Forum Discussion
Proxy MSS
My question is could there be any negitive impact enabling this feature (small packet DOS?). We are having a debate on if we should enable this everywhere or only on the VIPs impacted.
My thought is that this is disabled for a reason but I wanted to get the communities take. I think we have a valid use case but not sure about enabling it everywhere.
Thanks,
Jim Moore
- mikand_61525NimbostratusAs a followup question to your MSS-question...
- nitassEmployeeF5 market the LTM as a "full-proxy", wouldnt this mean that a F5 virtually never fragment any packets because all flows is proxied through the LTM "full-proxy" engine?i do not think so. i understand full-proxy means two separate connection between client-f5 and f5-server.
- Jim_MooreNimbostratusI agree with nitass that it's two seperate connections. 1 client and 1 server. If it were to buffer like you suggest mikand I would think it would introduce to much latency and buffer size would need to be large.
- mikand_61525NimbostratusMost network devices have both receiving and send buffers, otherwise you would end up with heavy packetloss during burst situations.
- nitassEmployeeif you change the value of "proxy mss" (into enabled?) the F5 will start to behave like a regular routeri do not think so. mss is only one parameter of tcp.
- Mike_Dayton_108Nimbostratus
I know this is an old post, but this might be really important to someone seeing ssl flows breaking on the first large inbound packet and does not see it show up outbound.
Say you have a TCP peer on one side of the LTM proxy negotiating mss to 1200 bytes and the on the other side, the a TCP peer is negotiating to 1500 bytes. I believe that without proxy-mss, the mss negotiated on one side (important when it is lower mss), is not considered when negotiating the mms value on the other side of the proxy. This is problem if the sender is on the large mms side of the proxy and the DF bit is set (like we see with HTTPS) and is sending to the smaller mss side of the proxy.
What you should see is an ICMP warning message being sent in the direction of the sender (larger mss side). The router/firewall may block the feedback and you end up with dropped packets due to packets exceeding the mss on the smaller mss side.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com