From owner-freebsd-hackers Sat Feb 1 01:20:41 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id BAA11868 for hackers-outgoing; Sat, 1 Feb 1997 01:20:41 -0800 (PST) Received: from panda.hilink.com.au (panda.hilink.com.au [203.2.144.5]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id BAA11860 for ; Sat, 1 Feb 1997 01:20:35 -0800 (PST) Received: (from danny@localhost) by panda.hilink.com.au (8.7.6/8.7.3) id UAA15875; Sat, 1 Feb 1997 20:22:16 +1100 (EST) Date: Sat, 1 Feb 1997 20:22:15 +1100 (EST) From: "Daniel O'Callaghan" To: Warner Losh cc: Brian Somers , Terry Lambert , dk+@ua.net, shocking@mailbox.uq.edu.au, freebsd-hackers@freebsd.org Subject: Re: Setting MTU from userland ppp In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Fri, 31 Jan 1997, Warner Losh wrote: > In message <199701302342.XAA20718@awfulhak.demon.co.uk> Brian Somers writes: > : > > Don't use 256 as your MTU. (violates the RFC) > : > > : > Any chance of having the software *enforce* the RFC, then? > : > : I'll have a look at the RFC. It currently checks that 100 <= M[TR]U <= 2000. > > Can someone point out where in the RFCs it says that an MTU size of > 256 is illegal? > > The closes that I've seen is a statement in the IP RFC that says that > a remote side must be able to asssemble a packet of at least 576 > bytes, but does not disallow smaller fragment sizes. As far as I am aware, the minimum MTU is 68 - a fully optioned IP packet with a single 8 octet chunk of fragment. At least, that is for routers. Danny