Fact-checked by Grok 2 weeks ago

Path MTU Discovery

Path MTU Discovery (PMTUD) is a standardized networking technique that enables an host to dynamically determine the (MTU)—the largest packet size that can traverse the entire path to a destination without requiring fragmentation by intermediate routers—thus optimizing data transmission efficiency and reducing overhead. Originally specified for IPv4 in 1990, PMTUD relies on the sender initially assuming the path MTU equals the first-hop interface MTU and then adjusting downward based on feedback to avoid packet drops. For , introduced in 1996 and updated in 2017, the mechanism is mandatory since routers do not fragment packets, making PMTUD essential to prevent delivery failures. The core operation involves the source host setting the Don't Fragment (DF) bit in the of outbound packets and probing with progressively smaller sizes if needed; intermediate devices that cannot forward a packet due to size constraints respond with an ICMP "Destination Unreachable" message (type 3, code 4 for IPv4 or "Packet Too Big" for IPv6) containing the allowable next-hop MTU, prompting the sender to cache and use this value for future transmissions. To mitigate risks like undetected from blocked ICMP messages—known as "" connections—hosts implement safeguards such as periodic MTU increase probes and minimum MTU assumptions (e.g., 1280 bytes for ). PMTUD enhances by minimizing fragmentation-related reassembly delays, CPU overhead on routers, and to attacks exploiting fragmented packets, though challenges persist in tunneled environments like or GRE where effective MTUs are reduced. Advanced variants, such as Packetization Layer Path MTU Discovery (PLPMTUD), address these limitations by leveraging transport-layer protocols like or for more robust probing without sole dependence on ICMP.

Overview

Definition and Purpose

Path MTU Discovery (PMTUD) is a standardized networking technique that enables an host to dynamically determine the (MTU) along the end-to-end path to a destination , ensuring packets can traverse the network without requiring fragmentation at intermediate routers. The MTU represents the largest size of an , including headers, that a specific link can handle without needing to fragment it further, while the path MTU is defined as the minimum MTU value across all links in the path from source to destination. This discovery process allows the sending to adjust its packet sizes accordingly, avoiding assumptions based on static or local MTU configurations that could lead to transmission failures. The primary purpose of PMTUD is to prevent inefficient , which occurs when packets larger than the path MTU are broken into smaller pieces by routers, thereby reducing overhead associated with reassembly at the destination and improving overall . In environments like , where intermediate routers are prohibited from fragmenting packets, PMTUD is essential to avoid outright packet drops that would otherwise halt communication. By enabling endpoints to probe and adapt to the path MTU, the technique minimizes unnecessary retransmissions and enhances reliability in diverse network topologies. PMTUD provides significant benefits for transport protocols such as , , and , as it allows applications to optimize packet sizing for better performance without relying on suboptimal defaults. In contrast to fixed MTU strategies, which often result in issues when paths include links with varying capacities, PMTUD promotes robust, efficient data transfer by ensuring packets are tailored to the narrowest constraint in the path. This endpoint-driven approach aligns with the of the , placing responsibility for path adaptation on the communicating hosts rather than intermediate devices.

Historical Development

Path MTU Discovery originated in the late as a response to fragmentation inefficiencies in early routers, where at intermediate nodes led to performance degradation and reliability issues. The initial proposal, outlined in RFC 1063 by and , introduced IP options for probing and reporting the minimum MTU along a path to avoid unnecessary fragmentation. This approach was refined and formalized for IPv4 in RFC 1191 by and Deering, which established the core mechanism relying on ICMP "Fragmentation Needed" messages to dynamically discover the path MTU. For IPv6, Path MTU Discovery was integrated early in the protocol's development through RFC 1981 by McCann, Deering, and Mogul, which adapted the IPv4 technique to 's fragment header and mandatory PMTUD support. This specification was later revised and updated in RFC 8201, which obsoleted relevant sections of the original specification (RFC 2460) to improve clarity and robustness. To enhance reliability amid growing network complexities, RFC 4821 by Allman and Bonica introduced Packetization Layer Path MTU Discovery (PLPMTUD), shifting some probing logic to the for better resilience against ICMP loss. The evolution of Path MTU Discovery continued with the development of in 8899 by Fairhurst and Weedon, an extension of PLPMTUD for datagram-based protocols. This approach has been adopted in protocols like , as specified in 9000 by Iyengar and Thomson. In 2022, 9268 introduced an Hop-by-Hop Option to record the minimum path MTU, further improving PMTUD in scenarios with unreliable ICMP feedback. Key milestones include the IPv4 standardization in RFC 1191. By the , widespread router and host support had emerged, with studies showing over 94% of web servers setting the IPv4 Don't Fragment bit to enable PMTUD by 2004, indicating broad adoption. Post-2020 developments have emphasized traversal techniques, driven by the expansion of and encrypted traffic, to mitigate ongoing fragmentation black holes in contemporary networks.

Mechanism

Core Operation

Path MTU Discovery (PMTUD) operates through an algorithmic process where the sender host dynamically determines the maximum transmission unit (MTU) along the network path to avoid fragmentation. The sender begins by assuming an initial path MTU equal to the known MTU of its first-hop link, such as 1500 bytes for Ethernet or the IPv6 minimum link MTU of 1280 bytes. It then sets the Don't Fragment (DF) bit in the IP header for outgoing packets and transmits probe packets starting at this assumed size. If a probe packet exceeds the MTU at any intermediate router, the router discards it and returns an ICMP error message to the sender, prompting adjustment. This process iteratively refines the path MTU estimate through reduction upon receiving ICMP error messages, revealing the bottleneck MTU on the path. Periodic probing at higher sizes may be used after timeouts to detect potential MTU increases. Upon receiving an ICMP "Fragmentation Needed" message for IPv4 or "Packet Too Big" for , the sender immediately reduces its path MTU estimate to the value indicated in the message's Next-Hop MTU field, which represents the MTU of the link where fragmentation was attempted. The sender caches this updated value and fragments subsequent packets only if necessary, though PMTUD aims to avoid fragmentation by using the discovered MTU or smaller for all future transmissions on that path. If the Next-Hop MTU field is zero, the sender may fall back to a conservative search among predefined MTU plateaus, such as 2002, 1792, 1500, , 1280, or 576 bytes, to locate the path MTU. This iterative reduction ensures efficient packet sizing without relying on router fragmentation, though the algorithm prohibits increasing the path MTU estimate solely based on ICMP feedback to prevent instability. Hosts maintain a path MTU cache to store these estimates, indexed by destination address or route, with entries subject to timeouts to account for potential path changes. Per RFC 1191, cached entries are invalidated after 10 minutes of inactivity, at which point the sender resets to the first-hop MTU and resumes probing; a minimum of 5 minutes applies after any reduction to avoid rapid fluctuations. RFC 4821 for packetization layer implementations recommends periodic probing at least every 10 minutes to detect MTU increases, with delays after failures based on congestion control mechanisms. This caching mechanism balances responsiveness to changes with avoidance of unnecessary probes, ensuring the path MTU remains current without excessive overhead. Probe packets are typically constructed using or to simulate real traffic, with the DF bit set to trigger ICMP feedback. For connections, the sender adjusts the (MSS) option during the SYN based on the discovered path MTU, subtracting header overhead—such as 40 bytes for IPv4 (20-byte plus 20-byte header without options)—to compute the effective data payload size, e.g., MSS = PMTU - 40. probes may use padding to reach the desired size, allowing the algorithm to test various MTU levels without application-specific data. This handling ensures probes mimic production traffic patterns while enabling precise MTU discovery.

