If the attacker have precise timing, it could be possible for it to trick ss into accept multiple connection with the same Salt/IV if they all pass the Salt/iv test at the same time if while other connection c.Encrypter(salt) is in process, and before they add that IV into the anti-replay pool.
If the attacker have precise timing, it could be possible for it to trick ss into accept multiple connection with the same Salt/IV if they all pass the Salt/iv test at the same time if while other connection c.Encrypter(salt) is in process, and before they add that IV into the anti-replay pool.
This PR does not solve any protocol weakness.