Dear All

Some time ago, I stood up a Linux Mint VM on my windows box in which to run flent. Flent showed (of course) that I had the usual bloat.

Since then, I have replaced my router with an Ubiquiti ER-4 so I could shape traffic with CAKE, getting unadulterated traffic from my VDSL modem  via IP passthrough.

I have pre-CAKE flent data using this router. But I can’t get data after starting CAKE.

 

The issue is that I am getting “No valid Data” from flent.

 

The flent log is unhelpful:

Program exited non-zero

Command produced no valid data

 

The command line output is a more helpful:

 

Starting rrul test. Expected run time: 70 seconds.

WARNING: Program exited non-zero.

Runner class: NetperfDemoRunner

Command: /usr/local/bin/netperf -P 0 -v 0 -D -0.20 -4 -Y EF,EF -H 23.226.232.80 -p 12865 -t UDP_RR -l 70 -F /dev/urandom    --   -H 23.226.232.80 -k THROUGHPUT,LOCAL_CONG_CONTROL,REMOTE_CONG_CONTROL,TRANSPORT_MSS,LOCAL_TRANSPORT_RETRANS,REMOTE_TRANSPORT_RETRANS,LOCAL_SOCKET_TOS,REMOTE_SOCKET_TOS,DIRECTION,ELAPSED_TIME,PROTOCOL,LOCAL_SEND_SIZE,LOCAL_RECV_SIZE,REMOTE_SEND_SIZE,REMOTE_RECV_SIZE 

Return code: 255

Stdout: establish control: are you sure there is a netserver listening on 23.226.232.80 at port 12865?

Establish control could not establish the control connection from 0.0.0.0 port 0 address family AF_INET to 23.226.232.80 port 12865 address family AF_INET

 

I don’t know how to decipher the above failure. However, I presumed an error on my side: a misconfigured firewall or port forwarding rule on the router. But I can’t find one.

 

A tcpdump of traffic to and from the VM (below) seems to show (to my inexperienced eye) that some traffic on port 12865 is reaching the VM. But I can’t tell what traffic is being blocked that would cause flent to think that there is no netserver listening.

 

Any help would be very much appreciated!

with thanks,

Jeremy

 

12:15:25.386575 IP (tos 0x0, ttl 64, id 54256, offset 0, flags [DF], proto UDP (17), length 53)

    192.168.2.65.41767 > 23.226.232.80.2112: [udp sum ok] UDP, length 25

12:15:25.426547 IP (tos 0x0, ttl 50, id 45575, offset 0, flags [none], proto ICMP (1), length 81)

    23.226.232.80 > 192.168.2.65: ICMP host 23.226.232.80 unreachable - admin prohibited, length 61

        IP (tos 0x0, ttl 55, id 54256, offset 0, flags [DF], proto UDP (17), length 53)

    192.168.2.65.41767 > 23.226.232.80.2112: [udp sum ok] UDP, length 25

12:15:25.437722 IP (tos 0x0, ttl 64, id 54260, offset 0, flags [DF], proto UDP (17), length 53)

    192.168.2.65.59586 > 23.226.232.80.2112: [udp sum ok] UDP, length 25

12:15:25.477526 IP (tos 0x0, ttl 50, id 45623, offset 0, flags [none], proto ICMP (1), length 81)

    23.226.232.80 > 192.168.2.65: ICMP host 23.226.232.80 unreachable - admin prohibited, length 61

        IP (tos 0x0, ttl 55, id 54260, offset 0, flags [DF], proto UDP (17), length 53)

    192.168.2.65.59586 > 23.226.232.80.2112: [udp sum ok] UDP, length 25

12:15:25.490388 IP (tos 0x0, ttl 64, id 54262, offset 0, flags [DF], proto UDP (17), length 53)

    192.168.2.65.52274 > 23.226.232.80.2112: [udp sum ok] UDP, length 25

12:15:25.530584 IP (tos 0x0, ttl 50, id 45625, offset 0, flags [none], proto ICMP (1), length 81)

    23.226.232.80 > 192.168.2.65: ICMP host 23.226.232.80 unreachable - admin prohibited, length 61

