[Olsr-users] Slow http info plugin on FreeBSD & firewall rule

Michel Blais (spam-protected)
Wed Aug 3 20:21:57 CEST 2011


Hi Teco,

It's look like a bug with Chrome/Chromium 12.

I just done a test with firefox and the result come without delay, it's 
happen on chromium.
The delay don't happen with Chromimum on httpinfo with OpenWRT 0.6.0 or 
0.6.1 or StarOS with 0.5.5.
Chromium about : 12.0.742.112 (90304) Built on Ubuntu 11.04, running on 
LinuxMint 11
Firefox was version 5 also on Mint 11.

On my Windows 7 laptop, it's the same. Firefox 5 without delay and 
Chrome 12.0.742.122 m have a delay of a little more then 1 minutes. I 
just updated it to 13.0.782.107 m and the're still a delay but now a lot 
faster, 15 seconds until the answer and  some paquets after. IE 8 is 
also without delay. I tryed Opera 11.10 on OpenSuse from a co-worker PC 
and the're also no delay.

Here the result of tcpdump for my IP address only in chromium 12 on Mint:

# tcpdump -ni re0 | grep 10.5.9.128
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes
17:49:33.634664 IP 10.5.9.128.47916 > 10.5.16.3.1978: Flags [S], seq 
2382954667, win 14600, options [mss 1460,sackOK,TS val 18931367 ecr 
0,nop,wscale 7], length 0
17:49:33.634732 IP 10.5.16.3.1978 > 10.5.9.128.47916: Flags [S.], seq 
1322067563, ack 2382954668, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 1526305143 ecr 18931367], length 0
17:49:33.634742 IP 10.5.9.128.47917 > 10.5.16.3.1978: Flags [S], seq 
2391043411, win 14600, options [mss 1460,sackOK,TS val 18931367 ecr 
0,nop,wscale 7], length 0
17:49:33.634778 IP 10.5.16.3.1978 > 10.5.9.128.47917: Flags [S.], seq 
2196275941, ack 2391043412, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 1459727619 ecr 18931367], length 0
17:49:33.635920 IP 10.5.9.128.47918 > 10.5.16.3.1978: Flags [S], seq 
2382208493, win 14600, options [mss 1460,sackOK,TS val 18931367 ecr 
0,nop,wscale 7], length 0
17:49:33.635956 IP 10.5.16.3.1978 > 10.5.9.128.47918: Flags [S.], seq 
3516818541, ack 2382208494, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 1808421010 ecr 18931367], length 0
17:49:33.635963 IP 10.5.9.128.47919 > 10.5.16.3.1978: Flags [S], seq 
2376619002, win 14600, options [mss 1460,sackOK,TS val 18931367 ecr 
0,nop,wscale 7], length 0
17:49:33.635996 IP 10.5.16.3.1978 > 10.5.9.128.47919: Flags [S.], seq 
2951582061, ack 2376619003, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 2901636807 ecr 18931367], length 0
17:49:33.636700 IP 10.5.9.128.47920 > 10.5.16.3.1978: Flags [S], seq 
2385869109, win 14600, options [mss 1460,sackOK,TS val 18931367 ecr 
0,nop,wscale 7], length 0
17:49:33.636735 IP 10.5.16.3.1978 > 10.5.9.128.47920: Flags [S.], seq 
2370616295, ack 2385869110, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 3643518369 ecr 18931367], length 0
17:49:33.730115 IP 10.5.9.128.47916 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18931375 ecr 1526305143], length 0
17:49:33.730458 IP 10.5.9.128.47916 > 10.5.16.3.1978: Flags [P.], ack 1, 
win 115, options [nop,nop,TS val 18931375 ecr 1526305143], length 454
17:49:33.730825 IP 10.5.9.128.47917 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18931375 ecr 1459727619], length 0
17:49:33.731052 IP 10.5.9.128.47918 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18931375 ecr 1808421010], length 0
17:49:33.731081 IP 10.5.16.3.1978 > 10.5.9.128.47918: Flags [R], seq 
3516818542, win 0, length 0
17:49:33.731382 IP 10.5.9.128.47919 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18931376 ecr 2901636807], length 0
17:49:33.731407 IP 10.5.16.3.1978 > 10.5.9.128.47919: Flags [R], seq 
2951582062, win 0, length 0
17:49:33.731688 IP 10.5.9.128.47920 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18931376 ecr 3643518369], length 0
17:49:33.731713 IP 10.5.16.3.1978 > 10.5.9.128.47920: Flags [R], seq 
2370616296, win 0, length 0
17:49:33.829687 IP 10.5.16.3.1978 > 10.5.9.128.47916: Flags [.], ack 
455, win 8326, options [nop,nop,TS val 1526305338 ecr 18931375], length 0
17:50:18.840266 IP 10.5.9.128.47917 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18935888 ecr 1459727619], length 0
17:50:18.840322 IP 10.5.16.3.1978 > 10.5.9.128.47917: Flags [.], ack 1, 
win 8326, options [nop,nop,TS val 1459772824 ecr 18931375], length 0
17:50:18.866478 IP 10.5.9.128.47916 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18935891 ecr 1526305338], length 0
17:50:18.866511 IP 10.5.16.3.1978 > 10.5.9.128.47916: Flags [.], ack 
455, win 8326, options [nop,nop,TS val 1526350375 ecr 18931375], length 0
17:50:39.100734 IP 10.5.9.128.47917 > 10.5.16.3.1978: Flags [F.], seq 1, 
ack 1, win 115, options [nop,nop,TS val 18937909 ecr 1459772824], length 0
17:50:39.100796 IP 10.5.16.3.1978 > 10.5.9.128.47917: Flags [.], ack 2, 
win 8326, options [nop,nop,TS val 1459793085 ecr 18937909], length 0
17:50:39.100864 IP 10.5.16.3.1978 > 10.5.9.128.47917: Flags [F.], seq 1, 
ack 2, win 8326, options [nop,nop,TS val 1459793085 ecr 18937909], length 0
17:50:39.100952 IP 10.5.16.3.1978 > 10.5.9.128.47916: Flags [.], ack 
455, win 8326, options [nop,nop,TS val 1526370609 ecr 18931375], length 1448
17:50:39.100970 IP 10.5.16.3.1978 > 10.5.9.128.47916: Flags [.], ack 
455, win 8326, options [nop,nop,TS val 1526370609 ecr 18931375], length 1448
17:50:39.100987 IP 10.5.16.3.1978 > 10.5.9.128.47916: Flags [P.], ack 
455, win 8326, options [nop,nop,TS val 1526370609 ecr 18931375], length 620
17:50:39.101010 IP 10.5.16.3.1978 > 10.5.9.128.47916: Flags [F.], seq 
3517, ack 455, win 8326, options [nop,nop,TS val 1526370609 ecr 
18931375], length 0
17:50:39.119291 IP 10.5.9.128.47917 > 10.5.16.3.1978: Flags [.], ack 2, 
win 115, options [nop,nop,TS val 18937916 ecr 1459793085], length 0
17:50:39.123099 IP 10.5.9.128.47916 > 10.5.16.3.1978: Flags [.], ack 
1449, win 137, options [nop,nop,TS val 18937916 ecr 1526370609], length 0
17:50:39.123122 IP 10.5.9.128.47916 > 10.5.16.3.1978: Flags [.], ack 
2897, win 160, options [nop,nop,TS val 18937916 ecr 1526370609], length 0
17:50:39.123141 IP 10.5.9.128.47916 > 10.5.16.3.1978: Flags [.], ack 
3517, win 182, options [nop,nop,TS val 18937916 ecr 1526370609], length 0
17:50:39.123160 IP 10.5.9.128.47916 > 10.5.16.3.1978: Flags [F.], seq 
455, ack 3518, win 182, options [nop,nop,TS val 18937916 ecr 
1526370609], length 0
17:50:39.123198 IP 10.5.16.3.1978 > 10.5.9.128.47916: Flags [.], ack 
456, win 8325, options [nop,nop,TS val 1526370631 ecr 18937916], length 0
17:50:39.123207 IP 10.5.9.128.47963 > 10.5.16.3.1978: Flags [S], seq 
3413223792, win 14600, options [mss 1460,sackOK,TS val 18937916 ecr 
0,nop,wscale 7], length 0
17:50:39.123299 IP 10.5.16.3.1978 > 10.5.9.128.47963: Flags [S.], seq 
4216834284, ack 3413223793, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 1853985944 ecr 18937916], length 0
17:50:39.124941 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [S], seq 
3407952455, win 14600, options [mss 1460,sackOK,TS val 18937916 ecr 
0,nop,wscale 7], length 0
17:50:39.124979 IP 10.5.16.3.1978 > 10.5.9.128.47964: Flags [S.], seq 
2244528480, ack 3407952456, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 2779465220 ecr 18937916], length 0
17:50:39.158929 IP 10.5.9.128.47963 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18937919 ecr 1853985944], length 0
17:50:39.158983 IP 10.5.9.128.47963 > 10.5.16.3.1978: Flags [P.], ack 1, 
win 115, options [nop,nop,TS val 18937919 ecr 1853985944], length 428
17:50:39.159003 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18937919 ecr 2779465220], length 0
17:50:39.159037 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [P.], ack 1, 
win 115, options [nop,nop,TS val 18937919 ecr 2779465220], length 409
17:50:39.258287 IP 10.5.16.3.1978 > 10.5.9.128.47963: Flags [.], ack 
429, win 8326, options [nop,nop,TS val 1853986079 ecr 18937919], length 0
17:50:39.258307 IP 10.5.16.3.1978 > 10.5.9.128.47964: Flags [.], ack 
410, win 8274, options [nop,nop,TS val 2779465354 ecr 18937919], length 0
17:50:39.301178 IP 10.5.16.3.1978 > 10.5.9.128.47963: Flags [.], ack 
429, win 8326, options [nop,nop,TS val 1853986121 ecr 18937919], length 1448
17:50:39.301197 IP 10.5.16.3.1978 > 10.5.9.128.47963: Flags [P.], ack 
429, win 8326, options [nop,nop,TS val 1853986121 ecr 18937919], length 606
17:50:39.301236 IP 10.5.16.3.1978 > 10.5.9.128.47963: Flags [F.], seq 
2055, ack 429, win 8326, options [nop,nop,TS val 1853986121 ecr 
18937919], length 0
17:50:39.318247 IP 10.5.9.128.47963 > 10.5.16.3.1978: Flags [.], ack 
1449, win 137, options [nop,nop,TS val 18937935 ecr 1853986121], length 0
17:50:39.318279 IP 10.5.9.128.47963 > 10.5.16.3.1978: Flags [.], ack 
2055, win 160, options [nop,nop,TS val 18937935 ecr 1853986121], length 0
17:50:39.318299 IP 10.5.9.128.47963 > 10.5.16.3.1978: Flags [F.], seq 
429, ack 2056, win 160, options [nop,nop,TS val 18937935 ecr 
1853986121], length 0
17:50:39.318341 IP 10.5.16.3.1978 > 10.5.9.128.47963: Flags [.], ack 
430, win 8325, options [nop,nop,TS val 1853986139 ecr 18937935], length 0
17:50:39.318353 IP 10.5.9.128.47965 > 10.5.16.3.1978: Flags [S], seq 
3415186628, win 14600, options [mss 1460,sackOK,TS val 18937936 ecr 
0,nop,wscale 7], length 0
17:50:39.318396 IP 10.5.16.3.1978 > 10.5.9.128.47965: Flags [S.], seq 
3693001828, ack 3415186629, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 670557249 ecr 18937936], length 0
17:50:39.347272 IP 10.5.9.128.47965 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18937938 ecr 670557249], length 0
17:50:39.347375 IP 10.5.9.128.47965 > 10.5.16.3.1978: Flags [P.], ack 1, 
win 115, options [nop,nop,TS val 18937938 ecr 670557249], length 413
17:50:39.402263 IP 10.5.16.3.1978 > 10.5.9.128.47964: Flags [.], ack 
410, win 8326, options [nop,nop,TS val 2779465497 ecr 18937919], length 1448
17:50:39.402283 IP 10.5.16.3.1978 > 10.5.9.128.47964: Flags [.], ack 
410, win 8326, options [nop,nop,TS val 2779465498 ecr 18937919], length 1448
17:50:39.402299 IP 10.5.16.3.1978 > 10.5.9.128.47964: Flags [P.], ack 
410, win 8326, options [nop,nop,TS val 2779465498 ecr 18937919], length 120
17:50:39.402324 IP 10.5.16.3.1978 > 10.5.9.128.47964: Flags [F.], seq 
3017, ack 410, win 8326, options [nop,nop,TS val 2779465498 ecr 
18937919], length 0
17:50:39.427816 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [.], ack 
1449, win 137, options [nop,nop,TS val 18937946 ecr 2779465497], length 0
17:50:39.427841 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [.], ack 
2897, win 160, options [nop,nop,TS val 18937946 ecr 2779465498], length 0
17:50:39.427859 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [.], ack 
3017, win 160, options [nop,nop,TS val 18937946 ecr 2779465498], length 0
17:50:39.447245 IP 10.5.16.3.1978 > 10.5.9.128.47965: Flags [.], ack 
414, win 8326, options [nop,nop,TS val 670557378 ecr 18937938], length 0
17:50:39.454865 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [.], ack 
3018, win 160, options [nop,nop,TS val 18937950 ecr 2779465498], length 0
17:50:39.502333 IP 10.5.16.3.1978 > 10.5.9.128.47965: Flags [P.], ack 
414, win 8326, options [nop,nop,TS val 670557433 ecr 18937938], length 256
17:50:39.502359 IP 10.5.16.3.1978 > 10.5.9.128.47965: Flags [F.], seq 
257, ack 414, win 8326, options [nop,nop,TS val 670557433 ecr 18937938], 
length 0
17:50:39.531287 IP 10.5.9.128.47965 > 10.5.16.3.1978: Flags [.], ack 
257, win 123, options [nop,nop,TS val 18937956 ecr 670557433], length 0
17:50:39.566812 IP 10.5.9.128.47965 > 10.5.16.3.1978: Flags [.], ack 
258, win 123, options [nop,nop,TS val 18937961 ecr 670557433], length 0
17:50:49.054026 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [F.], seq 
410, ack 3018, win 160, options [nop,nop,TS val 18938910 ecr 
2779465498], length 0
17:50:49.054316 IP 10.5.9.128.47965 > 10.5.16.3.1978: Flags [F.], seq 
414, ack 258, win 123, options [nop,nop,TS val 18938910 ecr 670557433], 
length 0
17:50:57.700907 IP 10.5.9.128.47965 > 10.5.16.3.1978: Flags [F.], seq 
414, ack 258, win 123, options [nop,nop,TS val 18939768 ecr 670557433], 
length 0
17:50:57.700955 IP 10.5.16.3.1978 > 10.5.9.128.47965: Flags [.], ack 
415, win 8325, options [nop,nop,TS val 670575631 ecr 18938910], length 0
17:50:58.041924 IP 10.5.9.128.47964 > 10.5.16.3.1978: Flags [F.], seq 
410, ack 3018, win 160, options [nop,nop,TS val 18939798 ecr 
2779465498], length 0
17:50:58.041957 IP 10.5.16.3.1978 > 10.5.9.128.47964: Flags [.], ack 
411, win 8325, options [nop,nop,TS val 2779484137 ecr 18938910], length 0

