From owner-freebsd-net@FreeBSD.ORG Tue Aug 16 21:36:53 2011 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9313F106566C for ; Tue, 16 Aug 2011 21:36:53 +0000 (UTC) (envelope-from chip@2bithacker.net) Received: from mail.2bithacker.net (unknown [IPv6:2001:470:1f07:202::123]) by mx1.freebsd.org (Postfix) with ESMTP id 65E798FC0C for ; Tue, 16 Aug 2011 21:36:53 +0000 (UTC) Received: from 2bithacker.net (nat-08-mht.dyndns.com [216.146.45.247]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: chip) by mail.2bithacker.net (Postfix) with ESMTPSA id A813EF01870; Tue, 16 Aug 2011 17:36:52 -0400 (EDT) Date: Tue, 16 Aug 2011 17:36:19 -0400 From: Chip Marshall To: Kevin Oberman Message-ID: <20110816213619.GD18638@2bithacker.net> Mail-Followup-To: chip@2bithacker.net, Kevin Oberman , freebsd-net@freebsd.org References: <20110812214309.GI72508@2bithacker.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="LTeJQqWS0MN7I/qa" Content-Disposition: inline In-Reply-To: X-OS: Mac OS X 10.6.8 i386 up 11 days User-Agent: Mutt/1.5.21 (2010-09-15) Cc: freebsd-net@freebsd.org Subject: Re: Odd TCP RFC1323 Behavior X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: chip@2bithacker.net List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Aug 2011 21:36:53 -0000 --LTeJQqWS0MN7I/qa Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 12-Aug-2011, Kevin Oberman sent: > Try installing security/openssh-portable from ports and enable > the HPN patches. >=20 > As it stands today, openssh locks the window size to a tiny > value. This causes performance over wide area links to be > simply terrible. >=20 > Take a look at http://fasterdata.es.net/fasterdata/say-no-to- > scp/ for more information on the issue. As you will see there, > window scaling is the least of the performance issues with > openssh. I've installed OpenSSH with the HPN patch on both the sender and receiver and repeated my tests, but it doesn't appear to be any better. As I understand it, if either side of the TCP connection declines to use RFC1323, the TCP receive window can't get any larger than 65K, which appears to be the limiting factor here. Before HPN: chip@test-client:~> scp test-server:~/testfile ./ testfile 100% 10MB 269.5KB/s 00:38 = =20 After HPN: chip@test-client:~> /usr/local/bin/scp test-server:~/testfile ./ testfile 100% 10MB 269.5KB/s 448.0KB/s 00:38 = =20 If I go in the other direction, I get better throughput. In this case, both sides are using RFC1323 window scaling: Before HPN: chip@test-server:~$ scp testfile test-client:~/ testfile 100% 10MB 409.6KB/s 800.0KB/s 00:25 = =20 After HPN: chip@test-server:~$ scp testfile test-client:~/ testfile 100% 10MB 445.2KB/s 576.0KB/s 00:23 = =20 --=20 Chip Marshall http://weblog.2bithacker.net/ KB1QYW PGP key ID 43C4819E v4sw5PUhw4/5ln5pr5FOPck4ma4u6FLOw5Xm5l5Ui2e4t4/5ARWb7HKOen6a2Xs5IMr2g6CM --LTeJQqWS0MN7I/qa Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) iEYEARECAAYFAk5K4tIACgkQnTUxIUPEgZ7WMgCZASLdGop8K3CA9rZv0dJugPLn nN4An1qv5TWjpm+BAUzmpE7EQFyDpYqb =+Rg/ -----END PGP SIGNATURE----- --LTeJQqWS0MN7I/qa--