Message157837
| Author |
sbt |
| Recipients |
Jon.Oberheide, sbt |
| Date |
2012年04月09日.10:52:42 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1333968762.94.0.141984861563.issue14532@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
I only looked quickly at the web pages, so I may have misunderstood.
But it sounds like this applies when the attacker gets multiple chances to guess the digest for a *fixed* message (which was presumably chosen by the attacker).
That is not the case here because deliver_challenge() generates a new message each time. Therefore the expected digest changes each time. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2012年04月09日 10:52:42 | sbt | set | recipients:
+ sbt, Jon.Oberheide |
| 2012年04月09日 10:52:42 | sbt | set | messageid: <1333968762.94.0.141984861563.issue14532@psf.upfronthosting.co.za> |
| 2012年04月09日 10:52:42 | sbt | link | issue14532 messages |
| 2012年04月09日 10:52:42 | sbt | create |
|