"David J Taylor" <[EMAIL PROTECTED]> writes: > Jon Kåre Hellan wrote: > > [EMAIL PROTECTED] (David Woolley) writes: > > > >> In article <[EMAIL PROTECTED]>, > >> David J Taylor > >> <[EMAIL PROTECTED]> wrote: > >> Almost certainly what happened is that the random selection of > >> servers > >> selected one that particularly disliked unauthorised accesses on > >> port 37 > >> and deliberately served an incorrect time to such clients to try and > >> dissuade them. Subsequently it selected a server that wasn't so > >> aggressive > >> in defending itself against port 37 attacks. > > > > What makes you choose to call it an attack? > > > > Regards > > > > Jon > > Jon, please be a little more careful with your quoting. David Wolley > wrote the remarks to which you responded, but you left my name (David J > Taylor) in your quoted text as well. > > Thanks, > David
My apologies Jon _______________________________________________ questions mailing list [email protected] https://lists.ntp.isc.org/mailman/listinfo/questions
