Before we invent a new header, have we looked at ways were the current legitimate usage could be solved by dedicated applications? Something in the spirit of traceroute, maybe with a little cooperation from the involved players in the spirit of UDP echo? Specialized applications open a much smaller attack surface than an IPv6 layer mechanism. They are also easier to secure using end-to-end mechanisms.
-- Christian Huitema -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------