What's interesting is that this is a protocol bug, not an implementation/software bug (in RFC 5961).<p><i>It is intriguing to realize that
the three information leakages are enabled by the three
(and only three) conditions that trigger challenge ACKs...</i><p>Indeed. It almost looks like an intentional back door.