Re: [tcpm] Initial CWND

Hagen Paul Pfeifer <hagen@jauu.net> Sat, 21 March 2015 11:44 UTC

Return-Path: <hagen@jauu.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81A201A924B for <tcpm@ietfa.amsl.com>; Sat, 21 Mar 2015 04:44:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.978
X-Spam-Level:
X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id stZ5d30J-dfQ for <tcpm@ietfa.amsl.com>; Sat, 21 Mar 2015 04:44:51 -0700 (PDT)
Received: from mail-la0-f48.google.com (mail-la0-f48.google.com [209.85.215.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59CBD1A9251 for <tcpm@ietf.org>; Sat, 21 Mar 2015 04:44:51 -0700 (PDT)
Received: by lagg8 with SMTP id g8so104309167lag.1 for <tcpm@ietf.org>; Sat, 21 Mar 2015 04:44:49 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=1NXipRbp6HFM0bfqLasMwmjEM8r6slxZWyj9EcTaXbc=; b=aP+UA7j0wsih9M9mtre2gcj9Dmff/QHsybY+LH7rwYEX8pNgcXhkazKlX9o0Wxc9W2 Ci3/LUZdapLnsy7UQdc03rXShDUIOg7yW0d05GQnsDWHRTNvNJRtwxGJhHUk68RhstEM imVdwyASCAkV+nwcUsTBfz2Al33UlRVkxlfAy69oVYqGE3tKW9+cLKI2oUp8/knBDipw KHcX/EkJzZivhixc+43Url+FPN7Vkm8fFnwkQ/hKfcUd/iWuOuwBlXzM3o/S5ESSWqWP nwt5Ub+b4PY+Riq7gb/ORbAjJR12D/7/yuXLyEWW97XPI2y5Qw0vCwiIenD+Sbb/Il7S 9+aA==
X-Gm-Message-State: ALoCoQlsx3YAZY/8hxQ9WzuIr58ZTkkDMX9dwhRlqHe+8auD2Q1D4RL9imqH/vQquKQEKaGQzI3C
MIME-Version: 1.0
X-Received: by 10.112.63.165 with SMTP id h5mr75140099lbs.16.1426938289378; Sat, 21 Mar 2015 04:44:49 -0700 (PDT)
Received: by 10.25.24.164 with HTTP; Sat, 21 Mar 2015 04:44:49 -0700 (PDT)
In-Reply-To: <C460E937-02F4-4EDF-8DB7-18F6DD1C73DD@ifi.uio.no>
References: <81564C0D7D4D2A4B9A86C8C7404A13DA320C6182@ESESSMB205.ericsson.se> <C460E937-02F4-4EDF-8DB7-18F6DD1C73DD@ifi.uio.no>
Date: Sat, 21 Mar 2015 12:44:49 +0100
Message-ID: <CAPh34mfpJYEPqmisMgXK0ero9PtLFg5XmBp_Rj3dP+4=coY_-w@mail.gmail.com>
From: Hagen Paul Pfeifer <hagen@jauu.net>
To: Michael Welzl <michawe@ifi.uio.no>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/tcpm/0rvHwj0_JAQR4pXai8LEqjtwmS8>
Cc: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, "tcpm@ietf.org" <tcpm@ietf.org>
Subject: Re: [tcpm] Initial CWND
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Mar 2015 11:44:53 -0000

On 17 March 2015 at 12:44, Michael Welzl <michawe@ifi.uio.no> wrote:

> If you want to repeat the test, this was pretty easy to do. Here's what I did:
> - get a web page, watch wireshark, find a URL of an object (image or something) that's larger than 10 packets
> - do the following with help of scapy  ( http://www.secdev.org/projects/scapy/ ):
>   * send a TCP SYN, respond to the SYN/ACK with a correct ACK
>   * disable all outgoing ACKs with the firewall
>   * send a HTTP GET to the address of the large object with scapy
>   * watch how many packets come back, in wireshark

This could and should be less complicated if you want to do this on a
large basis:

- "Spider" over a list of websites and grab at least a MSS * 10 byte
object (probably more because some CDN violates IW10 and IW15 and
more).
- Capture all data in a pcap file
- Analyse the file and check for IW, using a python script:
   - Separate on a per TCP connection basis
   - Ignore TWH and HTTP GET request, count first burst

hgn