Navigation: Linux Kernel Driver DataBase - web LKDDB: Main index - N index
The Linux kernel configuration item CONFIG_NETFILTER_XT_TARGET_TCPMSS
:
( CONFIG_IPV6 || CONFIG_IPV6 = CONFIG_n ) && ( CONFIG_NETFILTER_ADVANCED = CONFIG_n )
xt_TCPMSS
This option adds a `TCPMSS' target, which allows you to alter the MSS value of TCP SYN packets, to control the maximum size for that connection (usually limiting it to your outgoing interface's MTU minus 40).
This is used to overcome criminally braindead ISPs or servers which block ICMP Fragmentation Needed packets. The symptoms of this problem are that everything works fine from your Linux firewall/router, but machines behind it can never exchange large packets: 1) Web browsers connect, then hang with no data received. 2) Small mail works fine, but large emails hang. 3) ssh works fine, but scp hangs after initial handshaking.
Workaround: activate this option and add a rule to your firewall configuration like:
iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN \ -j TCPMSS --clamp-mss-to-pmtu
To compile it as a module, choose M here. If unsure, say N.
Raw data from LKDDb:
lkddb module xt_TCPMSS CONFIG_NETFILTER_XT_TARGET_TCPMSS : net/netfilter/Kconfig : "'TCPMSS' target support" # in 2.6.21–2.6.39, 3.0–3.19, 4.0–4.20, 5.0–5.19, 6.0–6.12
This page is automaticly generated with free (libre, open) software lkddb(see lkddb-sources).
The data is retrived from:
Popular queries:
Navigation: Linux Kernel Driver DataBase - web LKDDB: main index - N index
Automatically generated (in year 2024). See also LKDDb sources on GitLab