Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Slow download, very small packet sizes #1170

Open
ctheune opened this issue Mar 8, 2024 · 21 comments
Open

Slow download, very small packet sizes #1170

ctheune opened this issue Mar 8, 2024 · 21 comments

Comments

@ctheune
Copy link

ctheune commented Mar 8, 2024

Hi,

I've been running with an older image for quite a while successfully (undionly.kpxe from around 2020 or 2021) and this only started showing up with newer machines. I've updated to a current version (not exactly sure how old, likely only a few days/weeks).

I've seen that slow downloads are a recurring theme and I've tried doing my homework ...

When downloading over HTTPs I'm getting less that 10mbit/s. Looking at this tcpdump I see that the window doesn't seem to increase and only wobbles around 1.5k and 3k bytes. The latency is around 10ms (a WAN link) so this makes initrd downloads extremely non-fun:

17:02:43.222110 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205662233:205663681, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222143 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205663681:205666577, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 2896
17:02:43.222297 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205666577:205668025, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222613 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205668025:205669473, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222678 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205669473:205675265, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 5792
17:02:43.222784 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205675265:205676713, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222847 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205676713:205678161, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222904 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205678161:205679609, ack 895, win 503, options [nop,nop,TS val 1628506725 ecr 58896656], length 1448
17:02:43.222923 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205679609:205681057, ack 895, win 503, options [nop,nop,TS val 1628506726 ecr 58896656], length 1448
17:02:43.222983 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205666577, win 4096, options [nop,nop,TS val 58896656 ecr 1628506725], length 0
17:02:43.223141 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205668025, win 4096, options [nop,nop,TS val 58896656 ecr 1628506725], length 0
17:02:43.223302 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205672369, win 4096, options [nop,nop,TS val 58896656 ecr 1628506725], length 0
17:02:43.223463 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205676713, win 4096, options [nop,nop,TS val 58896656 ecr 1628506725], length 0
17:02:43.223623 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205681057, win 4096, options [nop,nop,TS val 58896656 ecr 1628506726], length 0
17:02:43.233609 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205681057:205683953, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 2896
17:02:43.233647 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205683953:205686849, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 2896
17:02:43.233667 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205686849:205689745, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 2896
17:02:43.233686 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205689745:205691193, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 1448
17:02:43.233713 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205691193:205692641, ack 895, win 503, options [nop,nop,TS val 1628506736 ecr 58896656], length 1448
17:02:43.233834 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205688297},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.233860 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205689745},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.233880 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205691193},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.233902 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205692641},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.233931 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205692641:205694089, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 1448
17:02:43.233997 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205694089:205695537, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 1448
17:02:43.234021 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205695537:205698433, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 2896
17:02:43.234040 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205698433:205701329, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 2896
17:02:43.234058 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205701329:205702777, ack 895, win 503, options [nop,nop,TS val 1628506737 ecr 58896656], length 1448
17:02:43.234073 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205694089},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.234089 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205695537},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.234130 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 1 {205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.234148 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 2 {205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.234166 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205702777}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244160 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205702777:205704225, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244201 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205704225:205705673, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244227 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205705673:205708569, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 2896
17:02:43.244264 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205708569:205710017, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244277 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205704225}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244313 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205705673}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244333 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205707121}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244350 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205708569}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244367 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205710017}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244393 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205710017:205711465, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244412 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205685401:205686849, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244429 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205711465:205714361, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 2896
17:02:43.244487 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205685401, win 4096, options [nop,nop,sack 3 {205701329:205711465}{205698433:205699881}{205686849:205696985},nop,nop,TS val 58896656 ecr 1628506736], length 0
17:02:43.244585 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205696985:205698433, ack 895, win 503, options [nop,nop,TS val 1628506747 ecr 58896656], length 1448
17:02:43.244800 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205696985, win 4096, options [nop,nop,sack 2 {205701329:205711465}{205698433:205699881},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.244838 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205696985, win 4096, options [nop,nop,sack 2 {205701329:205712913}{205698433:205699881},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.244855 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205696985, win 4096, options [nop,nop,sack 2 {205701329:205714361}{205698433:205699881},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.244874 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205696985, win 4096, options [nop,nop,sack 2 {205701329:205715809}{205698433:205699881},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.244905 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205699881, win 4096, options [nop,nop,sack 1 {205701329:205715809},nop,nop,TS val 58896656 ecr 1628506747], length 0
