[c-nsp] transport path-mtu-discovery - ME3600....too unpredictable to use?

Dan Peachey dan at peachey.co
Wed Feb 24 06:13:11 EST 2016


On 24/02/2016 10:33, Nick Cutting wrote:
> Im an enterprise guy, so this is what I see for our clients.
>   I don't have exact info but if for example a TCP sessions stays up between two end hosts (whether they are routers or windows boxes whatever..) and a path changes from say a P2P to a routed VPN, quick enough that the tcp session between the endpoints doesn't time out (I hope so) - the MSS is NOT recalculated as, it is only set in the TCP handshake - which is what Adam is referring to when you set the MSS on the interface.
>
> The exact path mtu discovery technique doesn't seem to be well documented - the RFC is 26 years old - and unless your hosts are actively "checking" mtu using DF bit the whole time a session is up (for changes)  - I don't believe even half of  RFC-1191 is implemented in the real world.
>
> If someone has knowledge of how cisco routers do it exactly - I would love to hear.
>

They do appear to set DF bit on every IP packet (at least on a CSR1000v 
this is true).

Packet dump shows DF being set on BGP keepalives:

dan at fluff:~$ sudo tcpdump -i virbr13 -v 'ip && tcp port 179'
tcpdump: listening on virbr13, link-type EN10MB (Ethernet), capture size 
262144 bytes
11:06:36.922464 IP (tos 0xc0, ttl 63, id 1770, offset 0, flags [DF], 
proto TCP (6), length 59)
     172.16.0.6.59175 > 172.16.0.5.bgp: Flags [P.], cksum 0x4b81 
(correct), seq 3523842787:3523842806, ack 1374955837, win 16384, length 
19: BGP, length: 19
         Keepalive Message (4), length: 19
11:06:37.651918 IP (tos 0xc0, ttl 63, id 1771, offset 0, flags [DF], 
proto TCP (6), length 40)
     172.16.0.6.59175 > 172.16.0.5.bgp: Flags [.], cksum 0x4f89 
(correct), ack 20, win 16384, length 0
11:06:39.991295 IP (tos 0xc0, ttl 253, id 1831, offset 0, flags [DF], 
proto TCP (6), length 59)
     172.16.0.3.bgp > 172.16.0.5.53016: Flags [P.], cksum 0xe427 
(correct), seq 579671816:579671835, ack 1679671767, win 16384, length 
19: BGP, length: 19
         Keepalive Message (4), length: 19


Whether they act on receiving an ICMP Frag Needed packet by decreasing 
the MSS of the BGP TCP session is another question. When I get time I'll 
try and test it.

Cheers,

Dan


More information about the cisco-nsp mailing list