1 A list of the crypto operations that we require, and what uses them.
3 This list is to allow research into using external crypto libraries.
4 Those possibly supported in the git version of GnuTLS are indicated as '# GNUTLS'
5 Those possibly supported in the git version of nettle are indicated as '# NETTLE'
7 Samba in general gnutls >= 3.4.7 is required
8 Samba FS with MS Catalog support will require gnutls >= 3.5.6
10 GnuTLS Milestone for Samba support:
11 - https://gitlab.com/gnutls/gnutls/milestones/14
15 - Password encryption on SAMR for password set/get
16 - NETLOGON SamLogon session keys
18 - DRSUAPI replication replicated secrets
24 - NTLM challenge-response
25 - LSA QuerySecret et al
26 - NETLOGON SamLogon session keys
27 - ServerGetTrustInfo returned passwords
28 - RID encryption of passwords
30 # No support in gnutls, it cannot be a certified use of crypto
31 # NETTLE (any version)
34 - NETLOGON Credentials (can't find any use in Samba)
37 - backupkey (uses heimdal lib or gnutls with mit krb5)
39 # gnutls >= 3.4.7 (3des cbc with 192 bit key is supported); can no longer be a certified use of crypto
43 - DRSUAPI replication replicated secrets
47 AES 128 in 8-bit CFB mode
49 - NETLOGON SamLogon session keys
51 # Missing in GNUTLS -> Bug opened
52 # NETTLE 3.4 contains CFB - possibly 128-bit mode (AES-NI available)
55 - SMB2 2.24 SMB encryption
58 # NETTLE (AES-NI available)
61 - SMB2 3.10 SMB encryption
62 - encrypted_secrets ldb module (encrypt secrets within sam.ldb)
65 # NETTLE (AES-NI available)
68 - SMB2 0x224 SMB Signing
70 # Missing in GNUTLS - > Bug opened
71 # Missing in NETTLE -> Bug opened
76 # Cannot be certified; considered non-crypto
80 - NTLM2 (can be considered non-crypto use of MD5)
81 - SCHANNEL (it's ok to fail in FIPS140 mode, as there are alternatives)
82 - NTLMSSP (it's ok to fail in FIPS140 mode, replaced by kerberos)
83 - NETLOGON computer credentials (it's ok to fail in FIPS140 mode, as there are alternatives)
84 - DRSUAPI blob encryption (can be considered non-crypto use as it is over DC-RPC which is encrypted)
85 - SAMR/wkssvc password change/set encryption
88 - passdb old password history format
89 - dsdb password_hash module
93 maybe use gnutls_fips140_mode_enabled() and enable only SMB2/3 when in fips mode?
95 # GNUTLS >= 3.0.0 (Will fail in FIPS mode, for non-crypto -> https://gitlab.com/gnutls/gnutls/merge_requests/572 , open bug for RC4, MD5 being available for non-crypto use )
101 # GNUTLS >= 3.0.0 (non-crypto)
105 - SMB2 < 2.24 SMB signing
106 - SMB2 Key derivation
112 - BackupKey ServerWrap
118 - Security Descriptor hash for vfs_acl_xattr
125 - SMB2 Pre-auth integrity verification
126 - BackupKey ClientWrap
132 - BackupKey ClientWrap
139 Use gnutls_rnd() in generate_random_buffer() to increase speed