17:02:43.254601 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205699881:205701329, ack 895, win 503, options [nop,nop,TS val 1628506757 ecr 58896656], length 1448
17:02:43.254670 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205715809:205717257, ack 895, win 503, options [nop,nop,TS val 1628506757 ecr 58896656], length 1448
17:02:43.254737 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205717257:205723049, ack 895, win 503, options [nop,nop,TS val 1628506757 ecr 58896656], length 5792
17:02:43.255073 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205723049:205724497, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.255131 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205724497:205725945, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.255198 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205725945:205727393, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.255263 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205727393:205728841, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.255323 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205728841:205730289, ack 895, win 503, options [nop,nop,TS val 1628506758 ecr 58896656], length 1448
17:02:43.256502 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205723049, win 4096, options [nop,nop,TS val 58896712 ecr 1628506757], length 0
17:02:43.256615 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205727393, win 4096, options [nop,nop,TS val 58896712 ecr 1628506758], length 0
17:02:43.256770 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205730289, win 4096, options [nop,nop,TS val 58896712 ecr 1628506758], length 0
17:02:43.258386 ARP, Request who-has 172.22.53.207 tell kenny07.gocept.net, length 28
17:02:43.258466 ARP, Reply 172.22.53.207 is-at d8:5e:d3:1f:48:73 (oui Unknown), length 46
17:02:43.267249 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205730289:205733185, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267291 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205733185:205736081, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267318 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205736081:205738977, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267343 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205738977:205741873, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267371 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205741873:205743321, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 1448
17:02:43.267406 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205743321:205744769, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 1448
17:02:43.267430 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205744769:205747665, ack 895, win 503, options [nop,nop,TS val 1628506770 ecr 58896712], length 2896
17:02:43.267481 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205736081, win 4096, options [nop,nop,TS val 58896712 ecr 1628506770], length 0
17:02:43.267837 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205747665, win 4096, options [nop,nop,TS val 58896712 ecr 1628506770], length 0
17:02:43.277884 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205747665:205749113, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.277923 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205749113:205750561, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.277949 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205750561:205753457, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 2896
17:02:43.277967 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205749113, win 4096, options [nop,nop,TS val 58896712 ecr 1628506781], length 0
17:02:43.278122 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205753457, win 4096, options [nop,nop,TS val 58896712 ecr 1628506781], length 0
17:02:43.278181 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205753457:205754905, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.278320 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205754905:205756353, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.278345 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205756353:205759249, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 2896
17:02:43.278366 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205759249:205760697, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.278380 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205754905, win 4096, options [nop,nop,TS val 58896712 ecr 1628506781], length 0
17:02:43.278422 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205760697:205762145, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 1448
17:02:43.278440 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205762145:205765041, ack 895, win 503, options [nop,nop,TS val 1628506781 ecr 58896712], length 2896
17:02:43.278663 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205765041, win 4096, options [nop,nop,TS val 58896712 ecr 1628506781], length 0
17:02:43.288263 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205765041:205766489, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288425 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205766489:205767937, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288451 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205767937:205769385, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288464 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205766489, win 4096, options [nop,nop,TS val 58896712 ecr 1628506791], length 0
17:02:43.288502 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205767937, win 4096, options [nop,nop,TS val 58896712 ecr 1628506791], length 0
17:02:43.288541 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205769385, win 4096, options [nop,nop,TS val 58896712 ecr 1628506791], length 0
17:02:43.288722 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205769385:205770833, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288775 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205770833:205772281, ack 895, win 503, options [nop,nop,TS val 1628506791 ecr 58896712], length 1448
17:02:43.288929 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205772281, win 4096, options [nop,nop,TS val 58896712 ecr 1628506791], length 0
17:02:43.288988 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205772281:205773729, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289084 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205773729, win 4096, options [nop,nop,TS val 58896712 ecr 1628506792], length 0
17:02:43.289111 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205773729:205775177, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289135 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205775177:205778073, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 2896
17:02:43.289157 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205778073:205779521, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289201 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205779521:205780969, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289221 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205780969:205782417, ack 895, win 503, options [nop,nop,TS val 1628506792 ecr 58896712], length 1448
17:02:43.289411 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205780969, win 4096, options [nop,nop,TS val 58896712 ecr 1628506792], length 0
17:02:43.289450 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205782417, win 4096, options [nop,nop,TS val 58896712 ecr 1628506792], length 0
