From owner-freebsd-net@freebsd.org Thu Mar 30 20:46:41 2017 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9F1AED26549 for ; Thu, 30 Mar 2017 20:46:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8EEC2AE2 for ; Thu, 30 Mar 2017 20:46:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v2UKkfwK087106 for ; Thu, 30 Mar 2017 20:46:41 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-net@FreeBSD.org Subject: [Bug 173444] [socket] [patch] IPV6_USE_MIN_MTU and TCP is broken Date: Thu, 30 Mar 2017 20:46:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 8.3-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: marka@isc.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: freebsd-net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Mar 2017 20:46:41 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D173444 --- Comment #10 from marka@isc.org --- (In reply to Andrey V. Elsukov from comment #8) So what! Most DNS/TCP response is a few of packets. What does it matter if it is the 3 or 4 packets. What matters is avoiding PMTUD as it is NOT reliable. Setting the IPv6 packet size to 1280 avoids triggering PMTUD issues. Limiting the packet size avoids timeout and retransmissions due to PTB not been generated due to rate limiting or being lost due to stupid load balancers and firewalls that drop ICMP. Go put your validating resolvers behind a IPv6 in IPv4 link then come back and say this is not needed. --=20 You are receiving this mail because: You are the assignee for the bug.=