John Candlish <johncandl...@gmail.com> wrote:

> Looking further at this it seems to be related to differing MSS values
> for the ppp0, eth3 physical interfaces, and also the virtual interface
> of the webserver in the DMZ.
...
> I suppose that this can be tuned via the MTU of the effected
> interfaces or by the MSS parameter of the shorewall configuration.
> 
> What are the recommended best practices in this situation?

Not sure about best practices, but it's a well known problem in that PPPoE 
needs to add an additional (8 octet) header to the packet, so if the pack is 
already larger than MSS-8 octets long then you'll be over size.
I think it's normal to specify MTU of 1492 for the PPP interface, and also 
specify (from memory, you'll need to check the docs) clamp_mss which will set a 
config which has the netfilter code alter any MSS values passing through to no 
more than the value specified. In principle, 1492 should be OK, but when I was 
looking this up the other day (for a Juniper device) I found people suggesting 
lower values (as lower as something like 1250) were needed - I think this is 
probably an "ISP config" thing.

Just checking my home router (UK VDSL2, aka FTTC), I have mtu 1492 set in my 
PPP peer config, and "CLAMPMSS=Yes" in shorewall.conf.
Interestingly, at work, I have CLAMPMSS=No and it seems to be working fine. 
Make that "had", I've just changed it to yes.
------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://makebettercode.com/inteldaal-eval
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to