evm 1.2 KB

1234567891011121314151617181920212223
  1. What: security/evm
  2. Date: March 2011
  3. Contact: Mimi Zohar <zohar@us.ibm.com>
  4. Description:
  5. EVM protects a file's security extended attributes(xattrs)
  6. against integrity attacks. The initial method maintains an
  7. HMAC-sha1 value across the extended attributes, storing the
  8. value as the extended attribute 'security.evm'.
  9. EVM depends on the Kernel Key Retention System to provide it
  10. with a trusted/encrypted key for the HMAC-sha1 operation.
  11. The key is loaded onto the root's keyring using keyctl. Until
  12. EVM receives notification that the key has been successfully
  13. loaded onto the keyring (echo 1 > <securityfs>/evm), EVM
  14. can not create or validate the 'security.evm' xattr, but
  15. returns INTEGRITY_UNKNOWN. Loading the key and signaling EVM
  16. should be done as early as possible. Normally this is done
  17. in the initramfs, which has already been measured as part
  18. of the trusted boot. For more information on creating and
  19. loading existing trusted/encrypted keys, refer to:
  20. Documentation/keys-trusted-encrypted.txt. (A sample dracut
  21. patch, which loads the trusted/encrypted key and enables
  22. EVM, is available from http://linux-ima.sourceforge.net/#EVM.)