Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Slow download, very small packet sizes #1170

Open
ctheune opened this issue Mar 8, 2024 · 36 comments
Open

Slow download, very small packet sizes #1170

ctheune opened this issue Mar 8, 2024 · 36 comments

Comments

@ctheune
Copy link

ctheune commented Mar 8, 2024

Hi,

I've been running with an older image for quite a while successfully (undionly.kpxe from around 2020 or 2021) and this only started showing up with newer machines. I've updated to a current version (not exactly sure how old, likely only a few days/weeks).

I've seen that slow downloads are a recurring theme and I've tried doing my homework ...

When downloading over HTTPs I'm getting less that 10mbit/s. Looking at this tcpdump I see that the window doesn't seem to increase and only wobbles around 1.5k and 3k bytes. The latency is around 10ms (a WAN link) so this makes initrd downloads extremely non-fun:

17:02:43.222110 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205662233:205663681, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222143 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205663681:205666577, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 2896
17:02:43.222297 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205666577:205668025, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222613 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205668025:205669473, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222678 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205669473:205675265, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 5792
17:02:43.222784 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205675265:205676713, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222847 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205676713:205678161, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222904 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205678161:205679609, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222923 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205679609:205681057, ack 895, win 503, options [nop,nop,TS val 1628506726 ecr 58896656], length 1448
17:02:43.222983 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205666577, win 4096, options [nop,nop,TS val 58896656 ecr 1628506725], length 0
17:02:43.223141 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205668025, win 4096, options [nop,nop,TS val 58896656 ecr 1628506725], length 0
17:02:43.223302 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205672369, win 4096, options [nop,nop,TS val 58896656 ecr 1628506725], length 0
17:02:43.223463 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205676713, win 4096, options [nop,nop,TS val 58896656 ecr 1628506725], length 0
17:02:43.223623 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205681057, win 4096, options [nop,nop,TS val 58896656 ecr 1628506726], length 0
17:02:43.233609 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205681057:205683953, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 2896
17:02:43.233647 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205683953:205686849, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 2896
17:02:43.233667 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205686849:205689745, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 2896
17:02:43.233686 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205689745:205691193, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 1448
17:02:43.233713 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205691193:205692641, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 1448
17:02:43.233834 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205688297},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.233860 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205689745},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.233880 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205691193},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.233902 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205692641},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.233931 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205692641:205694089, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 1448
17:02:43.233997 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205694089:205695537, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 1448
17:02:43.234021 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205695537:205698433, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 2896
17:02:43.234040 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205698433:205701329, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 2896
17:02:43.234058 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205701329:205702777, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 1448
17:02:43.234073 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205694089},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.234089 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205695537},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.234130 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.234148 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 2 {205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.234166 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205702777}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244160 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205702777:205704225, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244201 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205704225:205705673, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244227 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205705673:205708569, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 2896
17:02:43.244264 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205708569:205710017, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244277 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205704225}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244313 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205705673}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244333 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205707121}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244350 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205708569}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244367 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205710017}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244393 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205710017:205711465, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244412 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205685401:205686849, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244429 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205711465:205714361, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 2896
17:02:43.244487 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205711465}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244585 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205696985:205698433, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244800 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205696985, win 4096, options [nop,nop,sack 2 {205701329:205711465}{205698433:205699881},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.244838 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205696985, win 4096, options [nop,nop,sack 2 {205701329:205712913}{205698433:205699881},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.244855 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205696985, win 4096, options [nop,nop,sack 2 {205701329:205714361}{205698433:205699881},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.244874 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205696985, win 4096, options [nop,nop,sack 2 {205701329:205715809}{205698433:205699881},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.244905 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205699881, win 4096, options [nop,nop,sack 1 {205701329:205715809},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.254601 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205699881:205701329, ack 895, win 503, options [nop,nop,TS val 1628506757 ecr 58896656], length 1448
17:02:43.254670 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205715809:205717257, ack 895, win 503, options [nop,nop,TS val 1628506757 ecr 58896656], length 1448
17:02:43.254737 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205717257:205723049, ack 895, win 503, options [nop,nop,TS val 1628506757 ecr 58896656], length 5792
17:02:43.255073 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205723049:205724497, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.255131 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205724497:205725945, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.255198 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205725945:205727393, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.255263 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205727393:205728841, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.255323 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205728841:205730289, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.256502 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205723049, win 4096, options [nop,nop,TS val 58896712 ecr 1628506757], length 0
17:02:43.256615 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205727393, win 4096, options [nop,nop,TS val 58896712 ecr 1628506758], length 0
17:02:43.256770 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205730289, win 4096, options [nop,nop,TS val 58896712 ecr 1628506758], length 0
17:02:43.258386 ARP, Request who-has 172.22.53.207 tell kenny07.gocept.net, length 28
17:02:43.258466 ARP, Reply 172.22.53.207 is-at d8:5e:d3:1f:48:73 (oui Unknown), length 46
17:02:43.267249 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205730289:205733185, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267291 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205733185:205736081, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267318 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205736081:205738977, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267343 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205738977:205741873, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267371 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205741873:205743321, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 1448
17:02:43.267406 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205743321:205744769, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 1448
17:02:43.267430 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205744769:205747665, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267481 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205736081, win 4096, options [nop,nop,TS val 58896712 ecr 1628506770], length 0
17:02:43.267837 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205747665, win 4096, options [nop,nop,TS val 58896712 ecr 1628506770], length 0
17:02:43.277884 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205747665:205749113, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.277923 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205749113:205750561, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.277949 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205750561:205753457, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 2896
17:02:43.277967 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205749113, win 4096, options [nop,nop,TS val 58896712 ecr 1628506781], length 0
17:02:43.278122 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205753457, win 4096, options [nop,nop,TS val 58896712 ecr 1628506781], length 0
17:02:43.278181 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205753457:205754905, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.278320 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205754905:205756353, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.278345 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205756353:205759249, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 2896
17:02:43.278366 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205759249:205760697, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.278380 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205754905, win 4096, options [nop,nop,TS val 58896712 ecr 1628506781], length 0
17:02:43.278422 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205760697:205762145, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.278440 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205762145:205765041, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 2896
17:02:43.278663 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205765041, win 4096, options [nop,nop,TS val 58896712 ecr 1628506781], length 0