17:02:43.298912 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205782417:205783865, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299004 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205783865:205785313, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299035 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205785313:205786761, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299117 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205786761, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.299201 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205786761:205788209, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299286 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205788209:205789657, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299399 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205789657, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.299706 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205789657:205791105, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299837 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205791105:205792553, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299864 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205792553:205795449, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 2896
17:02:43.299889 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205791105, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.299919 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205795449:205798345, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 2896
17:02:43.299943 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205798345:205799793, ack 895, win 503, options [nop,nop,TS val 1628506802 ecr 58896712], length 1448
17:02:43.299954 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205792553, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.300191 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205799793, win 4096, options [nop,nop,TS val 58896712 ecr 1628506802], length 0
17:02:43.309565 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205799793:205802689, ack 895, win 503, options [nop,nop,TS val 1628506812 ecr 58896712], length 2896
17:02:43.309732 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205802689:205804137, ack 895, win 503, options [nop,nop,TS val 1628506812 ecr 58896712], length 1448
17:02:43.309822 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205804137:205805585, ack 895, win 503, options [nop,nop,TS val 1628506812 ecr 58896712], length 1448
17:02:43.310169 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205805585:205807033, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.310236 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205807033:205808481, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.310298 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205808481:205811377, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 2896
17:02:43.310462 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205811377:205812825, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.310541 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205812825:205814273, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.310564 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205814273:205817169, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 2896
17:02:43.310584 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205817169:205818617, ack 895, win 503, options [nop,nop,TS val 1628506813 ecr 58896712], length 1448
17:02:43.311250 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205804137, win 4096, options [nop,nop,TS val 58896768 ecr 1628506812], length 0
17:02:43.311305 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205807033, win 4096, options [nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.311426 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205811377, win 4096, options [nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.311680 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321664 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205818617:205821513, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 2896
17:02:43.321714 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205821513:205824409, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 2896
17:02:43.321741 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205824409:205827305, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 2896
17:02:43.321769 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205827305:205828753, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 1448
17:02:43.321786 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205820065},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321814 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205821513},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321831 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205822961},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321848 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205824409},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321866 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205825857},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321884 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205827305},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321913 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205828753:205830201, ack 895, win 503, options [nop,nop,TS val 1628506824 ecr 58896768], length 1448
17:02:43.321929 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205828753},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.321972 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205830201:205831649, ack 895, win 503, options [nop,nop,TS val 1628506825 ecr 58896768], length 1448
17:02:43.321987 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205830201},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.322019 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205831649:205833097, ack 895, win 503, options [nop,nop,TS val 1628506825 ecr 58896768], length 1448
17:02:43.322052 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205833097:205834545, ack 895, win 503, options [nop,nop,TS val 1628506825 ecr 58896768], length 1448
17:02:43.322097 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205833097},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.322126 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205817169, win 4096, options [nop,nop,sack 1 {205818617:205834545},nop,nop,TS val 58896768 ecr 1628506813], length 0
17:02:43.332252 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205817169:205818617, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 1448
17:02:43.332349 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205834545:205837441, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 2896
17:02:43.332389 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205837441:205841785, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 4344
17:02:43.332420 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205841785:205843233, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 1448
17:02:43.332477 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205843233:205844681, ack 895, win 503, options [nop,nop,TS val 1628506835 ecr 58896768], length 1448
17:02:43.332870 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205840337, win 4096, options [nop,nop,TS val 58896768 ecr 1628506835], length 0
17:02:43.333125 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205844681, win 4096, options [nop,nop,TS val 58896768 ecr 1628506835], length 0
17:02:43.343227 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205844681:205846129, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343292 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205846129:205847577, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343322 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205847577:205850473, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 2896
17:02:43.343349 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205850473:205853369, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 2896
17:02:43.343366 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205846129, win 4096, options [nop,nop,TS val 58896768 ecr 1628506846], length 0
