> I'd still like someone to explain why we're wasting man hours, CPU time, > filling up our router logs, and potentially making DoS easier, for an > attack that doesn't exist.
because the non-existent attack(s) have occurred. and keys have been compomised. randy