Something to mention is that I ad my page at 17:50:39 but their some 
paquets that came after.

Now the tcpdump for firefox 5 on Mint :

# tcpdump -ni re0 | grep 10.5.9.128
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes
17:53:01.043894 IP 10.5.9.128.53172 > 10.5.16.3.1978: Flags [S], seq 
1344136921, win 14600, options [mss 1460,sackOK,TS val 18952108 ecr 
0,nop,wscale 7], length 0
17:53:01.043974 IP 10.5.16.3.1978 > 10.5.9.128.53172: Flags [S.], seq 
1118541675, ack 1344136922, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 4078623745 ecr 18952108], length 0
17:53:01.075059 IP 10.5.9.128.53172 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18952113 ecr 4078623745], length 0
17:53:01.075956 IP 10.5.9.128.53172 > 10.5.16.3.1978: Flags [P.], ack 1, 
win 115, options [nop,nop,TS val 18952113 ecr 4078623745], length 351
17:53:01.175395 IP 10.5.16.3.1978 > 10.5.9.128.53172: Flags [.], ack 
352, win 8326, options [nop,nop,TS val 4078623877 ecr 18952113], length 0
17:53:01.241929 IP 10.5.16.3.1978 > 10.5.9.128.53172: Flags [.], ack 
352, win 8326, options [nop,nop,TS val 4078623943 ecr 18952113], length 1448
17:53:01.241947 IP 10.5.16.3.1978 > 10.5.9.128.53172: Flags [.], ack 
352, win 8326, options [nop,nop,TS val 4078623943 ecr 18952113], length 1448
17:53:01.241963 IP 10.5.16.3.1978 > 10.5.9.128.53172: Flags [P.], ack 
352, win 8326, options [nop,nop,TS val 4078623943 ecr 18952113], length 620
17:53:01.241989 IP 10.5.16.3.1978 > 10.5.9.128.53172: Flags [F.], seq 
3517, ack 352, win 8326, options [nop,nop,TS val 4078623943 ecr 
18952113], length 0
17:53:01.383919 IP 10.5.9.128.53172 > 10.5.16.3.1978: Flags [.], ack 
1449, win 137, options [nop,nop,TS val 18952144 ecr 4078623943], length 0
17:53:01.383949 IP 10.5.9.128.53172 > 10.5.16.3.1978: Flags [.], ack 
2897, win 160, options [nop,nop,TS val 18952144 ecr 4078623943], length 0
17:53:01.391920 IP 10.5.9.128.53172 > 10.5.16.3.1978: Flags [.], ack 
3517, win 182, options [nop,nop,TS val 18952144 ecr 4078623943], length 0
17:53:01.391943 IP 10.5.9.128.53172 > 10.5.16.3.1978: Flags [F.], seq 
352, ack 3518, win 182, options [nop,nop,TS val 18952144 ecr 
4078623943], length 0
17:53:01.391984 IP 10.5.16.3.1978 > 10.5.9.128.53172: Flags [.], ack 
353, win 8325, options [nop,nop,TS val 4078624093 ecr 18952144], length 0
17:53:01.417984 IP 10.5.9.128.53174 > 10.5.16.3.1978: Flags [S], seq 
1349994793, win 14600, options [mss 1460,sackOK,TS val 18952146 ecr 
0,nop,wscale 7], length 0
17:53:01.418036 IP 10.5.16.3.1978 > 10.5.9.128.53174: Flags [S.], seq 
3296824297, ack 1349994794, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 2518196155 ecr 18952146], length 0
17:53:01.418046 IP 10.5.9.128.53175 > 10.5.16.3.1978: Flags [S], seq 
1350690489, win 14600, options [mss 1460,sackOK,TS val 18952146 ecr 
0,nop,wscale 7], length 0
17:53:01.418081 IP 10.5.16.3.1978 > 10.5.9.128.53175: Flags [S.], seq 
1729449701, ack 1350690490, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 138591868 ecr 18952146], length 0
17:53:01.563808 IP 10.5.9.128.53174 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18952159 ecr 2518196155], length 0
17:53:01.563959 IP 10.5.9.128.53174 > 10.5.16.3.1978: Flags [P.], ack 1, 
win 115, options [nop,nop,TS val 18952159 ecr 2518196155], length 351
17:53:01.563981 IP 10.5.9.128.53175 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18952159 ecr 138591868], length 0
17:53:01.564015 IP 10.5.9.128.53175 > 10.5.16.3.1978: Flags [P.], ack 1, 
win 115, options [nop,nop,TS val 18952159 ecr 138591868], length 362
17:53:01.663387 IP 10.5.16.3.1978 > 10.5.9.128.53174: Flags [.], ack 
352, win 8326, options [nop,nop,TS val 2518196401 ecr 18952159], length 0
17:53:01.663408 IP 10.5.16.3.1978 > 10.5.9.128.53175: Flags [.], ack 
363, win 8280, options [nop,nop,TS val 138592114 ecr 18952159], length 0
17:53:01.746004 IP 10.5.16.3.1978 > 10.5.9.128.53174: Flags [.], ack 
352, win 8326, options [nop,nop,TS val 2518196483 ecr 18952159], length 1448
17:53:01.746024 IP 10.5.16.3.1978 > 10.5.9.128.53174: Flags [P.], ack 
