[PATCH 3/3] Drop packets that are too large without dropping connection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, May 10, 2017 at 8:03 PM, Nikolay Martynov <mar.kolya at gmail.com> wrote:
>
> Sometimes server sends us packets that are larger than negotiated MTU.
> Current implementation bails out in this case.
> This patch just makes openconnect to drop such packets and continue.
> It looks like data stream from VPN server is generally correct - with
> exception of packet being too large, so we can continue parsing further
> packets.
>

My concern here is that with some protocols the MTU is not known
authoritatively, and must be estimated, and might be wrong.

For example, in my fully-functional, though not yet merged, branch
supporting GlobalProtect (https://github.com/dlenski/openconnect/)
there is no way to request a specific MTU, and I have never seen a
server that actually reports the MTU correctly.

> This improves connection stability.

How so? What is the downside to accepting an unexpectedly large packet
which nevertheless managed to make it across the VPN tunnel?

-Dan



[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux