you're actually serving web pages. jeff47 Mar 2016 #80
And just to be clear, that was supposed to be "nearly every government mail server" Recursion Mar 2016 #81
Nope. jeff47 Mar 2016 #44
And a CA-signed certificate only authenticates to the extent you trust the CA. And some of those CAs Recursion Mar 2016 #50
Again, pre-shared keys only protect you as long as the cert is not stolen. jeff47 Mar 2016 #55
Well, first off, you are confusing pre-shared keys with public/private key pairs Recursion Mar 2016 #57
Yes, I used 'pre-shared key' when I should have used 'pre-shared certificate'. jeff47 Mar 2016 #62
It would look self-signed to an outside observer Recursion Mar 2016 #65
It would be chained to a root CA that the outside observer does not trust. jeff47 Mar 2016 #70
Right, but a self-signed certificate is still strictly better Recursion Mar 2016 #73
Why would you access an email server through HTTP? (nt) Recursion Mar 2016 #69
Business-level security would be a 3-tier minimum server layer, Bus Architecture to the back-end. TheBlackAdder Mar 2016 #20
Not necessarily - you don't seem up to date on the latest tech MaggieD Mar 2016 #23
There's new and there's secure. Play in your world, I have responsibilities to secure billions. TheBlackAdder Mar 2016 #25
That's nice MaggieD Mar 2016 #26
Let me get this straight! You think a stand-alone server is secure in any configuration? TheBlackAdder Mar 2016 #27
A stand-alone Windows server no less AgerolanAmerican Mar 2016 #36
I agree Bob41213 Mar 2016 #64
Apparently magic gnomes can detect the attack from the compromised server itself. jeff47 Mar 2016 #45
Sounds like more Hillary tales LittleBlue Mar 2016 #37
k&r DesertRat Mar 2016 #2
That sort of misses the point of the investigation tularetom Mar 2016 #3
Thank you - I was scratching my head when I read this. What does this have to do with anything? jillan Mar 2016 #30
Defense by non sequitur is mostly for show HereSince1628 Mar 2016 #41
Gosh, if only they had the logs 8 months ago this security review Press Virginia Mar 2016 #4
Your headline is misleading nichomachus Mar 2016 #5
Our guys are as good as their guys. kstewart33 Mar 2016 #21
How do you know our guys are as good? JonLeibowitz Mar 2016 #33
Well if Hillary's aide said it, case closed! morningfog Mar 2016 #6
This! NWCorona Mar 2016 #7
Actually the FBI said it.. DemocratSinceBirth Mar 2016 #59
Great news, if true. Link to FBI confirmation? The article in the OP and what I have read only morningfog Mar 2016 #61
Not an official confirmation DemocratSinceBirth Mar 2016 #67
Okay, I see what you are saying. morningfog Mar 2016 #79
When I was enlisted... LP2K12 Mar 2016 #15
I'm glad renate Mar 2016 #17
Log files are just like any other, subject to edit with tools, including its timestamps! TheBlackAdder Mar 2016 #18
MMWWAAAAAA, MMWWWAAAAAA MMWWAAAAAA Darb Mar 2016 #54
Unsinkable HRC. oasis Mar 2016 #24
Great silenttigersong Mar 2016 #28
Bernie supporters are not RWers calguy Mar 2016 #31
This story is being grasped at all over the place mindwalker_i Mar 2016 #29
from the article lovuian Mar 2016 #32
Why would we have to worry about hackers? Nuclear Unicorn Mar 2016 #40
Great news, but no surprise. MoonRiver Mar 2016 #46
So if a top secret email isn't hacked, is it still a crime? Chemisse Mar 2016 #52
what OS was the private email server using? lapfog_1 Mar 2016 #60
no evidence of foreign hacking does not equal "never hacked", but then you might not know that. Kip Humphrey Mar 2016 #76
Same staffer who pleaded the 5th and got immunity lynne Mar 2016 #78

jeff47

(26,549 posts)
9. Read the story. They're talking about the mailserver's logs.
Fri Mar 4, 2016, 12:17 AM
Mar 2016

As for enterprise grade firewall, how'd that work for OMB, DoD, IRS, Blue Cross/Blue Shield, Target........

