Before we invent a new header, have we looked at ways were the current
legitimate usage could be solved by dedicated applications? Something in
the spirit of traceroute, maybe with a little cooperation from the
involved players in the spirit of UDP echo? Specialized applications
open a much smaller attack surface than an IPv6 layer mechanism. They
are also easier to secure using end-to-end mechanisms.

-- Christian Huitema




--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to