        IP (tos 0x0, ttl 55, id 54262, offset 0, flags [DF], proto UDP (17), length 53)

    192.168.2.65.52274 > 23.226.232.80.2112: [udp sum ok] UDP, length 25

12:15:25.594950 IP (tos 0x0, ttl 64, id 29001, offset 0, flags [DF], proto TCP (6), length 60)

    192.168.2.65.39911 > 23.226.232.80.12865: Flags [S], cksum 0x2881 (correct), seq 2174008342, win 64240, options [mss 1460,sackOK,TS val 2289290538 ecr 0,nop,wscale 7], length 0

12:15:25.597800 IP (tos 0x0, ttl 64, id 42262, offset 0, flags [DF], proto TCP (6), length 60)

    192.168.2.65.38041 > 23.226.232.80.12865: Flags [S], cksum 0x9c79 (correct), seq 4261008130, win 64240, options [mss 1460,sackOK,TS val 2289290542 ecr 0,nop,wscale 7], length 0

12:15:25.603039 IP (tos 0x0, ttl 64, id 63809, offset 0, flags [DF], proto TCP (6), length 60)

    192.168.2.65.41435 > 23.226.232.80.12865: Flags [S], cksum 0xab85 (correct), seq 4038902764, win 64240, options [mss 1460,sackOK,TS val 2289290547 ecr 0,nop,wscale 7], length 0

12:15:25.609710 IP (tos 0x0, ttl 64, id 27989, offset 0, flags [DF], proto ICMP (1), length 84)

    192.168.2.65 > 23.226.232.80: ICMP echo request, id 10612, seq 0, length 64

12:15:25.634196 IP (tos 0x0, ttl 50, id 15238, offset 0, flags [DF], proto TCP (6), length 40)

    23.226.232.80.12865 > 192.168.2.65.39911: Flags [R.], cksum 0xe0df (correct), seq 0, ack 2174008343, win 0, length 0

12:15:25.637456 IP (tos 0x0, ttl 50, id 15239, offset 0, flags [DF], proto TCP (6), length 40)

    23.226.232.80.12865 > 192.168.2.65.38041: Flags [R.], cksum 0x54dc (correct), seq 0, ack 4261008131, win 0, length 0

12:15:25.643244 IP (tos 0x0, ttl 50, id 15242, offset 0, flags [DF], proto TCP (6), length 40)

    23.226.232.80.12865 > 192.168.2.65.41435: Flags [R.], cksum 0x63ed (correct), seq 0, ack 4038902765, win 0, length 0

12:15:25.649427 IP (tos 0x0, ttl 50, id 45641, offset 0, flags [none], proto ICMP (1), length 84)

    23.226.232.80 > 192.168.2.65: ICMP echo reply, id 10612, seq 0, length 64

12:15:25.809981 IP (tos 0x0, ttl 64, id 28037, offset 0, flags [DF], proto ICMP (1), length 84)

    192.168.2.65 > 23.226.232.80: ICMP echo request, id 10612, seq 1, length 64

12:15:25.849400 IP (tos 0x0, ttl 50, id 45656, offset 0, flags [none], proto ICMP (1), length 84)

    23.226.232.80 > 192.168.2.65: ICMP echo reply, id 10612, seq 1, length 64

12:15:26.010268 IP (tos 0x0, ttl 64, id 28060, offset 0, flags [DF], proto ICMP (1), length 84)

    192.168.2.65 > 23.226.232.80: ICMP echo request, id 10612, seq 2, length 64

12:15:26.049420 IP (tos 0x0, ttl 50, id 45715, offset 0, flags [none], proto ICMP (1), length 84)

    23.226.232.80 > 192.168.2.65: ICMP echo reply, id 10612, seq 2, length 64

12:15:26.210592 IP (tos 0x0, ttl 64, id 28110, offset 0, flags [DF], proto ICMP (1), length 84)

    192.168.2.65 > 23.226.232.80: ICMP echo request, id 10612, seq 3, length 64

12:15:26.249923 IP (tos 0x0, ttl 50, id 45830, offset 0, flags [none], proto ICMP (1), length 84)

    23.226.232.80 > 192.168.2.65: ICMP echo reply, id 10612, seq 3, length 64