------
This is not how border routers work. Those do not keep a packet in
memory until some check-up would finish. They are *stateless* when it
comes to forwarding packets, otherwise they could be DDoS'd much
easily than today. IOW, they do not *know anything* about other
packets while processing your "tracking packet".
What if a tracking packet is lost in transit? What if it arrives an
hour later? How long does it take for a router to drop a packet
without a confirmation?
------
The firmware - the upgraded software - is set how the router works - even if it intentionally intended to be stateless. If a tracking packet is lost in transit then this is exactly such as the original ip packet is lost in transit - the source and destination
will communicate between themselves when the ip packet wasn't received. There will be a timeout for the tracking ip packet so an hour later will be too late. Round table of the RIRs and routing equipment manufacturers will set the timeout value.
------
This is not how vulnerabilities work. They are frequently
*introduced* by an update.
I'm waiting for your financial analysis of the concept "let's keep a
VM for every published CVE" (assuming that every actively exploited
vulnerability even gets a CVE, which is also not how it works).
------
Vulnerabilities can be at the templates as well, and as you wrote also in the updates, updates can be performed in a monitored way so the system will know exactly which VM's have which updates. No - I didn't write lets keep a VM for every published CVE,
Each VM can have vulnerabilities of many CVE's.
------
This is not gonna work for P2P botnets.
------
Yes, but they are not the majority of botnets, one step at a time.
-----
(possibly intentionally).
-----
Yes, intentionally.
Respectfully,
Elad