Given that response rate limiting is considered (short of implementing BCP 38) the recommended mitigation against the rampant DNS Amplification Attacks it would be foolish to strip Ubuntu LTS users of that tool!
See: https://www.us-cert.gov/ncas/alerts/TA13-088A -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to bind9 in Ubuntu. https://bugs.launchpad.net/bugs/1288823 Title: Trusty bind9 RRL To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/1288823/+subscriptions -- Ubuntu-server-bugs mailing list [email protected] Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
