Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp2878804pxb; Tue, 24 Aug 2021 09:41:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwyUuFZ7qpKXWvMnFbIQ/GO2Hg+aeeKT3zfed9f7z1xT9vHDQyBK6SH7xIQcHYgyZWUeFnj X-Received: by 2002:a92:de0a:: with SMTP id x10mr28665598ilm.277.1629823307796; Tue, 24 Aug 2021 09:41:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629823307; cv=none; d=google.com; s=arc-20160816; b=HPmpcjLrpbTfh2owNvVwG4rPJiV117bXKPSpijUFn43joi8tNe8JcdMJ481H3raSCo OSi25UL1yStSe2ThU6ivxqExQAgAMwqIQjiTtO9DJrF9nkJpWfIgWJmeLe2hTdBvpB9F uHzUjYq3CobVLsnJJnxzzdkjUKpaR3i5R3TERTuDVpHCG1EkDohse3/cSzX9Zk/uwwda vQsU8QkZts8CGLfL15rksP9hDxEtIdlRlUKGp8i8H+WK1XF5Z7Hh9nv9y7rRElbCnga0 s19x3/8dcLlxv949FWWMXsQNWYrjwXg4dIbQpfMasYimsfonH8Dg0nixHyLoBi+GgE2S 1j1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=aSziwwwdyIEOJ4mYpFaEyyynDBylrGdfxWjE78omM94=; b=p8O4kjLkDO5o4c95efFsokVZ5bCvSE61mDHMCe2WrufhHxvmq9utOxNr8w6TtO4nJ8 W4RF3nFfuaJ7bPr7vowWeCFvSGfuLpoLryCMz+D5yhkV3T72mxER5nfrGq879HeV6GjN IBWnDF7T1nZWjhtL/Bhz1lV4H3LOhA/PXcWDxJb3YXFM/BH/UKkvqzL5fqqfP9Zm3yEs fHUuA18qSe7BdASATDGNcnNReon1pRDLyhTgSuTIOXvmJhNNuJrzs8kE5YL5sWI7Uc5f 8dp949eeUj+OEeonrNNWerncao1RXmLdvRePyC50ODpJ+4XiR5RJk6IMfMcHlOSfIru+ guMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=DCMmJs4F; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u4si16110595jak.106.2021.08.24.09.41.20; Tue, 24 Aug 2021 09:41:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=DCMmJs4F; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231292AbhHXQl7 (ORCPT + 99 others); Tue, 24 Aug 2021 12:41:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52334 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229896AbhHXQl6 (ORCPT ); Tue, 24 Aug 2021 12:41:58 -0400 Received: from mail-lf1-x129.google.com (mail-lf1-x129.google.com [IPv6:2a00:1450:4864:20::129]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21EE6C061757; Tue, 24 Aug 2021 09:41:14 -0700 (PDT) Received: by mail-lf1-x129.google.com with SMTP id o10so46807599lfr.11; Tue, 24 Aug 2021 09:41:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=aSziwwwdyIEOJ4mYpFaEyyynDBylrGdfxWjE78omM94=; b=DCMmJs4FRG79pqa2rFUGIv1mI88LNPFRfH2H3rCOUVKwIzKqHGC+5U1glL5+Yp8/Cu WpqwYj/8GWmDxLMsEyOasYKwMr6QNRYxcOBKYMLJhRwXSnoQ6eRxmfYW3wv1No5d/JBe Uo8pM1XuZ6G33c06ZYp0iZUz5JwzZAMlMjB+ld+DkY4Kk9paDbwS7Pi7JRUgxCmMgqFg slGFdFrgvOXSv/o23LL3YYIe1Y0/yY//9PLZwr0c0PQ5b0yiQPuqEgZ7EwMo/FRC1iN0 Tnd6yMAG/hqzagdMGxE4whdKhVAuZKjlXo1R5HQMJDpjOIYWUXux5Y8SZv8iBjpPQmCz DclA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=aSziwwwdyIEOJ4mYpFaEyyynDBylrGdfxWjE78omM94=; b=LSZNEowWI438vAkhWHLFvO01p9vDxh+xL+Bk1eKhF9fA8iW+pwgTrSSQ3LAQecfpbC o3TQ8G4CT4UshaVQZFjou1vAVlY5TPfIM8s7ANMC2jPL3ywd9tbCpaJDlUqQQkDbipg3 VOj3a6DJYU4byQJiL4Ql0K09XRQG/WfaC6z3FH5PubdvdmcQHdfU73Kjgm/ZEw1VTWuJ aThkNml3zkuvFS9z/1plxCatoleFObIVDRIvx72wqdMt+BDSV61yI4NWNdgUaThRXH6o Wp4AujmcLcySHSLr8o5kY6NBtoao8YLAtskGTIHDhIAUxsvb09gpdX33ONCL/r2+8FB9 GmAQ== X-Gm-Message-State: AOAM533bQCT6cQYs1U7apx1hQyxSqO915O4186k0Yk81TqlvJJUYERev ccRV8rr5pM/xEaV9/L9gF0yE0QxGX3Td/7/AEXw= X-Received: by 2002:ac2:4561:: with SMTP id k1mr5393956lfm.313.1629823272322; Tue, 24 Aug 2021 09:41:12 -0700 (PDT) MIME-Version: 1.0 References: <627872ec0f8cc52a06f8f58598f96b72b5b9645a.camel@redhat.com> In-Reply-To: <627872ec0f8cc52a06f8f58598f96b72b5b9645a.camel@redhat.com> From: Steve French Date: Tue, 24 Aug 2021 11:41:01 -0500 Message-ID: Subject: Re: Building cifs.ko without any support for insecure crypto? To: Simo Sorce Cc: ronnie sahlberg , Ard Biesheuvel , Eric Biggers , linux-cifs , Steve French , "samba-technical@lists.samba.org" , Linux Crypto Mailing List Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Aug 23, 2021 at 5:05 AM Simo Sorce wrote: > Another way to handle this part is to calculate the hash in userspace > and handle the kernel just the hashes. This would allow you to remove > MD4 from the kernel. I guess it would break putting a password on the > kernel command line, but is that really a thing to do? Kernels do not > boot from cifs shares so you can always use userspace tools (or pass > hexed hashes directly on the command line in a pinch). We can boot from cifs (and given the security features of SMB3.1.1 it probably makes more sense than some of the alternatives) albeit with some POSIX restrictions unless booting from ksmbd with POSIX extensions enabled. Paulo added the support for booting from cifs.ko in the 5.5 kernel. > > I have patches for both DES removal and forking ARC4 prepared for linux-cifs. > > MD4 will require more work since we use it via the crypto_alloc_hash() > > api but we will do that too. > > > > What about MD5? Is it also scheduled for removal? if so we will need > > to fork it too. > > MD5 is still used for a ton of stuff, however it may make sense to > consider moving it in /lib and our of /lib/crypto as it is not usable > in cryptographic settings anymore anyway. Seems reasonable -- Thanks, Steve