352, win 8326, options [nop,nop,TS val 2518196483 ecr 18952159], length 606
17:53:01.746054 IP 10.5.16.3.1978 > 10.5.9.128.53174: Flags [F.], seq 
2055, ack 352, win 8326, options [nop,nop,TS val 2518196483 ecr 
18952159], length 0
17:53:01.844988 IP 10.5.16.3.1978 > 10.5.9.128.53175: Flags [.], ack 
363, win 8326, options [nop,nop,TS val 138592295 ecr 18952159], length 1448
17:53:01.845007 IP 10.5.16.3.1978 > 10.5.9.128.53175: Flags [.], ack 
363, win 8326, options [nop,nop,TS val 138592295 ecr 18952159], length 1448
17:53:01.845030 IP 10.5.16.3.1978 > 10.5.9.128.53175: Flags [P.], ack 
363, win 8326, options [nop,nop,TS val 138592295 ecr 18952159], length 120
17:53:01.845058 IP 10.5.16.3.1978 > 10.5.9.128.53175: Flags [F.], seq 
3017, ack 363, win 8326, options [nop,nop,TS val 138592295 ecr 
18952159], length 0
17:53:01.856275 IP 10.5.9.128.53174 > 10.5.16.3.1978: Flags [.], ack 
1449, win 137, options [nop,nop,TS val 18952190 ecr 2518196483], length 0
17:53:01.856304 IP 10.5.9.128.53174 > 10.5.16.3.1978: Flags [.], ack 
2055, win 160, options [nop,nop,TS val 18952190 ecr 2518196483], length 0
17:53:01.856324 IP 10.5.9.128.53174 > 10.5.16.3.1978: Flags [F.], seq 
352, ack 2056, win 160, options [nop,nop,TS val 18952191 ecr 
2518196483], length 0
17:53:01.856370 IP 10.5.16.3.1978 > 10.5.9.128.53174: Flags [.], ack 
353, win 8325, options [nop,nop,TS val 2518196594 ecr 18952191], length 0
17:53:01.856383 IP 10.5.9.128.53177 > 10.5.16.3.1978: Flags [S], seq 
1350751064, win 14600, options [mss 1460,sackOK,TS val 18952191 ecr 
0,nop,wscale 7], length 0
17:53:01.856431 IP 10.5.16.3.1978 > 10.5.9.128.53177: Flags [S.], seq 
3514542819, ack 1350751065, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 3658414457 ecr 18952191], length 0
17:53:01.993781 IP 10.5.9.128.53175 > 10.5.16.3.1978: Flags [.], ack 
1449, win 137, options [nop,nop,TS val 18952205 ecr 138592295], length 0
17:53:02.003160 IP 10.5.9.128.53175 > 10.5.16.3.1978: Flags [.], ack 
2897, win 160, options [nop,nop,TS val 18952205 ecr 138592295], length 0
17:53:02.003183 IP 10.5.9.128.53175 > 10.5.16.3.1978: Flags [.], ack 
3017, win 160, options [nop,nop,TS val 18952205 ecr 138592295], length 0
17:53:02.003203 IP 10.5.9.128.53177 > 10.5.16.3.1978: Flags [.], ack 1, 
win 115, options [nop,nop,TS val 18952205 ecr 3658414457], length 0
17:53:02.003278 IP 10.5.9.128.53177 > 10.5.16.3.1978: Flags [P.], ack 1, 
win 115, options [nop,nop,TS val 18952205 ecr 3658414457], length 378
17:53:02.043849 IP 10.5.9.128.53175 > 10.5.16.3.1978: Flags [.], ack 
3018, win 160, options [nop,nop,TS val 18952209 ecr 138592295], length 0
17:53:02.102390 IP 10.5.16.3.1978 > 10.5.9.128.53177: Flags [.], ack 
379, win 8326, options [nop,nop,TS val 3658414703 ecr 18952205], length 0
17:53:02.147042 IP 10.5.16.3.1978 > 10.5.9.128.53177: Flags [P.], ack 
379, win 8326, options [nop,nop,TS val 3658414747 ecr 18952205], length 256
17:53:02.147068 IP 10.5.16.3.1978 > 10.5.9.128.53177: Flags [F.], seq 
257, ack 379, win 8326, options [nop,nop,TS val 3658414747 ecr 
18952205], length 0
17:53:02.271602 IP 10.5.9.128.53177 > 10.5.16.3.1978: Flags [.], ack 
257, win 123, options [nop,nop,TS val 18952232 ecr 3658414747], length 0
17:53:02.299576 IP 10.5.9.128.53177 > 10.5.16.3.1978: Flags [.], ack 
258, win 123, options [nop,nop,TS val 18952236 ecr 3658414747], length 0
17:53:04.534367 IP 10.5.9.128.53177 > 10.5.16.3.1978: Flags [F.], seq 
379, ack 258, win 123, options [nop,nop,TS val 18952460 ecr 3658414747], 
length 0
17:53:04.534422 IP 10.5.16.3.1978 > 10.5.9.128.53177: Flags [.], ack 
380, win 8325, options [nop,nop,TS val 3658417135 ecr 18952460], length 0
17:53:04.537284 IP 10.5.9.128.53175 > 10.5.16.3.1978: Flags [F.], seq 
363, ack 3018, win 160, options [nop,nop,TS val 18952460 ecr 138592295], 
length 0
17:53:04.537321 IP 10.5.16.3.1978 > 10.5.9.128.53175: Flags [.], ack 
364, win 8325, options [nop,nop,TS val 138594987 ecr 18952460], length 0

I had my page at 17:53:02.

here the tcpdump for windows 7 + Chrome 13. Connected via a other 
interface so I use re1 instead of re0 for tcpdump.

