[Bug 1288823] Re: Trusty bind9 RRL

Ralf Hildebrandt Ralf.Hildebrandt at charite.de
Thu Mar 20 08:17:45 UTC 2014


Given that response rate limiting is considered (short of implementing BCP 38) the recommended
mitigation against the rampant DNS Amplification Attacks it would be foolish to strip Ubuntu LTS users of that tool!

See: https://www.us-cert.gov/ncas/alerts/TA13-088A

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in Ubuntu.
https://bugs.launchpad.net/bugs/1288823

Title:
  Trusty bind9 RRL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/1288823/+subscriptions



More information about the Ubuntu-server-bugs mailing list