 

AgerolanAmerican

(1,000 posts)
34. Doesn't say which security logs
Fri Mar 4, 2016, 01:57 AM
Mar 2016

"Security logs" can refer to many different things. Could be the Windows security log for the OS, or could be the mail server's security log.

They should assign a reporter who knows enough about IT security to relay all the relevant information in a story.

The exact phrase used was "computer security logs from Mrs. Clinton’s private server". Might be reporter ignorance but my guess is that that is a different log than one made by a network security appliance.

jeff47

(26,549 posts)
49. Security logs from the potentially compromised system tells you nothing.
Fri Mar 4, 2016, 11:14 AM
Mar 2016

Step 1 of your attack is to gain access to the system.

Step 2 of your attack is to erase all evidence of your attack from the system.

If Clinton's server was successfully compromised, there would be no record in any logs on her server.

 

Lizzie Poppet

(10,164 posts)
63. Exactly: compromised systems' logs are useless.
Fri Mar 4, 2016, 11:30 AM
Mar 2016

No one competent enough to do the hack in the first place is likely to leave the logs intact. Basic shit...

jeff47

(26,549 posts)
11. Reading. Try it this time.
Fri Mar 4, 2016, 12:19 AM
Mar 2016

Or are you going to claim nation-state-level attacks would write to your log files?

 

MaggieD

(7,393 posts)
12. I read it
Fri Mar 4, 2016, 12:21 AM
Mar 2016

It shows a stunning lack of knowledge about business level security. We aren't running servers in our basements.

jeff47

(26,549 posts)
13. Again, do you think nation-state-level attacks would write to log files?
Fri Mar 4, 2016, 12:25 AM
Mar 2016

If you do, I really hope you're not storing anything important. 'Cause I assure you it does not leave anything you can grep.

Btw, "Business-level-security" has leaked my identity 4 times in the last 2 years. That I know about. "Government-level security" has leaked my identity once.

 

MaggieD

(7,393 posts)
14. I think they wouldn't have a chance to....
Fri Mar 4, 2016, 12:27 AM
Mar 2016

When business level security is in place. The government and the server in mom's basement are not in the same league has business level security, and I am sure that is exactly what the Clinton's employed.

jeff47

(26,549 posts)
16. Of course they have a choice.
Fri Mar 4, 2016, 12:35 AM
Mar 2016

When they take complete control of your servers and network, they get to decide what you see.

The government and the server in mom's basement are not in the same league has business level security

So...skipped over the part where my information has been stolen from "business level security" far more frequently?

I'm well aware of what you think is so super secure. It isn't when you're facing nation-state-grade attacks. Just as you claim business security is in a league beyond home security, nation-state-grade is a league beyond business.

and I am sure that is exactly what the Clinton's employed.

Then you haven't read any coverage of the security problems on her server.

Would you spend the first 4 months with all communications unencrypted? Clinton did.
Would you leave the default VPN keys on your VPN appliance? Clinton did.
Would you use self-signed certificates? Clinton did.
Would you use an easy-to-typosquat address when a .gov could be made available? Clinton did.
Does your ISP have a history of being repeatedly hacked by China? Clinton's did.

About the only good thing they did in regards to the server was not announce its existence on 4chan.
 

MaggieD

(7,393 posts)
22. No, not with the proper security
Fri Mar 4, 2016, 01:04 AM
Mar 2016

There is a reason the state department server was hacked and hers was not. Do you not think WikiLeaks would have gotten in if they could have?

The fact is her server was never hacked.

 

AgerolanAmerican

(1,000 posts)
35. There's no way that can be said for sure
Fri Mar 4, 2016, 02:10 AM
Mar 2016

It's like proving a negative. With evidence one can prove a hack occurred, but a conclusion of not being hacked can only be based on the lack of evidence of a hack. There is no positive direct evidence that can be produced that a machine hasn't been hacked, although one can present evidence that proper security measures were taken.

Businesses do get hacked all the time, even big ones with nominally secure infrastructure. Off the top of my head, Target and SONY both experienced hacks that got 100 million+ customer records each. The IRS has been hacked in a big way at least twice recently, and of course OPM got its whole database stolen in an insider job. All these businesses use industry standard information security doctrine, but implementing them in detail is a whole different animal. A whole IT infrastructure can be penetrated through something as simple as a failure to protect a web application from an SQL injection attack in one input on one screen (as happened in the SONY case).

