SuSE Linux Enterprise Server OpenSSH 5.1p1 nagle issue?

Jeremy Guthrie jeremy.guthrie at cdw.com
Thu Oct 18 07:50:08 EST 2012


I have another bit of detail, I think SSH keepalives are part of the 
issue.  This test didn't have me using the same values for keepalives 
that I use in production so I am going to re-conduct the test with 
matching SSH settings like in production.

When things look good:
debug2: channel 0: window 1966046 sent adjust 131106
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1998272 sent adjust 98880
debug2: channel 0: window 1982464 sent adjust 114688
debug2: channel 0: rcvd ext data 36
Wed Oct 17 15:26:19 2012 0.004193
debug2: channel 0: written 36 to e
d 6
debug2: channel 0: window 1966044 sent adjust 131108
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1998272 sent adjust 98880
debug2: channel 0: window 1982464 sent adjust 114688
debug2: channel 0: rcvd ext data 36
Wed Oct 17 15:26:34 2012 0.004004
debug2: channel 0: written 36 to e

When things are slow:
debug2: channel 0: window 1998812 sent adjust 98340
debug1: client_input_channel_req: channel 0 rtype keepalive at openssh.com 
reply 1
debug1: client_input_channel_req: channel 0 rtype keepalive at openssh.com 
reply 1
debug2: channel 0: window 1966080 sent adjust 131072
debug1: client_input_channel_req: channel 0 rtype keepalive at openssh.com 
reply 1
debug2: channel 0: window 1966080 sent adjust 131072
debug1: client_input_channel_req: channel 0 rtype keepalive at openssh.com 
reply 1
debug2: channel 0: window 1966080 sent adjust 131072
debug1: client_input_channel_req: channel 0 rtype keepalive at openssh.com 
reply 1
debug2: channel 0: window 1966080 sent adjust 131072
debug1: client_input_channel_req: channel 0 rtype keepalive at openssh.com 
reply 1
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: window 1966080 sent adjust 131072
debug2: channel 0: rcvd ext data 37
Wed Oct 17 15:30:21 2012 196.41162



On 10/17/12 3:28 PM, Jeremy Guthrie wrote:
> One node: packet lengths > 1500 are TSO taking affect, if I turn off 
> TSO, I see under normal conditions the appropriate size/sequence of 
> packets.
>
> Example of the connection performing correctly:
> 450   1.746243 SSH 2642 Encrypted response packet len=2576 clientend 
> -> headend
> 451   1.746347 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074656266 
> Win=16666 Len=0 TSval=1456827748 TSecr=798139682 headend -> clientend
> 452   1.746369 SSH 3930 Encrypted response packet len=3864 clientend 
> -> headend
> 453   1.746386 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074657554 
> Win=16666 Len=0 TSval=1456827748 TSecr=798139682 headend -> clientend
> 454   1.746396 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074654978 
> Win=16666 Len=0 TSval=1456827748 TSecr=798139682 headend -> clientend
> 455   1.791951 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074660130 
> Win=16666 Len=0 TSval=1456827760 TSecr=798139694 headend -> clientend
> 456   1.791973 SSH 5218 Encrypted response packet len=5152 clientend 
> -> headend
> 457   1.792501 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074662706 
> Win=16666 Len=0 TSval=1456827760 TSecr=798139694 headend -> clientend
> 458   1.792692 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074665282 
> Win=16666 Len=0 TSval=1456827760 TSecr=798139694 headend -> clientend
> 459   1.792718 SSH 5218 Encrypted response packet len=5152 clientend 
> -> headend
> 460   1.792741 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074667858 
> Win=16666 Len=0 TSval=1456827760 TSecr=798139694 headend -> clientend
> 461   1.849577 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074670434 
> Win=16666 Len=0 TSval=1456827774 TSecr=798139706 headend -> clientend
> 462   1.849600 SSH 5218 Encrypted response packet len=5152 clientend 
> -> headend
> 463   1.849620 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074673010 
> Win=16666 Len=0 TSval=1456827774 TSecr=798139706 headend -> clientend
> 464   1.849746 TCP 66 43269 > 22 [ACK] Seq=555192630 Ack=3074675586 
> Win=16666 Len=0 TSval=1456827774 TSecr=798139706 headend -> clientend
> 465   1.849764 SSH 6506 Encrypted response packet len=6440 clientend 
> -> headend
>
> Example of the connection showing a ping-ponging effect using only 
> 1288 byte packets
> 1288  41.112341 TCP 66 43269 > 22 [ACK] Seq=555193638 Ack=3075980138 
> Win=16666 Len=0 TSval=1456837590 TSecr=798149524 headend -> clientend
> 1289  41.386131 SSH 1354 Encrypted response packet len=1288 clientend 
> -> headend
> 1290  41.432684 TCP 66 43269 > 22 [ACK] Seq=555193638 Ack=3075981426 
> Win=16666 Len=0 TSval=1456837670 TSecr=798149604 headend -> clientend
> 1291  41.702157 SSH 1354 Encrypted response packet len=1288 clientend 
> -> headend
> 1292  41.753245 TCP 66 43269 > 22 [ACK] Seq=555193638 Ack=3075982714 
> Win=16666 Len=0 TSval=1456837750 TSecr=798149683 headend -> clientend
> 1293  42.022128 SSH 1354 Encrypted response packet len=1288 clientend 
> -> headend
>
>
>


-- 
*Jeremy Guthrie*
Technical Architect - Orchestration | *CDW*
5520 Research Park | Madison, WI 53711
Phone: 608.298.1061 | Fax: 608.288.3007 | NOC: 608.298.1102 | Toll Free: 
866.202.1807


More information about the openssh-unix-dev mailing list