Change password
This password form uses the
zxcvbn
password strength estimator to give an indication of password strength.
The crack time estimage given above assume online attack without rate
limiting, at a rate of 10 attempts per second.
Offline cracking
The datatracker currently uses the {{ hasher.algorithm }}
password hasher with
{% if hasher.iterations %}
{{ hasher.iterations }} iterations
{% elif hasher.rounds %}
{{ hasher.rounds }} rounds
{% elif hasher.time_cost and hasher.memory_cost and hasher.parallelism %}
time cost {{ hasher.time_cost }}, memory cost {{ hasher.memory_cost }}
and parallelism {{ hasher.parallelism }}
{% endif %}
.
Calculating offline attack time if password hashes should leak is left
as an excercise for the reader.
As a guideline, if we assume offline hashing using the current hasher
at a speed of 104 attempts per second, this password would
take to crack.