prop 153 fixes

This commit is contained in:
zzz
2019-08-05 14:22:02 +00:00
parent e169a54013
commit a904e87b52

View File

@@ -5,8 +5,8 @@ ChaCha Tunnel Layer Encryption
:author: chisana
:created: 2019-08-04
:thread: http://zzz.i2p/topics/2753
:lastupdated: 2019-08-04
:status: Draft
:lastupdated: 2019-08-05
:status: Open
.. contents::
@@ -333,3 +333,9 @@ The padding oracle attacks against AES256/CBC won't work, because no padding is
changed to non-mod-16 lengths, AES256/CBC would still not be vulnerable due to rejected duplicate IVs.
Both attacks are also blocked by disallowing multiple oracle calls using the same IV, since duplicate IVs are rejected.
References
==========
.. [Tunnel-Implementation]
https://geti2p.net/en/docs/tunnels/implementation