# tcpdump -ni re1 | grep 10.254.201.19
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
18:01:21.820412 IP 10.254.201.19.49661 > 10.5.16.3.1978: Flags [S], seq 
4218297782, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], 
length 0
18:01:21.820551 IP 10.5.16.3.1978 > 10.254.201.19.49661: Flags [S.], seq 
837769070, ack 4218297783, win 65535, options [mss 1460,nop,wscale 
3,sackOK,eol], length 0
18:01:21.820562 IP 10.254.201.19.49662 > 10.5.16.3.1978: Flags [S], seq 
3116963818, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], 
length 0
18:01:21.820601 IP 10.5.16.3.1978 > 10.254.201.19.49662: Flags [S.], seq 
3420478316, ack 3116963819, win 65535, options [mss 1460,nop,wscale 
3,sackOK,eol], length 0
18:01:21.820681 IP 10.254.201.19.49663 > 10.5.16.3.1978: Flags [S], seq 
355433200, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], 
length 0
18:01:21.820719 IP 10.5.16.3.1978 > 10.254.201.19.49663: Flags [S.], seq 
2361975398, ack 355433201, win 65535, options [mss 1460,nop,wscale 
3,sackOK,eol], length 0
18:01:21.820796 IP 10.254.201.19.49661 > 10.5.16.3.1978: Flags [.], ack 
1, win 256, length 0
18:01:21.820849 IP 10.254.201.19.49662 > 10.5.16.3.1978: Flags [.], ack 
1, win 256, length 0
18:01:21.820971 IP 10.254.201.19.49663 > 10.5.16.3.1978: Flags [.], ack 
1, win 256, length 0
18:01:21.821005 IP 10.5.16.3.1978 > 10.254.201.19.49663: Flags [R], seq 
2361975399, win 0, length 0
18:01:21.821016 IP 10.254.201.19.49664 > 10.5.16.3.1978: Flags [S], seq 
4106040937, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], 
length 0
18:01:21.821054 IP 10.5.16.3.1978 > 10.254.201.19.49664: Flags [S.], seq 
2901239658, ack 4106040938, win 65535, options [mss 1460,nop,wscale 
3,sackOK,eol], length 0
18:01:21.821180 IP 10.254.201.19.49664 > 10.5.16.3.1978: Flags [.], ack 
1, win 256, length 0
18:01:21.821209 IP 10.5.16.3.1978 > 10.254.201.19.49664: Flags [R], seq 
2901239659, win 0, length 0
18:01:21.822103 IP 10.254.201.19.49661 > 10.5.16.3.1978: Flags [P.], ack 
1, win 256, length 414
18:01:21.921300 IP 10.5.16.3.1978 > 10.254.201.19.49661: Flags [.], ack 
415, win 8212, length 0
18:01:35.778103 IP 10.254.201.19.49662 > 10.5.16.3.1978: Flags [F.], seq 
1, ack 1, win 256, length 0
18:01:35.778208 IP 10.5.16.3.1978 > 10.254.201.19.49662: Flags [.], ack 
2, win 8212, length 0
18:01:35.778263 IP 10.5.16.3.1978 > 10.254.201.19.49662: Flags [F.], seq 
1, ack 2, win 8212, length 0
18:01:35.778361 IP 10.5.16.3.1978 > 10.254.201.19.49661: Flags [.], ack 
415, win 8212, length 1460
18:01:35.778459 IP 10.254.201.19.49662 > 10.5.16.3.1978: Flags [.], ack 
2, win 256, length 0
18:01:35.778510 IP 10.5.16.3.1978 > 10.254.201.19.49661: Flags [.], ack 
415, win 8212, length 1460
18:01:35.778634 IP 10.5.16.3.1978 > 10.254.201.19.49661: Flags [P.], ack 
415, win 8212, length 596
18:01:35.778738 IP 10.5.16.3.1978 > 10.254.201.19.49661: Flags [F.], seq 
3517, ack 415, win 8212, length 0
18:01:35.778781 IP 10.254.201.19.49661 > 10.5.16.3.1978: Flags [.], ack 
2921, win 256, length 0
18:01:35.779078 IP 10.254.201.19.49661 > 10.5.16.3.1978: Flags [.], ack 
3518, win 254, length 0
18:01:35.780482 IP 10.254.201.19.49661 > 10.5.16.3.1978: Flags [F.], seq 
415, ack 3518, win 254, length 0
18:01:35.780576 IP 10.5.16.3.1978 > 10.254.201.19.49661: Flags [.], ack 
416, win 8212, length 0
18:01:35.784316 IP 10.254.201.19.49665 > 10.5.16.3.1978: Flags [S], seq 
3744282928, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], 
length 0
18:01:35.784373 IP 10.5.16.3.1978 > 10.254.201.19.49665: Flags [S.], seq 
