On 8 Nov 2014, at 17:09, McDonald Richards wrote:

Any failure or success stories you can share?

In my experience, it's the generally broadband access operators who will sometimes respond, when contacted about reflection/amplification attacks leveraging misconfigured, abusable CPE.

Generally speaking, networks running misconfigured, abusable devices by definition aren't very actively managed - and so those operators don't often respond, unless one has personal contacts within the relevant group(s).

YMMV, of course.

-----------------------------------
Roland Dobbins <rdobb...@arbor.net>

Reply via email to