Jason Haar
2005-02-14 20:52:12 UTC
A couple of years ago, I was a bit of a keen user of FreeSWAN (now
OpenSWAN), and one feature they had - which I haven't see any mention of
in OpenVPN - was that the ipsec interfaces had an MTU of 16260 instead
of the more standard 1500.
The rationale was that there are LOTS of broken firewalls and gateways
out there on the Internet that cannot handle fragmentation correctly
(typically they are dropping the ICMP "frag-required" packets and don't
realize fragmentation is needed). So by making the IPSec interfaces
think they have a large MTU, when a *client* sends a "full", 1500 byte
packet to the VPN router, the router *doesn't* send back a "frag
required" packet - as the interface it's forwarding to has an MTU of
16260. Then it's purely OpenSWANs problem to deal with frags thereafter
- and it's something the owner can control via the "overridemtu" statement.
Anyway, I see tun* interfaces have an MTU of 1500... Is there a way of
emulating this OpenSWAN behavior? i.e. to make fragmentation OpenVPNs
problem instead of end-user?
OpenSWAN), and one feature they had - which I haven't see any mention of
in OpenVPN - was that the ipsec interfaces had an MTU of 16260 instead
of the more standard 1500.
The rationale was that there are LOTS of broken firewalls and gateways
out there on the Internet that cannot handle fragmentation correctly
(typically they are dropping the ICMP "frag-required" packets and don't
realize fragmentation is needed). So by making the IPSec interfaces
think they have a large MTU, when a *client* sends a "full", 1500 byte
packet to the VPN router, the router *doesn't* send back a "frag
required" packet - as the interface it's forwarding to has an MTU of
16260. Then it's purely OpenSWANs problem to deal with frags thereafter
- and it's something the owner can control via the "overridemtu" statement.
Anyway, I see tun* interfaces have an MTU of 1500... Is there a way of
emulating this OpenSWAN behavior? i.e. to make fragmentation OpenVPNs
problem instead of end-user?
--
Cheers
Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1
Cheers
Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1