249700704, ack 3744282929, win 65535, options [mss 1460,nop,wscale 
3,sackOK,eol], length 0
18:01:35.784534 IP 10.254.201.19.49666 > 10.5.16.3.1978: Flags [S], seq 
1117868573, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], 
length 0
18:01:35.784572 IP 10.5.16.3.1978 > 10.254.201.19.49666: Flags [S.], seq 
1897488748, ack 1117868574, win 65535, options [mss 1460,nop,wscale 
3,sackOK,eol], length 0
18:01:35.784581 IP 10.254.201.19.49665 > 10.5.16.3.1978: Flags [.], ack 
1, win 256, length 0
18:01:35.784760 IP 10.254.201.19.49666 > 10.5.16.3.1978: Flags [.], ack 
1, win 256, length 0
18:01:35.784824 IP 10.254.201.19.49665 > 10.5.16.3.1978: Flags [P.], ack 
1, win 256, length 388
18:01:35.785003 IP 10.254.201.19.49666 > 10.5.16.3.1978: Flags [P.], ack 
1, win 256, length 369
18:01:35.884197 IP 10.5.16.3.1978 > 10.254.201.19.49665: Flags [.], ack 
389, win 8212, length 0
18:01:35.884223 IP 10.5.16.3.1978 > 10.254.201.19.49666: Flags [.], ack 
370, win 8166, length 0
18:01:35.980034 IP 10.5.16.3.1978 > 10.254.201.19.49665: Flags [.], ack 
389, win 8212, length 1460
18:01:35.980162 IP 10.5.16.3.1978 > 10.254.201.19.49665: Flags [P.], ack 
389, win 8212, length 594
18:01:35.980280 IP 10.5.16.3.1978 > 10.254.201.19.49665: Flags [F.], seq 
2055, ack 389, win 8212, length 0
18:01:35.980617 IP 10.254.201.19.49665 > 10.5.16.3.1978: Flags [.], ack 
2056, win 256, length 0
18:01:35.982044 IP 10.254.201.19.49665 > 10.5.16.3.1978: Flags [F.], seq 
389, ack 2056, win 256, length 0
18:01:35.982085 IP 10.5.16.3.1978 > 10.254.201.19.49665: Flags [.], ack 
390, win 8212, length 0
18:01:35.984696 IP 10.254.201.19.49667 > 10.5.16.3.1978: Flags [S], seq 
547170738, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], 
length 0
18:01:35.984746 IP 10.5.16.3.1978 > 10.254.201.19.49667: Flags [S.], seq 
2740164580, ack 547170739, win 65535, options [mss 1460,nop,wscale 
3,sackOK,eol], length 0
18:01:35.984958 IP 10.254.201.19.49667 > 10.5.16.3.1978: Flags [.], ack 
1, win 256, length 0
18:01:35.985256 IP 10.254.201.19.49667 > 10.5.16.3.1978: Flags [P.], ack 
1, win 256, length 373
18:01:36.079057 IP 10.5.16.3.1978 > 10.254.201.19.49666: Flags [.], ack 
370, win 8212, length 1460
18:01:36.079279 IP 10.5.16.3.1978 > 10.254.201.19.49666: Flags [.], ack 
370, win 8212, length 1460
18:01:36.079522 IP 10.5.16.3.1978 > 10.254.201.19.49666: Flags [P.], ack 
370, win 8212, length 96
18:01:36.079527 IP 10.5.16.3.1978 > 10.254.201.19.49666: Flags [F.], seq 
3017, ack 370, win 8212, length 0
18:01:36.079623 IP 10.254.201.19.49666 > 10.5.16.3.1978: Flags [.], ack 
2921, win 256, length 0
18:01:36.079781 IP 10.254.201.19.49666 > 10.5.16.3.1978: Flags [.], ack 
3018, win 256, length 0
18:01:36.080332 IP 10.254.201.19.49666 > 10.5.16.3.1978: Flags [F.], seq 
370, ack 3018, win 256, length 0
18:01:36.080375 IP 10.5.16.3.1978 > 10.254.201.19.49666: Flags [.], ack 
371, win 8212, length 0
18:01:36.085170 IP 10.5.16.3.1978 > 10.254.201.19.49667: Flags [.], ack 
374, win 8212, length 0
18:01:36.178436 IP 10.5.16.3.1978 > 10.254.201.19.49667: Flags [P.], ack 
374, win 8212, length 256
18:01:36.178469 IP 10.5.16.3.1978 > 10.254.201.19.49667: Flags [F.], seq 
257, ack 374, win 8212, length 0
18:01:36.178690 IP 10.254.201.19.49667 > 10.5.16.3.1978: Flags [.], ack 
258, win 255, length 0
18:01:36.179474 IP 10.254.201.19.49667 > 10.5.16.3.1978: Flags [F.], seq 
374, ack 258, win 255, length 0
18:01:36.179515 IP 10.5.16.3.1978 > 10.254.201.19.49667: Flags [.], ack 
375, win 8212, length 0