Then there's the infamous Ashley Madison hack which was not so long ago, either. Smaller organizations are even less likely to be properly secured than large ones.

jeff47

(26,549 posts)
42. The state department server was never hacked either.
Fri Mar 4, 2016, 10:58 AM
Mar 2016

FFS, if you're going to claim to be an expert on security, you should at least know that an authorized user copying information they were authorized to access onto a CD is not a "hack".

BlueStateLib

(937 posts)
38. Digital certificate analysis for clintonemail.com
Fri Mar 4, 2016, 03:53 AM
Mar 2016

These certificates were obtained validly and enabled web-based encryption for applications. Based on TrustNet analyst, Venafi can conclude clintonemail.com was enabled for browser, smartphone, and tablet encryption since 2009 and can operate using encryption through at least 2018. However, for the first 3 months of Secretary Clinton’s term, access to the server was not encrypted or authenticated with a digital certificate.
https://www.venafi.com/blog/post/what-venafi-trustnet-tells-us-about-the-clinton-email-server



All FortiMail units have a self-signed certificate installed on them by default
https://www.venafi.com/blog/post/what-venafi-trustnet-tells-us-about-the-clinton-email-server



Self-signed certificate are just as a secure as a TrustNet issued digital certificate. The only
difference is that you would see this warning when accessing https:// login page.


Hillary accessed her email server from her Blackberry through VPN not https login and clintonemail.com had an userbase of 1 (herself), so nobody had a need or reason to login through https

Recursion

(56,582 posts)
43. That's a wonderful thing, not a flaw, as far as that goes
Fri Mar 4, 2016, 11:01 AM
Mar 2016

The US Government doesn't use and never will use stock commercial CA's. That would be a horrible idea.

That page is exactly what you want to see.

Central CA's are a horrible, horrible idea, and I'm glad the government is avoiding them. Self-signed certificates are significantly more secure.

jeff47

(26,549 posts)
47. Then you can't authenticate the remote server.
Fri Mar 4, 2016, 11:10 AM
Mar 2016

You've got no idea if the server you're connecting to is the "real" server, or a man-in-the-middle or similar hijacking.

All they do is present a self-signed cert and say "trust me". That's why you get the big giant warning in Chrome.

Pre-shared self-signed certs give some security, but only as long as that certificate has not been stolen. The third-party authentication via root CAs give more security, because you have to steal more certificates from multiple sources in order to set up your man-in-the-middle attack.

Recursion

(56,582 posts)
48. Of course you can. What a ridiculous claim. You *manage key exchange*
Fri Mar 4, 2016, 11:14 AM
Mar 2016
You've got no idea if the server you're connecting to is the "real" server, or a man-in-the-middle or similar hijacking.


That's simply absurd. Your administrators *install known good keys*.

That's the entire point. The government can do that. Joe Schmoe can't, which is why the rest of us are stuck with the inferior PKI system.

jeff47

(26,549 posts)
51. That would be the pre-shared keys I talked about.
Fri Mar 4, 2016, 11:17 AM
Mar 2016

Again, that's only good as long as the certificates have not been stolen. You've got a single point of failure with a giant target on it.

Root CAs (assuming a competent root CA company) require hacking both the target server and a root CA server to exploit. That's significantly harder.

Recursion

(56,582 posts)
53. You're half right
Fri Mar 4, 2016, 11:20 AM
Mar 2016
Root CAs (assuming a competent root CA company)

Stop.

The root CA for a government server is a government server.

Government IT admins distribute that key, and only that key, to secure systems.

There are zero third party corporate/foreign servers involved, unlike for the rest of us.

That is more secure, and you know that.

jeff47

(26,549 posts)
56. Not quite.
Fri Mar 4, 2016, 11:22 AM
Mar 2016

The certificate on a government server is not a root CA. The government has its own root CA servers that are separate from, say, a government web server.

The browser in this scenario still contacts a root CA to authenticate the remote server. It just contacts a government-only root CA instead of Verisign, et al.

