mirror of
https://github.com/qdm12/gluetun.git
synced 2026-05-07 04:20:12 +02:00
be92aa2ac4
- Existing option `WIREGUARD_MTU` , if set, disables PMTUD and is used - New option `PMTUD_ICMP_ADDRESSES=1.1.1.1,8.8.8.8` and `PMTUD_TCP_ADDRESSES=1.1.1.1:443,8.8.8.8:443` - ICMP PMTUD now targets external-by-default IP addresses - New TCP PMTUD (binary search only) as a second MTU confirmation and fallback mechanism. - Force set TCP MSS to MTU - IP header - TCP base header - "magic 20 bytes" 🎆 - Fix #3108
41 lines
1.2 KiB
Go
41 lines
1.2 KiB
Go
package pmtud
|
|
|
|
import (
|
|
"net/netip"
|
|
|
|
"github.com/qdm12/gluetun/internal/constants"
|
|
"github.com/qdm12/gluetun/internal/constants/vpn"
|
|
pconstants "github.com/qdm12/gluetun/internal/pmtud/constants"
|
|
)
|
|
|
|
// MaxTheoreticalVPNMTU returns the theoretical maximum MTU for a VPN tunnel
|
|
// given the VPN type, network protocol, and VPN gateway IP address.
|
|
// This is notably useful to skip testing MTU values higher than this value.
|
|
// The function panics if the network or VPN type is unknown.
|
|
func MaxTheoreticalVPNMTU(vpnType, network string, vpnGateway netip.Addr) uint32 {
|
|
const physicalLinkMTU = pconstants.MaxEthernetFrameSize
|
|
vpnLinkMTU := physicalLinkMTU
|
|
if vpnGateway.Is4() {
|
|
vpnLinkMTU -= pconstants.IPv4HeaderLength
|
|
} else {
|
|
vpnLinkMTU -= pconstants.IPv6HeaderLength
|
|
}
|
|
switch network {
|
|
case constants.TCP:
|
|
vpnLinkMTU -= pconstants.BaseTCPHeaderLength
|
|
case constants.UDP:
|
|
vpnLinkMTU -= pconstants.UDPHeaderLength
|
|
default:
|
|
panic("unknown network protocol: " + network)
|
|
}
|
|
switch vpnType {
|
|
case vpn.Wireguard:
|
|
vpnLinkMTU -= pconstants.WireguardHeaderLength
|
|
case vpn.OpenVPN:
|
|
vpnLinkMTU -= pconstants.OpenVPNHeaderMaxLength
|
|
default:
|
|
panic("unknown VPN type: " + vpnType)
|
|
}
|
|
return vpnLinkMTU
|
|
}
|