17:02:43.288263 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205765041:205766489, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288425 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205766489:205767937, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288451 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205767937:205769385, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288464 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205766489, win 4096, options [nop,nop,TS val 58896712 ecr 1628506791], length 0
17:02:43.288502 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205767937, win 4096, options [nop,nop,TS val 58896712 ecr 1628506791], length 0
17:02:43.288541 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205769385, win 4096, options [nop,nop,TS val 58896712 ecr 1628506791], length 0
17:02:43.288722 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205769385:205770833, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288775 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205770833:205772281, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288929 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205772281, win 4096, options [nop,nop,TS val 58896712 ecr 1628506791], length 0
17:02:43.288988 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205772281:205773729, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289084 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205773729, win 4096, options [nop,nop,TS val 58896712 ecr 1628506792], length 0
17:02:43.289111 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205773729:205775177, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289135 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205775177:205778073, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 2896
17:02:43.289157 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205778073:205779521, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289201 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205779521:205780969, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289221 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205780969:205782417, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289411 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205780969, win 4096, options [nop,nop,TS val 58896712 ecr 1628506792], length 0
17:02:43.289450 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205782417, win 4096, options [nop,nop,TS val 58896712 ecr 1628506792], length 0
17:02:43.298912 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205782417:205783865, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299004 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205783865:205785313, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299035 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205785313:205786761, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299117 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205786761, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.299201 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205786761:205788209, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299286 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205788209:205789657, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299399 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205789657, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.299706 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205789657:205791105, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299837 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205791105:205792553, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299864 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205792553:205795449, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 2896
17:02:43.299889 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205791105, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.299919 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205795449:205798345, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 2896
17:02:43.299943 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205798345:205799793, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299954 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205792553, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.300191 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205799793, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.309565 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205799793:205802689, ack 895, win 503, options [nop,nop,TS val 1628506812 ecr 58896712], length 2896
17:02:43.309732 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205802689:205804137, ack 895, win 503, options [nop,nop,TS val 1628506812 ecr 58896712], length 1448
17:02:43.309822 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205804137:205805585, ack 895, win 503, options [nop,nop,TS val 1628506812 ecr 58896712], length 1448
17:02:43.310169 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205805585:205807033, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.310236 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205807033:205808481, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.310298 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205808481:205811377, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 2896
17:02:43.310462 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205811377:205812825, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.310541 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205812825:205814273, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.310564 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205814273:205817169, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 2896
17:02:43.310584 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205817169:205818617, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.311250 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205804137, win 4096, options [nop,nop,TS val 58896768 ecr 1628506812], length 0
17:02:43.311305 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205807033, win 4096, options [nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.311426 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205811377, win 4096, options [nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.311680 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321664 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205818617:205821513, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 2896
17:02:43.321714 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205821513:205824409, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 2896
17:02:43.321741 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205824409:205827305, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 2896
17:02:43.321769 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205827305:205828753, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 1448
17:02:43.321786 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205820065},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321814 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205821513},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321831 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205822961},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321848 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205824409},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321866 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205825857},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321884 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205827305},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321913 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205828753:205830201, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 1448
17:02:43.321929 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205828753},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321972 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205830201:205831649, ack 895, win 503, options [nop,nop,TS val 1628506825 ecr 58896768], length 1448
17:02:43.321987 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205830201},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.322019 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205831649:205833097, ack 895, win 503, options [nop,nop,TS val 1628506825 ecr 58896768], length 1448
17:02:43.322052 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205833097:205834545, ack 895, win 503, options [nop,nop,TS val 1628506825 ecr 58896768], length 1448
17:02:43.322097 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205833097},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.322126 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205834545},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.332252 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205817169:205818617, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 1448
17:02:43.332349 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205834545:205837441, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 2896
17:02:43.332389 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205837441:205841785, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 4344
17:02:43.332420 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205841785:205843233, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 1448
17:02:43.332477 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205843233:205844681, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 1448
17:02:43.332870 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205840337, win 4096, options [nop,nop,TS val 58896768 ecr 1628506835], length 0
17:02:43.333125 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205844681, win 4096, options [nop,nop,TS val 58896768 ecr 1628506835], length 0
17:02:43.343227 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205844681:205846129, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343292 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205846129:205847577, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343322 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205847577:205850473, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 2896
17:02:43.343349 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205850473:205853369, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 2896
17:02:43.343366 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205846129, win 4096, options [nop,nop,TS val 58896768 ecr 1628506846], length 0
17:02:43.343390 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205847577, win 4096, options [nop,nop,TS val 58896768 ecr 1628506846], length 0
17:02:43.343422 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205853369:205854817, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343453 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205854817:205856265, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343488 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205856265:205857713, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343637 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205856265, win 4096, options [nop,nop,TS val 58896768 ecr 1628506846], length 0
17:02:43.343800 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205857713, win 4096, options [nop,nop,TS val 58896768 ecr 1628506846], length 0
17:02:43.353772 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205857713:205859161, ack 895, win 503, options [nop,nop,TS val 1628506856 ecr 58896768], length 1448
17:02:43.353815 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205859161:205860609, ack 895, win 503, options [nop,nop,TS val 1628506856 ecr 58896768], length 1448
17:02:43.353871 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205859161, win 4096, options [nop,nop,TS val 58896768 ecr 1628506856], length 0
17:02:43.353900 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205860609, win 4096, options [nop,nop,TS val 58896768 ecr 1628506856], length 0
17:02:43.353944 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205860609:205862057, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354031 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205862057:205863505, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354055 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205863505:205864953, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354091 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205864953:205866401, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354115 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205866401:205869297, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 2896
17:02:43.354135 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205869297:205870745, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354153 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205864953, win 4096, options [nop,nop,TS val 58896768 ecr 1628506857], length 0
17:02:43.354192 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205870745:205872193, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354424 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205872193, win 4096, options [nop,nop,TS val 58896768 ecr 1628506857], length 0
