OK. I guess my question is where do you draw the line between an attack and a network problem. I suspect reflections are caused more by network problems than by attacks so I'd prefer that we report an error in the case of a reflection than ignoring it.