Hey Fedi! What's a short list of best practices for writing or configuring software to:
1. Not be a source of a DDoS attack
2. Be more resilient to a DDoS attack
I know basics (e.g. disable recursive DNS resolution, use as few resources as possible on incoming connections till verified as legit) but I would like a complete list and, boy howdy, all the search results are someone providing a DDoS protection service.
This is for the CRA OS standard, funded by EFTA and the EC