Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp225496pxb; Wed, 18 Aug 2021 20:50:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwTLv7ZRTyg530wY6dtsv3WQrmT6r9KO3zyZRI6bYAvDE4eKASiPMA7l+EuuFUN1PxhWDQO X-Received: by 2002:a17:906:2acc:: with SMTP id m12mr13714470eje.231.1629345015597; Wed, 18 Aug 2021 20:50:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629345015; cv=none; d=google.com; s=arc-20160816; b=UlfgO0lpr8JqO1/2i1GAuiFaT+k5k57AVVSTI/fyOVkbrtBgf9KzwcG4VobZrNkcjA mmUEeREohsQnEL7WASnKPHzDpT7XnV2isCqjArl99lragxZANnuhNL8A0mFq+uZxYdIL yKCxozKb7MDi24O4pDi3HMDlTnZclZGdZctacNe2ijzG+s0yBcnx9zDEu/+1112eVLbg WbyZ4Tw1Az7GcSKyeI34oNVIfHjhYVpXLfaGtI/ePsFrctY2kVj4K8tYMlAzbUS98xAh Rj/GvxZDmKBf3vI35PsDQtUE0b2vS0pk9o9ceKp0JfQznM9lFv2M4iD6xFxnEZd8vHax F08g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=j5tjpwG95NMneNvkZrZuuP58BNA+DYtbNUwlFLXa088=; b=teChgQp1lhgdlt/TDXYfqilnytYtlY0AYig7QoBaPNsYf5KDwTmC8mG16h1tAAbJ3T hmQH/xpV4XdDWeFCYJEpCQ6elQaj8RqnLL++svQyYjAk2DjZeDdr2BlWqV8RGXkLGLi8 q2+vo7Us/U/JTRcaI8uV+3fHyJxb2LpRQ1KyyovYNBAc6u2KdWG1Ew2ryx0zshdq6dKm pV7/c41JhFQxtXkA3jJjOIUL+gc4s9GiRdk1axBTOPgn8ajNVJOdZMTjype8XEhEGmmd 4L0nO4ZVJXkq4uMHj4EoIwjxG27hXvNmKtlqk1CQEt7fEuCby+iuXqRvuOEbbYk7rjRJ OlqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@samba.org header.s=42 header.b=a5x+MjnJ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=samba.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id eb8si2398123edb.361.2021.08.18.20.49.46; Wed, 18 Aug 2021 20:50:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@samba.org header.s=42 header.b=a5x+MjnJ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=samba.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236028AbhHSDuF (ORCPT + 99 others); Wed, 18 Aug 2021 23:50:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37044 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235806AbhHSDuE (ORCPT ); Wed, 18 Aug 2021 23:50:04 -0400 Received: from hr2.samba.org (hr2.samba.org [IPv6:2a01:4f8:192:486::2:0]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A293DC061764; Wed, 18 Aug 2021 20:49:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=samba.org; s=42; h=Date:Cc:To:From:Message-ID; bh=j5tjpwG95NMneNvkZrZuuP58BNA+DYtbNUwlFLXa088=; b=a5x+MjnJdalNxaXTqFlHAcM74Y BeWcrdGfHsRK2BUUKzE5rHJUJNzlKIEUi6JpR1OwX5XADMJrfHBHfYwt7Re/tqYH0FKqVYpVdU+J/ +++gJ81R7ghl1fIv+OsLYX+Fl4Kn0ybRIxSOB4x+PJeQwLN8WDEkd4dNrcLcqH+1bZOWrVZwlKZ2G 7es3417aDlkCMz6VnUxf4Jiynxo4++wcgU7uTr5RW886HTEx17R3z2u+KvZ8Pj33JWUQtl++HCZGV ExraIrEsSgAHL/4ctZpua/e8wm/Xn+jGo/q/VVChYmuZX4mvZOdd5On9g5iDFZWiBJ6jOYN69WZXx RVnc+rpcqtVa7YYn53PCk0fC8kc88tzPkukFQjMwwAkzYQ76pCzOuXNGL88TvM+IY4Zu+PwLPSrAM jFbrfZruvdtWvv8wp5uU2/61Z3/+r/Jv7u9FCX0AHoA2UBzBvX/ssGUAOdyOEAg7IWIQM3TtIPOTd fM423ije1pODh1jMqDy4Ben6; Received: from [127.0.0.2] (localhost [127.0.0.1]) by hr2.samba.org with esmtpsa (TLS1.3:ECDHE_SECP256R1__ECDSA_SECP256R1_SHA256__CHACHA20_POLY1305:256) (Exim) id 1mGZ3U-0020Ds-IC; Thu, 19 Aug 2021 03:49:25 +0000 Message-ID: Subject: Re: [PATCH 0/2] crypto: remove MD4 generic shash From: Andrew Bartlett To: Jeremy Allison , Steve French Cc: linux-cifs , Herbert Xu , Eric Biggers , samba-technical , David Howells , Steve French , keyrings@vger.kernel.org, Linux Crypto Mailing List , Ard Biesheuvel , Denis Kenzior Date: Thu, 19 Aug 2021 15:49:14 +1200 In-Reply-To: References: <20210818144617.110061-1-ardb@kernel.org> <946591db-36aa-23db-a5c4-808546eab762@gmail.com> <24606605-71ae-f918-b71a-480be7d68e43@gmail.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5-0ubuntu1 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, 2021-08-18 at 15:08 -0700, Jeremy Allison via samba-technical wrote: > > My 2 cents. Preventing NTLM authentication/signing from working would > be > a negative for the Linux kernel client. I don't mind if that code has > to be isolated inside cifs.ko, but it really needs to keep working, > at least until we have a pluggable client auth in cifs.ko and Samba > that allows the single-server (non AD-Domain) case to keep working > easily. I would echo that, and also just remind folks that MD4 in NTLMSSP is used as a compression only, it has no security value. The security would be the same if the password was compressed with MD4, SHA1 or SHA256 - the security comes from the complexity of the password and the HMAC-MD5 rounds inside NTLMv2. I'll also mention the use of MD4, which is used to re-encrypt a short- term key with the long-term key out of the NTLMv2 scheme. This thankfully is an unchecksumed simple RC4 round of one random value with another, so not subject to known-plaintext attacks here. I know neither MD4 nor HMAC-MD5 is not flavour of the month any more, with good reason, but we would not want to go with way of NFSv4 which is, as I understand it, full Kerberos or bust (so folks choose no protection). Andrew Bartlett -- Andrew Bartlett (he/him) https://samba.org/~abartlet/ Samba Team Member (since 2001) https://samba.org Samba Team Lead, Catalyst IT https://catalyst.net.nz/services/samba Samba Development and Support, Catalyst IT - Expert Open Source Solutions