ICMP Messages

The (ICMP) plays a crucial role in Path MTU Discovery (PMTUD) by enabling routers to provide feedback to sending hosts about path constraints, specifically when a packet cannot be forwarded due to MTU limitations. This signaling is essential for PMTUD, as it allows endpoints to adjust their transmission sizes dynamically without relying on fragmentation, thereby improving efficiency and avoiding . In IPv4, the relevant ICMP message is Type 3 (Destination Unreachable) with Code 4 (Fragmentation Needed and Don't Fragment [DF] Set), often referred to as the "Datagram Too Big" message. This message is generated by a router when it receives an IPv4 packet with the DF bit set that exceeds the MTU of the outgoing link. The message includes a 16-bit (2-byte) Next-Hop MTU field in the lower 16 bits of the 32-bit field following the checksum, with the upper 16 bits set to zero. This field reports the MTU of the link where fragmentation would have been required, with a minimum value of 68 octets, enabling the sender to immediately update its path MTU estimate to this value. For , PMTUD uses Type 2 (Packet Too Big) with Code 0, signaling that a packet exceeds the path MTU. Unlike IPv4, IPv6 routers do not perform fragmentation, so this message is mandatory for informing the sender of the constraint. The message contains a 4-byte (32-bit) MTU field specifying the maximum packet size transmittable from the to the destination, which must be at least the IPv6 minimum link MTU of 1280 octets; messages with smaller MTU values are discarded. This field allows the sender to reduce its path MTU estimate accordingly, without support for fragmentation at intermediate nodes. Both IPv4 and IPv6 ICMP messages for PMTUD include the Internet Protocol header (plus the first 64 bits of the original datagram data) to provide context, allowing the recipient to verify that the message pertains to a recently sent packet and matches the destination address. Routers are required to originate these messages using the IP address of the interface on which the offending packet arrived, ensuring the source IP aligns with the forward path. To mitigate denial-of-service risks, routers implement rate-limiting on ICMP generation, such as limiting Packet Too Big messages to avoid floods from a single source. Senders handle these messages by validating their authenticity: for , per rules, the message must correspond to a transmitted packet, and the source must be on the path; invalid messages are discarded to prevent spoofing attacks. In IPv4, similar checks ensure the ICMP originates from an intermediate router on the path, with the included data used for . Upon validation, the sender lowers its path MTU but never increases it based solely on these messages to avoid exploitation. The format of the IPv4 ICMP message is as follows:
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |   Type = 3    |   Code = 4    |           Checksum            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |           unused = 0          |         Next-Hop MTU          |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |      Internet Header + 64 bits of Original Datagram Data      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Implementations

IPv4 Specifics

In IPv4, Path MTU Discovery (PMTUD) relies on the 1-bit Don't Fragment (DF) flag in the to prevent intermediate routers from fragmenting packets, instead prompting them to discard oversized and return an ICMP "Destination Unreachable" message with code 4 ("fragmentation needed and DF set"). When the DF bit is set to 1, routers along the path that encounter a datagram exceeding the (MTU) of the outgoing interface must generate this ICMP message, including the MTU of the next-hop link in the unused field to inform the sender of the constraining link MTU. This mechanism enables the source host to iteratively reduce its estimated path MTU until packets can traverse the entire path without fragmentation. Unlike protocols that prohibit fragmentation entirely, IPv4 permits it as a fallback when the DF bit is 0, allowing routers or endpoints to fragment and reassemble datagrams if needed; however, PMTUD disables this option for efficiency by mandating DF=1 during , as fragmentation introduces performance overhead and potential reassembly failures. The source host begins probing with an initial path MTU estimate of the minimum of 576 bytes or the MTU of the first-hop interface, derived from historical assumptions in 879, which also sets the default Maximum Segment Size (MSS) to 536 bytes (accounting for 40 bytes of and headers). To align with the discovered path MTU, implementations adjust the MSS option in packets, ensuring segments do not exceed the effective path capacity minus header overheads. Routers are required by RFC 1191 to support DF-based PMTUD by generating the appropriate ICMP messages, though compliance remains optional in some deployments, leading to inconsistent behavior across networks. Legacy IPv4 implementations, particularly older stacks, often lack full PMTUD support and default to conservative minimum MTU assumptions of 576 bytes to avoid issues, while tunnels like PPPoE introduce additional 8-byte header overhead, effectively reducing the usable MTU to 1492 bytes on standard 1500-byte Ethernet links.

