-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ------- Original Message ------- On Friday, July 28th, 2023 at 16:42, Niccolò Belli <darkba...@linuxsystems.it> wrote:
> Il 2023-07-29 18:13 tincantech ha scritto: > > > My analysis of your test data, reduces to the following comment: > > > > Personally, I do not consider Google to be a valid target to test > > against. > > <snip>> > I used Google as an example, but the MTU I've found is correct and I can > confirm it with any other address, including my server's public IP. In future, the only valid target is your server (or client). <snip> I am not interested in comparing your various network paths. Establish a well known MTU on a well known path, first. > > However, considering the data you have posted, I think OpenVPN > > has documented the most simple solution. > > > > The example given is to use these options: > > > > --tun-mtu 1500 --fragment 1300 --mssfix > > > > If you are confident that you have established the genuine PMTU > > between your client and server then adjust the --tun-mtu value > > as you see fit. Then, starting with the --fragment value given, > > adjust --fragment until you establish the likely maximum. > > > What's fragment's max parameter (1300 in your example) supposed to mean? > If it's the payload size after which openvpn starts to internally > fragment packets shouldn't I just set "--fragment xxxx mtu" where xxxx > is the lowest MTU between the client and the server? Considering your command of English, this is documented: https://build.openvpn.net/man/openvpn-2.6/openvpn.8.html See: --fragment, --mssfix and --tun-mtu Regards -- -----BEGIN PGP SIGNATURE----- Version: ProtonMail wsBzBAEBCAAnBYJkxU8OCZBPl5z2a5C4nRYhBAm8PURno41yecVVVU+XnPZr kLidAABX0Af/eo6M+D1v18WxvIbE3/ZaRNCtRN11yw6hsocP9j7bZXcINYFW fVdSCYOPm8lb9tDGVTMGKQHUqh8m1jWWMyubGD/aBjBkxUuum4IsRTlaJMdo j1TdBvuV1yCamIeA7EgfK1Y/7O1THwauvlO6PgSE7/aEIxgRLPmaVJgQ/nMA lB6Rx89v3a1DIEWwt9GMPVP3Q3evmi8oxzC1IEVxFAgvBo2LI/WV9KbnhO9D jR6tUQvRyLWzf7PTu6e+g0MQZt41xNUsMzWw75zIbwXjxjoFM6T0TJ6MscPI 7Y3QkJSaQhQRxycjO/AKWzalIxH3ZdPk1RQDVoLNqcQ2uVgI9GHk4w== =2tag -----END PGP SIGNATURE-----
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users