From owner-freebsd-net@FreeBSD.ORG Tue Aug 26 13:43:18 2014 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id E50801F9 for ; Tue, 26 Aug 2014 13:43:18 +0000 (UTC) Received: from mail.ignoranthack.me (ignoranthack.me [199.102.79.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C74CE381C for ; Tue, 26 Aug 2014 13:43:18 +0000 (UTC) Received: from [192.168.200.205] (unknown [50.136.155.142]) (using SSLv3 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: sbruno@ignoranthack.me) by mail.ignoranthack.me (Postfix) with ESMTPSA id EE1BD192906 for ; Tue, 26 Aug 2014 13:43:16 +0000 (UTC) Subject: [RFC] PLPMTU Blackhole Detection From: Sean Bruno Reply-To: sbruno@freebsd.org To: FreeBSD Net Content-Type: text/plain; charset="us-ascii" Date: Tue, 26 Aug 2014 06:43:15 -0700 Message-ID: <1409060595.1385.6.camel@bruno> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Aug 2014 13:43:19 -0000 https://reviews.freebsd.org/D506 This patch implements an attempt to adjust the MTU/MSS of a connection to work around poor networks that block ICMP fragmentation needed indications. sean p.s. I intend on working on a full PLPMTU implementation after working this into the tree.