[Yeti DNS Discuss] Dealing with IPv6 Fragmentation in the DNS
Andreas Schulze
andreas.schulze at datev.de
Wed Aug 23 16:56:17 UTC 2017
Am 23.08.2017 um 16:05 schrieb P Vix:
> Fragmentation in v6 was meant to be an improvement on v4, by making it
> end to end only ... Routers don't fragment. Turns out icmp6 is a huge
> security hole and is most often blocked.
>
> I had thought that DNS servers were now using mtu 1280 to work around it.
I set 1220 on all of my NSD instances months ago. At least, it don't hurt.
( see https://nlnetlabs.nl/projects/nsd/nsd.conf.5.html )
server:
outgoing-tcp-mss: 1220
tcp-mss: 1220
Andreas
More information about the discuss
mailing list