Problems accessing community.kde.org with non-1500 mtu connection

Fabian Bläse fabian at blaese.de
Fri Oct 4 12:42:38 BST 2019


Hey there,

just a quick status report (as whe have Q4 now):
PMTU is still broken with services at Imperva. I have reminded them about this issue.

community.kde.org ist therefore still unreachable in networks with MTUs smaller then 1500.

You can check if the issue still exists on this site: https://ipv6alizer.se?address=https://community.kde.org

Regards,
Fabian

On 23.06.19 21:24, Ben Cooksley wrote:
> On Mon, 24 Jun 2019, 04:03 Fabian Bläse, <fabian at blaese.de <mailto:fabian at blaese.de>> wrote:
> 
>     Hey Ben,
> 
> 
> Hi Fabian,
> 
> 
>     Imperva Cloud Application Security Support has responded to my last mail:
>     > At the moment, we do not support PMTU.
>     > Our networking team is working on implementing PMTU support for several months now. We only have an approximate ETA, it should be implemented sometimes in Q3.
>     > We will keep you updated with the team's progress.
> 
>     Because IPv6 does not support fragmentation that means that their IPv6 support is fundamentally broken at the moment.
>     Let's hope that they get this fixed soon.
> 
> 
> Thanks for sending through their response. Historically the timelines they've provided have been pretty accurate, so sounds like this will be fixed sometime in the next few months.
> 
> Until then there isn't much we can do unfortunately. 
> 
> They'll likely inform you when they roll-out the fix (they did in my case when they fixed a different IPv6 issue I had reported following several user complaints which I had managed to reproduce)
> 
> 
>     Due to most browsers quick fallback to IPv4, it should be possible to access your sites from all networks which still have IPv4 enabled. (If the IPv6 connections fails)
>     We already have some (a tiny minority at the moment) IPv6 only networks which make use of NAT64/DNS64 however. In that scenario it might be possible that sites with broken PMTU are inaccessible.
> 
>     If you need any further information to debug this issue, just ask.
>     I'll happily provide any information that helps fixing this issue.
> 
> 
> Duly noted. 
> 
> 
>     Best regards,
>     Fabian
> 
> 
> Thanks,
> Ben
> 
> 
> 
>     On 23.06.19 10:29, Ben Cooksley wrote:
>     > On Sat, Jun 22, 2019 at 10:05 PM Fabian Bläse <fabian at blaese.de <mailto:fabian at blaese.de>> wrote:
>     >>
>     >> Hey Ben,
>     >
>     > Hi Fabian,
>     >
>     >>
>     >> sorry for the delay, I've been busy as well.
>     >>
>     >> Due to their enterprise-foo security rules, they seem to not be interested in this problem.
>     >> I'm sorry that I don't have the time to discuss this with them any further.
>     >
>     > No worries. Their network setups have proven very unusual at times yes.
>     >
>     > I assume our services protected by them are still accessible normally
>     > over IPv4 from your networks?
>     >
>     >>
>     >> You might want to check if any firewalls are active on your services (if that is configurable) that might block ICMP(v6) messages.
>     >> If not it looks like you have to contact them on your own. :-(
>     >
>     > Our systems don't have any such firewalls so those shouldn't be an issue.
>     >
>     > Chances are they'll request additional information (such as packet
>     > captures) to diagnose the issue. Will you be in a position to provide
>     > these if needed?
>     >
>     >>
>     >> Regards,
>     >> Fabian
>     >
>     > Cheers,
>     > Ben
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://mail.kde.org/pipermail/kde-www/attachments/20191004/84ca673c/attachment.sig>


More information about the kde-www mailing list