Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 05 Jan 2002 01:14:24 +0100
From:      "Rogier R. Mulhuijzen" <drwilco@drwilco.net>
To:        freebsd-hackers@freebsd.org
Subject:   Re: path_mtu_discovery
Message-ID:  <5.1.0.14.0.20020105011402.01d75230@mail.drwilco.net>

next in thread | raw e-mail | index | archive | help
<snip description="put minimum mtu in tuneable sysctl"/>

>I suppose so, but then you won't be able to connect to machines with 
>miniscule path MTU's, and that should definately be a warning.  But then 
>it beats Linux which allows the path MTU to be reduced to 69 bytes (ouch!).

Ouch indeed. Well default would be what we have now, but you'd be able to 
tune it. The way I see it is that the attack would be most common on the 
internet, and minuscule MTUs would most probably occur in specialistic 
environments. Admins of potential targets would raise the minimum to a nice 
value (say 512 or 1024), and print a message when something requests 
something below this minimum, for troubleshooting ease.  Or maybe a soft 
limit and a hard limit. Soft limit triggers a message, hard limit is enforced.

Out of curiosity, where do MTUs < ~512 occur?

>The best solution is to try and make sure that the mustfrag messages are 
>coming from real connections we have open, and perhaps even, make sure 
>that the host on the remote end hasn't already ACK'ed a packet whose 
>header shows up in the ICMP mustfrag.  (It would be kind of silly to get 
>an ACK and a mustfrag.)  Although, then it is just a race to see who gets 
>their packet to us first.

What about a mustfrag flood? Wouldn't this be a tad much to process?

         DocWilco


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20020105011402.01d75230>