Salut à tous.
Encore un grand merci pour votre support.
Polo, j'ai effectué le netstat, le voici: (J'ai rien vu de spécial)
tcp:
185103 packets sent
30819 data packets (21933027 bytes)
800 data packets (790622 bytes) retransmitted
1 resend initiated by MTU discovery
118177 ack-only packets (93 delayed)
0 URG only packets
0 window probe packets
24613 window update packets
10744 control packets
0 data packets sent after flow control
286736 packets received
37736 acks (for 21857179 bytes)
3928 duplicate acks
0 acks for unsent data
246816 packets (304922699 bytes) received in-sequence
274 completely duplicate packets (52241 bytes)
0 old duplicate packets
3 packets with some dup. data (1678 bytes duped)
5211 out-of-order packets (5542798 bytes)
0 packets (0 bytes) of data after window
0 window probes
515 window update packets
943 packets received after close
0 bad resets
0 discarded for bad checksums
0 discarded for bad header offset fields
0 discarded because packet too short
5538 connection requests
71 connection accepts
0 bad connection attempts
0 listen queue overflows
4986 connections established (including accepts)
5883 connections closed (including 474 drops)
181 connections updated cached RTT on close
181 connections updated cached RTT variance on close
25 connections updated cached ssthresh on close
190 embryonic connections dropped
36271 segments updated rtt (of 36240 attempts)
6139 retransmit timeouts
367 connections dropped by rexmit timeout
0 connections dropped after retransmitting FIN
0 persist timeouts
0 connections dropped by persist timeout
9 keepalive timeouts
0 keepalive probes sent
1 connection dropped by keepalive
1690 correct ACK header predictions
229975 correct data packet header predictions
222 SACK recovery episodes
359 segment rexmits in SACK recovery episodes
505315 byte rexmits in SACK recovery episodes
1373 SACK options (SACK blocks) received
2693 SACK options (SACK blocks) sent
0 SACK scoreboard overflow
udp:
91864 datagrams received
0 with incomplete header
0 with bad data length field
0 with bad checksum
702 dropped due to no socket
488 broadcast/multicast datagrams dropped due to no socket
0 dropped due to full socket buffers
0 not for hashed pcb
90674 delivered
77442 datagrams output
ip:
383296 total packets received
0 bad header checksums
0 with size smaller than minimum
0 with data size < data length
0 with ip length > max ip packet size
0 with header length < data size
0 with data length < header length
0 with bad options
0 with incorrect version number
0 fragments received
0 fragments dropped (dup or out of space)
0 fragments dropped after timeout
0 packets reassembled ok
377959 packets for this host
5337 packets for unknown/unsupported protocol
0 packets forwarded (0 packets fast forwarded)
0 packets not forwardable
0 packets received for unknown multicast group
0 redirects sent
266590 packets sent from this host
0 packets sent with fabricated ip header
0 output packets dropped due to no bufs, etc.
4 output packets discarded due to no route
0 output datagrams fragmented
0 fragments created
0 datagrams that can't be fragmented
0 tunneling packets that can't find gif
0 datagrams with bad address in header
0 packets dropped due to no bufs for control data
icmp:
702 calls to icmp_error
0 errors not generated 'cuz old message was icmp
Output histogram:
destination unreachable: 702
0 messages with bad code fields
0 messages < minimum length
0 bad checksums
0 messages with bad length
0 multicast echo requests ignored
0 multicast timestamp requests ignored
Input histogram:
echo reply: 44
destination unreachable: 5228
0 message responses generated
ICMP address mask responses are disabled
igmp:
124 messages received
0 messages received with too few bytes
0 messages received with wrong TTL
0 messages received with bad checksum
0 V1/V2 membership queries received
123 V3 membership queries received
0 membership queries received with invalid field(s)
121 general queries received
2 group queries received
0 group-source queries received
0 group-source queries dropped
0 membership reports received
0 membership reports received with invalid field(s)
0 membership reports received for groups to which we belong
0 V3 reports received without Router Alert
124 membership reports sent
ipsec:
0 inbound packets processed successfully
0 inbound packets violated process security policy
0 inbound packets with no SA available
0 invalid inbound packets
0 inbound packets failed due to insufficient memory
0 inbound packets failed getting SPI
0 inbound packets failed on AH replay check
0 inbound packets failed on ESP replay check
0 inbound packets considered authentic
0 inbound packets failed on authentication
0 outbound packets processed successfully
0 outbound packets violated process security policy
0 outbound packets with no SA available
0 invalid outbound packets
0 outbound packets failed due to insufficient memory
0 outbound packets with no route
ip6:
711 total packets received
0 with size smaller than minimum
0 with data size < data length
0 with bad options
0 with incorrect version number
0 fragments received
0 fragments dropped (dup or out of space)
0 fragments dropped after timeout
0 fragments that exceeded limit
0 packets reassembled ok
705 packets for this host
0 packets forwarded
0 packets not forwardable
0 redirects sent
379 packets sent from this host
0 packets sent with fabricated ip header
0 output packets dropped due to no bufs, etc.
