"David J Taylor" <[EMAIL PROTECTED]> writes:

> Jon Kåre Hellan wrote:
> > [EMAIL PROTECTED] (David Woolley) writes:
> >
> >> In article <[EMAIL PROTECTED]>,
> >> David J Taylor
> >> <[EMAIL PROTECTED]> wrote:
> >> Almost certainly what happened is that the random selection of
> >> servers
> >> selected one that particularly disliked unauthorised accesses on
> >> port 37
> >> and deliberately served an incorrect time to such clients to try and
> >> dissuade them.  Subsequently it selected a server that wasn't so
> >> aggressive
> >> in defending itself against port 37 attacks.
> >
> > What makes you choose to call it an attack?
> >
> > Regards
> >
> > Jon
> 
> Jon, please be a little more careful with your quoting.  David Wolley 
> wrote the remarks to which you responded, but you left my name (David J 
> Taylor) in your quoted text as well.
> 
> Thanks,
> David 

My apologies

Jon

_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.isc.org/mailman/listinfo/questions

Reply via email to