{% extends "base.html" %} {# Copyright The IETF Trust 2015, All Rights Reserved #} {% load origin %} {% load django_bootstrap5 %} {% load static %} {% block title %}Change password{% endblock %} {% block js %} {{ block.super }} {% endblock %} {% block content %} {% origin %} {% if success %}

Your password was successfully changed.

{% if not user.is_authenticated %} Sign in {% endif %} {% else %}

Change password

{% if update_user and update_user != user %}
This will change the password for user {{ update_user }}.
{% endif %}
{% csrf_token %} {% bootstrap_form form %}
Online attack: This password form uses the zxcvbn password strength estimator to give an indication of password strength. The crack time estimate given above assume online attack without rate limiting, at a rate of 10 attempts per second.
Offline cracking: The datatracker currently uses the {{ hasher.algorithm }} password hasher with {% if hasher.iterations %} {{ hasher.iterations }} iterations {% elif hasher.rounds %} {{ hasher.rounds }} rounds {% elif hasher.time_cost and hasher.memory_cost and hasher.parallelism %} time cost {{ hasher.time_cost }}, memory cost {{ hasher.memory_cost }} and parallelism {{ hasher.parallelism }}{% endif %}. Calculating offline attack time if password hashes should leak is left as an exercise for the reader. As a guideline, if we assume offline hashing using the current hasher at a speed of 104 attempts per second, this password would take to crack.
{% endif %} {% endblock %}