Fixing a PMTUD Black hole is a multistep process, and it starts with finding the correct MTU/MRU of your link. In this post, I will explain how to do just that.
In this post, I'm going to talk about what IP fragmentation is, how it works and why it's needed. And while learning that, we're going to touch on subjects like OSI Layers / PDU / MTU / MRU and PMTUD.
Much has been changed since my last post about LUKS remote unlock workaround. This is the updated version on how to set things up properly.
I like Kaspersky anti-virus, and I use it regularly… (Not on my own PC mind you, but on the clients)
While I do believe they provide the best anti-virus in the market, I am not a fan of most of their other products. That goes for the Firewall, Safe Browsing, SSL Hijacking, and of course their newest addition, Secure Connection…
Not so long ago, remote unlocking of a LUKS-encrypted root partition was difficult to setup. While essential for headless servers, all required steps needed to be done manually and compatibility was a concern. Luckily, it is much simpler to do so in recent versions of Ubuntu/Debian. Unlocking an encrypted root remotely *should* be as simple as installing a single package... We'll see about that in a moment.
Recently I was in need of setting up some windows clients to connect to my OpenVPN server. This server running on Linux, uses a specific MTU value (let’s say 1400) to ensure maximum compatibility with different clients over different links.
In the previous post, I talked about OpenVPN TCP and UDP tunnels and why you should not be using TCP. In this post, I’m going to talk about optimizing the said tunnels to get the most out of them.
Spoiler alert: You most likely would want to use UDP tunneling!
An OpenVPN tunnel runs over IP and can encapsulates VPN traffic into either a UDP or a TCP connection. To understand the pros and cons of each, we first need to have an understanding of them both.