Re: clearing dont-fragment bit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Oct 09, 2003 at 04:52:48PM +0200, Abraham van der Merwe wrote:

> Ideally one would want to leave DF untouched unless a packet with DF=1 is
> resent in which case you clear it - that way you solve PMTU probes, but I
> suspect this would be overly complicated / resource intensive.
> 
> Even better would be if there was a tunnelling protocol that would just take
> packets on side A (incl ip headers, galore), chop it up, and reassemble it
> on the other side. Unfortunately there is no such thing :P

Use conntrack on both sides at the entrance. It'll ensure the reassembly of
the fragments...

> 
> > Can you come up with a list of the non-TCP-based application protocols that
> > would use the PMTU (DF bit)?
> 
> Basically any UDP application that sends packets bigger than the maximum
> allowed mtu. I would assume TFTP, SNMP, etc. would all get into trouble. I
> know that some protocols such as DNS try to stay below 512 bytes payload,
> but there is probably a gazillion protocols out there that don't.

Neither TFTP nor SNMP set the DF bit and as you said DNS enforces the
packet size itself. NFS might do that though (not sure) but one would
think that NFS should not span over the Internet. So, what other UDP-based
applications use the DF bit?

Ramin


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux