sbt <shibt...@gmail.com> added the comment:

I only looked quickly at the web pages, so I may have misunderstood.

But it sounds like this applies when the attacker gets multiple chances to 
guess the digest for a *fixed* message (which was presumably chosen by the 
attacker).

That is not the case here because deliver_challenge() generates a new message 
each time.  Therefore the expected digest changes each time.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue14532>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to