-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

------- Original Message -------
On Friday, July 28th, 2023 at 16:42, Niccolò Belli <darkba...@linuxsystems.it> 
wrote:

> Il 2023-07-29 18:13 tincantech ha scritto:
> 
> > My analysis of your test data, reduces to the following comment:
> > 
> > Personally, I do not consider Google to be a valid target to test
> > against.
> > 

<snip>>

> I used Google as an example, but the MTU I've found is correct and I can
> confirm it with any other address, including my server's public IP.

In future, the only valid target is your server (or client).

<snip>

I am not interested in comparing your various network paths.

Establish a well known MTU on a well known path, first.


> > However, considering the data you have posted, I think OpenVPN
> > has documented the most simple solution.
> > 
> > The example given is to use these options:
> > 
> > --tun-mtu 1500 --fragment 1300 --mssfix
> > 
> > If you are confident that you have established the genuine PMTU
> > between your client and server then adjust the --tun-mtu value
> > as you see fit. Then, starting with the --fragment value given,
> > adjust --fragment until you establish the likely maximum.
> 
> 
> What's fragment's max parameter (1300 in your example) supposed to mean?
> If it's the payload size after which openvpn starts to internally
> fragment packets shouldn't I just set "--fragment xxxx mtu" where xxxx
> is the lowest MTU between the client and the server?

Considering your command of English, this is documented:
https://build.openvpn.net/man/openvpn-2.6/openvpn.8.html

See: --fragment, --mssfix and --tun-mtu

Regards
--

-----BEGIN PGP SIGNATURE-----
Version: ProtonMail

wsBzBAEBCAAnBYJkxU8OCZBPl5z2a5C4nRYhBAm8PURno41yecVVVU+XnPZr
kLidAABX0Af/eo6M+D1v18WxvIbE3/ZaRNCtRN11yw6hsocP9j7bZXcINYFW
fVdSCYOPm8lb9tDGVTMGKQHUqh8m1jWWMyubGD/aBjBkxUuum4IsRTlaJMdo
j1TdBvuV1yCamIeA7EgfK1Y/7O1THwauvlO6PgSE7/aEIxgRLPmaVJgQ/nMA
lB6Rx89v3a1DIEWwt9GMPVP3Q3evmi8oxzC1IEVxFAgvBo2LI/WV9KbnhO9D
jR6tUQvRyLWzf7PTu6e+g0MQZt41xNUsMzWw75zIbwXjxjoFM6T0TJ6MscPI
7Y3QkJSaQhQRxycjO/AKWzalIxH3ZdPk1RQDVoLNqcQ2uVgI9GHk4w==
=2tag
-----END PGP SIGNATURE-----

Attachment: publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys

Attachment: publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature

_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to