* Tom Yu: > Florian Weimer <f...@deneb.enyo.de> writes: > >> * Tom Yu: >> >>> Some limited testing indicates that when the packet storm is confined >>> to a single host, legitimate kpasswd and kadm5 requests can still get >>> through, and the CPU usage pegs at about 70%. I haven't tested with >>> multiple hosts involved. >> >> Out of curiosity, how many spoofed packets have you injected? > > I only did some proof of concept testing with a single spoofed packet.
Okay, that explains the limited impact. 8-) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org