[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20131219.143012.205185984019527730.davem@davemloft.net>
Date: Thu, 19 Dec 2013 14:30:12 -0500 (EST)
From: David Miller <davem@...emloft.net>
To: hannes@...essinduktion.org
Cc: johnwheffner@...il.com, netdev@...r.kernel.org,
eric.dumazet@...il.com
Subject: Re: [PATCH net-next] ipv4: introduce ip_dst_mtu_secure and protect
forwarding path against pmtu spoofing
From: Hannes Frederic Sowa <hannes@...essinduktion.org>
Date: Thu, 19 Dec 2013 13:17:57 +0100
> Networking software on the end system which wants to guard against
> that kind of fragmentation can do so by using the various knobs to
> limit pmtu notification processing or use IP_PMTUDISC_INTERFACE to
> protect itself from sending fragments.
And that's part of where my irritation is coming from.
Applications have to opt-in to this new socket option based behavior,
but you're making the routing thing default to on.
And even if we default it to off, someone is going to cry and tell all
the distributions to turn it on in /etc/sysctl.conf, just like they
did for rp_filter. And they will. I don't have the strength and time
to fight every person who makes these decisions at all the major
distributions to explain to each and every one of them how foolish it
would be.
No end host should have rp_filter on. It unnecessarily makes our
routing lookups much more expensive for zero gain on an end host. But
people convinced the distributions that turning it on everywhere by
default was a good idea and it stuck.
I don't want to create a carrot for that kind of situation again.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists