User1421602847 posted
Thanks Michelle. Yes we can detect a ViewStateMAC error but the page fails none-the-less. So the underlying problem is that we have to identify what is causing the ViewStateMAC errors and has proved to be an impossible task so far. We have researched thousands
of pages and tried every suggestion. We are now trying to rewrite the pages to use not VIEWSTATE at all which completely defeats the purpose of this great feature. The web is littered with bazillions of users fighting this error. My client had to resort to
using enableViewStateMAC=false and now that is no longer an option. Since we did not see the bulletin about this change and my client has production servers with pages crashing, have tried everything MS suggest to fix these and have no tools to identify the
cause. This could bring down their small business.
My point was that you can perform completely valid coding that can cause ViewStateMAC checksums to change while a ViewStateMAC change could be a security attack, 99.9% of the time it is not. But MS decides it so dangerous that it must match every time. Of
all the problems, ASP.NET security, MS had to choose this one to shove down our throats?