Split access and strange things...

Linux Advanced Routing and Traffic Control

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



With two uplink, i've setup split access with load balancing:

	http://lartc.org/howto/lartc.rpdb.multiple-links.html

but on big download, trouble arise.

I need to download some DVD image, and i've tried 3 time, the first two
the download stalls after 50-100MB.

I've fired up tcpdump on both public interfaces, and the download start
from one interface (eth1), and this is expected because it is a direct
http downlaod and split access with load balancing are route based.
But after some times, this strange thing happen:

in eth1 come the ''reply'' from the server, eg the data:

 18:21:51.475148 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485272930:485274378, ack 1, win 5792, options [nop,nop,TS val 1840500332 ecr 3260276], length 1448
 18:21:51.481077 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485274378:485275826, ack 1, win 5792, options [nop,nop,TS val 1840500332 ecr 3260276], length 1448
 18:21:51.486703 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485275826:485277274, ack 1, win 5792, options [nop,nop,TS val 1840500332 ecr 3260276], length 1448
 18:21:51.492600 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485277274:485278722, ack 1, win 5792, options [nop,nop,TS val 1840500332 ecr 3260276], length 1448
 18:21:51.498579 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485278722:485280170, ack 1, win 5792, options [nop,nop,TS val 1840500332 ecr 3260276], length 1448
 18:21:51.504719 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485280170:485281618, ack 1, win 5792, options [nop,nop,TS val 1840500347 ecr 3260284], length 1448
 18:21:51.510656 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485281618:485283066, ack 1, win 5792, options [nop,nop,TS val 1840500347 ecr 3260284], length 1448
 18:21:51.516013 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485283066:485284514, ack 1, win 5792, options [nop,nop,TS val 1840500347 ecr 3260284], length 1448
 18:21:51.522166 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485284514:485285962, ack 1, win 5792, options [nop,nop,TS val 1840500347 ecr 3260284], length 1448
 18:21:51.528137 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485285962:485287410, ack 1, win 5792, options [nop,nop,TS val 1840500376 ecr 3260290], length 1448
 18:21:51.534032 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485287410:485288858, ack 1, win 5792, options [nop,nop,TS val 1840500376 ecr 3260290], length 1448
 18:21:51.539713 IP 93.186.135.105.80 > MY.IP.41928: Flags [.], seq 485288858:485290306, ack 1, win 5792, options [nop,nop,TS val 1840500376 ecr 3260290], length 1448

and from eth2.11, the other interface, go the request/ack:

 18:21:52.474825 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356586275, win 11765, options [nop,nop,TS val 3260545 ecr 1840501220], length 0
 18:21:52.491656 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356589171, win 11765, options [nop,nop,TS val 3260550 ecr 1840501220], length 0
 18:21:52.504299 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356592067, win 11765, options [nop,nop,TS val 3260553 ecr 1840501231], length 0
 18:21:52.517080 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356594963, win 11765, options [nop,nop,TS val 3260556 ecr 1840501231], length 0
 18:21:52.529671 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356597859, win 11765, options [nop,nop,TS val 3260559 ecr 1840501262], length 0
 18:21:52.538145 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356600755, win 11765, options [nop,nop,TS val 3260561 ecr 1840501262], length 0
 18:21:52.555053 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356603651, win 11765, options [nop,nop,TS val 3260565 ecr 1840501358], length 0
 18:21:52.567638 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356606547, win 11765, options [nop,nop,TS val 3260569 ecr 1840501358], length 0
 18:21:52.580377 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356609443, win 11765, options [nop,nop,TS val 3260572 ecr 1840501358], length 0
 18:21:52.592992 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356612339, win 11765, options [nop,nop,TS val 3260575 ecr 1840501358], length 0
 18:21:52.601490 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356615235, win 11765, options [nop,nop,TS val 3260577 ecr 1840501358], length 0
 18:21:52.618340 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356618131, win 11765, options [nop,nop,TS val 3260581 ecr 1840501358], length 0
 18:21:52.631022 IP MY.IP.41928 > 93.186.135.105.80: Flags [.], ack 356621027, win 11765, options [nop,nop,TS val 3260584 ecr 1840501358], length 0

This explain also the stalls: the second interface (eth2.11) have
''double nat'', eg the ip are 192.168.11.254 and there's a router that
to a second nat to the Net, and probably the double nat mess all the
things.


Indeed, this is not normal. What i'm missing? Thanks.

-- 
dott. Marco Gaiarin				    GNUPG Key ID: 240A3D66
  Associazione ``La Nostra Famiglia''                http://www.sv.lnf.it/
  Polo FVG  -  Via della Bontà, 7 - 33078  -  San Vito al Tagliamento (PN)
  marco.gaiarin(at)sv.lnf.it	  tel +39-0434-842711  fax +39-0434-842797

		Dona il 5 PER MILLE a LA NOSTRA FAMIGLIA!
	   http://www.lanostrafamiglia.it/chi_siamo/5xmille.php
	(cf 00307430132, categoria ONLUS oppure RICERCA SANITARIA)
--
To unsubscribe from this list: send the line "unsubscribe lartc" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [LARTC Home Page]     [Netfilter]     [Netfilter Development]     [Network Development]     [Bugtraq]     [GCC Help]     [Yosemite News]     [Linux Kernel]     [Fedora Users]
  Powered by Linux