From owner-freebsd-hackers Fri Jan 4 15:53:52 2002 Delivered-To: freebsd-hackers@freebsd.org Received: from glenfiddich.infospace.com (mail1.infospace.com [206.29.197.33]) by hub.freebsd.org (Postfix) with SMTP id 8F56037B419 for ; Fri, 4 Jan 2002 15:53:48 -0800 (PST) Received: (qmail 4045 invoked from network); 4 Jan 2002 23:53:47 -0000 Received: from unknown (HELO stoli.inspinc.ad) (206.29.197.190) by mail1.infospace.com with SMTP; 4 Jan 2002 23:53:47 -0000 Received: (qmail 4150 invoked from network); 4 Jan 2002 23:53:47 -0000 Received: from rolf.inspinc.ad ([10.99.33.65]) (envelope-sender ) by stoli.inspinc.ad (qmail-ldap-1.03) with SMTP for ; 4 Jan 2002 23:53:47 -0000 Date: Fri, 4 Jan 2002 15:54:06 -0800 Subject: Re: path_mtu_discovery Content-Type: text/plain; charset=ISO-8859-1; format=flowed Mime-Version: 1.0 (Apple Message framework v480) From: William Carrel To: freebsd-hackers@freebsd.org Content-Transfer-Encoding: quoted-printable In-Reply-To: <20020104234639.GA53752@ussenterprise.ufp.org> Message-Id: <56AE006E-016E-11D6-9ED7-003065B4E0E8@infospace.com> X-Mailer: Apple Mail (2.480) Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG [reducing CC creep] On Friday, January 4, 2002, at 03:46 PM, Leo Bicknell wrote: > In a message written on Fri, Jan 04, 2002 at 03:35:35PM -0800, Terry=20= > Lambert wrote: >> Of course, now you've let the dirty little secret out of the >> bag: the MTU is on the *route*, which means on the next hop, >> so a spoof that got through would frag basically all traffic >> out of the victim machine down to 296 bytes... > > I might be assuming something here, but I want to clarify. It is > _NOT_ the case that a box with say, only a default route, would > limit _ALL_ TCP connections to the lowest returned MTU. > > The MTU is on the *route*, where *route* =3D=3D the cloned route, > correct? That is certainly the way that the relevant code looks to me. FWIW, this is really a rehash of the same topic that came up on Bugtraq=20= a couple years ago, and was cross-posted into freebsd-security at one=20 point. I'm not sure if anything came of it then. -- Andy Carrel - william.carrel@infospace.com - +1 (425) 201-8745 Se=F1or Systems Eng. - Corporate Infrastructure Applications - InfoSpace To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message