Recursion

(56,582 posts)
58. You're nearly understanding it
Fri Mar 4, 2016, 11:24 AM
Mar 2016

You still seem to be missing the fundamental point:

Replace Verisign and 170 other entities with USG. It's the same infrastructure, but 1 and only 1 certificate authority is trusted.

That's more secure.

jeff47

(26,549 posts)
66. Nope, you're still missing a certificate.
Fri Mar 4, 2016, 11:32 AM
Mar 2016

The web server has a certificate. It is not a root CA, and the public key from that certificate is not installed on the client.

Instead, that certificate chains to a government root CA. The client has that government root CA's public key to authenticate the web server's certificate.

There's (at least) 2 certificates involved.

Recursion

(56,582 posts)
68. And the government root CA cert is installed by the government IT admins on the client computers
Fri Mar 4, 2016, 11:34 AM
Mar 2016

We actually agreed on this downthread.

I'm still curious why we started on this from the results of an HTTPS request when to my knowledge a WWW site was never involved.

Recursion

(56,582 posts)
74. We have absolutely zero evidence of that
Fri Mar 4, 2016, 11:41 AM
Mar 2016

None.

A web server located at that same IP address seems to have, but that's a very different question, isn't it?

jeff47

(26,549 posts)
75. We don't have any evidence of a non-self-signed certificate either.
Fri Mar 4, 2016, 11:42 AM
Mar 2016

And what would a web server be doing at that address other than providing access to email?

Recursion

(56,582 posts)
77. Well, my web server and mail server are at the same IP address and use different certificates
Fri Mar 4, 2016, 11:47 AM
Mar 2016


I agree, we also have no evidence of a non-self-signed cert.

We have literally no evidence about the certificates that were used by this mail server whatsoever.

If the web server was used only as a webmail gateway for Clinton and only Clinton, that's actually kind of the textbook use-case for a self-signed certificate because it removes literally any compromise pathways except her own admin.

For that matter, her email server like nearly every government mail server out there could well have just been taking SMTP connections unencrypted over port 25, in which case this entire point is completely moot.

jeff47

(26,549 posts)
80. Yeah, but you're actually serving web pages.
Fri Mar 4, 2016, 11:56 AM
Mar 2016

What's the point of Clinton even having a web server on the box if not to provide web-based access to email?

If the web server was used only as a webmail gateway for Clinton and only Clinton, that's actually kind of the textbook use-case for a self-signed certificate because it removes literally any compromise pathways except her own admin.

We know Bill, Hillary and several of Hillary's aides had accounts. I vaguely remember Chelsea having one, but I'm not sure about that and don't care to look it up.

For that matter, her email server like nearly every government web server out there could well have just been taking SMTP connections unencrypted over port 25, in which case this entire point is completely moot.

The claim from camp Clinton is that she only accessed the server via VPN on her Blackberry (And that VPN appliance had the default certificates still installed, so it was insecure).

No one has said how the other account holders accessed the server.

Recursion

(56,582 posts)
81. And just to be clear, that was supposed to be "nearly every government mail server"
Fri Mar 4, 2016, 12:01 PM
Mar 2016
What's the point of Clinton even having a web server on the box if not to provide web-based access to email?


That's fine, and if she was the only client, that's a perfect use case for a self-signed certificate. Literally no pathway for compromise except her admin (who is a pathway in any other circumstance too). Ditto if it was here and some finite number of friends like Bill and Chelsea.

jeff47

(26,549 posts)
44. Nope.
Fri Mar 4, 2016, 11:02 AM
Mar 2016
Self-signed certificate are just as a secure as a TrustNet issued digital certificate.

Nope.

A self-signed certificate only encrypts the communication. It does not authenticate the remote server. So a self-signed certificate allows man-in-the-middle or similar connection hijacking attacks.

Hillary accessed her email server from her Blackberry through VPN

And the VPN appliance had the default, widely-known keys installed. Meaning anyone could connect to that VPN.

and clintonemail.com had an userbase of 1 (herself)

Nope. Hillary Clinton, Bill Clinton and at least 3 of Hillary Clinton's aides had accounts.

Recursion

(56,582 posts)
50. And a CA-signed certificate only authenticates to the extent you trust the CA. And some of those CAs
Fri Mar 4, 2016, 11:15 AM
Mar 2016

are the Chinese government.