0 output packets discarded due to no route
40 output datagrams fragmented
96 fragments created
0 datagrams that can't be fragmented
0 packets that violated scope rules
0 multicast packets which we don't join
Input histogram:
TCP: 30
UDP: 675
ICMP6: 4
Mbuf statistics:
35 one mbuf
two or more mbuf:
lo0= 327
349 one ext mbuf
0 two or more ext mbuf
0 packets whose headers are not continuous
0 tunneling packets that can't find gif
0 packets discarded due to too may headers
0 failures of source address selection
0 forward cache hit
0 forward cache miss
0 packets dropped due to no bufs for control data
icmp6:
0 calls to icmp_error
0 errors not generated because old message was icmp error or so
0 errors not generated because rate limitation
Output histogram:
neighbor solicitation: 5
neighbor advertisement: 5
MLDv2 listener report: 12
0 messages with bad code fields
0 messages < minimum length
0 bad checksums
0 messages with bad length
Input histogram:
neighbor advertisement: 4
Histogram of error messages to be generated:
0 no route
0 administratively prohibited
0 beyond scope
0 address unreachable
0 port unreachable
0 packet too big
0 time exceed transit
0 time exceed reassembly
0 erroneous header field
0 unrecognized next header
0 unrecognized option
0 redirect
0 unknown
0 message responses generated
0 messages with too many ND options
0 messages with bad ND options
0 bad neighbor solicitation messages
0 bad neighbor advertisement messages
0 bad router solicitation messages
0 bad router advertisement messages
0 bad redirect messages
0 path MTU changes
ipsec6:
0 inbound packets processed successfully
0 inbound packets violated process security policy
0 inbound packets with no SA available
0 invalid inbound packets
0 inbound packets failed due to insufficient memory
0 inbound packets failed getting SPI
0 inbound packets failed on AH replay check
0 inbound packets failed on ESP replay check
0 inbound packets considered authentic
0 inbound packets failed on authentication
0 outbound packets processed successfully
0 outbound packets violated process security policy
0 outbound packets with no SA available
0 invalid outbound packets
0 outbound packets failed due to insufficient memory
0 outbound packets with no route
rip6:
0 messages received
0 checksum calcurations on inbound
0 messages with bad checksum
0 messages dropped due to no socket
0 multicast messages dropped due to no socket
0 messages dropped due to full socket buffers
0 delivered
0 datagrams output
pfkey:
0 requests sent to userland
0 bytes sent to userland
0 messages with invalid length field
0 messages with invalid version field
0 messages with invalid message type field
0 messages too short
0 messages with memory allocation failure
0 messages with duplicate extension
0 messages with invalid extension type
0 messages with invalid sa type
0 messages with invalid address extension
0 requests sent from userland
0 bytes sent from userland
0 messages toward single socket
0 messages toward all sockets
0 messages toward registered sockets
0 messages with memory allocation failure
Je n'ai pas trouvé ton fameux "Half duplexe" est-tu certain que ce paramètre est encore présent sur OSX 10.8 ?
Je garde de côté ta commande pour diagnostiquer en même temps que le chargement, merci!
Quand à toi Leyry, tu es un gagnant.
J'y avais pas pensé, mais effectivement, pas de souci depuis le compte invité!!!
Exact, j'ai migré mon compte tel-quel... donc le problème est lié à mon compte.
Concernant les ressources CPU, je viens d'ouvrir 4-5 onglets, 5-15% d'utilisation, plutôt 5% la majeure partie du temps, pas de bloquage en haute conso. Les ventilateurs sont à la sièste.
Pour le transfert, c'est là que c'est louche, j'ai un fichier de 200mo sur un FTP, j'ouvre le lien.. il mouline, mouline, mouline, et démarre le téléchargement à 1mo/s sans souci.. donc c'est juste le chargement au départ qui est foireux!
Je me lance dans le mode développeur de Safari.
Ton mode réseau c'est sûrement "Chronologies" ---> "Demandes du réseau"
Je vais déjà envoyer ce message avant d'effectuer les tests, histoire de pas le perdre..
See ya!
---------- Nouveau message ajouté à 18h35 ---------- Le message précédent a été envoyé à 18h20 ----------
Voilà voilà, enfin une véritable preuve qui prouve que je ne suis pas fou
Chargement d'un site sur la session invité:
Chargement de Facebook sur ma session (celle qui foire sévère):
Et quand j'ai arrêté l'enregistrement après 44 secondes, le chargement était loin d'être terminé.
