Why is the "don't fragment" flag set in https and ssh protocols?

23,578

The DF flag instructs routers who would normally fragment the packet due to it being too large for a link's MTU (and potentially deliver it out of order due to that fragmentation) to instead drop the packet and return an ICMP Fragmentation Needed packet, allowing the sending host to account for the lower MTU on the path to the destination host. This process is called "Path MTU discovery".

It's generally better to leave PMTUD alone and let it do its work, as opposed to having your TCP stack dealing with out of order fragments. However, in some cases (mainly when the necessary ICMP is blocked) the PMTUD doesn't work, and the connection breaks.

That's when you'll want to have the DF flag unset - when PMTUD can't function properly and connection problems result.

Share:
23,578

Related videos on Youtube

Aiden Thompson
Author by

Aiden Thompson

Updated on September 18, 2022

Comments

  • Aiden Thompson
    Aiden Thompson almost 2 years

    I've found a lot of information specifying that this is the case, however, I am really looking for the reason behind this. Why is it necessary? Is it necessary?

  • Aiden Thompson
    Aiden Thompson over 10 years
    Is there a reason that encrypted traffic, ie. ssh and https traffic shouldn't be fragmented?
  • voretaq7
    voretaq7 over 10 years
  • ravi yarlagadda
    ravi yarlagadda over 10 years
    @AidenThompson Generally, letting PMTUD do its thing instead of letting fragmentation happen is better for performance for all TCP connections, including SSH and HTTPS.
  • Basur
    Basur over 10 years
    (I.e., it has nothing to do with encryption, and everything to do with TCP.)
  • Smithers
    Smithers about 9 years
    This is one of those things that server and network worlds will never agree upon.