17:02:43.364232 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205872193:205873641, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 1448
17:02:43.364434 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205873641:205875089, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 1448
17:02:43.364467 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205875089:205876537, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 1448
17:02:43.364498 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205876537:205879433, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 2896
17:02:43.364673 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205879433:205882329, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 2896
17:02:43.364794 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205882329:205885225, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 2896
17:02:43.364817 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205885225:205886673, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 1448
17:02:43.365885 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205880881, win 4096, options [nop,nop,TS val 58896824 ecr 1628506867], length 0
17:02:43.366143 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205886673, win 4096, options [nop,nop,TS val 58896824 ecr 1628506867], length 0
17:02:43.376275 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205886673:205888121, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 1448
17:02:43.376319 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205888121:205889569, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 1448
17:02:43.376342 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205889569:205892465, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 2896
17:02:43.376381 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205892465:205895361, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 2896
17:02:43.376401 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205888121, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.376430 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205889569, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.376666 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205895361, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.376733 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205895361:205896809, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 1448
17:02:43.376803 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205896809:205899705, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 2896
17:02:43.376823 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205896809, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.376850 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205899705:205901153, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 1448
17:02:43.377008 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205901153, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.387018 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205901153:205902601, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 1448
17:02:43.387050 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205902601:205904049, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 1448
17:02:43.387072 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205904049:205906945, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 2896
17:02:43.387093 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205906945:205909841, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 2896
17:02:43.387276 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205909841:205911289, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 1448
17:02:43.387330 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205908393, win 4096, options [nop,nop,TS val 58896824 ecr 1628506890], length 0
17:02:43.387509 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205911289:205912737, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 1448
17:02:43.387542 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205912737:205915633, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 2896
17:02:43.387566 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205915633:205918529, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 2896
17:02:43.387729 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205915633, win 4096, options [nop,nop,TS val 58896824 ecr 1628506890], length 0
17:02:43.387769 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205918529, win 4096, options [nop,nop,TS val 58896824 ecr 1628506890], length 0
17:02:43.397753 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205918529:205919977, ack 895, win 503, options [nop,nop,TS val 1628506900 ecr 58896824], length 1448
17:02:43.397787 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205919977:205921425, ack 895, win 503, options [nop,nop,TS val 1628506900 ecr 58896824], length 1448
17:02:43.397812 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205921425:205924321, ack 895, win 503, options [nop,nop,TS val 1628506900 ecr 58896824], length 2896
17:02:43.398008 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205924321:205925769, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 1448
17:02:43.398063 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205924321, win 4096, options [nop,nop,TS val 58896824 ecr 1628506900], length 0
17:02:43.398108 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205925769, win 4096, options [nop,nop,TS val 58896824 ecr 1628506901], length 0
17:02:43.398185 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205925769:205927217, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 1448
17:02:43.398210 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205927217:205930113, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 2896
17:02:43.398235 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205930113:205933009, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 2896
17:02:43.398260 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205933009:205935905, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 2896
17:02:43.398489 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205931561, win 4096, options [nop,nop,TS val 58896824 ecr 1628506901], length 0
17:02:43.398648 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205935905, win 4096, options [nop,nop,TS val 58896824 ecr 1628506901], length 0
17:02:43.408429 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205935905:205937353, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 1448
17:02:43.408471 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205937353:205938801, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 1448
17:02:43.408501 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205938801:205941697, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 2896
17:02:43.408520 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205937353, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.408546 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205938801, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.408703 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205941697, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.408802 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205941697:205943145, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 1448
17:02:43.408828 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205943145:205944593, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 1448
17:02:43.408895 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205944593:205947489, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 2896
17:02:43.408917 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205943145, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.409005 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205947489:205950385, ack 895, win 503, options [nop,nop,TS val 1628506912 ecr 58896824], length 2896
17:02:43.409028 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205950385:205953281, ack 895, win 503, options [nop,nop,TS val 1628506912 ecr 58896824], length 2896
17:02:43.409045 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205947489, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.409325 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205953281, win 4096, options [nop,nop,TS val 58896824 ecr 1628506912], length 0
17:02:43.418932 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205953281:205954729, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.418978 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205954729:205956177, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419003 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205956177:205957625, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419220 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205957625:205959073, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419279 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205959073:205960521, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419301 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205960521:205961969, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419342 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205961969:205964865, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 2896
17:02:43.419600 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205964865:205966313, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419659 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205966313:205967761, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419682 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205967761:205970657, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 2896
17:02:43.421037 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205957625, win 4096, options [nop,nop,TS val 58896880 ecr 1628506922], length 0
17:02:43.421250 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205964865, win 4096, options [nop,nop,TS val 58896880 ecr 1628506922], length 0
17:02:43.421413 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205970657, win 4096, options [nop,nop,TS val 58896880 ecr 1628506922], length 0
17:02:43.431579 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205970657:205973553, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431610 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205973553:205976449, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431648 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205976449:205979345, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431669 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205979345:205982241, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431879 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205982241:205983689, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 1448
17:02:43.431912 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205983689:205985137, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 1448
17:02:43.431934 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205985137:205988033, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431953 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205988033:205989481, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 1448
17:02:43.431980 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205989481:205990929, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 1448
17:02:43.432001 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205980793, win 4096, options [nop,nop,TS val 58896880 ecr 1628506934], length 0
17:02:43.432266 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205990929, win 4096, options [nop,nop,TS val 58896880 ecr 1628506934], length 0
17:02:43.442468 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205990929:205993825, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 2896
17:02:43.442495 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205993825:205995273, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442520 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205995273:205996721, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442539 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205996721:205999617, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 2896
17:02:43.442729 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205999617:206001065, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442761 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 206001065:206002513, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442796 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205999617, win 4096, options [nop,nop,TS val 58896880 ecr 1628506945], length 0
17:02:43.442865 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 206002513:206003961, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442923 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 206003961:206005409, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442946 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 206005409:206008305, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 2896

The interface stats also don't look too good, but the linked explainers don't help ...

net0: d8:5e:d3:1f:48:73 using undionly on 0000:61:00.1 (Ethernet) [open]
  [Link:up, TX:146655 TXE:1 RX:8291509 RXE:7926594]
  [TXE: 1 x "Network unreachable (https://ipxe.org/28086011)"]
  [RXE: 3 x "The socket is not connected (https://ipxe.org/380a6001)"]
  [RXE: 4313600 x "Operation not supported (https://ipxe.org/3c086003)"]
  [RXE: 3612523 x "Invalid argument (https://ipxe.org/1c056002)"]
  [RXE: 467 x "The socket is not connected (https://ipxe.org/380f6001)"]

The version that is shown when booting is a bit unspecific (1.0.0+) and I'm not 100% sure whether I might still be accidentally running an old image, but as far as I can tell my tftp server is deliverying the correct image file that I've taken from my distro as nix/store/3fm734b6ci0klbsijc8mi04rryfhfh10-ipxe-unstable-2023-07-19.

Thanks for any help ..

@NiKiZe
Copy link
Contributor

NiKiZe commented Mar 8, 2024

Please use current master, you will have to build it yourself, you can also use the ones from boot.ipxe.org, but for any debugging to be done you will need to be able to modify and build new versions.

Could you please dump the http headers you get from the server?

@ctheune
Copy link
Author

ctheune commented Mar 8, 2024

Please use current master, you will have to build it yourself, you can also use the ones from boot.ipxe.org, but for any debugging to be done you will need to be able to modify and build new versions.

Will do.

Could you please dump the http headers you get from the server?

As it's https I can give you the headers from a curl call to the same URL. Is that what you want?

@NiKiZe
Copy link
Contributor

NiKiZe commented Mar 9, 2024

You could start with what curl shows you, but really want what iPXE gets.

@ctheune
Copy link
Author

ctheune commented Mar 10, 2024

Alright, here's the curl story:

curl -v https://hydra.flyingcircus.io/channels/installer/dev/initrd -o /dev/null
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0*   Trying [2a02:238:f030:102::1068]:443...
* Connected to hydra.flyingcircus.io (2a02:238:f030:102::1068) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} [326 bytes data]
*  CAfile: /etc/ssl/cert.pem
*  CApath: none
* (304) (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* (304) (IN), TLS handshake, Unknown (8):
{ [19 bytes data]
* (304) (IN), TLS handshake, Certificate (11):
{ [2856 bytes data]
* (304) (IN), TLS handshake, CERT verify (15):
{ [520 bytes data]
* (304) (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* (304) (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / AEAD-AES256-GCM-SHA384
* ALPN: server accepted h2
* Server certificate:
*  subject: CN=hydra.flyingcircus.io
*  start date: Mar 10 03:33:57 2024 GMT
*  expire date: Jun  8 03:33:56 2024 GMT
*  subjectAltName: host "hydra.flyingcircus.io" matched cert's "hydra.flyingcircus.io"
*  issuer: C=US; O=Let's Encrypt; CN=R3
*  SSL certificate verify ok.
* using HTTP/2
* [HTTP/2] [1] OPENED stream for https://hydra.flyingcircus.io/channels/installer/dev/initrd
* [HTTP/2] [1] [:method: GET]
* [HTTP/2] [1] [:scheme: https]
* [HTTP/2] [1] [:authority: hydra.flyingcircus.io]
* [HTTP/2] [1] [:path: /channels/installer/dev/initrd]
* [HTTP/2] [1] [user-agent: curl/8.4.0]
* [HTTP/2] [1] [accept: */*]
> GET /channels/installer/dev/initrd HTTP/2
> Host: hydra.flyingcircus.io
> User-Agent: curl/8.4.0
> Accept: */*
>
< HTTP/2 200
< server: nginx
< date: Sun, 10 Mar 2024 08:47:30 GMT
< content-type: application/octet-stream
< content-length: 756393569
< last-modified: Sat, 17 Dec 2022 06:02:03 GMT
< etag: "639d5b5b-2d15a661"
< accept-ranges: bytes

This is a public URL, so if you like you can poke it directly for debugging.

How do I get to see the headers that ipxe sees?

@mcb30
Copy link
Member

mcb30 commented Mar 10, 2024

I ran a quick test downloading that URL with both curl and iPXE just now:

curl: 54.3s
iPXE: 59.0s

so I am unable to reproduce your problem.

Since you have a packet capture: could you please provide the raw .pcapng file? Doesn't need to include the whole download: the first 10 seconds or so should be sufficient to observe the problem.

@ctheune
Copy link
Author

ctheune commented Mar 10, 2024

Thanks a lot. I'll get a pcap file, could be a couple of days, though as travel is coming up.

