> Of course, once there are shim6 aware firewalls, we don't know
how
> they will behave. But we could at least recommend that they take > this issue into consideration, by recommending > 1) that they not block shim6 by default, but instead look at the > carried (TCP, UDP, etc) payload
You may ask firewall admins to "please not block shim6". You may even
shout from the hill tops. Whether they will heed your advice is
anybody's guess. After all, these are the same folks who routinely block
ICMP.
If we want end-to-end options to not be blocked by firewalls, the best solution is to encrypt them. That is, run shim6 inside IPSEC, end to end.
Erik