IPv6 Specifics

In IPv6, unlike previous protocols, routers are prohibited from fragmenting packets, as specified in the IPv6 core specification. This design choice, outlined in RFC 8201, requires source endpoints to discover the (PMTU) prior to transmitting large packets, ensuring they fit within the smallest link MTU along the without intermediate reassembly. IPv6 implementations must support a minimum link MTU of 1280 bytes, as mandated by 8200. For PMTUD, the source initially assumes the path MTU equals the MTU of its first-hop link, adjusting downward based on feedback, with 1280 bytes as the minimum supported value. While IPv6 supports Jumbo Frames with payloads up to 2^32 - 1 bytes on capable links, such configurations remain rare due to limited hardware and network support. The header consists of a fixed 40-byte base plus optional extension headers, necessitating adjustments in PMTUD calculations to account for this overhead. For over , the (MSS) is derived by subtracting 60 bytes (40 for header and 20 for header) from the effective MTU, yielding a typical MSS of 1220 bytes on minimum-MTU paths. All nodes must maintain a Path MTU cache to store discovered PMTUs per destination or flow, updating it based on incoming Packet Too Big messages. Path MTU Discovery is strongly recommended in all protocol stacks, as specified in RFC 8200, to enable efficient transmission beyond the minimum link MTU of 1280 bytes. Minimal implementations may limit packets to 1280 bytes without PMTUD support. In deployment scenarios involving tunnels, such as (adding 20 bytes of IPv4 encapsulation overhead) or Teredo (adding approximately 28 bytes via IPv4 and UDP headers), PMTUD is essential for adjusting to the additional overhead and preventing packet drops.

Challenges

Black Hole Connections

In Path MTU Discovery (PMTUD), black hole connections arise when intermediate routers silently discard oversized IP packets that have the Don't Fragment (DF) bit set, without transmitting the required ICMP "Destination Unreachable—Fragmentation Needed" message to inform the sender of the MTU restriction. This lack of feedback prevents the source host from adjusting its packet size downward, resulting in persistent transmission attempts with the same oversized packets that continue to be dropped. Consequently, connections stall, particularly in protocols like TCP that rely on successful packet delivery for progress, such as hanging after the initial SYN-ACK exchange where small packets succeed but larger data packets fail. The primary causes of these black holes include router software bugs that fail to generate or forward ICMP messages, misconfigurations in network devices, and the deployment of firewalls or security policies that inadvertently block ICMP traffic. In encapsulated environments, such as (GRE) tunnels or Virtual Private Networks (VPNs), additional protocol headers reduce the effective path MTU, and if the encapsulation does not properly support PMTUD signaling, drops go undetected, exacerbating the issue. Path MTU variations occurring mid-session, such as those triggered by routing shifts or events to alternate paths with differing MTU limits, can also induce black holes if no fresh ICMP feedback reaches the source to update its cached MTU value. Non-compliant middleboxes, like certain proxies or load balancers, further contribute by altering packets without preserving DF bit semantics or ICMP propagation. Symptoms of black hole connections typically manifest as unidirectional or stalled bidirectional traffic, where outbound large-packet flows fail while inbound traffic succeeds if the return path accommodates larger MTUs, a scenario common in asymmetric topologies. Long-lived flows, such as bulk data transfers or streaming sessions, are particularly affected, often timing out after repeated retransmissions (e.g., up to 15 minutes in some implementations with no bytes transferred). These issues were historically prevalent in the during the 1990s and 2000s, with empirical studies indicating PMTUD failure rates of 17% for IPv4 in , improving to 5–18% by depending on probed MTU sizes, reflecting gradual network hardening but persistent vulnerabilities in diverse paths. Detecting black holes without ICMP feedback is challenging, often requiring diagnostic tools like with varying packet sizes or ICMP echo requests that test DF-bit behavior across the . In severe cases, this results in complete of large-packet , effectively black-holing half or more of the if small packets intermix with , though exact varies by application. Such detection historically relied on packet captures showing repeated large-packet retransmits without size reduction. Black holes are frequently worsened by explicit ICMP filtering, which prevents the necessary error signaling.

