On Thu, 11 Jan 2018 15:28:19 -0500, William Herrin said: > On Thu, Jan 11, 2018 at 2:46 PM, Dale W. Carder <dwcar...@es.net> wrote: > > > > Traceroute or any other path diagnostics comes to mind.
> That's not obvious to me. Assuming the time-exceeded message was modified > to include the necessary data, how would blockchain authenticate the > responding router? And do you really want to do *all* that on every single 'TTL Exceeded' ICMP? Sounds like a *really* easy way to DDoS a router....
pgp2reTgCcYbW.pgp
Description: PGP signature