Comment by immibis

1 day ago

How do you secure it against being used as a reflector in a UDP amplification attack?

Probably rate limits, making sure response minification is fully enabled, and maybe set a low truncation size?

You can't run a public service without reflecting something, but you can endeavour to make the reflection ratio small.