* Tom Yu:

> Florian Weimer <f...@deneb.enyo.de> writes:
>
>> * Tom Yu:
>>
>>> Some limited testing indicates that when the packet storm is confined
>>> to a single host, legitimate kpasswd and kadm5 requests can still get
>>> through, and the CPU usage pegs at about 70%.  I haven't tested with
>>> multiple hosts involved.
>>
>> Out of curiosity, how many spoofed packets have you injected?
>
> I only did some proof of concept testing with a single spoofed packet.

Okay, that explains the limited impact. 8-)


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to