[Bug 1288823] Re: Trusty bind9 RRL
Ralf Hildebrandt
Ralf.Hildebrandt at charite.de
Thu Mar 20 08:17:45 UTC 2014
Given that response rate limiting is considered (short of implementing BCP 38) the recommended
mitigation against the rampant DNS Amplification Attacks it would be foolish to strip Ubuntu LTS users of that tool!
See: https://www.us-cert.gov/ncas/alerts/TA13-088A
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in Ubuntu.
https://bugs.launchpad.net/bugs/1288823
Title:
Trusty bind9 RRL
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/1288823/+subscriptions
More information about the Ubuntu-server-bugs
mailing list