This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path. It specifies a small change to the way routers generate one type of ICMP message. For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice.
RFC Downloads
Cited By
- Feng X, Li Q, Sun K, Fu C and Xu K (2021). Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID, IEEE/ACM Transactions on Networking, 30:1, (409-422), Online publication date: 1-Feb-2022.
- Völker T, Tüxen M and Rathgeb E The search of the path MTU with QUIC Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC, (22-28)
- Hu Z and Zhang Q (2018). A new approach for packet loss measurement of video streaming and its application, Multimedia Tools and Applications, 77:10, (11589-11608), Online publication date: 1-May-2018.
- Araújo J, Saino L, Buytenhek L and Landa R Balancing on the edge Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, (111-124)
- Detal G, Hesmans B, Bonaventure O, Vanaubel Y and Donnet B Revealing middlebox interference with tracebox Proceedings of the 2013 conference on Internet measurement conference, (1-8)
- Gilad Y and Herzberg A (2013). Fragmentation Considered Vulnerable, ACM Transactions on Information and System Security, 15:4, (1-31), Online publication date: 1-Apr-2013.
- Gilad Y and Herzberg A (2012). LOT, ACM Transactions on Information and System Security, 15:2, (1-30), Online publication date: 1-Jul-2012.
- Genkov D An approach for finding proper packet size in IPv6 networks Proceedings of the 12th International Conference on Computer Systems and Technologies, (442-447)
- Luckie M and Stasiewicz B Measuring path MTU discovery behaviour Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, (102-108)
- Luckie M, Hyun Y and Huffaker B Traceroute probe method and forward IP path inference Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (311-324)
- Osterweil E, Ryan M, Massey D and Zhang L Quantifying the operational status of the DNSSEC deployment Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (231-242)
- Rubino R An open system for transparent firewall authentication and user traffic identification within corporate intranets Proceedings of the 9th ACM SIGITE conference on Information technology education, (113-118)
- Rikitake K, Nakao K, Shimojo S and Nogawa H (2008). UDP Large-Payload Capability Detection for DNSSEC, IEICE - Transactions on Information and Systems, E91-D:5, (1261-1273), Online publication date: 1-May-2008.
- Lau S and Trajković L Analysis of traffic data from a hybrid satellite-terrestrial network The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops, (1-7)
- Eggert L and Eddy W Towards more expressive transport-layer interfaces Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture, (71-74)
- Luckie M, Cho K and Owens B Inferring and debugging path MTU discovery failures Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (17-17)
- Paris J, Gulias V and Valderruten A A high performance Erlang Tcp/Ip stack Proceedings of the 2005 ACM SIGPLAN workshop on Erlang, (52-61)
- Medina A, Allman M and Floyd S (2005). Measuring the evolution of transport protocols in the internet, ACM SIGCOMM Computer Communication Review, 35:2, (37-52), Online publication date: 1-Apr-2005.
- Rabinovich M and Wang H (2004). DHTTP, IEEE/ACM Transactions on Networking, 12:6, (1007-1020), Online publication date: 1-Dec-2004.
- Medina A, Allman M and Floyd S Measuring interactions between transport protocols and middleboxes Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (336-341)
- Eddy W, Ostermann S and Allman M (2004). New techniques for making transport protocols robust to corruption-based loss, ACM SIGCOMM Computer Communication Review, 34:5, (75-88), Online publication date: 15-Oct-2004.
- Kanda T and Shimamura K Application of packet assembly technology to digital video and VoIP Proceedings of the 12th annual ACM international conference on Multimedia, (392-395)
- Cho K, Luckie M and Huffaker B Identifying IPv6 network problems in the dual-stack world Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (283-288)
- Widmer J, Boutremans C and Boudec J (2004). End-to-end congestion control for TCP-friendly flows with variable packet size, ACM SIGCOMM Computer Communication Review, 34:2, (137-151), Online publication date: 1-Apr-2004.
- Stergiou T, Leeson M and Green R (2004). An alternative architectural framework to the OSI security model, Computers and Security, 23:2, (137-153), Online publication date: 1-Mar-2004.
