Bug 40849 - problems with routing large (>14xx) packets
Summary: problems with routing large (>14xx) packets
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: rp-pppoe   
(Show other bugs)
Version: 7.1
Hardware: i686
OS: Linux
Target Milestone: ---
Assignee: Ngo Than
QA Contact: Aaron Brown
URL: http://www.roaringpenguin.com/pppoe/
Depends On:
TreeView+ depends on / blocked
Reported: 2001-05-16 09:15 UTC by Moritz Baumann
Modified: 2007-04-18 16:33 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2001-05-16 09:15:51 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description Moritz Baumann 2001-05-16 09:15:47 UTC
From Bugzilla Helper:
User-Agent: Mozilla/4.77 [en] (X11; U; Linux 2.4.2-SGI_XFS_1.0 i686; Nav)

Description of problem:
redhat version of rp-pppoe-2.6-5 does not support MSS Clamp 
(act is 3.0-1 and does) 
This should eleminate the need to adjust mtu settings in a lan when acting
as a router.

How reproducible:

Steps to Reproduce:
1.have a linux-pc act as router that does masq (via ipchains)
2.have the mtu of eth0 and eth1 set to 1500 (which is standard)
3.disable proxy on a client behind that router
4. visit e.g. http://www.heise.de/ (this depends on the web-page, but heise
definitely does not work)


Actual Results:  does not show the web-page
worked fine when using squid on the router (so I think it has to do with
the need to fragment large packets)
web-page can be seen from the router

Expected Results:  should work don't you think

Additional info:


last three lines in section recquierements

The latest version of the PPPoE client is 3.0. It includes nice shell
scripts for managing the connection as well as more manual pages. It also
includes the "MSS Clamp" feature
         which eliminates the need to adjust MTU settings on LAN hosts. If
you are using a version earlier than 2.5, you are strongly encouraged to
upgrade. 2.5 and later fix a
         denial-of-service vulnerability found in earlier versions.

Comment 1 Moritz Baumann 2001-05-16 09:26:09 UTC
just realised that this router is NOT running redhat but debian :-(

sorry for filling in this report

Note You need to log in before you can comment on or make changes to this bug.