The above analysis indicates that there are several significant reflector attack threats:
Without this assumption, Web servers can be attacked by requests chained through proxies serving as reflectors, SMTP servers by mail sent through relays, and any TCP-based server by requests reflected through mechanisms such as FTP PORT directives.