17:02:43.343390 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205847577, win 4096, options [nop,nop,TS val 58896768 ecr 1628506846], length 0
17:02:43.343422 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205853369:205854817, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343453 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205854817:205856265, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343488 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205856265:205857713, ack 895, win 503, options [nop,nop,TS val 1628506846 ecr 58896768], length 1448
17:02:43.343637 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205856265, win 4096, options [nop,nop,TS val 58896768 ecr 1628506846], length 0
17:02:43.343800 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205857713, win 4096, options [nop,nop,TS val 58896768 ecr 1628506846], length 0
17:02:43.353772 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205857713:205859161, ack 895, win 503, options [nop,nop,TS val 1628506856 ecr 58896768], length 1448
17:02:43.353815 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205859161:205860609, ack 895, win 503, options [nop,nop,TS val 1628506856 ecr 58896768], length 1448
17:02:43.353871 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205859161, win 4096, options [nop,nop,TS val 58896768 ecr 1628506856], length 0
17:02:43.353900 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205860609, win 4096, options [nop,nop,TS val 58896768 ecr 1628506856], length 0
17:02:43.353944 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205860609:205862057, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354031 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205862057:205863505, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354055 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205863505:205864953, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354091 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205864953:205866401, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354115 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205866401:205869297, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 2896
17:02:43.354135 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205869297:205870745, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354153 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205864953, win 4096, options [nop,nop,TS val 58896768 ecr 1628506857], length 0
17:02:43.354192 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205870745:205872193, ack 895, win 503, options [nop,nop,TS val 1628506857 ecr 58896768], length 1448
17:02:43.354424 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205872193, win 4096, options [nop,nop,TS val 58896768 ecr 1628506857], length 0
17:02:43.364232 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205872193:205873641, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 1448
17:02:43.364434 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205873641:205875089, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 1448
17:02:43.364467 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205875089:205876537, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 1448
17:02:43.364498 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205876537:205879433, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 2896
17:02:43.364673 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205879433:205882329, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 2896
17:02:43.364794 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205882329:205885225, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 2896
17:02:43.364817 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205885225:205886673, ack 895, win 503, options [nop,nop,TS val 1628506867 ecr 58896768], length 1448
17:02:43.365885 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205880881, win 4096, options [nop,nop,TS val 58896824 ecr 1628506867], length 0
17:02:43.366143 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205886673, win 4096, options [nop,nop,TS val 58896824 ecr 1628506867], length 0
17:02:43.376275 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205886673:205888121, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 1448
17:02:43.376319 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205888121:205889569, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 1448
17:02:43.376342 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205889569:205892465, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 2896
17:02:43.376381 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205892465:205895361, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 2896
17:02:43.376401 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205888121, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.376430 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205889569, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.376666 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205895361, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.376733 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205895361:205896809, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 1448
17:02:43.376803 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205896809:205899705, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 2896
17:02:43.376823 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205896809, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.376850 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205899705:205901153, ack 895, win 503, options [nop,nop,TS val 1628506879 ecr 58896824], length 1448
17:02:43.377008 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205901153, win 4096, options [nop,nop,TS val 58896824 ecr 1628506879], length 0
17:02:43.387018 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205901153:205902601, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 1448
17:02:43.387050 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205902601:205904049, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 1448
17:02:43.387072 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205904049:205906945, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 2896
17:02:43.387093 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205906945:205909841, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 2896
17:02:43.387276 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205909841:205911289, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 1448
17:02:43.387330 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205908393, win 4096, options [nop,nop,TS val 58896824 ecr 1628506890], length 0
17:02:43.387509 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205911289:205912737, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 1448
17:02:43.387542 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205912737:205915633, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 2896
17:02:43.387566 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205915633:205918529, ack 895, win 503, options [nop,nop,TS val 1628506890 ecr 58896824], length 2896
17:02:43.387729 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205915633, win 4096, options [nop,nop,TS val 58896824 ecr 1628506890], length 0
17:02:43.387769 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205918529, win 4096, options [nop,nop,TS val 58896824 ecr 1628506890], length 0
17:02:43.397753 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205918529:205919977, ack 895, win 503, options [nop,nop,TS val 1628506900 ecr 58896824], length 1448
17:02:43.397787 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205919977:205921425, ack 895, win 503, options [nop,nop,TS val 1628506900 ecr 58896824], length 1448
17:02:43.397812 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205921425:205924321, ack 895, win 503, options [nop,nop,TS val 1628506900 ecr 58896824], length 2896
17:02:43.398008 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205924321:205925769, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 1448
17:02:43.398063 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205924321, win 4096, options [nop,nop,TS val 58896824 ecr 1628506900], length 0
17:02:43.398108 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205925769, win 4096, options [nop,nop,TS val 58896824 ecr 1628506901], length 0
17:02:43.398185 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205925769:205927217, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 1448
17:02:43.398210 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205927217:205930113, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 2896
17:02:43.398235 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205930113:205933009, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 2896
17:02:43.398260 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205933009:205935905, ack 895, win 503, options [nop,nop,TS val 1628506901 ecr 58896824], length 2896
17:02:43.398489 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205931561, win 4096, options [nop,nop,TS val 58896824 ecr 1628506901], length 0
17:02:43.398648 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205935905, win 4096, options [nop,nop,TS val 58896824 ecr 1628506901], length 0
17:02:43.408429 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205935905:205937353, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 1448
17:02:43.408471 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205937353:205938801, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 1448
17:02:43.408501 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205938801:205941697, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 2896
17:02:43.408520 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205937353, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.408546 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205938801, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.408703 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205941697, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.408802 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205941697:205943145, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 1448
17:02:43.408828 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205943145:205944593, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 1448
17:02:43.408895 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205944593:205947489, ack 895, win 503, options [nop,nop,TS val 1628506911 ecr 58896824], length 2896
17:02:43.408917 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205943145, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.409005 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205947489:205950385, ack 895, win 503, options [nop,nop,TS val 1628506912 ecr 58896824], length 2896
17:02:43.409028 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205950385:205953281, ack 895, win 503, options [nop,nop,TS val 1628506912 ecr 58896824], length 2896
17:02:43.409045 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205947489, win 4096, options [nop,nop,TS val 58896824 ecr 1628506911], length 0
17:02:43.409325 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205953281, win 4096, options [nop,nop,TS val 58896824 ecr 1628506912], length 0
17:02:43.418932 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205953281:205954729, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.418978 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205954729:205956177, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419003 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205956177:205957625, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419220 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205957625:205959073, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419279 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205959073:205960521, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419301 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205960521:205961969, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419342 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205961969:205964865, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 2896
17:02:43.419600 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205964865:205966313, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419659 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205966313:205967761, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 1448
17:02:43.419682 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205967761:205970657, ack 895, win 503, options [nop,nop,TS val 1628506922 ecr 58896824], length 2896
17:02:43.421037 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205957625, win 4096, options [nop,nop,TS val 58896880 ecr 1628506922], length 0
17:02:43.421250 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205964865, win 4096, options [nop,nop,TS val 58896880 ecr 1628506922], length 0
17:02:43.421413 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205970657, win 4096, options [nop,nop,TS val 58896880 ecr 1628506922], length 0
17:02:43.431579 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205970657:205973553, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431610 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205973553:205976449, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431648 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205976449:205979345, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431669 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205979345:205982241, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431879 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205982241:205983689, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 1448
17:02:43.431912 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205983689:205985137, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 1448
17:02:43.431934 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205985137:205988033, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 2896
17:02:43.431953 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205988033:205989481, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 1448
17:02:43.431980 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205989481:205990929, ack 895, win 503, options [nop,nop,TS val 1628506934 ecr 58896880], length 1448
17:02:43.432001 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205980793, win 4096, options [nop,nop,TS val 58896880 ecr 1628506934], length 0
17:02:43.432266 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205990929, win 4096, options [nop,nop,TS val 58896880 ecr 1628506934], length 0
17:02:43.442468 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205990929:205993825, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 2896
17:02:43.442495 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205993825:205995273, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442520 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205995273:205996721, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442539 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 205996721:205999617, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 2896
17:02:43.442729 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 205999617:206001065, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442761 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 206001065:206002513, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442796 IP 172.22.53.207.23190 > hydra01.fe.whq.gocept.net.https: Flags [.], ack 205999617, win 4096, options [nop,nop,TS val 58896880 ecr 1628506945], length 0
17:02:43.442865 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [.], seq 206002513:206003961, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442923 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 206003961:206005409, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 1448
17:02:43.442946 IP hydra01.fe.whq.gocept.net.https > 172.22.53.207.23190: Flags [P.], seq 206005409:206008305, ack 895, win 503, options [nop,nop,TS val 1628506945 ecr 58896880], length 2896

