SuSE Linux Enterprise Server OpenSSH 5.1p1 nagle issue?
Jeremy Guthrie
jeremy.guthrie at cdw.com
Thu Oct 18 07:28:23 EST 2012
One node: packet lengths > 1500 are TSO taking affect, if I turn off
TSO, I see under normal conditions the appropriate size/sequence of packets.
Example of the connection performing correctly:
450 1.746243 SSH 2642 Encrypted response packet len=2576 clientend ->
headend
451 1.746347 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074656266
Win=16666 Len=0 TSval=1456827748 TSecr=798139682 headend -> clientend
452 1.746369 SSH 3930 Encrypted response packet len=3864 clientend ->
headend
453 1.746386 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074657554
Win=16666 Len=0 TSval=1456827748 TSecr=798139682 headend -> clientend
454 1.746396 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074654978
Win=16666 Len=0 TSval=1456827748 TSecr=798139682 headend -> clientend
455 1.791951 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074660130
Win=16666 Len=0 TSval=1456827760 TSecr=798139694 headend -> clientend
456 1.791973 SSH 5218 Encrypted response packet len=5152 clientend ->
headend
457 1.792501 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074662706
Win=16666 Len=0 TSval=1456827760 TSecr=798139694 headend -> clientend
458 1.792692 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074665282
Win=16666 Len=0 TSval=1456827760 TSecr=798139694 headend -> clientend
459 1.792718 SSH 5218 Encrypted response packet len=5152 clientend ->
headend
460 1.792741 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074667858
Win=16666 Len=0 TSval=1456827760 TSecr=798139694 headend -> clientend
461 1.849577 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074670434
Win=16666 Len=0 TSval=1456827774 TSecr=798139706 headend -> clientend
462 1.849600 SSH 5218 Encrypted response packet len=5152 clientend ->
headend
463 1.849620 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074673010
Win=16666 Len=0 TSval=1456827774 TSecr=798139706 headend -> clientend
464 1.849746 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074675586
Win=16666 Len=0 TSval=1456827774 TSecr=798139706 headend -> clientend
465 1.849764 SSH 6506 Encrypted response packet len=6440 clientend ->
headend
Example of the connection showing a ping-ponging effect using only 1288
byte packets
1288 41.112341 TCP 66 43269 > 22 [ACK] Seq=555193638 Ack=3075980138
Win=16666 Len=0 TSval=1456837590 TSecr=798149524 headend -> clientend
1289 41.386131 SSH 1354 Encrypted response packet len=1288 clientend ->
headend
1290 41.432684 TCP 66 43269 > 22 [ACK] Seq=555193638 Ack=3075981426
Win=16666 Len=0 TSval=1456837670 TSecr=798149604 headend -> clientend
1291 41.702157 SSH 1354 Encrypted response packet len=1288 clientend ->
headend
1292 41.753245 TCP 66 43269 > 22 [ACK] Seq=555193638 Ack=3075982714
Win=16666 Len=0 TSval=1456837750 TSecr=798149683 headend -> clientend
1293 42.022128 SSH 1354 Encrypted response packet len=1288 clientend ->
headend
--
*Jeremy Guthrie*
Technical Architect - Orchestration | *CDW*
5520 Research Park | Madison, WI 53711
Phone: 608.298.1061 | Fax: 608.288.3007 | NOC: 608.298.1102 | Toll Free:
866.202.1807
More information about the openssh-unix-dev
mailing list