Hi,
I seem to have problem with one particular client that is unable to access AFS.
When tcpdumping both sides I can see the server sends some packets that are
1488B long and non of these ever arrives to the client so this points out to a
MTU problem (verified with ping).
Is there a way to
On Thu, 7 Feb 2013 11:09:28 + (GMT)
Antony Mayi antonym...@yahoo.com wrote:
I seem to have problem with one particular client that is unable to
access AFS. When tcpdumping both sides I can see the server sends some
packets that are 1488B long and non of these ever arrives to the
client so
From: Andrew Deason adea...@sinenomine.net
To: openafs-info@openafs.org
Sent: Thursday, 7 February 2013, 15:16
Subject: [OpenAFS] Re: mtu problem
On Thu, 7 Feb 2013 11:09:28 + (GMT)
Antony Mayi antonym...@yahoo.com wrote:
I seem to have problem with
On 2/7/13 8:36 AM, Antony Mayi wrote:
modern tcp/ip stack is setting Don'tFragment flag by default so
oversized packets are always dropped (relevant ICMP should be sent
back for PMTU discovery to kick in though which is not happening in
my case).
...
yes, I meant adjusting client interface
On Thu, 7 Feb 2013 16:36:18 + (GMT)
Antony Mayi antonym...@yahoo.com wrote:
yes, I meant adjusting client interface MTU. I already tried the -rxmaxmtu
without any success.
you might want to try -rxmagfrags as well. just set this to 1 to
keep afs from trying to send packets that are
A host or network which drops all ICMP indiscriminately is fundamentally
broken, and I could make an argument for not allowing it to communicate with
other networks at all. If someone is demanding drop-all-ICMP as security best
practice then you need to find someone who actually understands
On Thu, 7 Feb 2013 16:36:18 + (GMT)
Antony Mayi antonym...@yahoo.com wrote:
modern tcp/ip stack is setting Don'tFragment flag by default so
oversized packets are always dropped (relevant ICMP should be sent
back for PMTU discovery to kick in though which is not happening in my
case).
On Feb 7, 2013, at 12:37 PM, Andrew Deason adea...@sinenomine.net wrote:
On Thu, 7 Feb 2013 16:36:18 + (GMT)
Antony Mayi antonym...@yahoo.com wrote:
modern tcp/ip stack is setting Don'tFragment flag by default so
oversized packets are always dropped (relevant ICMP should be sent
Brandon Allbery ballb...@sinenomine.net writes:
A host or network which drops all ICMP indiscriminately is
fundamentally broken, and I could make an argument for not allowing it
to communicate with other networks at all. If someone is demanding
drop-all-ICMP as security best practice then
Subset of, yes. All? So many sites on the Internet can't be accessed reliably
from the many OSes that do PMTUD? Somehow, I doubt.
--
brandon s allbery kf8nh sine nomine associates
allber...@gmail.com ballb...@sinenomine.net
unix,
On Thu, Feb 7, 2013 at 10:39 AM, Brandon Allbery
ballb...@sinenomine.net wrote:
Subset of, yes. All? So many sites on the Internet can't be accessed
reliably from the many OSes that do PMTUD? Somehow, I doubt.
If you want to be sure, use the RFC mandated minimum MTU
of 576 for IPv4 (1280
11 matches
Mail list logo