@ctheune
Copy link
Author

ctheune commented Mar 11, 2024

Alright, here's a pcap file (unfortunately it doesn't compress well due to the encryption). Something I noticed while going through it is a high number of duplicate ACKs. I'm not aware of an underling issue in our network here as I can use another host attached to the same network and switch and get the download within 10s which is close to 1GBit which is almost identical to the slowest link on the path.

ipxe-initrd-download.pcap.gz

@ctheune
Copy link
Author

ctheune commented Mar 11, 2024

Ugh. Seems like some corruption is happening here as well.

Screenshot 2024-03-11 at 13 37 34

The archive itself is intact. I downloaded it using curl on the neighbouring machine. I'm double checking this on other hardware now to see whether this is specific to that one machine.

Edit: actually, I'm going to try a manually compiled current version of ipxe (based on 226531e) first.

@ctheune
Copy link
Author

ctheune commented Mar 11, 2024

Ok, so this is also happening on a current version. I'm now getting a proper version number reported:

Screenshot 2024-03-11 at 13 52 42

@ctheune
Copy link
Author

ctheune commented Mar 11, 2024

After trying a couple of times I was able to boot one of the initrds we have available and on that machine, using the same link I got the initrd downloaded within 1 minute. So it's not an issue with the machine itself.

@mcb30
Copy link
Member

mcb30 commented Mar 19, 2024

Alright, here's a pcap file (unfortunately it doesn't compress well due to the encryption). Something I noticed while going through it is a high number of duplicate ACKs. I'm not aware of an underling issue in our network here as I can use another host attached to the same network and switch and get the download within 10s which is close to 1GBit which is almost identical to the slowest link on the path.

ipxe-initrd-download.pcap.gz

Thanks. The capture file is taken from an interface with some kind of TCP offload enabled, so is not showing the actual packets that went over the wire. For example: packet 115 is shown as being 15994 bytes long, which is longer than an Ethernet jumbo frame. We therefore cannot trust what the capture shows about duplicate ACKs, etc, since we are seeing a resynthesis of a TCP conversation rather than the actual TCP conversation.

Could you try disabling the assorted segmentation offload features on the capture interface via ethtool -K <device> <feature> off and then retry the capture. You can get a feature list for your NIC using ethtool -k <device>.

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Ok, so, this is quite fiddly to setup and I only managed to get an excerpt from the middle of the conversation. It might be that this doesn't yet help, but I think I managed to get a better dump now. I used a router in the middle and set its offloading settings to ethtool -K ethsrv gso off gro off tso off for the duration of the dump.

Looking at the dump in wireshark now only shows packet sizes around 1514, so correct L2 overhead for 1500 link MTU.

I still see messages about reassambled PDUs, though as well as bursts of retransmisions and duplicate acks ...

Any ideas? Let me know if you do need the beginning of the conversation instead.

ipxe.pcap.gz

@mcb30
Copy link
Member

mcb30 commented Apr 5, 2024

Ok, so, this is quite fiddly to setup and I only managed to get an excerpt from the middle of the conversation. It might be that this doesn't yet help, but I think I managed to get a better dump now. I used a router in the middle and set its offloading settings to ethtool -K ethsrv gso off gro off tso off for the duration of the dump.

Looking at the dump in wireshark now only shows packet sizes around 1514, so correct L2 overhead for 1500 link MTU.

Great, so we can rule out any problem relating to packet sizes.

I still see messages about reassambled PDUs, though as well as bursts of retransmisions and duplicate acks ...

I see normal length packets and ACK RTT times (at the point of the wireshark capture) of <1ms from iPXE. TCP SACK is in use and is working as expected.

I think you're using undionly.kpxe, which means that we have no direct control over the NIC and no visibility into things like RX buffer exhaustion. Are you able to use ipxe.pxe and a NIC for which there exists a native iPXE driver?

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

The cards are 61:00.0 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01) and seem to be natively supported.

I'm using undionly mostly due to (very longterm) historical reasons when I tried to get things working reliably around 10+ years ago ... so this choise is likely cargo cult for now.

I can try using ipxe.pxe - I'm curious whether this might be a driver issue and would resolve itself by switching to the natvie driver ...

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Ok, so I chainloaded into ipxe.pxe and had the impression, that the kernel loaded faster, but the initrd is still as slow at 1% in 10seconds.

I canceled the download and here's the data from the interfaces:

net0: d8:5e:d3:1f:44:58 using i350 on 0000:61:00.0 (Ethernet) [closed]
  [Link:up, TX:15 TXE:0 RX:123 RXE:77]
  [RXE: 36 x "Operation not supported (https://ipxe.org/3c086003)"]
  [RXE: 1 x "Invalid argument (https://ipxe.org/1c056002)"]
  [RXE: 40 x "The socket is not connected (https://ipxe.org/380f6001)"]
net1: d8:5e:d3:1f:44:59 using i350 on 0000:61:00.1 (Ethernet) [open]
  [Link:up, TX:41278 TXE:1 RX:3156520 RXE:3063147]
  [TXE: 1 x "Network unreachable (https://ipxe.org/28086011)"]
  [RXE: 2958 x "Error 0x2a654006 (https://ipxe.org/2a654006)"]
  [RXE: 1639005 x "Operation not supported (https://ipxe.org/3c086003)"]
  [RXE: 1421072 x "Invalid argument (https://ipxe.org/1c056002)"]
  [RXE: 1 x "The socket is not connected (https://ipxe.org/380f6001)"]
net2: 10:70:fd:cb:c8:32 using ConnectX-5 on 0000:c1:00.0 (Ethernet) [closed]
  [Link:down, TX:0 TXE:0 RX:0 RXE:0]
  [Link status: Unknown (https://ipxe.org/1a086101)]
net3: 10:70:fd:cb:c8:33 using ConnectX-5 on 0000:c1:00.1 (Ethernet) [closed]
  [Link:down, TX:0 TXE:0 RX:0 RXE:0]
  [Link status: Unknown (https://ipxe.org/1a086101)]

