Date: Fri, 4 Jan 2002 18:46:39 -0500 From: Leo Bicknell <bicknell@ufp.org> To: Terry Lambert <tlambert2@mindspring.com> Cc: "Louis A. Mamakos" <louie@TransSys.COM>, Guido van Rooij <guido@gvr.org>, William Carrel <william.carrel@infospace.com>, freebsd-hackers@FreeBSD.ORG Subject: Re: path_mtu_discovery Message-ID: <20020104234639.GA53752@ussenterprise.ufp.org> In-Reply-To: <3C363C47.1AE94141@mindspring.com> References: <26E71536-013D-11D6-8ED3-003065D5E9A4@infospace.com> <3C36149B.B9C02DCF@mindspring.com> <20020104223235.GA64301@gvr.gvr.org> <200201042302.g04N2A789953@whizzo.transsys.com> <3C363C47.1AE94141@mindspring.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In a message written on Fri, Jan 04, 2002 at 03:35:35PM -0800, Terry Lambert wrote: > Of course, now you've let the dirty little secret out of the > bag: the MTU is on the *route*, which means on the next hop, > so a spoof that got through would frag basically all traffic > out of the victim machine down to 296 bytes... I might be assuming something here, but I want to clarify. It is _NOT_ the case that a box with say, only a default route, would limit _ALL_ TCP connections to the lowest returned MTU. The MTU is on the *route*, where *route* == the cloned route, correct? -- Leo Bicknell - bicknell@ufp.org - CCIE 3440 PGP keys at http://www.ufp.org/~bicknell/ Read TMBG List - tmbg-list-request@tmbg.org, www.tmbg.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020104234639.GA53752>