[Olsr-users] Slow http info plugin on FreeBSD & firewall rule

Michel Blais (spam-protected)
Wed Aug 3 17:41:21 CEST 2011


Hi Teco,

Thanks for your anser.

I'm typing the IP address as http address so it should not be DNS 
related. IPv6 isn't enable on rc.conf and not configure in olsrd.conf. I 
also tryed with both pf on and off so it's also not firewall related.

Here the output of tcp dump, we can see the request was made at 15:27:49 
and I got httpinfo page at 15:29:02. Maybe somebody will understand this 
output better than me.

15:27:49.338117 IP 10.5.85.250 > 10.5.14.50: ICMP echo reply, id 25444, 
seq 9, length 64
15:27:53.697217 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [S], 
seq 2223679125, win 14600, options [mss 1460,sackOK,TS val 18081258 ecr 
0,nop,wscale 7], length 0
15:27:53.697308 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [S.], 
seq 315446759, ack 2223679126, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 1804231141 ecr 18081258], length 0
15:27:53.699350 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [S], 
seq 2229282048, win 14600, options [mss 1460,sackOK,TS val 18081258 ecr 
0,nop,wscale 7], length 0
15:27:53.699402 IP 10.5.16.3.customport > 10.5.9.128.35975: Flags [S.], 
seq 3040131297, ack 2229282049, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 206391270 ecr 18081258], length 0
15:27:53.769029 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], 
ack 1, win 115, options [nop,nop,TS val 18081265 ecr 1804231141], length 0
15:27:53.769688 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [P.], 
ack 1, win 115, options [nop,nop,TS val 18081265 ecr 1804231141], length 428
15:27:53.769709 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [.], 
ack 1, win 115, options [nop,nop,TS val 18081265 ecr 206391270], length 0
15:27:53.869422 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], 
ack 429, win 8326, options [nop,nop,TS val 1804231314 ecr 18081265], 
length 0
15:27:55.397816 IP 10.5.9.128.47177 > 10.254.200.2.8117: Flags [S], seq 
1928743483, win 14600, options [mss 1460,sackOK,TS val 18081428 ecr 
0,nop,wscale 7], length 0
15:27:55.398583 IP 10.5.9.128.47178 > 10.254.200.2.8117: Flags [S], seq 
1924898983, win 14600, options [mss 1460,sackOK,TS val 18081428 ecr 
0,nop,wscale 7], length 0
15:27:55.404121 IP 10.5.9.128.47177 > 10.254.200.2.8117: Flags [.], ack 
2191558317, win 115, length 0
15:27:55.404159 IP 10.5.9.128.47178 > 10.254.200.2.8117: Flags [.], ack 
2196816302, win 115, length 0
15:27:55.437314 IP 10.5.9.128.47177 > 10.254.200.2.8117: Flags [.], ack 
2, win 115, length 0
15:27:55.536538 IP 10.5.9.128.47178 > 10.254.200.2.8117: Flags [.], ack 
2, win 115, length 0
15:28:02.308117 IP 10.5.16.253 > 10.5.14.50: ICMP echo reply, id 21349, 
seq 9, length 64
15:28:02.507485 IP 10.5.9.128.47177 > 10.254.200.2.8117: Flags [F.], seq 
0, ack 2, win 115, length 0
15:28:02.508788 IP 10.5.9.128.47178 > 10.254.200.2.8117: Flags [F.], seq 
0, ack 2, win 115, length 0
15:28:38.870105 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [.], 
ack 1, win 115, options [nop,nop,TS val 18085776 ecr 206391270], length 0
15:28:38.870166 IP 10.5.16.3.customport > 10.5.9.128.35975: Flags [.], 
ack 1, win 8326, options [nop,nop,TS val 206436441 ecr 18081265], length 0
15:28:38.909138 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], 
ack 1, win 115, options [nop,nop,TS val 18085780 ecr 1804231314], length 0
15:28:38.909171 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], 
ack 429, win 8326, options [nop,nop,TS val 1804276354 ecr 18081265], 
length 0
15:28:46.811759 IP 10.5.16.248.698 > 10.5.16.255.698: OLSR, seq 0x7a01, 
length 1464
15:29:02.503246 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [F.], 
seq 1, ack 1, win 115, options [nop,nop,TS val 18088139 ecr 206436441], 
length 0
15:29:02.503298 IP 10.5.16.3.customport > 10.5.9.128.35975: Flags [.], 
ack 2, win 8326, options [nop,nop,TS val 206460074 ecr 18088139], length 0
15:29:02.503366 IP 10.5.16.3.customport > 10.5.9.128.35975: Flags [F.], 
seq 1, ack 2, win 8326, options [nop,nop,TS val 206460074 ecr 18088139], 
length 0
15:29:02.503472 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], 
ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], 
length 1448
15:29:02.503490 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], 
ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], 
length 1448
15:29:02.503505 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [P.], 
ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], 
length 620
15:29:02.503527 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [F.], 
seq 3517, ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 
18081265], length 0
15:29:02.514781 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [.], 
ack 2, win 115, options [nop,nop,TS val 18088140 ecr 206460074], length 0
15:29:02.514926 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], 
ack 1449, win 137, options [nop,nop,TS val 18088140 ecr 1804299948], 
length 0
15:29:02.515046 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], 
ack 2897, win 160, options [nop,nop,TS val 18088140 ecr 1804299948], 
length 0
15:29:02.515066 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], 
ack 3517, win 182, options [nop,nop,TS val 18088140 ecr 1804299948], 
length 0
15:29:02.515085 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [F.], 
seq 429, ack 3518, win 182, options [nop,nop,TS val 18088140 ecr 
1804299948], length 0
15:29:02.515120 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], 
ack 430, win 8325, options [nop,nop,TS val 1804299960 ecr 18088140], 
length 0
15:29:02.522531 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [S], 
seq 3305835155, win 14600, options [mss 1460,sackOK,TS val 18088141 ecr 
0,nop,wscale 7], length 0
15:29:02.522599 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [S.], 
seq 1337004000, ack 3305835156, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 3445127330 ecr 18088141], length 0
15:29:02.522608 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [S], 
seq 3304631491, win 14600, options [mss 1460,sackOK,TS val 18088141 ecr 
0,nop,wscale 7], length 0
15:29:02.522656 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [S.], 
seq 509028834, ack 3304631492, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 3027710882 ecr 18088141], length 0
15:29:02.533379 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [.], 
ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3445127330], length 0
15:29:02.533835 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [.], 
ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3027710882], length 0
15:29:02.537354 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [P.], 
ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3445127330], length 428
15:29:02.537420 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [P.], 
ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3027710882], length 409
15:29:02.636980 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [.], 
ack 429, win 8326, options [nop,nop,TS val 3445127445 ecr 18088142], 
length 0
15:29:02.637000 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [.], 
ack 410, win 8274, options [nop,nop,TS val 3027710997 ecr 18088142], 
length 0
15:29:02.705636 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [.], 
ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 18088142], 
length 1448
15:29:02.705656 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [P.], 
ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 18088142], 
length 606
15:29:02.705682 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [F.], 
seq 2055, ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 
18088142], length 0
15:29:02.716912 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [.], 
ack 1449, win 137, options [nop,nop,TS val 18088161 ecr 3445127513], 
length 0
15:29:02.717206 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [.], 
ack 2055, win 160, options [nop,nop,TS val 18088161 ecr 3445127513], 
length 0
15:29:02.718461 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [F.], 
seq 429, ack 2056, win 160, options [nop,nop,TS val 18088161 ecr 
3445127513], length 0
15:29:02.718503 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [.], 
ack 430, win 8325, options [nop,nop,TS val 3445127526 ecr 18088161], 
length 0
15:29:02.722581 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [S], 
seq 3303396676, win 14600, options [mss 1460,sackOK,TS val 18088161 ecr 
0,nop,wscale 7], length 0
15:29:02.722639 IP 10.5.16.3.customport > 10.5.9.128.36022: Flags [S.], 
seq 2610177134, ack 3303396677, win 65535, options [mss 1460,nop,wscale 
3,sackOK,TS val 848416791 ecr 18088161], length 0
15:29:02.729197 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [.], 
ack 1, win 115, options [nop,nop,TS val 18088162 ecr 848416791], length 0
15:29:02.729753 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [P.], 
ack 1, win 115, options [nop,nop,TS val 18088162 ecr 848416791], length 413
15:29:02.805440 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [.], 
ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], 
length 1448
15:29:02.805458 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [.], 
ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], 
length 1448
15:29:02.805474 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [P.], 
ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], 
length 120
15:29:02.805498 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [F.], 
seq 3017, ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 
18088142], length 0
15:29:02.817170 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [.], 
ack 1449, win 137, options [nop,nop,TS val 18088171 ecr 3027711165], 
length 0
15:29:02.818996 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [.], 
ack 2897, win 160, options [nop,nop,TS val 18088171 ecr 3027711165], 
length 0
15:29:02.823870 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [.], 
ack 3017, win 160, options [nop,nop,TS val 18088171 ecr 3027711165], 
length 0
15:29:02.823894 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [F.], 
seq 410, ack 3018, win 160, options [nop,nop,TS val 18088171 ecr 
3027711165], length 0
15:29:02.823930 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [.], 
ack 411, win 8325, options [nop,nop,TS val 3027711183 ecr 18088171], 
length 0
15:29:02.828960 IP 10.5.16.3.customport > 10.5.9.128.36022: Flags [.], 
ack 414, win 8326, options [nop,nop,TS val 848416898 ecr 18088162], length 0
15:29:02.905059 IP 10.5.16.3.customport > 10.5.9.128.36022: Flags [P.], 
ack 414, win 8326, options [nop,nop,TS val 848416974 ecr 18088162], 
length 256
15:29:02.905083 IP 10.5.16.3.customport > 10.5.9.128.36022: Flags [F.], 
seq 257, ack 414, win 8326, options [nop,nop,TS val 848416974 ecr 
18088162], length 0
15:29:02.915164 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [.], 
ack 257, win 123, options [nop,nop,TS val 18088180 ecr 848416974], length 0
15:29:02.944798 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [.], 
ack 258, win 123, options [nop,nop,TS val 18088184 ecr 848416974], length 0

That not a big problem but it strange the answer is so long to get from 
httpinfo. I will also try txtinfo to check if the same happen

Thanks

Michel

Le 2011-08-03 02:22, Teco Boot a écrit :
> Could it be DNS, IPv6 or other timeout?
> I would use tcpdump and see what is happening.
>
> Teco
>
> Op 2 aug 2011, om 22:36 heeft Michel Blais het volgende geschreven:
>
>> Hi,
>>
>> Anyone have a idea of why http_info is really slow to acces on 
>> FreeBSD ? I'm using the version 8.2 with OLSRd 0.6.1 from the package 
>> (pkg_add) and it can take around 1 minute to acces httpinfo but once 
>> it's loaded, changing from a tab to a other is fine but if I go into 
>> the address bar (without closing the page or the tab, the page show 
>> is still httpinfo) and type enter again, I have to wait 1 minute 
>> again. I don't have any delay with OLSRd on OpenWRT. Maybe I should 
>> try to build it from the port.
>>
>> Also, I couldn't find any information on this with google and I think 
>> it's something that should be on the olsrd.org's FAQ, firewall should 
>> have a rule to let pass port 698/UDP traffic at destination of the 
>> broadcast address or else, the firewall will block hello paquet. The 
>> port was easy to find but I had to use tcp dump to know why my allow 
>> to NIC IP address was not matching.
>>
>> Exemple with PF from FreeBSD or OpenBSD 4.6 and earlier. NIC is re0 
>> and ip address is of the nic is 10.100.0.100/24
>>
>> allow on re0 proto udp to 10.100.0.100 port 698
>> will not work, instead, it should be
>> allow on re0 proto udp to 10.100.0.255 port 698
>>
>> Thanks
>>
>> Michel
>>
>> -- 
>> Olsr-users mailing list
>> (spam-protected)
>> https://lists.olsr.org/mailman/listinfo/olsr-users
>




More information about the Olsr-users mailing list