[Openswan Users] Problems with Large Packets? - ps ax hangs in
ssh - tunnel over wireless network
Norbert Wegener
nw at sbs.de
Wed Apr 20 22:03:52 CEST 2005
We had a similar problem in some countries. It turned out, that setting
the mtu size of the eth device to 1366 and additionally overridemtu
=1366 solved that problem for us.
Norbert Wegener
Tomasz Grzelak wrote:
> Markus Meissner wrote:
>
>>> first read some articles, they may give you some answers and/or more
>>> light on the case:
>>> http://www.netheaven.com/pmtu.html
>>> http://alive.znep.com/~marcs/mtu/
>>
>>
>>
>> Thanks for the quick response. I think I have now understood the mtu
>> problem.
>>
>>> check if you allow to pass icmp responsible for the MTU discovery;
>>> maybe
>>> you block them, and if you let them through it would solve the
>>> problem...
>>> maybe...
>>
>>
>>
>> Checked by disableing the whole firewall, setting all to ACCEPT. No
>> change.
>
>
> check that you accept icmp packets on all interfaces; run tcpdump to
> see if they go
> If I understand the articles well you should see the icmp [type 3,
> code 4] packets
> I didn't check it by myself on my server 'cause I managed to make it
> work with the MSS rule
>
>>> On the other hand you have another choice that worked for me - add the
>>> following rules to the iptables script:
>>> $IPT -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --set-mss 1416
>>>
>>> (apply it for all packets going through the tunnel) I know it does not
>>> solve the problem for the upd "big" packets, but for tcp connections it
>>> really suites my needs.
>>
>>
>>
>> It would suite my needs, too, but it doesn't work. I have added the
>> rule on
>> both gateways and checked that they have catched some packets, but I
>> have
>> still the same effect.
>
>
> check again and see if the MSS rule is really executed; place the rule
> at the top of your iptables script
> it's very easy to make such a mistake 'cause if you ACCEPT a packet
> first it will have no chance to match another rule - so make the MSS
> rule the first rule, and after that ACCEPT a packet
>
> if still no success try to lower the mss value to 1400 or much lower,
> for example 1200, just to see if it works then
>
>> Uah, 10 minutes later =) I have set the mtu on the client (the
>> ssh-server)
>> to 1413 and it works! What I don't understand is that I have to set
>> the mtu
>> on the "client" and one hop later, on the gateway, it doesn't work.
>
>
> avoid this; changing mtu on all LAN interfaces is the last thing you
> should do; forget about it
> try to find a solution not affecting hosts in LANs
> IPSec should be transparent to hosts making connections
>
> use google and try to find another archivized mails about vpn, ipsec
> encapsulation and mtu
>
> Good Luck!
> Tomasz Grzelak
> _______________________________________________
> Users mailing list
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
More information about the Users
mailing list