You're just wrong here. PKI is exactly the wrong solution for true security.

jeff47

(26,549 posts)
55. Again, pre-shared keys only protect you as long as the cert is not stolen.
Fri Mar 4, 2016, 11:20 AM
Mar 2016

There's a reason even the DoD uses a root CA system - they just have their own root CAs. It requires stealing more certificates from multiple places.

Recursion

(56,582 posts)
57. Well, first off, you are confusing pre-shared keys with public/private key pairs
Fri Mar 4, 2016, 11:23 AM
Mar 2016

A public key is very different from a shared key.

In a secure government system, one and only one public key is trusted, and that is the key whose private key is owned by a government server (again, this is not a shared-key cryptosystem; I suspect you'll realize this if you think about it for a second). This is the exact same cryptosystem that we use, except that the only trusted root certificate is from the US government.

In contrast, my browser (on OpenBSD, which is fairly paranoid) trusts by default 171 different public keys.

The government's way is more secure.

jeff47

(26,549 posts)
62. Yes, I used 'pre-shared key' when I should have used 'pre-shared certificate'.
Fri Mar 4, 2016, 11:30 AM
Mar 2016
In a secure government system, one and only one public key is trusted, and that is the key whose private key is owned by a government server

Not quite.

Let's say you're setting up a web server. You'll be given a certificate for that server's secure connections. That certificate is authenticated via a government root CA, and not Verisign's root CA (or any other root CA). Depending on what the client is used for, it will only have that government root CA, or it will have a stripped-down list of root CAs.

You seemed to be espousing generating a self-signed certificate for that web server, and then sharing that with the client in order to authenticate the connection. Which is secure as long as that one certificate is not stolen.

Recursion

(56,582 posts)
65. It would look self-signed to an outside observer
Fri Mar 4, 2016, 11:32 AM
Mar 2016
You seemed to be espousing generating a self-signed certificate for that web server, and then sharing that with the client in order to authenticate the connection.

Nope. I'm espousing not even sharing the CA's public key with anybody outside of the network. Which looks the same as a self-signed key.

As a separate issue, I think it's absurd that browsers treat a self-signed certificate as less secure than plaintext, when it's strictly better, but that's a completely different question (and I'd imagine you agree with that...)

(And at any rate it's odd that what started this was the results of an HTTPS request, when nobody yet has claimed there was a problem with her website.)

jeff47

(26,549 posts)
70. It would be chained to a root CA that the outside observer does not trust.
Fri Mar 4, 2016, 11:37 AM
Mar 2016

That typically triggers self-signed behavior, but it's technically not self-signed - the same server is not authenticating the certificate, so it's technically not self-signed.

As a separate issue, I think it's absurd that browsers treat a self-signed certificate as less secure than plaintext, when it's strictly better, but that's a completely different question (and I'd imagine you agree with that...)

IMO, it's based on what the user is more likely to see. Plaintext is "normal" to a typical user. Authenticated via a root CA is also "normal" to a typical user.

Self-signed is not what you'd expect when going to your bank or similar. So the browser says 'Holy shit this is weird! Do you REALLY want to do this?"

Recursion

(56,582 posts)
73. Right, but a self-signed certificate is still strictly better
Fri Mar 4, 2016, 11:40 AM
Mar 2016

In that it prevents all passive attacks (you might be being phished by the Russian mob, but at least you know the NSA can't listen in).

I still stand by my main point: the results of an HTTPS request don't actually tell me much about the cert an email server was using.

TheBlackAdder

(28,205 posts)
25. There's new and there's secure. Play in your world, I have responsibilities to secure billions.
Fri Mar 4, 2016, 01:06 AM
Mar 2016

.


And Windows is one of the last places to do it!


.

 

MaggieD

(7,393 posts)
26. That's nice
Fri Mar 4, 2016, 01:10 AM
Mar 2016

State Department server was hacked. Hers was not. And lots of companies with "billions" don't seem to know about or deploy the proper security. If you think it depends on "bus architecture" you are severely behind the times.

TheBlackAdder

(28,205 posts)
27. Let me get this straight! You think a stand-alone server is secure in any configuration?
Fri Mar 4, 2016, 01:12 AM
Mar 2016

.


Are you freakin' kidding me?


.

 

AgerolanAmerican

(1,000 posts)
36. A stand-alone Windows server no less
Fri Mar 4, 2016, 02:16 AM
Mar 2016

I can tell you have first hand experience from both the content of your comments and the level of exasperation.

I can only imagine the nightmare of trying to secure that machine. I doubt it was really tried, anyone competent would have raised bloody murder over the configuration.

Bob41213

(491 posts)
64. I agree
Fri Mar 4, 2016, 11:31 AM
Mar 2016

From what I read about that server it set up so many red flags in my mind. I'd never run anything like this on a server like that. I can't imagine any foreign government who wanted to get in wouldn't have a handful of zero day hacks they could use to get real time access to that server. This assumes of course that they knew about her use of the server, which seems reasonably likely but I can't say for sure. I can't imagine the Russians or Chinese wouldn't have waltzed right into this server if they tried.

Secondly, the claim that there was only 1 person using the server is ridiculous. In my mind it's quite obvious the whole point of this server was to avoid freedom of information requests. In order to effectively do that is to get all your aids on the server. When it leaks out onto other servers is when you no longer control the records (like the Sidney Blumenthal emails).

I also wonder why the server admin was in possession of the logs and required an immunity agreement to turn them over. If I own that server, I should be the one in possession of the logs. One of my employees doesn't keep a copy of the server logs at home and require immunity to turn them over, those should be owned by the employer since she paid him.

jeff47

(26,549 posts)
45. Apparently magic gnomes can detect the attack from the compromised server itself.
Fri Mar 4, 2016, 11:03 AM
Mar 2016

Surely the compromise won't involve disabling the ability to detect the compromise!!!

 

LittleBlue

(10,362 posts)
37. Sounds like more Hillary tales
Fri Mar 4, 2016, 02:19 AM
Mar 2016

Concocted by some flack who doesn't understand or care about cybersecurity.

jillan

(39,451 posts)
30. Thank you - I was scratching my head when I read this. What does this have to do with anything?
Fri Mar 4, 2016, 01:15 AM
Mar 2016

It's about classified info.

HereSince1628

(36,063 posts)
41. Defense by non sequitur is mostly for show
Fri Mar 4, 2016, 08:27 AM
Mar 2016

In this particular case the absence of evidence that the server was hacked is akin to a drunk driver stopped for speeding in the wrong direction in a school zone who says 'But I didn't have an accident.'

 

Press Virginia

(2,329 posts)
4. Gosh, if only they had the logs 8 months ago this security review
Thu Mar 3, 2016, 11:59 PM
Mar 2016

would be over and there wouldn't be a need to grant anyone immunity from prosecution.

nichomachus

(12,754 posts)
5. Your headline is misleading
Fri Mar 4, 2016, 12:05 AM
Mar 2016

The computer guy said "there were no signs of foreign hacking in the security logs."

No signs of it. Doesn't mean it didn't happen. Any hacker worth his or her salt knows how to erase his footprints amd fingerprints from the server logs. That's what they do.

Any time they do leave a trail is when they want a quick in and out and don't care if the victim knows. Mossad, the KGB, the Chinese, and the Iranians know exactly how to hack a server and not leave any trail behind. Give them some credit.

kstewart33

(6,551 posts)
21. Our guys are as good as their guys.
Fri Mar 4, 2016, 01:03 AM
Mar 2016

You can bet that the best experts we have examined and concluded that no breaks occurred. That's what the FBI does.

JonLeibowitz

(6,282 posts)
33. How do you know our guys are as good?
Fri Mar 4, 2016, 01:36 AM
Mar 2016

If they're even slightly better, there would be no evidence.

And the advantage typically goes to the person who has control over the syslog files, so they can clean their tracks of anything the FBI wants to find.

DemocratSinceBirth

(99,710 posts)
59. Actually the FBI said it..
Fri Mar 4, 2016, 11:25 AM
Mar 2016

I have been told that her private server was some Rube Goldberg home brew device but the evidence suggests this Brian Pagliano guy built an impenetrable system.

 

morningfog

(18,115 posts)
61. Great news, if true. Link to FBI confirmation? The article in the OP and what I have read only
Fri Mar 4, 2016, 11:29 AM
Mar 2016

cite to Pagliano or "aide" for the never-hacked statement.

