From owner-freebsd-hackers Wed Dec 17 19:34:49 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id TAA12854 for hackers-outgoing; Wed, 17 Dec 1997 19:34:49 -0800 (PST) (envelope-from owner-freebsd-hackers) Received: from kai.communique.net (Kai.communique.net [204.27.67.90]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id TAA12267 for ; Wed, 17 Dec 1997 19:29:08 -0800 (PST) (envelope-from nectar@kai.communique.net) Received: (from smap@localhost) by kai.communique.net (8.8.8/8.8.7) id VAA10624; Wed, 17 Dec 1997 21:34:44 -0600 (CST) Message-Id: <199712180334.VAA10624@kai.communique.net> X-Authentication-Warning: kai.communique.net: smap set sender to using -f Received: from localhost.communique.net(127.0.0.1) by kai.communique.net via smap (V2.0) id xma010621; Wed, 17 Dec 97 21:34:36 -0600 From: Jacques Vidrine To: Andrew Gordon cc: benedict@echonyc.com, hackers@freebsd.org Subject: Re: ifconfig reports bogus netmask In-reply-to: References: Date: Wed, 17 Dec 1997 21:34:36 -0600 Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk I feel I should point out that I think this is avoidable ... If one uses RFC1918 addresses, and one wishes to avoid problems with Path MTU Discovery, one could simply pick MTUs for the interfaces with RFC1918 addresses that are at least as large as the largest MTU found on any of the other interfaces on that router. There's probably a more concise way of saying that ... Jacques Vidrine On 18 December 1997 at 1:21, Andrew Gordon wrote: > Notably, TCP path MTU discovery - where not seeing the ICMP messages > rejecting your too-big packets can stop things working altogether.