Public bug reported:

three domUs:
gateway, loginserver, webserver

mtu of webserver is 1500

[EMAIL PROTECTED]:~ $ ifconfig eth0
eth0      Protokoll:Ethernet  Hardware Adresse 00:16:3E:39:F9:F4
          inet Adresse:137.226.18.3  Bcast:137.226.18.255  Maske:255.255.255.0
          inet6 Adresse: fe80::216:3eff:fe39:f9f4/64 
Gültigkeitsbereich:Verbindung
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:3206004 errors:0 dropped:0 overruns:0 frame:0
          TX packets:4090292 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:1000
          RX bytes:317519642 (302.8 MiB)  TX bytes:6339718363 (5.9 GiB)

Nevertheless during a TCP transfer:
16:16:24.303263 IP webserver.umic-mesh.net.www > 
loginserver.umic-mesh.net.54364: . 10472538:10485570(13032) ack 114 win 91 
<nop,nop,timestamp 63828762 63825762>

an IP packet of size 13032! I assume this is meant to improve TCP throughput 
but this is totally broken! One can't just override the actual
MTU setting and begin to send with whatever sized packets seems fortunate. 

As if this weren't bad enough, it is even ignoring ICMP fragmentatiation needed 
messages... leading to a maximal TCP throughput of around 8 Kilobyte per 
second, where the gateway is another domU. 
After one ICMP the packet is sent with correct MTU, however the next packet 
will be again sent with illegal MTU:

During a transfer from webserver through gateway to an outside machine:

16:24:33.788608 IP 137.226.12.150.33012 > 137.226.18.3.80: S 
2873656164:2873656164(0) win 5840 <mss 1460,sackOK,timestamp 5405857 
0,nop,wscale 6>
16:24:33.800995 IP 137.226.18.3.80 > 137.226.12.150.33012: S 
3221591711:3221591711(0) ack 2873656165 win 5792 <mss 1460,sackOK,timestamp 
63951128 5405857,nop,wscale 6>
16:24:33.788877 IP 137.226.12.150.33012 > 137.226.18.3.80: . ack 1 win 92 
<nop,nop,timestamp 5405857 63951128>
16:24:33.788986 IP 137.226.12.150.33012 > 137.226.18.3.80: P 1:114(113) ack 1 
win 92 <nop,nop,timestamp 5405857 63951128>
16:24:33.788994 IP 137.226.18.3.80 > 137.226.12.150.33012: . ack 114 win 91 
<nop,nop,timestamp 63951128 5405857>
16:24:33.789171 IP 137.226.18.3.80 > 137.226.12.150.33012: . 1:2897(2896) ack 
114 win 91 <nop,nop,timestamp 63951128 5405857>
16:24:33.789232 IP 137.226.18.1 > 137.226.18.3: ICMP 137.226.12.150 unreachable 
- need to frag (mtu 1500), length 556
16:24:33.991430 IP 137.226.18.3.80 > 137.226.12.150.33012: . 1:1449(1448) ack 
114 win 91 <nop,nop,timestamp 63951179 5405857>
16:24:33.992082 IP 137.226.12.150.33012 > 137.226.18.3.80: . ack 1449 win 137 
<nop,nop,timestamp 5405908 63951179>
16:24:33.992091 IP 137.226.18.3.80 > 137.226.12.150.33012: . 2897:5793(2896) 
ack 114 win 91 <nop,nop,timestamp 63951179 5405908>
16:24:33.992205 IP 137.226.18.1 > 137.226.18.3: ICMP 137.226.12.150 unreachable 
- need to frag (mtu 1500), length 556
16:24:34.195401 IP 137.226.18.3.80 > 137.226.12.150.33012: . 1449:2897(1448) 
ack 114 win 91 <nop,nop,timestamp 63951230 5405908>
16:24:34.195982 IP 137.226.12.150.33012 > 137.226.18.3.80: . ack 2897 win 182 
<nop,nop,timestamp 5405959 63951230>
16:24:34.195989 IP 137.226.18.3.80 > 137.226.12.150.33012: . 5793:8689(2896) 
ack 114 win 91 <nop,nop,timestamp 63951230 5405959>
16:24:34.196086 IP 137.226.18.1 > 137.226.18.3: ICMP 137.226.12.150 unreachable 
- need to frag (mtu 1500), length 556
...

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

-- 
xen kernel does not honor mtu setting (network stack totally broken)
https://bugs.launchpad.net/bugs/238573
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to