Date: Thu, 8 Jun 2000 19:21:36 +0930 From: Mark Newton <newton@internode.com.au> To: Dave Preece <dave.preece@kbgroup.co.nz> Cc: "Kenneth D. Merry" <ken@kdm.org>, freebsd-hackers@FreeBSD.ORG Subject: Re: Path MTU discovery. Message-ID: <20000608192136.A48159@internode.com.au> In-Reply-To: <67B808B0DD93D211ABEE0000B498356B02BC71@internet.kbgroup.co.nz> References: <67B808B0DD93D211ABEE0000B498356B02BC71@internet.kbgroup.co.nz>
index | next in thread | previous in thread | raw e-mail
On Thu, Jun 08, 2000 at 07:21:57PM +1200, Dave Preece wrote:
> So... thinking about what this means for firewalls and natd. If we block all
> incoming ICMP's across the firewall, it is quite possible that a server
> behind the firewall could completely fail to send packets to a client on a
> smaller MTU (modem user with MTU set to 576, for instance).
Yes, that's correct -- The idea that ICMP is a separate and optional
part of TCP/IP is fundamentally wrong. Blocking it unconditionally
is a recipe for all kinds of hard-to-debug lossage around your firewall.
Just Say No.
- mark
--
Mark Newton Email: newton@internode.com.au (W)
Network Engineer Email: newton@atdot.dotat.org (H)
Internode Systems Pty Ltd Desk: +61-8-82232999
"Network Man" - Anagram of "Mark Newton" Mobile: +61-416-202-223
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000608192136.A48159>
