> I'd still like someone to explain why we're wasting man hours, CPU time, 
> filling up our router logs, and potentially making DoS easier, for an 
> attack that doesn't exist.

because the non-existent attack(s) have occurred.  and keys have
been compomised.

randy

Reply via email to