[Olsr-users] Slow http info plugin on FreeBSD & firewall rule
Teco Boot
(spam-protected)
Wed Aug 3 18:14:32 CEST 2011
Hi Michel,
You could use -n (then we know your http port).
And filter, e.g. with tcp and port your-port
There is no TCP on 15:29:02. On 15:27:53, two (or more, I did not check) requests are send.
First connection gets data on 15:29:02, as you mentioned. Seems slow indeed.
I have seen similar delays, but not reproducible. Sometimes, web page shows only text (e.g. not the icon, no header).
Teco
Op 3 aug 2011, om 17:41 heeft Michel Blais het volgende geschreven:
> Hi Teco,
>
> Thanks for your anser.
>
> I'm typing the IP address as http address so it should not be DNS related. IPv6 isn't enable on rc.conf and not configure in olsrd.conf. I also tryed with both pf on and off so it's also not firewall related.
>
> Here the output of tcp dump, we can see the request was made at 15:27:49 and I got httpinfo page at 15:29:02. Maybe somebody will understand this output better than me.
>
> 15:27:49.338117 IP 10.5.85.250 > 10.5.14.50: ICMP echo reply, id 25444, seq 9, length 64
> 15:27:53.697217 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [S], seq 2223679125, win 14600, options [mss 1460,sackOK,TS val 18081258 ecr 0,nop,wscale 7], length 0
> 15:27:53.697308 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [S.], seq 315446759, ack 2223679126, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 1804231141 ecr 18081258], length 0
> 15:27:53.699350 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [S], seq 2229282048, win 14600, options [mss 1460,sackOK,TS val 18081258 ecr 0,nop,wscale 7], length 0
> 15:27:53.699402 IP 10.5.16.3.customport > 10.5.9.128.35975: Flags [S.], seq 3040131297, ack 2229282049, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 206391270 ecr 18081258], length 0
> 15:27:53.769029 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18081265 ecr 1804231141], length 0
> 15:27:53.769688 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [P.], ack 1, win 115, options [nop,nop,TS val 18081265 ecr 1804231141], length 428
> 15:27:53.769709 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18081265 ecr 206391270], length 0
> 15:27:53.869422 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], ack 429, win 8326, options [nop,nop,TS val 1804231314 ecr 18081265], length 0
> 15:27:55.397816 IP 10.5.9.128.47177 > 10.254.200.2.8117: Flags [S], seq 1928743483, win 14600, options [mss 1460,sackOK,TS val 18081428 ecr 0,nop,wscale 7], length 0
> 15:27:55.398583 IP 10.5.9.128.47178 > 10.254.200.2.8117: Flags [S], seq 1924898983, win 14600, options [mss 1460,sackOK,TS val 18081428 ecr 0,nop,wscale 7], length 0
> 15:27:55.404121 IP 10.5.9.128.47177 > 10.254.200.2.8117: Flags [.], ack 2191558317, win 115, length 0
> 15:27:55.404159 IP 10.5.9.128.47178 > 10.254.200.2.8117: Flags [.], ack 2196816302, win 115, length 0
> 15:27:55.437314 IP 10.5.9.128.47177 > 10.254.200.2.8117: Flags [.], ack 2, win 115, length 0
> 15:27:55.536538 IP 10.5.9.128.47178 > 10.254.200.2.8117: Flags [.], ack 2, win 115, length 0
> 15:28:02.308117 IP 10.5.16.253 > 10.5.14.50: ICMP echo reply, id 21349, seq 9, length 64
> 15:28:02.507485 IP 10.5.9.128.47177 > 10.254.200.2.8117: Flags [F.], seq 0, ack 2, win 115, length 0
> 15:28:02.508788 IP 10.5.9.128.47178 > 10.254.200.2.8117: Flags [F.], seq 0, ack 2, win 115, length 0
> 15:28:38.870105 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18085776 ecr 206391270], length 0
> 15:28:38.870166 IP 10.5.16.3.customport > 10.5.9.128.35975: Flags [.], ack 1, win 8326, options [nop,nop,TS val 206436441 ecr 18081265], length 0
> 15:28:38.909138 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18085780 ecr 1804231314], length 0
> 15:28:38.909171 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], ack 429, win 8326, options [nop,nop,TS val 1804276354 ecr 18081265], length 0
> 15:28:46.811759 IP 10.5.16.248.698 > 10.5.16.255.698: OLSR, seq 0x7a01, length 1464
> 15:29:02.503246 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [F.], seq 1, ack 1, win 115, options [nop,nop,TS val 18088139 ecr 206436441], length 0
> 15:29:02.503298 IP 10.5.16.3.customport > 10.5.9.128.35975: Flags [.], ack 2, win 8326, options [nop,nop,TS val 206460074 ecr 18088139], length 0
> 15:29:02.503366 IP 10.5.16.3.customport > 10.5.9.128.35975: Flags [F.], seq 1, ack 2, win 8326, options [nop,nop,TS val 206460074 ecr 18088139], length 0
> 15:29:02.503472 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], length 1448
> 15:29:02.503490 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], length 1448
> 15:29:02.503505 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [P.], ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], length 620
> 15:29:02.503527 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [F.], seq 3517, ack 429, win 8326, options [nop,nop,TS val 1804299948 ecr 18081265], length 0
> 15:29:02.514781 IP 10.5.9.128.35975 > 10.5.16.3.customport: Flags [.], ack 2, win 115, options [nop,nop,TS val 18088140 ecr 206460074], length 0
> 15:29:02.514926 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], ack 1449, win 137, options [nop,nop,TS val 18088140 ecr 1804299948], length 0
> 15:29:02.515046 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], ack 2897, win 160, options [nop,nop,TS val 18088140 ecr 1804299948], length 0
> 15:29:02.515066 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [.], ack 3517, win 182, options [nop,nop,TS val 18088140 ecr 1804299948], length 0
> 15:29:02.515085 IP 10.5.9.128.35974 > 10.5.16.3.customport: Flags [F.], seq 429, ack 3518, win 182, options [nop,nop,TS val 18088140 ecr 1804299948], length 0
> 15:29:02.515120 IP 10.5.16.3.customport > 10.5.9.128.35974: Flags [.], ack 430, win 8325, options [nop,nop,TS val 1804299960 ecr 18088140], length 0
> 15:29:02.522531 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [S], seq 3305835155, win 14600, options [mss 1460,sackOK,TS val 18088141 ecr 0,nop,wscale 7], length 0
> 15:29:02.522599 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [S.], seq 1337004000, ack 3305835156, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3445127330 ecr 18088141], length 0
> 15:29:02.522608 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [S], seq 3304631491, win 14600, options [mss 1460,sackOK,TS val 18088141 ecr 0,nop,wscale 7], length 0
> 15:29:02.522656 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [S.], seq 509028834, ack 3304631492, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3027710882 ecr 18088141], length 0
> 15:29:02.533379 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3445127330], length 0
> 15:29:02.533835 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3027710882], length 0
> 15:29:02.537354 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [P.], ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3445127330], length 428
> 15:29:02.537420 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [P.], ack 1, win 115, options [nop,nop,TS val 18088142 ecr 3027710882], length 409
> 15:29:02.636980 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [.], ack 429, win 8326, options [nop,nop,TS val 3445127445 ecr 18088142], length 0
> 15:29:02.637000 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [.], ack 410, win 8274, options [nop,nop,TS val 3027710997 ecr 18088142], length 0
> 15:29:02.705636 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [.], ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 18088142], length 1448
> 15:29:02.705656 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [P.], ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 18088142], length 606
> 15:29:02.705682 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [F.], seq 2055, ack 429, win 8326, options [nop,nop,TS val 3445127513 ecr 18088142], length 0
> 15:29:02.716912 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [.], ack 1449, win 137, options [nop,nop,TS val 18088161 ecr 3445127513], length 0
> 15:29:02.717206 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [.], ack 2055, win 160, options [nop,nop,TS val 18088161 ecr 3445127513], length 0
> 15:29:02.718461 IP 10.5.9.128.36020 > 10.5.16.3.customport: Flags [F.], seq 429, ack 2056, win 160, options [nop,nop,TS val 18088161 ecr 3445127513], length 0
> 15:29:02.718503 IP 10.5.16.3.customport > 10.5.9.128.36020: Flags [.], ack 430, win 8325, options [nop,nop,TS val 3445127526 ecr 18088161], length 0
> 15:29:02.722581 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [S], seq 3303396676, win 14600, options [mss 1460,sackOK,TS val 18088161 ecr 0,nop,wscale 7], length 0
> 15:29:02.722639 IP 10.5.16.3.customport > 10.5.9.128.36022: Flags [S.], seq 2610177134, ack 3303396677, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 848416791 ecr 18088161], length 0
> 15:29:02.729197 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [.], ack 1, win 115, options [nop,nop,TS val 18088162 ecr 848416791], length 0
> 15:29:02.729753 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [P.], ack 1, win 115, options [nop,nop,TS val 18088162 ecr 848416791], length 413
> 15:29:02.805440 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [.], ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], length 1448
> 15:29:02.805458 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [.], ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], length 1448
> 15:29:02.805474 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [P.], ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], length 120
> 15:29:02.805498 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [F.], seq 3017, ack 410, win 8326, options [nop,nop,TS val 3027711165 ecr 18088142], length 0
> 15:29:02.817170 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [.], ack 1449, win 137, options [nop,nop,TS val 18088171 ecr 3027711165], length 0
> 15:29:02.818996 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [.], ack 2897, win 160, options [nop,nop,TS val 18088171 ecr 3027711165], length 0
> 15:29:02.823870 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [.], ack 3017, win 160, options [nop,nop,TS val 18088171 ecr 3027711165], length 0
> 15:29:02.823894 IP 10.5.9.128.36021 > 10.5.16.3.customport: Flags [F.], seq 410, ack 3018, win 160, options [nop,nop,TS val 18088171 ecr 3027711165], length 0
> 15:29:02.823930 IP 10.5.16.3.customport > 10.5.9.128.36021: Flags [.], ack 411, win 8325, options [nop,nop,TS val 3027711183 ecr 18088171], length 0
> 15:29:02.828960 IP 10.5.16.3.customport > 10.5.9.128.36022: Flags [.], ack 414, win 8326, options [nop,nop,TS val 848416898 ecr 18088162], length 0
> 15:29:02.905059 IP 10.5.16.3.customport > 10.5.9.128.36022: Flags [P.], ack 414, win 8326, options [nop,nop,TS val 848416974 ecr 18088162], length 256
> 15:29:02.905083 IP 10.5.16.3.customport > 10.5.9.128.36022: Flags [F.], seq 257, ack 414, win 8326, options [nop,nop,TS val 848416974 ecr 18088162], length 0
> 15:29:02.915164 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [.], ack 257, win 123, options [nop,nop,TS val 18088180 ecr 848416974], length 0
> 15:29:02.944798 IP 10.5.9.128.36022 > 10.5.16.3.customport: Flags [.], ack 258, win 123, options [nop,nop,TS val 18088184 ecr 848416974], length 0
>
> That not a big problem but it strange the answer is so long to get from httpinfo. I will also try txtinfo to check if the same happen
>
> Thanks
>
> Michel
>
> Le 2011-08-03 02:22, Teco Boot a écrit :
>> Could it be DNS, IPv6 or other timeout?
>> I would use tcpdump and see what is happening.
>>
>> Teco
>>
>> Op 2 aug 2011, om 22:36 heeft Michel Blais het volgende geschreven:
>>
>>> Hi,
>>>
>>> Anyone have a idea of why http_info is really slow to acces on FreeBSD ? I'm using the version 8.2 with OLSRd 0.6.1 from the package (pkg_add) and it can take around 1 minute to acces httpinfo but once it's loaded, changing from a tab to a other is fine but if I go into the address bar (without closing the page or the tab, the page show is still httpinfo) and type enter again, I have to wait 1 minute again. I don't have any delay with OLSRd on OpenWRT. Maybe I should try to build it from the port.
>>>
>>> Also, I couldn't find any information on this with google and I think it's something that should be on the olsrd.org's FAQ, firewall should have a rule to let pass port 698/UDP traffic at destination of the broadcast address or else, the firewall will block hello paquet. The port was easy to find but I had to use tcp dump to know why my allow to NIC IP address was not matching.
>>>
>>> Exemple with PF from FreeBSD or OpenBSD 4.6 and earlier. NIC is re0 and ip address is of the nic is 10.100.0.100/24
>>>
>>> allow on re0 proto udp to 10.100.0.100 port 698
>>> will not work, instead, it should be
>>> allow on re0 proto udp to 10.100.0.255 port 698
>>>
>>> Thanks
>>>
>>> Michel
>>>
>>> --
>>> Olsr-users mailing list
>>> (spam-protected)
>>> https://lists.olsr.org/mailman/listinfo/olsr-users
>>
More information about the Olsr-users
mailing list