Date: Tue, 28 Jan 2025 20:45:29 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 143666] [ip6] [request] PMTU black hole detection not implemented Message-ID: <bug-143666-7501-chljnzA1KN@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-143666-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-143666-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=143666 Michael Tuexen <tuexen@freebsd.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|Open |Closed Resolution|--- |FIXED CC| |tuexen@freebsd.org --- Comment #7 from Michael Tuexen <tuexen@freebsd.org> --- I think this can be closed, since PMTU balckhole detection is now implemented. >From tcp.4: pmtud_blackhole_detection Enable automatic path MTU blackhole detection. In case of retransmits of MSS sized segments, the OS will lower the MSS to check if it's an MTU problem. If the current MSS is greater than the configured value to try (net.inet.tcp.pmtud_blackhole_mss and net.inet.tcp.v6pmtud_blackhole_mss), it will be set to this value, otherwise, the MSS will be set to the default values (net.inet.tcp.mssdflt and net.inet.tcp.v6mssdflt). Settings: 0 Disable path MTU blackhole detection. 1 Enable path MTU blackhole detection for IPv4 and IPv6. 2 Enable path MTU blackhole detection only for IPv4. 3 Enable path MTU blackhole detection only for IPv6. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-143666-7501-chljnzA1KN>
