On Fri 15. Apr 2022 at 10:49, Greg Troxel <g...@lexort.com> wrote:

>
> Malte Dehling <mdehl...@gmail.com> writes:
>
> > On Fri 15. Apr 2022 at 10:12, Greg Troxel <g...@lexort.com> wrote
> > offlist which was then later copied to the list:
> >
> >> Malte Dehling <mdehl...@gmail.com> writes:
> >>
> >> > I have been trying to access the NetBSD archives at
> >> > https://archive.netbsd.org/ but keep getting an error 503 - first
> byte
> >> > timeout.  Is that server currently unavailable?  Anywhere else I
> might be
> >> > able to download older NetBSD install media?
> >>
> >> also works for me, northeast US
> >
> > Allright, so I got what I needed by going through a VPN.  That doesn’t
> > solve the issue, though.  I’m not sure who needs to see this to get the
> > server fixed?
>
> Well, for starters you need to provide a lot more information.
>
> Then, you or others could begin to speculate about where the problem is.
> Asserting that the server is broken is quite a leap, even though it
> certainly could be.


Not much of a leap considering 503 is a server error.  The message seems to
indicate a timeout in the connection from the CDN to the regional server.

So:
>
>   What country are you in?


I mentioned that: southern california.

  In what IPv4 prefix is your v4 address?


public IP is 76.88.x.x

  Same for v6.
>
>   Is this problem with v4, v6, both?


I’m not using ipv6.


>
>   When you do "dig archive.netbsd.org in a" (and aaaa) what address do
>   you get?


# dig archive.netbsd.org in a

; <<>> DiG 9.16.20 <<>> archive.netbsd.org in a
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30279
;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1


;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;archive.netbsd.org.            IN      A

;; ANSWER SECTION:
archive.netbsd.org.     1603    IN      CNAME
dualstack.o.ssl.global.fastly.net.
dualstack.o.ssl.global.fastly.net. 30 IN A      151.101.1.6

dualstack.o.ssl.global.fastly.net. 30 IN A      151.101.65.6

dualstack.o.ssl.global.fastly.net. 30 IN A      151.101.129.6

dualstack.o.ssl.global.fastly.net. 30 IN A      151.101.193.6



;; Query time: 22 msec

;; SERVER: 192.168.86.1#53(192.168.86.1)

;; WHEN: Fri Apr 15 10:51:50 PDT 2022

;; MSG SIZE  rcvd: 158


>
>   What happens when you traceroute/traceroute6 to those addresses?


# traceroute archive.netbsd.org
traceroute: archive.netbsd.org has multiple addresses; using 151.101.1.6

traceroute to dualstack.o.ssl.global.fastly.net (151.101.1.6), 64 hops max,
40 byte packets
 1  192.168.86.1 (192.168.86.1)  7.428 ms  2.339 ms  4.639 ms

 2  142-254-184-149.inf.spectrum.com (142.254.184.149)  13.814 ms  6.607 ms
 9.953 ms
 3  lag-63.sndhcaht01h.netops.charter.com (76.167.26.105)  23.129 ms
 30.346 ms  32.246 ms
 4  lag-21.sndhcaax01r.netops.charter.com (72.129.1.54)  14.918 ms  17.794
ms  16.223 ms
 5  lag-22.lsancarc01r.netops.charter.com (72.129.1.0)  17.757 ms  16.020
ms  14.493 ms
 6  lag-46.lsancarc0yw-bcr00.netops.charter.com (209.18.43.62)  16.508 ms

    lag-16.lsancarc0yw-bcr00.netops.charter.com (66.109.6.102)  16.794 ms

    lag-36.lsancarc0yw-bcr00.netops.charter.com (66.109.6.92)  17.578 ms

 7  lag-0.pr2.lax00.netops.charter.com (66.109.5.123)  17.404 ms  19.137 ms

    lag-800.pr2.lax00.netops.charter.com (66.109.7.225)  22.625 ms

 8  * * *

  When you run tcpdump to watch a connection attempt, what do you see?


# tcpdump tcp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode

listening on genet0, link-type EN10MB (Ethernet), capture size 262144 bytes

11:05:38.645434 IP 192.168.86.2.65531 > 151.101.1.6.http: Flags [S], seq
2059843661, win 32768, options [mss 1460,nop,wscale 3,sackOK,TS val 1 ecr
0], length 0
11:05:38.661713 IP 151.101.1.6.http > 192.168.86.2.65531: Flags [S.], seq
763067123, ack 2059843662, win 65535, options [mss 1460,sackOK,TS val
457835305 ecr 1,nop,wscale 9], length 0

11:05:38.661757 IP 192.168.86.2.65531 > 151.101.1.6.http: Flags [.], ack 1,
win 4197, options [nop,nop,TS val 1 ecr 457835305], length 0
11:05:38.661860 IP 192.168.86.2.65531 > 151.101.1.6.http: Flags [P.], seq
1:27, ack 1, win 4197, options [nop,nop,TS val 1 ecr 457835305], length 26:
HTTP: GET /index.html HTTP/1.1

11:05:38.685981 IP 151.101.1.6.http > 192.168.86.2.65531: Flags [.], ack
27, win 283, options [nop,nop,TS val 457835329 ecr 1], length 0
11:05:38.686058 IP 192.168.86.2.65531 > 151.101.1.6.http: Flags [P.], seq
27:120, ack 1, win 4197, options [nop,nop,TS val 1 ecr 457835329], length
93: HTTP
11:05:38.701592 IP 151.101.1.6.http > 192.168.86.2.65531: Flags [.], ack
120, win 283, options [nop,nop,TS val 457835345 ecr 1], length 0
11:05:54.454763 IP 151.101.1.6.http > 192.168.86.2.65531: Flags [P.], seq
1:339, ack 120, win 283, options [nop,nop,TS val 457851097 ecr 1], length
338: HTTP: HTTP/1.1 503 first byte timeout

11:05:54.454777 IP 151.101.1.6.http > 192.168.86.2.65531: Flags [P.], seq
339:794, ack 120, win 283, options [nop,nop,TS val 457851097 ecr 1], length
455: HTTP
11:05:54.454781 IP 151.101.1.6.http > 192.168.86.2.65531: Flags [F.], seq
794, ack 120, win 283, options [nop,nop,TS val 457851097 ecr 1], length 0
11:05:54.454834 IP 192.168.86.2.65531 > 151.101.1.6.http: Flags [.], ack
794, win 4098, options [nop,nop,TS val 33 ecr 457851097], length 0
11:05:54.454858 IP 192.168.86.2.65531 > 151.101.1.6.http: Flags [.], ack
795, win 4098, options [nop,nop,TS val 33 ecr 457851097], length 0
11:05:54.456161 IP 192.168.86.2.65531 > 151.101.1.6.http: Flags [F.], seq
120, ack 795, win 4197, options [nop,nop,TS val 33 ecr 457851097], length 0
11:05:54.476748 IP 151.101.1.6.http > 192.168.86.2.65531: Flags [.], ack
121, win 283, options [nop,nop,TS val 457851121 ecr 33], length 0

Reply via email to