Hide Forgot
+++ This bug was initially created as a clone of Bug #756586 +++ Modern GPUs are able to brute-force hashed passwords faster than ever, even when PBKDF2 or bcrypt are used. Scrypt (http://www.tarsnap.com/scrypt.html) is a key derivation function that is resistant to GPU-based attacks. I would like to see Fedora support the use of Scrypt password authentication. Please see the more detailed paper (http://www.tarsnap.com/scrypt/scrypt.pdf) on Scrypt for further details. --- Additional comment from tmraz on 2011-11-24 03:48:58 EST --- The currently supported SHA256 and SHA512 hashed passwords allow choosing the iteration counts relatively freely. If the scrypt should be supported in Fedora it would have to be included in the glibc crypt() implementation. --- Additional comment from ben on 2011-11-24 04:23:34 EST --- Increasing the number of iterations can increase the time needed to compute a hash by a constant factor for both attackers with GPUs (or other specialized hardware) and ordinary users. Thus, the number of iterations necessary to make brute force attacks with GPUs unfeasible would also require ordinary users to wait a very long time for their CPUs to complete all of the hash iterations when using their passwords. In contrast, Scrypt is designed such that hashes run relatively quickly on an ordinary user's CPU, but very slowly on GPUs used by potential brute-force attackers, forcing attackers to go back to brute-forcing with CPUs, and thus to surrender the advantage provided by GPUs for brute-forcing passwords hashed with current methods. I apologize for filing this under the wrong component, however, and ask that it be looked at by the glibc team.
This is something that really needs to be discussed, designed and implemented upstream (ie, in the official glibc project http://sourceware.org/glibc). If they choose to implement this feature, then Fedora will naturally pick it up