MPC packets could be explicitly dropped or reset by firewall somewhere in the network, e.g. with:
iptables -t filter -A FORWARD -p tcp --tcp-option 30 -j DROP
It sounds safer to fallback to TCP after X attempts (defined in a sysctl option?), "just in case".
Later, this could be improved with a cache, see #57.