-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tempesta TLS generates non optimal TCP segments #1325
Comments
Please address comment in Also check this behaviour against TLS tickets, #1430 |
tempesta-tech/tempesta#1325 : the test originally didn't consider the TLS handshake overhead.
There is actually not problem: the first segment is TCP SYN-ACK, the 2nd and 3rd segments from Tempesta TLS are the handshake messages. I fixed the test in tempesta-tech/tempesta-test@2a13877 |
If you run the TLS test with debug mode at least 2 (default is 3) (note that I disabled the test in the suite, so fix
tests_disabled.json
before trying), then you see output with sizes of TCP segments sent by deproxy server to Tempesta FW and Tempesta TLS to the deproxy client:
It's possible that in some circumstances TCP stack generate non optimal skbs for transmission, but this test case is run with no load and should show reasonable TCP segment sizes.
Probably linked with extra skb fragmentation #1103. Note that 9f83f10 lightly reduces skb fragmentation.
The text was updated successfully, but these errors were encountered: