Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756254Ab0FDOrQ (ORCPT ); Fri, 4 Jun 2010 10:47:16 -0400 Received: from msux-gh1-uea02.nsa.gov ([63.239.65.40]:57727 "EHLO msux-gh1-uea02.nsa.gov" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755586Ab0FDOrP (ORCPT ); Fri, 4 Jun 2010 10:47:15 -0400 X-Greylist: delayed 1102 seconds by postgrey-1.27 at vger.kernel.org; Fri, 04 Jun 2010 10:47:15 EDT Subject: Re: [PATCH 04/14] evm: re-release From: Stephen Smalley To: Mimi Zohar Cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, James Morris , David Safford , Dave Hansen , Mimi Zohar In-Reply-To: <1271886594-3719-5-git-send-email-zohar@linux.vnet.ibm.com> References: <1271886594-3719-1-git-send-email-zohar@linux.vnet.ibm.com> <1271886594-3719-5-git-send-email-zohar@linux.vnet.ibm.com> Content-Type: text/plain; charset="UTF-8" Organization: National Security Agency Date: Fri, 04 Jun 2010 10:28:50 -0400 Message-ID: <1275661730.21231.32.camel@moss-pluto.epoch.ncsc.mil> Mime-Version: 1.0 X-Mailer: Evolution 2.28.3 (2.28.3-1.fc12) Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1869 Lines: 36 On Wed, 2010-04-21 at 17:49 -0400, Mimi Zohar wrote: > EVM protects a file's security extended attributes against integrity > attacks. It maintains an HMAC-sha1 value across the extended attributes, > storing the value as the extended attribute 'security.evm'. EVM has gone > through a number of iterations, initially as an LSM module, subsequently > as a LIM integrity provider, and now, when co-located with a security_ > hook, embedded directly in the security_ hook, similar to IMA. > > This is the first part of a local file integrity verification system. > While this part does authenticate the selected extended attributes, and > cryptographically bind them to the inode, coming extensions will bind > other directory and inode metadata for more complete protection. The > set of protected security extended attributes is configured at compile. > > EVM depends on the Kernel Key Retention System to provide it with the > kernel master key for the HMAC operation. The kernel master key is > securely loaded onto the root's keyring, typically by 'loadkernkey', > which either uses the TPM sealed secret key, if available, or a > password requested from the console. To signal EVM, that the key has > been loaded onto the keyring, 'echo 1 > /evm'. This is > normally done in the initrd, which has already been measured as part > of the trusted boot. (Refer to http://linux-ima.sourceforge.net/#EVM.) I don't remember this dependency on the kernel key system in prior incarnations of EVM. Can you explain the rationale for using it, and the implications? -- Stephen Smalley National Security Agency -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/