ICMP Filtering

ICMP filtering refers to the practice of blocking or restricting (ICMP) messages by firewalls and security appliances, which disrupts Path MTU Discovery (PMTUD) by preventing the transmission of critical feedback. In particular, ICMP Type 3 Code 4 messages, known as "Fragmentation Needed," are commonly filtered to thwart network reconnaissance scans and denial-of-service () attacks that exploit ICMP for amplification or probing. Early versions of , for example, were often configured with lists that dropped these messages as part of basic security hardening, contributing to widespread adoption of such policies in the late 1990s and early . The primary impact of this filtering is that originating hosts fail to receive notifications of MTU mismatches along the path, forcing repeated transmission of oversized packets that are silently discarded, thereby creating persistent connectivity failures. This leads to black hole connections where TCP sessions stall for payloads exceeding the effective path MTU, often manifesting as timeouts or incomplete data transfers. Studies from the 2010s, such as the CAIDA measurement of paths to popular websites, found overall PMTUD failure rates of 5% to 18% of tested paths depending on the probed MTU size, with ICMP blocking contributing as a key cause. Post-2000, the networking community gained greater awareness of these problems through documents like RFC 2923, which explicitly warned against indiscriminate ICMP filtering and recommended allowing error messages sourced from router IP addresses to preserve PMTUD functionality. Guidelines evolved to advocate selective permitting of ICMP Type 3 Code 4 from trusted infrastructure, balancing security with operational needs. However, as of 2025, such filtering persists in many enterprise networks due to legacy configurations and ongoing concerns over ICMP-based threats, complicating troubleshooting and performance optimization. As of 2024, such filtering persists in cloud environments like AWS, where network ACLs must be configured to permit ICMP "Packet Too Big" messages to ensure PMTUD functionality. Variations in filtering approaches include rate-limiting ICMP messages to curb potential abuse while allowing occasional PMTUD signals, or applying blocks on a path-specific basis via lists tailored to untrusted segments. IPv6 deployments face heightened risks from ICMPv6 filtering, as the protocol mandates end-to-end PMTUD without intermediate router fragmentation, making "Packet Too Big" messages ( Type 2) indispensable for reliable transmission.