Thanks again for your help.

Michel

Le 2011-08-03 12:14, Teco Boot a écrit :
> Hi Michel,
>
> You could use -n (then we know your http port).
> And filter, e.g. with tcp and port your-port
>
> There is no TCP on 15:29:02. On 15:27:53, two (or more, I did not check) requests are send.
> First connection gets data on 15:29:02, as you mentioned. Seems slow indeed.
>
> I have seen similar delays, but not reproducible. Sometimes, web page shows only text (e.g. not the icon, no header).
>
> Teco
>
>
> Op 3 aug 2011, om 17:41 heeft Michel Blais het volgende geschreven:
>
>> Hi Teco,
>>
>> Thanks for your anser.
>>
>> I'm typing the IP address as http address so it should not be DNS related. IPv6 isn't enable on rc.conf and not configure in olsrd.conf. I also tryed with both pf on and off so it's also not firewall related.
>>
>> Here the output of tcp dump, we can see the request was made at 15:27:49 and I got httpinfo page at 15:29:02. Maybe somebody will understand this output better than me.
>>
>> 15:27:49.338117 IP 10.5.85.250>  10.5.14.50: ICMP echo reply, id 25444, seq 9, length 64
>> 15:27:53.697217 IP 10.5.9.128.35974>  10.5.16.3.customport: Flags [S], seq 2223679125, win 14600, options [mss 1460,sackOK,TS val 18081258 ecr 0,nop,wscale 7], length 0
>> 15:27:53.697308 IP 10.5.16.3.customport>  10.5.9.128.35974: Flags [S.], seq 315446759, ack 2223679126, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 1804231141 ecr 18081258], length 0
>> 15:27:53.699350 IP 10.5.9.128.35975>  10.5.16.3.customport: Flags [S], seq 2229282048, win 14600, options [mss 1460,sackOK,TS val 18081258 ecr 0,nop,wscale 7], length 0
>> 15:27:53.699402 IP 10.5.16.3.customport>  10.5.9.128.35975: Flags [S.], seq 3040131297, ack 2229282049, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 206391270 ecr 18081258], length 0
>> 15:27:53.769029 IP 10.5.9.128.35974>  10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18081265 ecr 1804231141], length 0
>> 15:27:53.769688 IP 10.5.9.128.35974>  10.5.16.3.customport: Flags [P.], ack 1, win 115, options [nop,nop,TS val 18081265 ecr 1804231141], length 428
>> 15:27:53.769709 IP 10.5.9.128.35975>  10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18081265 ecr 206391270], length 0
>> 15:27:53.869422 IP 10.5.16.3.customport>  10.5.9.128.35974: Flags [.], ack 429, win 8326, options [nop,nop,TS val 1804231314 ecr 18081265], length 0
>> 15:27:55.397816 IP 10.5.9.128.47177>  10.254.200.2.8117: Flags [S], seq 1928743483, win 14600, options [mss 1460,sackOK,TS val 18081428 ecr 0,nop,wscale 7], length 0
>> 15:27:55.398583 IP 10.5.9.128.47178>  10.254.200.2.8117: Flags [S], seq 1924898983, win 14600, options [mss 1460,sackOK,TS val 18081428 ecr 0,nop,wscale 7], length 0
>> 15:27:55.404121 IP 10.5.9.128.47177>  10.254.200.2.8117: Flags [.], ack 2191558317, win 115, length 0
>> 15:27:55.404159 IP 10.5.9.128.47178>  10.254.200.2.8117: Flags [.], ack 2196816302, win 115, length 0
>> 15:27:55.437314 IP 10.5.9.128.47177>  10.254.200.2.8117: Flags [.], ack 2, win 115, length 0
>> 15:27:55.536538 IP 10.5.9.128.47178>  10.254.200.2.8117: Flags [.], ack 2, win 115, length 0
>> 15:28:02.308117 IP 10.5.16.253>  10.5.14.50: ICMP echo reply, id 21349, seq 9, length 64
>> 15:28:02.507485 IP 10.5.9.128.47177>  10.254.200.2.8117: Flags [F.], seq 0, ack 2, win 115, length 0
>> 15:28:02.508788 IP 10.5.9.128.47178>  10.254.200.2.8117: Flags [F.], seq 0, ack 2, win 115, length 0
>> 15:28:38.870105 IP 10.5.9.128.35975>  10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18085776 ecr 206391270], length 0
>> 15:28:38.870166 IP 10.5.16.3.customport>  10.5.9.128.35975: Flags [.], ack 1, win 8326, options [nop,nop,TS val 206436441 ecr 18081265], length 0
>> 15:28:38.909138 IP 10.5.9.128.35974>  10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18085780 ecr 1804231314], length 0
>> 15:28:38.909171 IP 10.5.16.3.customport>  10.5.9.128.35974: Flags [.], ack 429, win 8326, options [nop,nop,TS val 1804276354 ecr 18081265], length 0
>> 15:28:46.811759 IP 10.5.16.248.698>  10.5.16.255.698: OLSR, seq 0x7a01, length 1464
>> 15:29:02.503246 IP 10.5.9.128.35975>  10.5.16.3.customport: Flags [F.], seq 1, ack 1, win 115, options [nop,nop,TS val 18088139 ecr 206436441], length 0
>> 15:29:02.503298 IP 10.5.16.3.customport>  10.5.9.128.35975: Flags [.], ack 2, win 8326, options [nop,nop,TS val 206460074 ecr 18088139], length 0
>> 15:29:02.503366 IP 10.5.16.3.customport>  10.5.9.128.35975: Flags [F.], seq 1, ack 2, win 8326, options [nop,nop,TS val 206460074 ecr 18088139], length 0
>> 15:29:02.503472 IP 10.5.16.3.customport>  10.5.9.128.35974: Flags [.], ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], length 1448
>> 15:29:02.503490 IP 10.5.16.3.customport>  10.5.9.128.35974: Flags [.], ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], length 1448
>> 15:29:02.503505 IP 10.5.16.3.customport>  10.5.9.128.35974: Flags [P.], ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], length 620
>> 15:29:02.503527 IP 10.5.16.3.customport>  10.5.9.128.35974: Flags [F.], seq 3517, ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], length 0
>> 15:29:02.514781 IP 10.5.9.128.35975>  10.5.16.3.customport: Flags [.], ack 2, win 115, options [nop,nop,TS val 18088140 ecr 206460074], length 0
>> 15:29:02.514926 IP 10.5.9.128.35974>  10.5.16.3.customport: Flags [.], ack 1449, win 137, options [nop,nop,TS val 18088140 ecr 1804299948], length 0
>> 15:29:02.515046 IP 10.5.9.128.35974>  10.5.16.3.customport: Flags [.], ack 2897, win 160, options [nop,nop,TS val 18088140 ecr 1804299948], length 0
>> 15:29:02.515066 IP 10.5.9.128.35974>  10.5.16.3.customport: Flags [.], ack 3517, win 182, options [nop,nop,TS val 18088140 ecr 1804299948], length 0
>> 15:29:02.515085 IP 10.5.9.128.35974>  10.5.16.3.customport: Flags [F.], seq 429, ack 3518, win 182, options [nop,nop,TS val 18088140 ecr 1804299948], length 0
>> 15:29:02.515120 IP 10.5.16.3.customport>  10.5.9.128.35974: Flags [.], ack 430, win 8325, options [nop,nop,TS val 1804299960 ecr 18088140], length 0
>> 15:29:02.522531 IP 10.5.9.128.36020>  10.5.16.3.customport: Flags [S], seq 3305835155, win 14600, options [mss 1460,sackOK,TS val 18088141 ecr 0,nop,wscale 7], length 0
>> 15:29:02.522599 IP 10.5.16.3.customport>  10.5.9.128.36020: Flags [S.], seq 1337004000, ack 3305835156, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3445127330 ecr 18088141], length 0
>> 15:29:02.522608 IP 10.5.9.128.36021>  10.5.16.3.customport: Flags [S], seq 3304631491, win 14600, options [mss 1460,sackOK,TS val 18088141 ecr 0,nop,wscale 7], length 0