The interface stats also don't look too good, but the linked explainers don't help ...

net0: d8:5e:d3:1f:48:73 using undionly on 0000:61:00.1 (Ethernet) [open]
  [Link:up, TX:146655 TXE:1 RX:8291509 RXE:7926594]
  [TXE: 1 x "Network unreachable (https://ipxe.org/28086011)"]
  [RXE: 3 x "The socket is not connected (https://ipxe.org/380a6001)"]
  [RXE: 4313600 x "Operation not supported (https://ipxe.org/3c086003)"]
  [RXE: 3612523 x "Invalid argument (https://ipxe.org/1c056002)"]
  [RXE: 467 x "The socket is not connected (https://ipxe.org/380f6001)"]

The version that is shown when booting is a bit unspecific (1.0.0+) and I'm not 100% sure whether I might still be accidentally running an old image, but as far as I can tell my tftp server is deliverying the correct image file that I've taken from my distro as nix/store/3fm734b6ci0klbsijc8mi04rryfhfh10-ipxe-unstable-2023-07-19.

Thanks for any help ..

@NiKiZe
Copy link
Contributor

NiKiZe commented Mar 8, 2024

Please use current master, you will have to build it yourself, you can also use the ones from boot.ipxe.org, but for any debugging to be done you will need to be able to modify and build new versions.

Could you please dump the http headers you get from the server?

@ctheune
Copy link
Author

ctheune commented Mar 8, 2024

Please use current master, you will have to build it yourself, you can also use the ones from boot.ipxe.org, but for any debugging to be done you will need to be able to modify and build new versions.

Will do.

Could you please dump the http headers you get from the server?

As it's https I can give you the headers from a curl call to the same URL. Is that what you want?

@NiKiZe
Copy link
Contributor

NiKiZe commented Mar 9, 2024

You could start with what curl shows you, but really want what iPXE gets.

@ctheune
Copy link
Author

ctheune commented Mar 10, 2024

Alright, here's the curl story:

curl -v https://hydra.flyingcircus.io/channels/installer/dev/initrd -o /dev/null
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0*   Trying [2a02:238:f030:102::1068]:443...
* Connected to hydra.flyingcircus.io (2a02:238:f030:102::1068) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} [326 bytes data]
*  CAfile: /etc/ssl/cert.pem
*  CApath: none
* (304) (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* (304) (IN), TLS handshake, Unknown (8):
{ [19 bytes data]
* (304) (IN), TLS handshake, Certificate (11):
{ [2856 bytes data]
* (304) (IN), TLS handshake, CERT verify (15):
{ [520 bytes data]
* (304) (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* (304) (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / AEAD-AES256-GCM-SHA384
* ALPN: server accepted h2
* Server certificate:
*  subject: CN=hydra.flyingcircus.io
*  start date: Mar 10 03:33:57 2024 GMT
*  expire date: Jun  8 03:33:56 2024 GMT
*  subjectAltName: host "hydra.flyingcircus.io" matched cert's "hydra.flyingcircus.io"
*  issuer: C=US; O=Let's Encrypt; CN=R3
*  SSL certificate verify ok.
* using HTTP/2
* [HTTP/2] [1] OPENED stream for https://hydra.flyingcircus.io/channels/installer/dev/initrd
* [HTTP/2] [1] [:method: GET]
* [HTTP/2] [1] [:scheme: https]
* [HTTP/2] [1] [:authority: hydra.flyingcircus.io]
* [HTTP/2] [1] [:path: /channels/installer/dev/initrd]
* [HTTP/2] [1] [user-agent: curl/8.4.0]
* [HTTP/2] [1] [accept: */*]
> GET /channels/installer/dev/initrd HTTP/2
> Host: hydra.flyingcircus.io
> User-Agent: curl/8.4.0
> Accept: */*
>
< HTTP/2 200
< server: nginx
< date: Sun, 10 Mar 2024 08:47:30 GMT
< content-type: application/octet-stream
< content-length: 756393569
< last-modified: Sat, 17 Dec 2022 06:02:03 GMT
< etag: "639d5b5b-2d15a661"
< accept-ranges: bytes

This is a public URL, so if you like you can poke it directly for debugging.

How do I get to see the headers that ipxe sees?

@mcb30
Copy link
Member

mcb30 commented Mar 10, 2024

I ran a quick test downloading that URL with both curl and iPXE just now:

curl: 54.3s
iPXE: 59.0s

so I am unable to reproduce your problem.

Since you have a packet capture: could you please provide the raw .pcapng file? Doesn't need to include the whole download: the first 10 seconds or so should be sufficient to observe the problem.

@ctheune
Copy link
Author

ctheune commented Mar 10, 2024

Thanks a lot. I'll get a pcap file, could be a couple of days, though as travel is coming up.

@ctheune
Copy link
Author

ctheune commented Mar 11, 2024

Alright, here's a pcap file (unfortunately it doesn't compress well due to the encryption). Something I noticed while going through it is a high number of duplicate ACKs. I'm not aware of an underling issue in our network here as I can use another host attached to the same network and switch and get the download within 10s which is close to 1GBit which is almost identical to the slowest link on the path.

ipxe-initrd-download.pcap.gz

@ctheune
Copy link
Author

ctheune commented Mar 11, 2024

Ugh. Seems like some corruption is happening here as well.

