Encrypted Volume and File System v1.1 Administrator's Guide
Example.................................................................................................................................57
Step 2d: Mount the File System on the EVFS Volume...............................................................57
Example.................................................................................................................................57
Step 2e: (Optional) Adding an Entry to /etc/fstab......................................................................57
Example.................................................................................................................................58
Step 3: Verifying the Configuration.................................................................................................59
evfsadm stat -a............................................................................................................................59
evfsvol display evfs_volume_path.............................................................................................59
Verifying Data Encryption.........................................................................................................59
Example.................................................................................................................................60
Step 4: (Optional) Migrating Existing Data to an EVFS Volume.....................................................61
Example......................................................................................................................................61
Step 5: (Optional) Configuring the Autostart Feature.....................................................................62
Step 6: Backing Up Your Configuration..........................................................................................64
Option 2: Converting a Volume with Existing Data to an EVFS Volume (Inline Encryption).............65
Step 1: Preparing the File System and Data....................................................................................66
Step 2: Performing Inline Encryption..............................................................................................67
iencrypt: Inline Encryption........................................................................................................67
Suspending an Ongoing Inline Encryption..........................................................................67
Re-starting a Suspended Inline Encryption..........................................................................67
Step 3: Verifying the Configuration.................................................................................................69
evfsadm stat -a............................................................................................................................69
evfsvol display evfs_volume_path.............................................................................................69
Verifying Data Encryption.........................................................................................................69
Example.................................................................................................................................70
Step 4: (Optional) Configuring the Autostart Feature.....................................................................72
Step 5: Backing Up Your Configuration..........................................................................................74
Examples...............................................................................................................................................75
Option 1...........................................................................................................................................75
Korn Shell Script for Creating an EVFS Volume and File System.............................................76
Option 2...........................................................................................................................................76
5 Administering EVFS......................................................................................................79
Starting and Stopping EVFS.................................................................................................................80
Starting the EVFS Subsystem..........................................................................................................80
Enabling Encryption and Decryption Access to EVFS Volumes.....................................................80
Disabling Encryption/Decryption Access to EVFS Volumes..........................................................81
Stopping the EVFS Subsystem........................................................................................................82
Opening Raw Access to EVFS Volumes..........................................................................................83
Closing Raw Access to EVFS Volumes............................................................................................83
Managing EVFS Keys and Users..........................................................................................................84
Displaying Key IDs for an EVFS Volume........................................................................................84
Syntax.........................................................................................................................................84
Example......................................................................................................................................84
Restoring User Keys........................................................................................................................84
Changing Owner Keys for an EVFS Volume...................................................................................86
Recovering from Problems with Owner Keys.................................................................................87
Removing Keys from an EVFS Volume...........................................................................................87
Removing User Keys or Stored Passphrase from the EVFS Key Database.....................................87
Changing the Passphrase for a Key.................................................................................................87
Creating or Changing a Stored Passphrase for an Existing Key.....................................................88
Recovering from EMD Corruption.......................................................................................................89
EMD Backup Directory...................................................................................................................89
Removing a Volume from the EVFS Subsystem...................................................................................90
Table of Contents 5