- Kaufman C, Perlman R and Sommerfeld B DoS protection for UDP-based protocols Proceedings of the 10th ACM conference on Computer and communications security, (2-7)
- Turányi Z, Valkó A and Campbell A (2003). 4+4, ACM SIGCOMM Computer Communication Review, 33:5, (43-54), Online publication date: 1-Oct-2003.
- Burnside M and Keromytis A High-speed I/O Proceedings of the ACM SIGCOMM workshop on Network-I/O convergence: experience, lessons, implications, (220-227)
- Mathis M, Heffner J and Reddy R (2003). Web100, ACM SIGCOMM Computer Communication Review, 33:3, (69-79), Online publication date: 1-Jul-2003.
- Shannon C, Moore D and Claffy K (2002). Beyond folklore, IEEE/ACM Transactions on Networking, 10:6, (709-720), Online publication date: 1-Dec-2002.
- Dunigan T, Mathis M and Tierney B A TCP tuning daemon Proceedings of the 2002 ACM/IEEE conference on Supercomputing, (1-16)
- Bellovin S A technique for counting natted hosts Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (267-272)
- Jiang H and Dovrolis C (2002). Passive estimation of TCP round-trip times, ACM SIGCOMM Computer Communication Review, 32:3, (75-88), Online publication date: 1-Jul-2002.
- Henderson T Observations on game server discovery mechanisms Proceedings of the 1st workshop on Network and system support for games, (47-52)
- Shannon C, Moore D and claffy k Characteristics of fragmented IP traffic on internet links Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (83-97)
- Kravets R, Carter C and Magalhães L (2001). A cooperative approach to user mobility, ACM SIGCOMM Computer Communication Review, 31:5, (57-69), Online publication date: 1-Oct-2001.
- Paxson V (2001). An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review, 31:3, (38-47), Online publication date: 1-Jul-2001.
- Savage S, Wetherall D, Karlin A and Anderson T (2000). Practical network support for IP traceback, ACM SIGCOMM Computer Communication Review, 30:4, (295-306), Online publication date: 1-Oct-2000.
- Savage S, Wetherall D, Karlin A and Anderson T Practical network support for IP traceback Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, (295-306)
- Eggert L, Heidemann J and Touch J (2000). Effects of ensemble-TCP, ACM SIGCOMM Computer Communication Review, 30:1, (15-29), Online publication date: 1-Jan-2000.
- Allman M and Falk A (1999). On the effective evaluation of TCP, ACM SIGCOMM Computer Communication Review, 29:5, (59-70), Online publication date: 5-Oct-1999.
- Balakrishnan H, Rahul H and Seshan S (1999). An integrated congestion management architecture for Internet hosts, ACM SIGCOMM Computer Communication Review, 29:4, (175-187), Online publication date: 1-Oct-1999.
- Balakrishnan H, Rahul H and Seshan S An integrated congestion management architecture for Internet hosts Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, (175-187)
- Williamson B and Farrell C (1999). Independent active program representation using ASN. 1, ACM SIGCOMM Computer Communication Review, 29:2, (69-88), Online publication date: 1-Apr-1999.
- Semke J, Mahdavi J and Mathis M (1998). Automatic TCP buffer tuning, ACM SIGCOMM Computer Communication Review, 28:4, (315-323), Online publication date: 1-Oct-1998.
- Semke J, Mahdavi J and Mathis M Automatic TCP buffer tuning Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication, (315-323)
- Ioannidis J, Duchamp D and Maguire G (1991). IP-based protocols for mobile internetworking, ACM SIGCOMM Computer Communication Review, 21:4, (235-245), Online publication date: 1-Aug-1991.
- Ioannidis J, Duchamp D and Maguire G IP-based protocols for mobile internetworking Proceedings of the conference on Communications architecture & protocols, (235-245)
Recommendations
Measuring path MTU discovery behaviour
IMC '10: Proceedings of the 10th ACM SIGCOMM conference on Internet measurementPath MTU Discovery (PMTUD) is widely believed to be unreliable because of firewalls that discard ICMP "Packet Too Big" messages. This paper measures PMTUD behaviour for 50,000 popular websites and finds the failure rate in IPv4 is much less than ...