Closed fiestajetsam closed 1 year ago
In thinking about this, I'm not sure there's any requirements we could add here to the protocol - if a source is sending a lot of incoming requests and is not (intentionally or otherwise) ignoring a KoD or something of that nature, as a host or a network operator your options are limited to implementing traffic management in firewall/routing and/or emailing noc@ on the other side. I don't see any other realistic options here. Further I don't think there's any more that could be included into a document because like in #39, this becomes more in the "deployment considerations" domain which I think is outside of scope of this I-D.
Ulrich writes:
In addition to this there should be some text describing some suggestions on how this should be dealt with.