On Sun, Jul 09, 2006 at 01:24:17PM +0300,
 Pekka Savola <[EMAIL PROTECTED]> wrote 
 a message of 46 lines which said:

> The attacker could just use whatever 3rd party DNS records that
> already exist, right?

Existing actual records do not typically provide a good amplification,
they are often too small. So, you are right, this step is no
*necessary* but in practice is very common.

.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to