Pawel Foremski writes:
 > For example because MPPE is optional and some sessions may be encrypted and
 > some not. As I mentioned, we cannot influence the ISP in topic.
 > 
 > More generally, I wanted to present an example of a layer-2 encapsulation
 > that Linux does not know or (as in this case) can't modify the data in it,
 > thus it cannot fix the TCP MSS value.

Given the same problem (securely bridging PPPoE over WiFi) I would
gone with an approach that peeked inside to see if there was MPPE and
in that case done nothing and if there was no MPPE adjusted the MSS of
any TCP traffic and wrapped it in another layer of IPsec+GRE.  The
latter eats up another 40-60 bytes of MTU/MSS but on the positive side
has known security properties and has no reordering issues.  However,
given that the code would be rather ugly (lots of layering violations)
I wouldn't have a high expectation of that code being accepted into a
major Linux tree unless bridged PPPoE over WiFi was something that
lots of users were clamouring for.  Hopefully PPPoE will die out and
make the issue moot.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to