Given that response rate limiting is considered (short of implementing BCP 38) 
the recommended
mitigation against the rampant DNS Amplification Attacks it would be foolish to 
strip Ubuntu LTS users of that tool!

See: https://www.us-cert.gov/ncas/alerts/TA13-088A

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1288823

Title:
  Trusty bind9 RRL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/1288823/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to