Given that response rate limiting is considered (short of implementing BCP 38) the recommended mitigation against the rampant DNS Amplification Attacks it would be foolish to strip Ubuntu LTS users of that tool!
See: https://www.us-cert.gov/ncas/alerts/TA13-088A -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1288823 Title: Trusty bind9 RRL To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/1288823/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs