Difference between pages "Forensic Live CD issues" and "User talk:Andy Jones"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (Journaling file systems updates)
 
m (Welcome!)
 
Line 1: Line 1:
== The problem ==
+
'''Welcome to ''Forensics Wiki''!'''
 
+
We hope you will contribute much and well.
[[Tools#Forensics_Live_CDs | Forensic Linux Live CD distributions]] are widely used during computer forensic investigations. Currently, many vendors of such Live CD distributions spread false claims that their distributions "do not touch anything", "write protect everything" and so on. Community-developed distributions are not exception here, unfortunately. Finally, it turns out that many forensic Linux Live CD distributions are not tested properly and there are no suitable test cases developed.
+
You will probably want to read the [[Help:Contents|help pages]].
 
+
Again, welcome and have fun! [[User:.FUF|.FUF]] 13:49, 9 March 2010 (UTC)
== Another side of the problem ==
+
 
+
Another side of the problem of insufficient testing of forensic Live CD distributions is that many users do not know what happens "under the hood" of such distributions and cannot adequately test them.
+
 
+
=== Example ===
+
 
+
For example, [http://forensiccop.blogspot.com/2009/10/forensic-cop-journal-13-2009.html ''Forensic Cop Journal'' (Volume 1(3), Oct 2009)] describes a test case when an Ext3 file system was mounted using "-o ro" mount flag as a way to write protect the data. The article says that all tests were successful (i.e. no data modification was found after unmounting the file system), but it is known that damaged (i.e not properly unmounted) Ext3 file systems cannot be write protected using only "-o ro" mount flags (write access will be enabled during file system recovery).
+
 
+
And the question is: will many users test damaged Ext3 file system (together with testing the clean one) when validating their favourite forensic Live CD distribution? My answer is "no", because many users are unaware of such traits.
+
 
+
== Problems ==
+
 
+
Here is a list of common problems of forensic Linux Live CD distributions that can be used by developers and users for testing purposes. Each problem is followed by an up to date list of distributions affected.
+
 
+
=== Journaling file systems updates ===
+
 
+
When mounting (and unmounting) several journaling file system types with only "-o ro" mount flag a different number of data writes may occur. Here is a list of such file systems:
+
 
+
{| class="wikitable" border="1"
+
|-
+
! File system
+
!  When happens
+
!  Notes
+
|-
+
|  Ext3
+
|  File system requires journal recovery
+
|  To disable recovery: use "noload" flag, or use "ro,loop" flags, or use "ext2" file system type
+
|-
+
|  Ext4
+
|  File system requires journal recovery
+
|  To disable recovery: use "noload" flag, or use "ro,loop" flags, or use "ext2" file system type
+
|-
+
|  ReiserFS
+
|  Always
+
|  "nolog" flag does not work (see ''man mount''). To disable journal updates: use "ro,loop" flags
+
|-
+
|  XFS
+
|  Always
+
|  "norecovery" flag does not work. To disable data writes: use "ro,loop" flags. The bug was fixed in recent 2.6 kernels.
+
|}
+
 
+
Incorrect mount flags can be used to mount a file system on evidentiary media during the boot process or during the file system preview process. As described above, this may result in modification of a file system's data. For example, several Ubuntu-based forensic Linux Live CD distributions mount Ext3/4 file systems on fixed media (e.g. hard drives) during execution of ''initrd'' scripts (these scripts mount every supported file system on every supported media type using only "-o ro" flag in order to find a root file system image).
+
 
+
List of distributions that recover Ext3 (and sometimes Ext4) file systems during the boot:
+
 
+
{| class="wikitable" border="1"
+
|-
+
!  Distribution
+
!  Version
+
|-
+
|  Helix3
+
|  2009R1
+
|-
+
|  SMART Linux (Ubuntu)
+
2010-01-20
+
|-
+
|  FCCU GNU/Linux Forensic Boot CD
+
|  12.1
+
|-
+
|  SPADA
+
|  4
+
|}
+
 
+
=== Root file system spoofing ===
+
 
+
=== Swap space activation ===
+
 
+
=== Incorrect automount policy for removable media ===
+
 
+
=== Incorrect write-blocking approach ===
+
 
+
=== Software RAID (Linux RAID) activation ===
+

Latest revision as of 08:49, 9 March 2010

Welcome to Forensics Wiki! We hope you will contribute much and well. You will probably want to read the help pages. Again, welcome and have fun! .FUF 13:49, 9 March 2010 (UTC)