Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 21 Jul 2007 11:37:05 -0500
From:      David DeSimone <fox@verio.net>
To:        freebsd-net@freebsd.org
Subject:   Re: 6.2 mtu now limits size of incomming packet
Message-ID:  <20070721163704.GC13029@verio.net>
In-Reply-To: <46A10860.50804@es.net>
References:  <200707150237.l6F2bAgZ011098@redrock.karels.net> <469E0FFF.8070802@seclark.us> <20070720172021.8EA3D13C4B3@mx1.freebsd.org> <46A10063.9010902@elischer.org> <46A10860.50804@es.net>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Eli Dart <dart@es.net> wrote:
>
> The networks that are apparently working fine are most likely
> misconfigured, IMHO.
> 
> Others have made a case for permitting an interface to accept as large
> a packet as it can, regardless of configured MTU.  That's fine for
> theory.

It works okay in practice, too.

You are correct about misconfigured networks.  In my experience,
the only reason to ever reduce the MTU is to work around a problem
discovered in someone else's network (not my local segment).  Fixing
the problem by getting someone else to fix their network is generally
too hard.  If MTU == MRU was forced behavior, the viability of this
workaround would be removed, one less tool in the toolbag, so to speak.

- -- 
David DeSimone == Network Admin == fox@verio.net
  "It took me fifteen years to discover that I had no
   talent for writing, but I couldn't give it up because
   by that time I was too famous.  -- Robert Benchley
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFGojYwFSrKRjX5eCoRAipgAJkBV6/IhmR8M+0o/bHviMFEvrfovQCcDP3w
FoLZrDFkw5bJKqIwiLaW62E=
=0KSA
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070721163704.GC13029>