The relevant interface is net1 (or potentially net0 which is the same) ... and ... right in this moment I'm noticing that usually we did boot from net0 and not net1. There was a slight firewall misconfiguration that caused the tftp server not to respond from net0 but on net1. Interestingly ... I now chained this to ipxe.pxe again after adjusting the firewall and the stats now show that I'm downloading from net0 and it's fast now.

net0: d8:5e:d3:1f:44:58 using i350 on 0000:61:00.0 (Ethernet) [open]
  [Link:up, TX:80108 TXE:0 RX:261113 RXE:625]
  [RXE: 207 x "Operation not supported (https://ipxe.org/3c086003)"]
  [RXE: 263 x "The socket is not connected (https://ipxe.org/380f6001)"]
  [RXE: 146 x "Error 0x2a654006 (https://ipxe.org/2a654006)"]
  [RXE: 9 x "Invalid argument (https://ipxe.org/1c056002)"]
net1: d8:5e:d3:1f:44:59 using i350 on 0000:61:00.1 (Ethernet) [closed]
  [Link:up, TX:0 TXE:1 RX:0 RXE:0]
  [TXE: 1 x "Network unreachable (https://ipxe.org/28086011)"]
net2: 10:70:fd:cb:c8:32 using ConnectX-5 on 0000:c1:00.0 (Ethernet) [closed]
  [Link:down, TX:0 TXE:0 RX:0 RXE:0]
  [Link status: Unknown (https://ipxe.org/1a086101)]
net3: 10:70:fd:cb:c8:33 using ConnectX-5 on 0000:c1:00.1 (Ethernet) [closed]
  [Link:down, TX:0 TXE:0 RX:0 RXE:0]
  [Link status: Unknown (https://ipxe.org/1a086101)]

This shows much much lower error rates ... I'm 95% sure that this isn't a problem on the actual network it's connected to. I can double check that once I booted.

Consider me puzzled.

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Ah, I chained this again into the undionly.kpxe using the net0 interface and it's fast now as well. So something is weird with the difference between net0/net1. Both are onboard ports:

61:00.0 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01)
61:00.1 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01)

@mcb30
Copy link
Member

mcb30 commented Apr 5, 2024

Ah, I chained this again into the undionly.kpxe using the net0 interface and it's fast now as well. So something is weird with the difference between net0/net1. Both are onboard ports:

61:00.0 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01)
61:00.1 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01)

Interesting! In the absence of any information to the contrary, I'm going to assume that this is most likely a configuration issue on the network side. If you are able to test that it really does depend on whether the NIC is using port 0 or port 1 (e.g. by physically swapping cables and observing that the slow/fast behaviour can be reproduced the other way round), then we can investigate further.

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Yes. I'm a bit tight on on-hands resources at the moment, so the first thing I can check is whether this also happens in a regular Linux environment. I'm happy to experiment with swapping the cables in a few days.

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

So, within Linux on the same machine downloading over the two interfaces shows no differences. I'll try with switches cables in a couple of days.

@NiKiZe
Copy link
Contributor

NiKiZe commented Apr 5, 2024

Are the 2 interfaces connected to identically configured ports? Is there any LCAP or other group functions enabled on the ports? STP configuration?

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Both are connected to identical switches, no LACP or other functions enabled. The faster network has a bit less traffic on the router (both area 1 switch away from the same router) but either are 1g interfaces that aren't fully utilized either way.

@danmcd
Copy link

danmcd commented May 13, 2024

Commenting here just so I can follow along. We've seen this when updating the Triton Data Center version of iPXE to March 2024 (ending with upstream commit 926816c) from October 2023 (ending with upstream commit 8b14652). I can detail the our-own commits and what-not if need be, but we are seeing problem with the most recent merge, and bisection has not helped us a lot in digging into the problem as of yet.

@danmcd
Copy link

danmcd commented May 14, 2024

I've added a packet trace of the very slow http download of our "unix" binary here: https://kebe.com/~danmcd/webrevs/2440-variants/httpboot-stock-failed-only.snoop . This was captured by one of our community members.

@danmcd
Copy link

danmcd commented May 16, 2024

I've been able to do some testing locally. I'm seeing very slow http downloads with a recent merge with our upstream. Given the 2MB window size in the snoop I linked above, I considered undoing this commit:

2d180ce

and the resultant undionly.kpxe appears to be noticeably faster on downloading our 3.5MB boot archives.

I believe this is a problem EXCLUSIVELY with undionly.kpxe. I have other methods of iPXE booting in deployment on my test cloud: EFI netboot chain to snponly,kpxe, and off-disk ipxe.lkrn. Both of these have NO issues with the larger 2MB max buffer size.

I get the feeling undionly is special for some reason. The community member who has set up the "woodchipper" to confirm/deny things won't be back until Monday. I'll report back here with the woodchipper's results.

Those who have this problem ( @ctheune ) who can recompile undionly.kpxe with the max window size shrunk back down to 256k, please try it, and see if it helps.

I do think the window size is exposing an undionly.kpxe problem, not causing it, given my positive experience with other iPXE binary artifacts.

@NiKiZe
Copy link
Contributor

NiKiZe commented May 17, 2024

Makes sense that this is an issue withe the underlaying UNDI stack, maybe more info on which NICs and ROMs/BIOSes this happens for needs to be collected, because it isn't on every device?

@danmcd
Copy link

danmcd commented May 17, 2024

I'm not 100% sure about every-device or not, because when I first heard of this bug I had not noticed the severe slowdown in my otherwise successful boot_archive download. There may be others out there who are experiencing a problem without having outright failure occur, so they dismiss it.

