Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 4 Jan 2002 18:56:22 -0500
From:      Leo Bicknell <bicknell@ufp.org>
To:        William Carrel <william.carrel@infospace.com>
Cc:        Terry Lambert <tlambert2@mindspring.com>, freebsd-hackers@FreeBSD.ORG
Subject:   Re: path_mtu_discovery
Message-ID:  <20020104235622.GA53844@ussenterprise.ufp.org>
In-Reply-To: <C64F7C2E-0159-11D6-9ED7-003065B4E0E8@infospace.com>
References:  <3C36149B.B9C02DCF@mindspring.com> <C64F7C2E-0159-11D6-9ED7-003065B4E0E8@infospace.com>

next in thread | previous in thread | raw e-mail | index | archive | help
In a message written on Fri, Jan 04, 2002 at 01:26:54PM -0800, William Carrel wrote:
> See now you've made me curious, and I ask myself questions like: How 
> robust is PMTU-D against someone malicious who wants to make us send 
> tinygrams?  Could the connection eventually be forced down to an MTU so 
> low that no actual data transfer could occur, or TCP frames with only 
> one byte of information?

I don't have the RFC handy, but aren't all Internet connected hosts
required to support a minimum MTU of 576 from end to end with no
fragmentation?  Thus if we ever got an MTU less than 576 we should
ignore it.  Right?

-- 
       Leo Bicknell - bicknell@ufp.org - CCIE 3440
        PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - tmbg-list-request@tmbg.org, www.tmbg.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020104235622.GA53844>