From bf18b4fe405d16caaed01a2eafaf409a29b99a6d Mon Sep 17 00:00:00 2001 From: Simon 'corecode' Schubert Date: Mon, 14 Sep 2009 19:08:04 +0200 Subject: [PATCH] Revert "Increase the default TCP maximum segment size from 512 to 1460." This reverts commit d190343e53819e25316a2a890724404f8e48c78d. It seems that there are systems (probably firewalls) in action which enforce an MSS of 536. Specifically, at research.microsoft.com, port 80, packets seem to be simply dropped if they exceed a MSS of 536 bytes, and no ICMP destinatino unreachable, need to fragment message is generated. While this behavior might be questionable as well, we should not diverge from established standards. This default MSS value can be changed using the sysctl node net.inet.tcp.mssdflt. Mandated by RFC 879, RFC 1122. --- sys/netinet/tcp.h | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/sys/netinet/tcp.h b/sys/netinet/tcp.h index b49338865a..e320bb798d 100644 --- a/sys/netinet/tcp.h +++ b/sys/netinet/tcp.h @@ -121,9 +121,8 @@ struct tcphdr { * With an IP MSS of 576, this is 536, * but 512 is probably more convenient. * This should be defined as MIN(512, IP_MSS - sizeof (struct tcpiphdr)). - * The modern consensus is that 1500 is a safe MTU to use for the Internet. */ -#define TCP_MSS 1460 +#define TCP_MSS 512 /* * TCP_MINMSS is defined to be 256 which is fine for the smallest -- 2.41.0