I will make sure I gather information on my slowed-down-but-not-failed one, as will anyone else from Triton-land with failures or slowdown who can gather that as well.

@danmcd
Copy link

danmcd commented May 20, 2024

So for my Supermicro, Xeon E5 v3 (Haswell), booting off of the Intel X540:

BIOS version: Supermicro X10DRU-i+ BIOS Date:01/29/2020 Rev:3.2a
Other boot-screen version: Version 2.17.1249
IPMI/BMC verision: BMC Firmware Revision 3.88
Network boot information: Network:IBA XE Slot 0100 v2346

An interesting data point for me is that I have "DUAL" boot support selected but also have "LEGACY to EFI support" DISABLED.

NOTE that this machine does boot, but MUCH MORE SLOWLY with a 2MiB TCP max buffer, vs. the 256KiB max buffer.

@goekesmi
Copy link

goekesmi commented May 20, 2024

Hello,

I'm a user of Triton and the downstream user of @danmcd mentioned above with the "woodchipper" which I've been running tests through.

The test system is a Dell OptiPlex 980. It was, during this debugging, updated to BIOS version A18. It has been configured in BIOS to use PXE boot, and has no UEFI mode.

During the boot sequence, the following information is displayed, which may help in identifying the exact model of card.

Initializing Intel(R) Boot Agent GE v1.4.10
PXE 2.1 Build 092 (WIM 2.0)
Intel(R) Boot Agent GE v1.4.10
Copyright (C) 1997-2012, Intel Corporation
CLIENT MAC ADDR: 84 2B 2B A5 BF 3A GUID: 44454C4C 3900 1038 8051 B8C04F4D4831
CLIENT IP: 172.20.47.200 MASK: 255.255.255.0 DHCP IP: 172.20.47.3
PXE-›EB: !PXE at 9929:0070, entry point at 9929:0106
UNDI code segment 9929:5750, data segment 92EB:63BO (587-635kB)
UNDI device is PCI 00:19.0, type DIX+802.3 
587kB free base memory after PXE unload
iPXE initialising devices..._

A packet trace of a failed boot using the default for Triton version of undionly is here https://manta.matrix.msu.edu/goekesmi/public/iPXE-debug/2024-0520-0001/AgentSmith-3a.2024-0502.undionly-d0c0252a89de00b943aa2017c39c204b.snoop

A packet trace of a successful boot using a variant that @danmcd provided that backs out 2d180ce is available at https://manta.matrix.msu.edu/goekesmi/public/iPXE-debug/2024-0520-0001/AgentSmith-3a.ipxe-256k-tcp-buffer-undionly.kpxe-610c7eaf10dd2e585671fae58afc1577-bootsequence.snoop

The capture was done with a mirror port from a switch so temporal packet reordering is possible in the trace, along with the occasional dropped packet.

The specific build versions and options @danmcd can speak to. The embedded md5 hashes in the file names refer to the undionly.pxe version that was used for that boot and packet trace.

Hope this helps.

@mcb30
Copy link
Member

mcb30 commented May 21, 2024

Thanks for the packet trace. I have a working theory as to what may be happening.

Using undionly is known to be slower than using a native driver, and so packet drops due to receiver overruns are much more likely than with a native driver. This is exercising portions of the TCP RX queue management that don't normally get much use.

A 2MB TCP window is necessary in order to get close to expected throughput on a modern network (as documented in the commit message for commit 2d180ce). However, this 2MB window is now larger than iPXE's internal heap, which is limited to 512kB. There are good reasons for keeping the heap size small: not least of these is that in some boot scenarios (such as iSCSI boot under BIOS) any memory used by iPXE is lost to the operating system.

With a 2MB TCP window, a 512kB heap, and a high rate of packet loss, there will inevitably be scenarios in which iPXE is forced to discard packets from the TCP receive queue, i.e. to "renege" in the terminology as used by RFC 2018. This is permitted by the RFC, but is expected to cause the overall behaviour to fall back to relying upon a retransmission timer on the sender side, which will degrade the performance back to roughly what it would have been without SACK. This is a significant degradation: as noted in commit e0fc8fe78, the improvement from adding SACK was in the region of 400%-700% of throughput increase.

It would be interesting to try undionly.kpxe in the known-bad setup with a single modification: change HEAP_SIZE (in core/malloc.c) from 512kB to 8MB, which would definitely be sufficient to hold a 2MB receive window (even after allowing for inefficiencies due to buffer alignment).

I am also noticing some oddities in the SACK values shown in the packet capture. For example, for two consecutive ACKs sent by iPXE:

  • #2223: ACK=5573629 SACK=5583765-5664317
  • #2227: ACK=5573629 SACK=5786325-5789221 5776189-5781981 5766589-5771845
  • .....
  • #2557: ACK=5573629 SACK=6301493-6304389

i.e. we seem to have discarded ("reneged upon") some packets from earlier on in the TCP receive queue, rather than dropping the later packets. This is not how iPXE is supposed to behave: under memory pressure, the TCP cache discarder (in tcp_discard()) should be discarding packets higher up in the sequence space first.

I will check the behaviour of the TCP cache discarder. In the meantime, @danmcd @goekesmi could you please carry out the test with the 8MB HEAP_SIZE and report back?

@danmcd
Copy link

danmcd commented May 21, 2024

Rebuilding the Triton iPXE from 20240502/master but with this:

diff --git a/src/core/malloc.c b/src/core/malloc.c
index 8499ab45..03bb683b 100644
--- a/src/core/malloc.c
+++ b/src/core/malloc.c
@@ -103,8 +103,9 @@ size_t maxusedmem;
  * Heap size
  *
  * Currently fixed at 512kB.
+ * ... XXX KEBE SAYS TRY 8MiB instead
  */
-#define HEAP_SIZE ( 512 * 1024 )
+#define HEAP_SIZE ( 8 * 1024 * 1024 )
 
 /** The heap itself */
 static char heap[HEAP_SIZE] __attribute__ (( aligned ( __alignof__(void *) )));

@goekesmi ==> Same kebe.com location, but file is 8m-heap-undionly.kpxe. (MD5 == 79223488ec603400a2c638bd47b5f2dd)

@danmcd
Copy link

danmcd commented May 21, 2024

For me and my supermicro it was faster than stock, but after an initial smooth burst it trickled to a much slower transfer rate.

I should probably recapture TCP snoops on all three scenarios: Stock 20240502, reversion of max buffer, and 8MiB heap. Can't do that this moment, but hope to in the next 24-48 hours (sooner if I'm lucky).

@danmcd
Copy link

danmcd commented May 21, 2024

Okay I took snoops of three variants:

1.) "stock" == The current iPXE downstream in TritonDataCenter. Last merged with upstream commit:

    commit 926816c58fca5641b17c17379b52203458081668
        [efi] Pad transmit buffer length to work around vendor driver bugs

2.) "8m" == Stock, but with the heap sized raised to 8MiB.

3.) "256k" == Stock, but with the TCP max buffer size revered to 256KiB.

The winner in my environment is still "256k" by a long shot. Here are the highlights:

[root@moe (kebecloud) /zones/root/ipxe-captures]# snoop -t a -r -i stock.snoop dst port 80 | egrep "Syn |Fin "
  1 21:12:45.02002 192.168.4.85 -> 192.168.4.6  TCP D=80 S=23157 Syn Seq=739949321 Len=0 Win=65532 Options=<nop,nop,tstamp 77832160 0,nop,nop,sackOK,nop,wscale 9,mss 1460>
15536 21:13:17.49287 192.168.4.85 -> 192.168.4.6  TCP D=80 S=23157 Fin Ack=1631200839 Seq=739949990 Len=0 Win=4096 Options=<nop,nop,tstamp 77864864 490203224>
[root@moe (kebecloud) /zones/root/ipxe-captures]# snoop -t a -r -i 8m.snoop dst port 80 | egrep "Syn |Fin "
  1 21:30:33.26264 192.168.4.85 -> 192.168.4.6  TCP D=80 S=45701 Syn Seq=1895842926 Len=0 Win=65532 Options=<nop,nop,tstamp 78920632 0,nop,nop,sackOK,nop,wscale 9,mss 1460>
19247 21:30:56.21511 192.168.4.85 -> 192.168.4.6  TCP D=80 S=45701 Fin Ack=150344437 Seq=1895843595 Len=0 Win=4096 Options=<nop,nop,tstamp 78943760 491262073>
[root@moe (kebecloud) /zones/root/ipxe-captures]# snoop -t a -r -i 256k.snoop dst port 80 | egrep "Syn |Fin "
  1 21:37:19.65470 192.168.4.85 -> 192.168.4.6  TCP D=80 S=43986 Syn Seq=836941936 Len=0 Win=65532 Options=<nop,nop,tstamp 79335480 0,nop,nop,sackOK,nop,wscale 9,mss 1460>
3399 21:37:23.19284 192.168.4.85 -> 192.168.4.6  TCP D=80 S=43986 Fin Ack=2420103357 Seq=836942605 Len=0 Win=512 Options=<nop,nop,tstamp 79338672 491649103>
[root@moe (kebecloud) /zones/root/ipxe-captures]# ls
256k.snoop   8m.snoop     stock.snoop
[root@moe (kebecloud) /zones/root/ipxe-captures]# ls -lt ; digest -a md5 *
total 225187
-rw-r--r--   1 root     root     18829508 May 21 21:37 256k.snoop
-rw-r--r--   1 root     root     59642089 May 21 21:30 8m.snoop
-rw-r--r--   1 root     root     36502423 May 21 21:13 stock.snoop
(256k.snoop) = 56e7cdc3f1a2c5bcde98b5f46b366a93
(8m.snoop) = b484588e7a792cddc6f5cac18852e20b
(stock.snoop) = 3653b0c04e0cd3cc445ea3305a0ebdf1
[root@moe (kebecloud) /zones/root/ipxe-captures]# 

Note the 32sec for stock, 23sec for 8m heap, and 3.5sec for 256k max tcp buffer size.

These snoops are available in https://kebe.com/~danmcd/webrevs/2440-variants/ for download.

@danmcd
Copy link

danmcd commented May 22, 2024

Can/should we have HEAP_SIZE and TCP_MAX_WINDOW_SIZE be configurable in src/config/local/general.h ?

@mcb30
Copy link
Member

mcb30 commented May 22, 2024

Can/should we have HEAP_SIZE and TCP_MAX_WINDOW_SIZE be configurable in src/config/local/general.h ?

No, that's definitely not a solution I'd accept. Those aren't meaningful user configuration choices, and making them configurable would just be papering over the problem and putting the burden onto all future users to guess what the "correct" values might happen to be for their use case.

@goekesmi
Copy link

To my great surprise, The test node using the 8m heap variant did boot. It was slow, and inconsistent on transfer speeds, but it did complete the boot. Twice. Which is all I have tested it.

Packet capture of the boot at https://manta.matrix.msu.edu/goekesmi/public/iPXE-debug/2024-0522-0001/AgentSmith-3a.8m-heap-undionly.kpxe-79223488ec603400a2c638bd47b5f2dd-bootsequence.snoop

@danmcd
Copy link

danmcd commented May 22, 2024

This matches my experience (See my timings above).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants