Hi,

On Tue, Jul 23, 2019 at 05:34:47PM +0300, Lev Stipakov wrote:
> From: Lev Stipakov <l...@openvpn.net>
> 
> This is the 2.4 backport of master patch (commit d22ba6b).
> 
> NCP negotiation replaces worst cast crypto overhead
> with actual one in data channel frame. That frame
> params are used by mssfix.
> 
> Fragment frame still contains worst case overhead.
> Because of that TCP packets are fragmented, since
> MSS value exceeds max fragment size.
> 
> Fix by replacing worst case crypto overhead with
> actual one for fragment frame, as it is done for data
> channel frame.

Thanks for the backport.

Unfortunately, I can not reproduce the problem *without* the patch,
so I wonder if the issue got fixed by something else as side-effect?

If I do what you describe in the ticket:

run

 openvpn --fragment 1300 --mssfix

and grep out the MSS lines, I get (for IPv4, IPv6 numbers are -20 bytes):

with NCP:      MSS: 1460 -> 1203
--ncp-disable: MSS: 1284 -> 1211

... and the very same numbers from master...


OpenVPN versions tested:

OpenVPN 2.4.7 [git:release/2.4/416532f8e4125adb+] 
OpenVPN 2.5_git [git:master/b5fe104ddbbdf59b+]


So, I'm wondering how to proceed here...

gert
-- 
"If was one thing all people took for granted, was conviction that if you 
 feed honest figures into a computer, honest figures come out. Never doubted 
 it myself till I met a computer with a sense of humor."
                             Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany                             g...@greenie.muc.de

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to