> There seem to be many daily examples of very large numbers of client
> machines being controlled remotely to participate in activities that
> the owner/operators of those machines aren't aware of. If there's a
> hook available to turn RH0 processing back on, and RH0 is useful to
> the kind of people who control botnets today, then I think it's a
> fair bet that RH0 will be turned back on regardless of the default
> setting is.
If you want to bounce packets around, it would seem far simpler to
turn on a UDP echo service - it doesn't have to have an 80 bounce
limit. Or, if it is firewall evasion you're after, configure a
tunnel and turn on forwarding - it could even hide your real source
address.
If you've access to someone's machine and can twiddle parameters
of their IP stack, then RH0 isn't a big deal.
David.
--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------