On Sun, Jul 09, 2006 at 01:24:17PM +0300, Pekka Savola <[EMAIL PROTECTED]> wrote a message of 46 lines which said:
> The attacker could just use whatever 3rd party DNS records that > already exist, right? Existing actual records do not typically provide a good amplification, they are often too small. So, you are right, this step is no *necessary* but in practice is very common. . dnsop resources:_____________________________________________________ web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html