…ets have the DF flag turned off, and the size set to the default value of 536 [ RFC1122 ]. References This problem has been discussed extensively on the tcp-impl mailing list; the name "black hole" has been in use for many years. How to detect This shows up as a TCP connection wh…
…n, messages SHOULD be the smaller of 576 bytes and the first-hop MTU for IPv4 [ RFC1122 ] and 1280 bytes for IPv6 [ RFC2460 ]. This value corresponds to the overall size of the IP packet. Consequently, for IPv4, the actual STUN message would need to be less than 548 bytes (576 mi…
…ets have the DF flag turned off, and the size set to the default value of 536 [ RFC1122 ]. References This problem has been discussed extensively on the tcp-impl mailing list; the name "black hole" has been in use for many years. How to detect This shows up as a TCP connection wh…
…special, its change resets all configuration parameters to their default state (RFC1122 for hosts, RFC1812 for routers) Possible values: 0 (disabled) 1 (enabled) Default: 0 (disabled) ip_default_ttl - INTEGER Default value of TTL field (Time To Live) for outgoing (but not forward…
…TF occasionally reserves an address block for a special purpose. For example, [ RFC1122 ] reserves an IPv4 address block (0.0.0.0/8) to represent the local (i.e., "this") network. Likewise, [ RFC4291 ] reserves an IPv6 address block (fe80::/10) for link-local unicast addresses. S…
…on. With a TCP maximum segment size of 1460 bytes and delayed acknowledgments [ RFC1122 ] in use, the ratio of IP packet bytes for data to IP packet bytes for ACKs is only (3000 to 40) 75 to 1. Border, et al. Informational [Page 22] RFC 3135 PILC - Performance Enhancing Proxies J…
…a smaller MTU. For TCP, this occurs when the R1 timeout threshold described by [RFC1122] expires. Mathis & Heffner Standards Track [Page 20] RFC 4821 Packetization Layer Path MTU Discovery March 2007 If there is a full-stop timeout and there was not an ICMP message indicating a r…
… It is RECOMMENDED that the safe value not exceed 1200 bytes. Please note that [RFC1122] only requires that end hosts be able to reassemble fragmented IP packets up to 576 bytes in length. The DTLS implementation SHOULD allow the DTLS user to set the Differentiated Services Code …
…ing a packet with a length equal to 576 bytes as discussed in [ RFC0791 ] and [ RFC1122 ] . ¶ The exact amount of application data that can be included while avoiding fragmentation depends on the details of the TURN session between the client and the server: whether UDP, TCP, or …
…It is RECOMMENDED that the safe value not exceed 1200 bytes. Please note that [ RFC1122 ] only requires that end hosts be able to reassemble fragmented IP packets up to 576 bytes in length. The DTLS implementation SHOULD allow the DTLS user to set the Differentiated Services Code…
…outgoing link. If this is the case, then the normal fragmentation rules apply [ RFC1122 ]. IPv4 Options Preferred Behavior: The outgoing packet is sent without any IPv4 options. Alternate Behavior: Same as preferred. Mahy, et al. Standards Track [Page 44] RFC 5766 TURN April 2010…
…It is RECOMMENDED that the safe value not exceed 1200 bytes. Please note that [ RFC1122 ] only requires that end hosts be able to reassemble fragmented IP packets up to 576 bytes in length. The DTLS implementation SHOULD allow the DTLS user to set the Differentiated Services Code…
…on. With a TCP maximum segment size of 1460 bytes and delayed acknowledgments [ RFC1122 ] in use, the ratio of IP packet bytes for data to IP packet bytes for ACKs is only (3000 to 40) 75 to 1. Border, et al. Informational [Page 22] RFC 3135 PILC - Performance Enhancing Proxies J…
…sages cannot be authenticated, all ICMP errors should be treated as soft errors RFC1122 ]. If the DNS query was sent over DTLS, then the corresponding DNS response MUST only be accepted if it is received over the same DTLS connection. This behavior mitigates all possible attacks …
…nding WINDOW_UPDATE frames with very small increments; see Section 4.2.3.3 of [ RFC1122 A sender that receives a WINDOW_UPDATE frame updates the corresponding window by the amount specified in the frame. A sender MUST NOT allow a flow-control window to exceed 2 31 -1 octets. If a…