Screenshot 2024-03-11 at 13 37 34

The archive itself is intact. I downloaded it using curl on the neighbouring machine. I'm double checking this on other hardware now to see whether this is specific to that one machine.

Edit: actually, I'm going to try a manually compiled current version of ipxe (based on 226531e) first.

@ctheune
Copy link
Author

ctheune commented Mar 11, 2024

Ok, so this is also happening on a current version. I'm now getting a proper version number reported:

Screenshot 2024-03-11 at 13 52 42

@ctheune
Copy link
Author

ctheune commented Mar 11, 2024

After trying a couple of times I was able to boot one of the initrds we have available and on that machine, using the same link I got the initrd downloaded within 1 minute. So it's not an issue with the machine itself.

@mcb30
Copy link
Member

mcb30 commented Mar 19, 2024

Alright, here's a pcap file (unfortunately it doesn't compress well due to the encryption). Something I noticed while going through it is a high number of duplicate ACKs. I'm not aware of an underling issue in our network here as I can use another host attached to the same network and switch and get the download within 10s which is close to 1GBit which is almost identical to the slowest link on the path.

ipxe-initrd-download.pcap.gz

Thanks. The capture file is taken from an interface with some kind of TCP offload enabled, so is not showing the actual packets that went over the wire. For example: packet 115 is shown as being 15994 bytes long, which is longer than an Ethernet jumbo frame. We therefore cannot trust what the capture shows about duplicate ACKs, etc, since we are seeing a resynthesis of a TCP conversation rather than the actual TCP conversation.

Could you try disabling the assorted segmentation offload features on the capture interface via ethtool -K <device> <feature> off and then retry the capture. You can get a feature list for your NIC using ethtool -k <device>.

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Ok, so, this is quite fiddly to setup and I only managed to get an excerpt from the middle of the conversation. It might be that this doesn't yet help, but I think I managed to get a better dump now. I used a router in the middle and set its offloading settings to ethtool -K ethsrv gso off gro off tso off for the duration of the dump.

Looking at the dump in wireshark now only shows packet sizes around 1514, so correct L2 overhead for 1500 link MTU.

I still see messages about reassambled PDUs, though as well as bursts of retransmisions and duplicate acks ...

Any ideas? Let me know if you do need the beginning of the conversation instead.

ipxe.pcap.gz

@mcb30
Copy link
Member

mcb30 commented Apr 5, 2024

Ok, so, this is quite fiddly to setup and I only managed to get an excerpt from the middle of the conversation. It might be that this doesn't yet help, but I think I managed to get a better dump now. I used a router in the middle and set its offloading settings to ethtool -K ethsrv gso off gro off tso off for the duration of the dump.

Looking at the dump in wireshark now only shows packet sizes around 1514, so correct L2 overhead for 1500 link MTU.

Great, so we can rule out any problem relating to packet sizes.

I still see messages about reassambled PDUs, though as well as bursts of retransmisions and duplicate acks ...

I see normal length packets and ACK RTT times (at the point of the wireshark capture) of <1ms from iPXE. TCP SACK is in use and is working as expected.

I think you're using undionly.kpxe, which means that we have no direct control over the NIC and no visibility into things like RX buffer exhaustion. Are you able to use ipxe.pxe and a NIC for which there exists a native iPXE driver?

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

The cards are 61:00.0 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01) and seem to be natively supported.

I'm using undionly mostly due to (very longterm) historical reasons when I tried to get things working reliably around 10+ years ago ... so this choise is likely cargo cult for now.

I can try using ipxe.pxe - I'm curious whether this might be a driver issue and would resolve itself by switching to the natvie driver ...

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Ok, so I chainloaded into ipxe.pxe and had the impression, that the kernel loaded faster, but the initrd is still as slow at 1% in 10seconds.

I canceled the download and here's the data from the interfaces:

