Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932266Ab0FDOxh (ORCPT ); Fri, 4 Jun 2010 10:53:37 -0400 Received: from e6.ny.us.ibm.com ([32.97.182.146]:34743 "EHLO e6.ny.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755586Ab0FDOxf (ORCPT ); Fri, 4 Jun 2010 10:53:35 -0400 Subject: Re: [PATCH 04/14] evm: re-release From: Mimi Zohar To: Stephen Smalley Cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, James Morris , David Safford , Dave Hansen , Mimi Zohar In-Reply-To: <1275661730.21231.32.camel@moss-pluto.epoch.ncsc.mil> References: <1271886594-3719-1-git-send-email-zohar@linux.vnet.ibm.com> <1271886594-3719-5-git-send-email-zohar@linux.vnet.ibm.com> <1275661730.21231.32.camel@moss-pluto.epoch.ncsc.mil> Content-Type: text/plain; charset="UTF-8" Date: Fri, 04 Jun 2010 10:53:32 -0400 Message-ID: <1275663212.3205.12.camel@localhost.localdomain> Mime-Version: 1.0 X-Mailer: Evolution 2.28.3 (2.28.3-1.fc12) Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2020 Lines: 39 On Fri, 2010-06-04 at 10:28 -0400, Stephen Smalley wrote: > On Wed, 2010-04-21 at 17:49 -0400, Mimi Zohar wrote: > > EVM protects a file's security extended attributes against integrity > > attacks. It maintains an HMAC-sha1 value across the extended attributes, > > storing the value as the extended attribute 'security.evm'. EVM has gone > > through a number of iterations, initially as an LSM module, subsequently > > as a LIM integrity provider, and now, when co-located with a security_ > > hook, embedded directly in the security_ hook, similar to IMA. > > > > This is the first part of a local file integrity verification system. > > While this part does authenticate the selected extended attributes, and > > cryptographically bind them to the inode, coming extensions will bind > > other directory and inode metadata for more complete protection. The > > set of protected security extended attributes is configured at compile. > > > > EVM depends on the Kernel Key Retention System to provide it with the > > kernel master key for the HMAC operation. The kernel master key is > > securely loaded onto the root's keyring, typically by 'loadkernkey', > > which either uses the TPM sealed secret key, if available, or a > > password requested from the console. To signal EVM, that the key has > > been loaded onto the keyring, 'echo 1 > /evm'. This is > > normally done in the initrd, which has already been measured as part > > of the trusted boot. (Refer to http://linux-ima.sourceforge.net/#EVM.) > > I don't remember this dependency on the kernel key system in prior > incarnations of EVM. Can you explain the rationale for using it, and > the implications? This changed very early on, so that people without a TPM could 'play' with it. Mimi -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/