>> 15:29:02.522656 IP 10.5.16.3.customport>  10.5.9.128.36021: Flags [S.], seq 509028834, ack 3304631492, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3027710882 ecr 18088141], length 0
>> 15:29:02.533379 IP 10.5.9.128.36020>  10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3445127330], length 0
>> 15:29:02.533835 IP 10.5.9.128.36021>  10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3027710882], length 0
>> 15:29:02.537354 IP 10.5.9.128.36020>  10.5.16.3.customport: Flags [P.], ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3445127330], length 428
>> 15:29:02.537420 IP 10.5.9.128.36021>  10.5.16.3.customport: Flags [P.], ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3027710882], length 409
>> 15:29:02.636980 IP 10.5.16.3.customport>  10.5.9.128.36020: Flags [.], ack 429, win 8326, options [nop,nop,TS val 3445127445 ecr 18088142], length 0
>> 15:29:02.637000 IP 10.5.16.3.customport>  10.5.9.128.36021: Flags [.], ack 410, win 8274, options [nop,nop,TS val 3027710997 ecr 18088142], length 0
>> 15:29:02.705636 IP 10.5.16.3.customport>  10.5.9.128.36020: Flags [.], ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 18088142], length 1448
>> 15:29:02.705656 IP 10.5.16.3.customport>  10.5.9.128.36020: Flags [P.], ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 18088142], length 606
>> 15:29:02.705682 IP 10.5.16.3.customport>  10.5.9.128.36020: Flags [F.], seq 2055, ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 18088142], length 0
>> 15:29:02.716912 IP 10.5.9.128.36020>  10.5.16.3.customport: Flags [.], ack 1449, win 137, options [nop,nop,TS val 18088161 ecr 3445127513], length 0
>> 15:29:02.717206 IP 10.5.9.128.36020>  10.5.16.3.customport: Flags [.], ack 2055, win 160, options [nop,nop,TS val 18088161 ecr 3445127513], length 0
>> 15:29:02.718461 IP 10.5.9.128.36020>  10.5.16.3.customport: Flags [F.], seq 429, ack 2056, win 160, options [nop,nop,TS val 18088161 ecr 3445127513], length 0
>> 15:29:02.718503 IP 10.5.16.3.customport>  10.5.9.128.36020: Flags [.], ack 430, win 8325, options [nop,nop,TS val 3445127526 ecr 18088161], length 0
>> 15:29:02.722581 IP 10.5.9.128.36022>  10.5.16.3.customport: Flags [S], seq 3303396676, win 14600, options [mss 1460,sackOK,TS val 18088161 ecr 0,nop,wscale 7], length 0
>> 15:29:02.722639 IP 10.5.16.3.customport>  10.5.9.128.36022: Flags [S.], seq 2610177134, ack 3303396677, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 848416791 ecr 18088161], length 0
>> 15:29:02.729197 IP 10.5.9.128.36022>  10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18088162 ecr 848416791], length 0
>> 15:29:02.729753 IP 10.5.9.128.36022>  10.5.16.3.customport: Flags [P.], ack 1, win 115, options [nop,nop,TS val 18088162 ecr 848416791], length 413
>> 15:29:02.805440 IP 10.5.16.3.customport>  10.5.9.128.36021: Flags [.], ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], length 1448
>> 15:29:02.805458 IP 10.5.16.3.customport>  10.5.9.128.36021: Flags [.], ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], length 1448
>> 15:29:02.805474 IP 10.5.16.3.customport>  10.5.9.128.36021: Flags [P.], ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], length 120
>> 15:29:02.805498 IP 10.5.16.3.customport>  10.5.9.128.36021: Flags [F.], seq 3017, ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], length 0
>> 15:29:02.817170 IP 10.5.9.128.36021>  10.5.16.3.customport: Flags [.], ack 1449, win 137, options [nop,nop,TS val 18088171 ecr 3027711165], length 0
>> 15:29:02.818996 IP 10.5.9.128.36021>  10.5.16.3.customport: Flags [.], ack 2897, win 160, options [nop,nop,TS val 18088171 ecr 3027711165], length 0
>> 15:29:02.823870 IP 10.5.9.128.36021>  10.5.16.3.customport: Flags [.], ack 3017, win 160, options [nop,nop,TS val 18088171 ecr 3027711165], length 0
>> 15:29:02.823894 IP 10.5.9.128.36021>  10.5.16.3.customport: Flags [F.], seq 410, ack 3018, win 160, options [nop,nop,TS val 18088171 ecr 3027711165], length 0
>> 15:29:02.823930 IP 10.5.16.3.customport>  10.5.9.128.36021: Flags [.], ack 411, win 8325, options [nop,nop,TS val 3027711183 ecr 18088171], length 0
>> 15:29:02.828960 IP 10.5.16.3.customport>  10.5.9.128.36022: Flags [.], ack 414, win 8326, options [nop,nop,TS val 848416898 ecr 18088162], length 0
>> 15:29:02.905059 IP 10.5.16.3.customport>  10.5.9.128.36022: Flags [P.], ack 414, win 8326, options [nop,nop,TS val 848416974 ecr 18088162], length 256
>> 15:29:02.905083 IP 10.5.16.3.customport>  10.5.9.128.36022: Flags [F.], seq 257, ack 414, win 8326, options [nop,nop,TS val 848416974 ecr 18088162], length 0
>> 15:29:02.915164 IP 10.5.9.128.36022>  10.5.16.3.customport: Flags [.], ack 257, win 123, options [nop,nop,TS val 18088180 ecr 848416974], length 0
>> 15:29:02.944798 IP 10.5.9.128.36022>  10.5.16.3.customport: Flags [.], ack 258, win 123, options [nop,nop,TS val 18088184 ecr 848416974], length 0
>>
>> That not a big problem but it strange the answer is so long to get from httpinfo. I will also try txtinfo to check if the same happen
>>
>> Thanks
>>
>> Michel
>>
>> Le 2011-08-03 02:22, Teco Boot a écrit :
>>> Could it be DNS, IPv6 or other timeout?
>>> I would use tcpdump and see what is happening.
>>>
>>> Teco
>>>
>>> Op 2 aug 2011, om 22:36 heeft Michel Blais het volgende geschreven:
>>>
>>>> Hi,
>>>>
>>>> Anyone have a idea of why http_info is really slow to acces on FreeBSD ? I'm using the version 8.2 with OLSRd 0.6.1 from the package (pkg_add) and it can take around 1 minute to acces httpinfo but once it's loaded, changing from a tab to a other is fine but if I go into the address bar (without closing the page or the tab, the page show is still httpinfo) and type enter again, I have to wait 1 minute again. I don't have any delay with OLSRd on OpenWRT. Maybe I should try to build it from the port.
>>>>
>>>> Also, I couldn't find any information on this with google and I think it's something that should be on the olsrd.org's FAQ, firewall should have a rule to let pass port 698/UDP traffic at destination of the broadcast address or else, the firewall will block hello paquet. The port was easy to find but I had to use tcp dump to know why my allow to NIC IP address was not matching.
>>>>
>>>> Exemple with PF from FreeBSD or OpenBSD 4.6 and earlier. NIC is re0 and ip address is of the nic is 10.100.0.100/24
>>>>
>>>> allow on re0 proto udp to 10.100.0.100 port 698
>>>> will not work, instead, it should be
>>>> allow on re0 proto udp to 10.100.0.255 port 698
>>>>
>>>> Thanks
>>>>
>>>> Michel
>>>>
>>>> -- 
>>>> Olsr-users mailing list
>>>> (spam-protected)
>>>> https://lists.olsr.org/mailman/listinfo/olsr-users




More information about the Olsr-users mailing list