> There seem to be many daily examples of very large numbers of client  
> machines being controlled remotely to participate in activities that  
> the owner/operators of those machines aren't aware of. If there's a  
> hook available to turn RH0 processing back on, and RH0 is useful to  
> the kind of people who control botnets today, then I think it's a  
> fair bet that RH0 will be turned back on regardless of the default  
> setting is.

If you want to bounce packets around, it would seem far simpler to
turn on a UDP echo service - it doesn't have to have an 80 bounce
limit.  Or, if it is firewall evasion you're after, configure a
tunnel and turn on forwarding - it could even hide your real source
address.

If you've access to someone's machine and can twiddle parameters
of their IP stack, then RH0 isn't a big deal.

        David.

--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to