Solutions

DPLPMTUD

Datagram Packetization Layer Path MTU Discovery (DPLPMTUD), also referred to as Packetization Layer Path MTU Discovery (PLPMTUD), is a method for determining the effective path MTU in networks using datagram-based transports such as , SCTP, or , without relying on ICMP feedback from the network layer. Defined in 8899 published in September 2020, DPLPMTUD operates at the packetization layer of the transport protocol, enabling senders to actively probe the path by transmitting of varying sizes and inferring the MTU based on delivery success or failure. This approach addresses limitations in classical PMTUD by avoiding dependency on potentially filtered or unreliable ICMP messages, making it suitable for modern encrypted transports where lower-layer signals may be unavailable or blocked. In operation, the sender initiates DPLPMTUD by transmitting probe datagrams starting from a base size (typically the initial MTU estimate, such as 1280 bytes for IPv6 or a conservative value for IPv4) and progressively increasing the size using an exponential search phase to quickly identify an upper bound for the path MTU. Once an upper bound is found—indicated by the failure to receive acknowledgments or detection of loss via the transport's loss detection mechanism (e.g., timeouts or explicit ACKs)—the algorithm switches to a binary search phase to refine the precise MTU value by testing intermediate sizes. To ensure accurate measurement, probes include padding to reach the desired size, and the sender validates the result by confirming successful delivery of a datagram at the discovered MTU without fragmentation. The process repeats periodically or on triggers like connection establishment to adapt to path changes, with loss detection tailored to the transport protocol's capabilities. DPLPMTUD offers several advantages over traditional ICMP-dependent PMTUD, primarily its robustness against middleboxes or firewalls that filter ICMP messages, ensuring reliable MTU in environments where classical methods fail due to connections. It supports both IPv4 and without modification and is particularly effective for transports, as demonstrated by its integration into (RFC 9000), where it facilitates efficient path MTU probing for web traffic over encrypted connections. Implementations include support for SCTP since 2022 and ongoing IETF work on UDP options for DPLPMTUD (draft as of 2024). By leveraging transport-layer acknowledgments, it provides proactive that handles dynamic conditions more reliably than passive ICMP signals. Despite these benefits, DPLPMTUD introduces higher overhead compared to ICMP-based methods, as probe packets consume and processing resources, potentially increasing during the search phases. Convergence to the correct MTU can be slower, especially in high-loss networks, due to reliance on transport-specific loss detection, which may require multiple retransmissions or timeouts. Additionally, it necessitates support at the , limiting its applicability to protocols like or modified /SCTP implementations, and does not provide IP-layer benefits for non-datagram flows.

MSS Clamping

MSS clamping, also referred to as TCP MSS adjustment, is a technique employed by network devices to mitigate by modifying the (MSS) option in SYN packets. This adjustment reduces the advertised MSS to ensure that subsequent segments fit within the path's effective MTU, accounting for protocol headers and any encapsulation overhead, such as in tunneling scenarios. By proactively limiting segment sizes, it avoids the need for fragmentation or reliance on potentially unreliable Path MTU Discovery (PMTUD) mechanisms. The process involves intermediate routers, firewalls, or tunnel endpoints inspecting outgoing TCP SYN packets and rewriting the MSS value if it exceeds a calculated , typically the MTU minus 40 bytes for IPv4 (20 bytes + 20 bytes header). For example, on a 1492-byte PPPoE , the MSS might be clamped to 1452 bytes to prevent oversized packets. This modification is applied symmetrically to SYN packets in both directions during the three-way handshake, ensuring both endpoints use compatible segment sizes. Configurations like Cisco's ip tcp adjust-mss command exemplify this implementation on routed s. MSS clamping addresses key challenges in PMTUD, particularly "" connections caused by filtered ICMP "Fragmentation Needed" messages, by eliminating the dependency on such signaling. It is especially prevalent in environments with fixed overhead, such as VPNs (e.g., or GRE tunnels) and access links (e.g., PPPoE over DSL), where PMTUD may fail due to interference. Unlike full PMTUD, which dynamically probes the path MTU, clamping uses a static or interface-specific value, providing a simpler, deterministic solution for traffic. Despite its effectiveness, MSS clamping has limitations: it applies only to TCP connections with an MSS option and does not support or other protocols without equivalent size negotiation. Additionally, it requires all relevant traffic to traverse clamping-capable devices, which can be problematic in asymmetric or multi-homed setups. Misconfiguration may lead to suboptimal throughput if the clamped value is overly conservative. Empirical studies demonstrate broad deployment of MSS clamping, with observations in over 20% of edge networks across wired and mobile infrastructures as of 2018, underscoring its role as a practical complement to PMTUD in modern paths. This adoption has helped sustain efficient performance amid varying MTU constraints.