DemocratSinceBirth

(99,710 posts)
67. Not an official confirmation
Fri Mar 4, 2016, 11:33 AM
Mar 2016
WASHINGTON — A former aide to Hillary Clinton has turned over to the F.B.I. computer security logs from Mrs. Clinton’s private server, records that showed no evidence of foreign hacking, according to people close to a federal investigation into Mrs. Clinton’s emails.




Brian Pagliano= former aide
FBI officials = people close to the investigation, speaking anonymously of course.


LP2K12

(885 posts)
15. When I was enlisted...
Fri Mar 4, 2016, 12:30 AM
Mar 2016

and working in intelligence as an analyst, I would never have gotten away with this excuse. It's really disheartening.

renate

(13,776 posts)
17. I'm glad
Fri Mar 4, 2016, 12:47 AM
Mar 2016

As much as I would rather have Bernie be our nominee, I'm not so unrealistic as to pretend that there isn't a good-to-excellent chance that it'll be Hillary. And I realize there's more to the issue than just whether it was hacked, but I'm glad that her server having been vulnerable won't be an issue.

 

Darb

(2,807 posts)
54. MMWWAAAAAA, MMWWWAAAAAA MMWWAAAAAA
Fri Mar 4, 2016, 11:20 AM
Mar 2016

"The fools, don't they know I control EVERYTHING!!!!!

MMWWAAAAAA, MMWWWAAAAAA MMWWAAAAAA

Hillary is Dr. Evil.

silenttigersong

(957 posts)
28. Great
Fri Mar 4, 2016, 01:12 AM
Mar 2016

Maybe some of the Clinton supporters will stop berating Sanders supporters as RWers.Nice break for awhile.

mindwalker_i

(4,407 posts)
29. This story is being grasped at all over the place
Fri Mar 4, 2016, 01:15 AM
Mar 2016

Thing is, it's a steaming pile of bullshit. The logs don't show it? Which logs? How often were the logs rotated? Who compiled the logs and sent them? Who read them?

"My ass doesn't hurt right now, so I've nobody's ever seen me naked."

lovuian

(19,362 posts)
32. from the article
Fri Mar 4, 2016, 01:21 AM
Mar 2016

Mr. Pagliano told the agents that nothing in his security logs suggested that any intrusion occurred. Security logs keep track of, among other things, who accessed the network and when. They are not definitive, and forensic experts can sometimes spot sophisticated hacking that is not apparent in the logs, but computer security experts view logs as key documents when detecting hackers.

time will tell

Nuclear Unicorn

(19,497 posts)
40. Why would we have to worry about hackers?
Fri Mar 4, 2016, 07:44 AM
Mar 2016

The server was just used for yoga routines and discussions of Chelsea's wedding. Hillary said so herself.

Chemisse

(30,813 posts)
52. So if a top secret email isn't hacked, is it still a crime?
Fri Mar 4, 2016, 11:18 AM
Mar 2016

They can accuse her of being careless, or using bad judgement, but they can hardly indict her if nobody ever got hold of the classified emails.

lapfog_1

(29,205 posts)
60. what OS was the private email server using?
Fri Mar 4, 2016, 11:27 AM
Mar 2016

I would ONLY trust it (and only a slight amount, BTW) if it was running the most up to date version of SELinux from Redhat and Tresys Technology (validation). And then only if the most secure policies offered were actually used.

And... even with all that (SELinux is used/from the NSA), you still can't PROVE that it wasn't hacked. Snowden was an admin using SELinux for the NSA... and he only mistake was going public with his information (the easiest way to hack into any system is to be one of the trusted people that administer that system).

lynne

(3,118 posts)
78. Same staffer who pleaded the 5th and got immunity
Fri Mar 4, 2016, 11:55 AM
Mar 2016

from the Justice Department, I believe.

Well, golly-gee, I'm sure his word is just oakely-dokely with the FBI! All that pleading and immunity wasn't needed at all because he had his logs. Sheesh . . . everybody back on the bus 'cause there's nothing to see here!

Latest Discussions»Retired Forums»2016 Postmortem»Breaking News: Clinton em...