We had a fun breakthrough in #netatalk in recent days: the SRP (Secure Remote Password) user authentication method is now reverse engineered and supported by the open source AFP server.
Apple quietly added SRP to the AFP protocol some time in 2010 (our testing indicates OSX 10.7 Lion) but never acknowledged or documented it.
SRP caught my eye since it would offer roughly twice as strong encryption as DHX2 which is the final "official" UAM from Apple.
Luckily, SRP is an open standard and not an Apple proprietary technology: described in RFCs 2945 and 5054. So the reverse engineering was straight-forward, using consumer products that are known to support SRP, then brute force a few dozen potential parameters afforded by RFC 5054.
I did this write-up about the protocol and cryptographic mechanism as a sort of community specification.
https://netatalk.io/spec/SRP_UAM
The upcoming Netatalk v4.5 will support SRP!



