6.2 mtu now limits size of incomming packet

Bill Moran wmoran at collaborativefusion.com
Fri Jul 13 19:27:26 UTC 2007


In response to David DeSimone <fox at verio.net>:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Bill Moran <wmoran at collaborativefusion.com> wrote:
> >
> > Let's flip the question around a bit:  why would you _want_ the TCP
> > stack to accept frames larger than the stated MTU?
> 
> If I receive a 64K frame and the TCP checksum checks out, and the
> sequence numbers match, and it passes my firewall state, why NOT receive
> it?  It is obviously valid, even if I cannot understand how my interface
> could have received it.  The packet is here, so do something useful with
> it.

But it's not here yet.  The problem is that it doesn't pass a basic
sanity check at the media layer, so it would be dropped before it ever
starts seeing checks at the TCP or IP layer.

> I agree with others that MTU means "limit what I transmit".  It does not
> mean "limit what someone else can transmit to me."

Interesting viewpoint.  I disagree with it, but I can't quote any standard
or otherwise to support my view.  You didn't either.

Does anyone know of a publicised, authoritative standard that would clear
this up?

-- 
Bill Moran
Collaborative Fusion Inc.
http://people.collaborativefusion.com/~wmoran/

wmoran at collaborativefusion.com
Phone: 412-422-3463x4023



More information about the freebsd-net mailing list