{% extends "base.html" %} {# Copyright The IETF Trust 2015, All Rights Reserved #} {% load origin %} {% load bootstrap3 %} {% load static %} {% block title %}Change password{% endblock %} {% block js %} {{ block.super }} {% endblock %} {% block content %} {% origin %} {% if success %}

Your password was successfully changed.

{% if not user.is_authenticated %} Sign in {% endif %} {% else %}

Change password

{% csrf_token %} {% bootstrap_form form %} {% buttons %} {% endbuttons %}
This password form uses the zxcvbn password strength estimator to give an indication of password strength. The crack time estimage given above assume online attack without rate limiting, at a rate of 10 attempts per second.

Offline cracking

The datatracker currently uses the {{ hasher.algorithm }} password hasher with {% if hasher.iterations %} {{ hasher.iterations }} iterations {% elif hasher.rounds %} {{ hasher.rounds }} rounds {% elif hasher.time_cost and hasher.memory_cost and hasher.parallelism %} time cost {{ hasher.time_cost }}, memory cost {{ hasher.memory_cost }} and parallelism {{ hasher.parallelism }} {% endif %} . Calculating offline attack time if password hashes should leak is left as an excercise for the reader.
{% endif %} {% endblock %}