Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Jun 2000 19:21:36 +0930
From:      Mark Newton <newton@internode.com.au>
To:        Dave Preece <dave.preece@kbgroup.co.nz>
Cc:        "Kenneth D. Merry" <ken@kdm.org>, freebsd-hackers@FreeBSD.ORG
Subject:   Re: Path MTU discovery.
Message-ID:  <20000608192136.A48159@internode.com.au>
In-Reply-To: <67B808B0DD93D211ABEE0000B498356B02BC71@internet.kbgroup.co.nz>
References:  <67B808B0DD93D211ABEE0000B498356B02BC71@internet.kbgroup.co.nz>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jun 08, 2000 at 07:21:57PM +1200, Dave Preece wrote:

 > So... thinking about what this means for firewalls and natd. If we block all
 > incoming ICMP's across the firewall, it is quite possible that a server
 > behind the firewall could completely fail to send packets to a client on a
 > smaller MTU (modem user with MTU set to 576, for instance).
 
Yes, that's correct -- The idea that ICMP is a separate and optional 
part of TCP/IP is fundamentally wrong.  Blocking it unconditionally
is a recipe for all kinds of hard-to-debug lossage around your firewall.
Just Say No.

    - mark

-- 
Mark Newton                               Email:  newton@internode.com.au (W)
Network Engineer                          Email:  newton@atdot.dotat.org  (H)
Internode Systems Pty Ltd                 Desk:   +61-8-82232999
"Network Man" - Anagram of "Mark Newton"  Mobile: +61-416-202-223


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000608192136.A48159>