net0: d8:5e:d3:1f:44:58 using i350 on 0000:61:00.0 (Ethernet) [closed]
  [Link:up, TX:15 TXE:0 RX:123 RXE:77]
  [RXE: 36 x "Operation not supported (https://ipxe.org/3c086003)"]
  [RXE: 1 x "Invalid argument (https://ipxe.org/1c056002)"]
  [RXE: 40 x "The socket is not connected (https://ipxe.org/380f6001)"]
net1: d8:5e:d3:1f:44:59 using i350 on 0000:61:00.1 (Ethernet) [open]
  [Link:up, TX:41278 TXE:1 RX:3156520 RXE:3063147]
  [TXE: 1 x "Network unreachable (https://ipxe.org/28086011)"]
  [RXE: 2958 x "Error 0x2a654006 (https://ipxe.org/2a654006)"]
  [RXE: 1639005 x "Operation not supported (https://ipxe.org/3c086003)"]
  [RXE: 1421072 x "Invalid argument (https://ipxe.org/1c056002)"]
  [RXE: 1 x "The socket is not connected (https://ipxe.org/380f6001)"]
net2: 10:70:fd:cb:c8:32 using ConnectX-5 on 0000:c1:00.0 (Ethernet) [closed]
  [Link:down, TX:0 TXE:0 RX:0 RXE:0]
  [Link status: Unknown (https://ipxe.org/1a086101)]
net3: 10:70:fd:cb:c8:33 using ConnectX-5 on 0000:c1:00.1 (Ethernet) [closed]
  [Link:down, TX:0 TXE:0 RX:0 RXE:0]
  [Link status: Unknown (https://ipxe.org/1a086101)]

The relevant interface is net1 (or potentially net0 which is the same) ... and ... right in this moment I'm noticing that usually we did boot from net0 and not net1. There was a slight firewall misconfiguration that caused the tftp server not to respond from net0 but on net1. Interestingly ... I now chained this to ipxe.pxe again after adjusting the firewall and the stats now show that I'm downloading from net0 and it's fast now.

net0: d8:5e:d3:1f:44:58 using i350 on 0000:61:00.0 (Ethernet) [open]
  [Link:up, TX:80108 TXE:0 RX:261113 RXE:625]
  [RXE: 207 x "Operation not supported (https://ipxe.org/3c086003)"]
  [RXE: 263 x "The socket is not connected (https://ipxe.org/380f6001)"]
  [RXE: 146 x "Error 0x2a654006 (https://ipxe.org/2a654006)"]
  [RXE: 9 x "Invalid argument (https://ipxe.org/1c056002)"]
net1: d8:5e:d3:1f:44:59 using i350 on 0000:61:00.1 (Ethernet) [closed]
  [Link:up, TX:0 TXE:1 RX:0 RXE:0]
  [TXE: 1 x "Network unreachable (https://ipxe.org/28086011)"]
net2: 10:70:fd:cb:c8:32 using ConnectX-5 on 0000:c1:00.0 (Ethernet) [closed]
  [Link:down, TX:0 TXE:0 RX:0 RXE:0]
  [Link status: Unknown (https://ipxe.org/1a086101)]
net3: 10:70:fd:cb:c8:33 using ConnectX-5 on 0000:c1:00.1 (Ethernet) [closed]
  [Link:down, TX:0 TXE:0 RX:0 RXE:0]
  [Link status: Unknown (https://ipxe.org/1a086101)]

This shows much much lower error rates ... I'm 95% sure that this isn't a problem on the actual network it's connected to. I can double check that once I booted.

Consider me puzzled.

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Ah, I chained this again into the undionly.kpxe using the net0 interface and it's fast now as well. So something is weird with the difference between net0/net1. Both are onboard ports:

61:00.0 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01)
61:00.1 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01)

@mcb30
Copy link
Member

mcb30 commented Apr 5, 2024

Ah, I chained this again into the undionly.kpxe using the net0 interface and it's fast now as well. So something is weird with the difference between net0/net1. Both are onboard ports:

61:00.0 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01)
61:00.1 Ethernet controller: Intel Corporation I350 Gigabit Network Connection (rev 01)

Interesting! In the absence of any information to the contrary, I'm going to assume that this is most likely a configuration issue on the network side. If you are able to test that it really does depend on whether the NIC is using port 0 or port 1 (e.g. by physically swapping cables and observing that the slow/fast behaviour can be reproduced the other way round), then we can investigate further.

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Yes. I'm a bit tight on on-hands resources at the moment, so the first thing I can check is whether this also happens in a regular Linux environment. I'm happy to experiment with swapping the cables in a few days.

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

So, within Linux on the same machine downloading over the two interfaces shows no differences. I'll try with switches cables in a couple of days.

@NiKiZe
Copy link
Contributor

NiKiZe commented Apr 5, 2024

Are the 2 interfaces connected to identically configured ports? Is there any LCAP or other group functions enabled on the ports? STP configuration?

@ctheune
Copy link
Author

ctheune commented Apr 5, 2024

Both are connected to identical switches, no LACP or other functions enabled. The faster network has a bit less traffic on the router (both area 1 switch away from the same router) but either are 1g interfaces that aren't fully utilized either way.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants