I'd still like someone to explain why we're wasting man hours, CPU time,
filling up our router logs, and potentially making DoS easier, for an
attack that doesn't exist.
because the non-existent attack(s) have occurred. and keys have
been compomised.
randy