On Oct 31, 2012, at 4:37 AM, Florian Weimer wrote:

> Reflection attacks do not use totally random source addresses, so the 
> typically state exhaustion vector does not necessarily apply.

There are many more types of attacks other than reflection/amplification 
attacks, though, and it's those to which I was referring - sorry for being 
unclear.

-----------------------------------------------------------------------
Roland Dobbins <[email protected]> // <http://www.arbornetworks.com>

          Luck is the residue of opportunity and design.

                       -- John Milton

_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to