[Bug 1014] SCP slow bandwidth with Solaris8 on n240

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Wed Apr 13 00:55:51 EST 2005


http://bugzilla.mindrot.org/show_bug.cgi?id=1014

           Summary: SCP slow bandwidth with Solaris8 on n240
           Product: Portable OpenSSH
           Version: 3.7.1p2
          Platform: ix86
        OS/Version: SunOS
            Status: NEW
          Severity: normal
          Priority: P2
         Component: scp
        AssignedTo: openssh-bugs at mindrot.org
        ReportedBy: banville_c at hotmail.com


Hi,

I'm experiencing some bandwidth issue when using SCP on SunOS and using SUN 
hardware platform n240. These n240 server are using SUN IPMP feature.  The SCP 
bandwidth issue is seen when files are transfered between two n240 servers 
using the active IP Interface (bge0). When the inactive IP Interface (bge1) is 
used to execute the transfer, no bandwidth issue is seen.  Bandwidth issue is 
only seen when SCP "get" is executed. "Pushing" a file using SCP do not causing 
any bandwidth issue in any way.

Here is a summay of the issue:
   - SCP "push" - No Bandwidth issue - Transfer rate = 10MB/s
   - SCP "get" - Inactive IP Interface - No Bandwidth issue => 10 MB/s
   - SCP "get" - Active IP Interface - Bandwidth issue => ~1.0MB/s - 500 kB/s

Testing was accomplish using SFTP and FTP. No Bandwidth issue seen.
Testing was also accomplish using SCP -1....No Bandwidth issue seen.

Versions of OpenSSH used for testing: 3.7.1p2 and 4.0p1  
Problem seen with both OpenSSH version.

Below are more detail regarding the transfer issue.
Any ideas, comments or solutions would be appreciated.
Thanks,
Chris


======================================================================
N240/SunOS Version where issue was reproduced.
======================================================================

SunOS version:
  SunOS 5.8 Generic 108528-29 Jan 2004
     OR
  SunOS TLWIPC01 5.8 Generic_117350-13 sun4u sparc SUNW,Netra-240

ssh -V
  OpenSSH_3.7.1p2-pwexp24, SSH protocols 1.5/2.0, OpenSSL 0.9.7c 30 Sep 2003
     OR
  OpenSSH_4.0p1, OpenSSL 0.9.7f 22 Mar 2005

======================================================================
Test Executed
======================================================================
We created a 50MB file on a webserver.

n240-A> mkfile 50m /tmp/testfile
n240-A> chmod u+w /tmp/testfile

We send it to n240-B like this
n240-A> scp /tmp/testfile sysadmin at n240-B:/tmp

We retrieve the file like this
n240-A> scp sysadmin at n240-B:/tmp/testfile /tmp


======================================================================
File Transfer results.
======================================================================


[SERVER1]/tmp:=> ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
        inet 127.0.0.1 netmask ff000000
bge0: flags=9040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER> 
mtu 1500 index 2
        inet 47.135.87.18 netmask ffffffe0 broadcast 47.135.87.31
        groupname imspub
bge0:1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
        inet 47.135.87.20 netmask ffffffe0 broadcast 47.135.87.31
bge1: 
flags=69040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER,STANDBY
,INACTIVE> mtu 1500 index 3
        inet 47.135.87.19 netmask ffffffe0 broadcast 47.135.87.31
        groupname imspub


Active IP Interface (bge0):

[SERVER0]/tmp:=> scp nortel at 47.135.87.18:/tmp/testfile /tmp/testfile
The authenticity of host '47.135.87.18 (47.135.87.18)' can't be established.
RSA key fingerprint is 39:2d:49:3c:96:16:7f:6c:00:c1:e5:2b:6f:7b:14:ea.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '47.135.87.18' (RSA) to the list of known hosts.
nortel at 47.135.87.18's password:
testfile                                      100%   50MB 774.2KB/s   01:01
[SERVER0]/tmp:=> scp /tmp/testfile  nortel at 47.135.87.18:/tmp/testfile
nortel at 47.135.87.18's password:
testfile                                      100%   50MB  10.2MB/s   00:04

[SERVER0]/tmp:=> ftp 47.135.87.18
ftp> get testfile
52428800 bytes received in 4.5 seconds (11379.72 Kbytes/s)
ftp> put testfile
52428800 bytes sent in 4.5 seconds (11295.58 Kbytes/s)


Inactive IP Interface (bge1):

[SERVER0]/tmp:=> scp nortel at 47.135.87.19:/tmp/testfile /tmp/testfile
The authenticity of host '47.135.87.19 (47.135.87.19)' can't be established.
RSA key fingerprint is 39:2d:49:3c:96:16:7f:6c:00:c1:e5:2b:6f:7b:14:ea.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '47.135.87.19' (RSA) to the list of known hosts.
nortel at 47.135.87.19's password:
testfile                                      100%   50MB  10.1MB/s   00:04
[SERVER0]/tmp:=> scp /tmp/testfile nortel at 47.135.87.19:/tmp/testfile
nortel at 47.135.87.19's password:
testfile                                      100%   50MB  10.1MB/s   00:05

[SERVER0]/tmp:=> ftp 47.135.87.19
ftp> get testfile
52428800 bytes received in 4.5 seconds (11296.81 Kbytes/s)
ftp> put testfile
52428800 bytes sent in 4.6 seconds (11251.99 Kbytes/s)



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




More information about the openssh-bugs mailing list