Andrew Reilly wrote: > On Sat, 2002-05-18 at 18:53, Terry Lambert wrote: > > Sending datagrams bigger than the MTU is a bad idea. > > > > I would be real tempted to drop the packets and send "don't fragment" > > ICMP responses to beat up anyone who abused UDP by sending larger > > than the MTU. > > > > I guess this is about Linux UDP NFS clients, in particular. > > Eh? Isn't the original, traditional and best NFS configuration 8k UDP > packets? > > Sure worked fine that way on SunOS-4 those many years ago. (On LANs, of > course. No one does NFS over the internet. I hope.)
No. TCP. RPC over UDP is really a silly idea. If you need reliable delivery, then don't use a protocol with "unreliable" as the first word of it's name. 8-). In any case, the best UDP packet size is always "The largest possible amount of data which fits in the MTU". There's no retransmit timeout to deal with incomplete fragment sets pending reassembly. If you want to get technical, TCP also has a bug; in the move from FIN-WAIT-1 to FIN-WAIT-2, there's an assumption of two responses for a single request. That's just intrinsically bad protocol design. The workaround is to pretend you didn't get the first FIN, resend, and then either get re-ACK'ed, or get an RST. NT does this. So did Paul Vixie's "Interceptor" product (transparent proxy cache appliance using NetBSD). Putting yourself in a situation where protocol bugs result in effective attacks is, well, "a bad idea". -- Terry To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-net" in the body of the message