- \begin{result}
- \end{result}
-
- \item\pass{} Verify that log fields from trusted and untrusted
- sources are distinguishable in log entries.
-
- \begin{result}
- \end{result}
+\notapplicable{\item Verify that log fields from trusted and untrusted
+ sources are distinguishable in log entries.}
It's not possible to retreive the IP address from which a password reset has been issued.
Only potential requests are logged even before it's verified such an action exists.
\end{result}
It's not possible to retreive the IP address from which a password reset has been issued.
Only potential requests are logged even before it's verified such an action exists.
\end{result}
logs have the correct time.
\begin{result}
Time information is not inserted into log messages.
The actual log files however are named after the current system date, this gives a precision of 24 hours.
\end{result}
logs have the correct time.
\begin{result}
Time information is not inserted into log messages.
The actual log files however are named after the current system date, this gives a precision of 24 hours.
\end{result}