Message157837
I only looked quickly at the web pages, so I may have misunderstood.
But it sounds like this applies when the attacker gets multiple chances to guess the digest for a *fixed* message (which was presumably chosen by the attacker).
That is not the case here because deliver_challenge() generates a new message each time. Therefore the expected digest changes each time. |
|
Date |
User |
Action |
Args |
2012-04-09 10:52:42 | sbt | set | recipients:
+ sbt, Jon.Oberheide |
2012-04-09 10:52:42 | sbt | set | messageid: <1333968762.94.0.141984861563.issue14532@psf.upfronthosting.co.za> |
2012-04-09 10:52:42 | sbt | link | issue14532 messages |
2012-04-09 10:52:42 | sbt | create | |
|