References

  1. [1]
    RFC 1191 - Path MTU discovery - IETF Datatracker
    This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path.
  2. [2]
    RFC 8201 - Path MTU Discovery for IP version 6 - IETF Datatracker
    This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4.
  3. [3]
    Resolve IPv4 Fragmentation, MTU, MSS, and PMTUD Issues ... - Cisco
    The tunnel path-mtu-discovery command helps the GRE interface set its IPv4 MTU dynamically, rather than statically with the ip mtu command. It is actually ...
  4. [4]
    RFC 4821 - Packetization Layer Path MTU Discovery
    This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with ...
  5. [5]
    RFC 1191: Path MTU discovery
    This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path.
  6. [6]
    RFC 4821: Packetization Layer Path MTU Discovery
    Classical Path MTU Discovery: Process described in RFC 1191 and RFC 1981, in which nodes rely on ICMP Packet Too Big (PTB) messages to learn the MTU of a path.Missing: historical development
  7. [7]
    Packetization Layer Path MTU Discovery for Datagram Transports
    This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram ...Table of Contents · DPLPMTUD Mechanisms · Specification of Protocol...
  8. [8]
    [PDF] Measuring Path MTU Discovery Behaviour - CAIDA Staff
    Measuring Path MTU Discovery Behaviour. Matthew Luckie. Department of Computer Science. University of Waikato. Hamilton, New Zealand mjl@wand.net.nz. Ben ...
  9. [9]
    RFC 1981 - Path MTU Discovery for IP version 6 - IETF Datatracker
    IPv6 nodes SHOULD implement Path MTU Discovery in order to discover and take advantage of paths with PMTU greater than the IPv6 minimum link MTU.
  10. [10]
    RFC 879 - The TCP Maximum Segment Size and Related Topics
    RFC 879 discusses the TCP Maximum Segment Size (MSS) and its relation to IP datagram size, clarifying TCP and IP interaction. The default MSS is 536.
  11. [11]
    RFC 8201: Path MTU Discovery for IP version 6
    Path MTU Discovery relies on ICMPv6 Packet Too Big (PTB) to determine the MTU of the path. An extension to Path MTU Discovery defined in this document can ...
  12. [12]
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
  18. [18]
    RFC 2516: A Method for Transmitting PPP Over Ethernet (PPPoE)
    ... MTU MUST NOT be greater than 1492. It is RECOMMENDED that the Access Concentrator ocassionally send Echo-Request packets to the Host to determine the state ...
  19. [19]
    RFC 2923: TCP Problems with Path MTU Discovery
    Introduction This memo catalogs several known TCP implementation problems dealing with Path MTU Discovery [RFC1191], including the long-standing black hole ...
  20. [20]
    RFC 2923 - TCP Problems with Path MTU Discovery
    This memo catalogs several known TCP implementation problems dealing with Path MTU Discovery [RFC1191], including the long-standing black hole problem.
  21. [21]
    Harden IOS Devices - Cisco
    Sep 12, 2024 · Cisco IOS software provides functionality to specifically filter ICMP messages by name or type and code. This example ACL, which must be used ...
  22. [22]
    Filter ICMP traffic in the Cisco IOS - TechRepublic
    May 15, 2008 · In this article, you learned what ICMP was, how it can help you, and how to filter ICMP to prevent security holes and DoS attacks.
  23. [23]
    Inferring and Debugging Path MTU Discovery Failures - USENIX
    Oct 20, 2005 · There is a perception that PMTUD is not working well in the modern Internet due to ICMP messages being firewalled or otherwise disabled due to ...
  24. [24]
    Disabling ICMP: The hidden costs to your network monitoring strategy
    Jul 28, 2025 · Filtering ICMP will not lead to increased security, but it will make it more difficult to diagnose network issues and resolve configuration ...
  25. [25]
    Troubleshooting Path MTU and TCP MSS Problems - ThousandEyes
    If PMTU is failing under IPv6, which typically occurs when ICMP messages are filtered (PMTU black holes), you are about to enter a world of pain, since your ...Missing: shifts | Show results with:shifts
  26. [26]
    RFC 4459: MTU and Fragmentation Issues with In-the-Network Tunneling
    ### Extracted Sections on MSS Clamping from RFC 4459
  27. [27]