Package: iptables
Version: 1.4.4-2
Severity: normal
Tags: patch

Whilst fixing an ICMP fragmentation-needed blackhole related network
problem, I noted a couple of areas where the iptables man page could
be clearer.  See patch for details.


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.31-rc5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages iptables depends on:
ii  libc6                         2.9-25     GNU C Library: Shared libraries

iptables recommends no packages.

iptables suggests no packages.

-- no debconf information
--- libxt_TCPMSS.man.old        2009-10-16 17:13:07.000000000 +0100
+++ libxt_TCPMSS.man    2009-10-16 20:00:04.000000000 +0100
@@ -34,9 +34,19 @@
              \-j TCPMSS \-\-clamp\-mss\-to\-pmtu
 .TP
 \fB\-\-set\-mss\fP \fIvalue\fP
-Explicitly set MSS option to specified value.
+Prior to Linux 2.6.25, explicitly set MSS option to specified value.
+For Linux 2.6.25 and later, ensure MSS option does not exceed the
+specified value.
+
 .TP
 \fB\-\-clamp\-mss\-to\-pmtu\fP
 Automatically clamp MSS value to (path_MTU \- 40 for IPv4; \-60 for IPv6).
+This may not function as desired where asymmetric routes with differing
+path MTU exist - the kernel uses the path MTU which it would use to send
+packets from itself to the source and destination IP addresses.  Prior to
+Linux 2.6.25, only the path MTU to the destination IP address was
+considered by this option; subsequent kernels also consider the path MTU
+to the source IP address.
+
 .PP
 These options are mutually exclusive.

Reply via email to