---------- Nouveau message ajouté à 18h54 ---------- Le message précédent a été envoyé à 18h35 ----------
Et pour finir, voici le résultat de la commande de Polo:
"sudo tcpdump -i en0 -c 20 host 94.103.134.62"
Lorsque le site Macgeneration.com mets environ 30 secondes pour charger:
(J'ai fait plusieurs tentatives de chargement et d'exécution de la requête, avant et pendant le chargement)
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on en0, link-type EN10MB (Ethernet), capture size 65535 bytes
18:50:57.490376 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags
, seq 675264003, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 103546494 ecr 0,sackOK,eol], length 0
18:50:57.529120 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [S.], seq 2890888469, ack 675264004, win 2920, options [mss 1460,nop,nop,sackOK,nop,wscale 1], length 0
18:50:57.529227 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [.], ack 1, win 16384, length 0
18:50:57.534384 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [P.], seq 1:838, ack 1, win 16384, length 837
18:50:57.573630 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], ack 838, win 2297, length 0
18:50:57.719223 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 1:1461, ack 838, win 2297, length 1460
18:50:57.719918 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 1461:2921, ack 838, win 2297, length 1460
18:50:57.720091 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [.], ack 2921, win 16201, length 0
18:50:57.720823 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 2921:4381, ack 838, win 2297, length 1460
18:50:57.759169 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 4381:5841, ack 838, win 2297, length 1460
18:50:57.759331 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [.], ack 5841, win 16019, length 0
18:50:57.760064 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 5841:7301, ack 838, win 2297, length 1460
18:50:57.761060 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 7301:8761, ack 838, win 2297, length 1460
18:50:57.761160 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [.], ack 8761, win 15836, length 0
18:50:57.798544 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 8761:10221, ack 838, win 2297, length 1460
18:50:57.799226 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 10221:11681, ack 838, win 2297, length 1460
18:50:57.799526 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [.], ack 11681, win 15654, length 0
18:50:57.799821 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [.], seq 11681:13141, ack 838, win 2297, length 1460
18:50:57.800196 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56706: Flags [P.], seq 13141:14167, ack 838, win 2297, length 1026
18:50:57.800373 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [.], ack 14167, win 15498, length 0
20 packets captured
217 packets received by filter
0 packets dropped by kernel
-----
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on en0, link-type EN10MB (Ethernet), capture size 65535 bytes
18:51:33.134404 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 675264841, ack 2890902637, win 16384, length 0
18:51:33.134703 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 1157823016, ack 2540769693, win 16384, length 0
18:51:33.462425 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:33.462467 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:33.863674 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:33.863733 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:34.365553 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:34.465781 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:35.167443 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:35.367873 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:36.571482 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:36.971829 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:38.173441 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:39.077262 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:40.193974 IP 192.168.1.47.56733 > lb1-e1-2.netsample.com.http: Flags , seq 4186926830, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 103588921 ecr 0,sackOK,eol], length 0
18:51:40.232284 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56733: Flags [S.], seq 3543186316, ack 4186926831, win 2920, options [mss 1460,nop,nop,sackOK,nop,wscale 1], length 0
18:51:40.232399 IP 192.168.1.47.56733 > lb1-e1-2.netsample.com.http: Flags [.], ack 1, win 16384, length 0
18:51:40.239365 IP 192.168.1.47.56733 > lb1-e1-2.netsample.com.http: Flags [P.], seq 1:838, ack 1, win 16384, length 837
18:51:40.278611 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56733: Flags [.], ack 838, win 2297, length 0
18:51:40.545617 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56733: Flags [.], seq 1:1461, ack 838, win 2297, length 1460
20 packets captured
650 packets received by filter
0 packets dropped by kernel
-----
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on en0, link-type EN10MB (Ethernet), capture size 65535 bytes
18:51:49.808998 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 1157823016, ack 2540769693, win 16384, length 0
18:51:51.113096 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 675264841, ack 2890902637, win 16384, length 0
18:51:52.717470 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:55.124858 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:55.283958 IP 192.168.1.47.56733 > lb1-e1-2.netsample.com.http: Flags [F.], seq 4186927668, ack 3543200484, win 16384, length 0
18:51:55.284851 IP 192.168.1.47.56744 > lb1-e1-2.netsample.com.http: Flags , seq 590910806, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 103603863 ecr 0,sackOK,eol], length 0
18:51:55.321846 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56733: Flags [.], ack 1, win 2297, length 0
18:51:55.323130 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56744: Flags [S.], seq 3788612145, ack 590910807, win 2920, options [mss 1460,nop,nop,sackOK,nop,wscale 1], length 0
18:51:55.323232 IP 192.168.1.47.56744 > lb1-e1-2.netsample.com.http: Flags [.], ack 1, win 16384, length 0
18:51:55.324548 IP 192.168.1.47.56744 > lb1-e1-2.netsample.com.http: Flags [P.], seq 1:919, ack 1, win 16384, length 918
18:51:55.363953 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56744: Flags [.], ack 919, win 2324, length 0
18:51:55.372100 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56744: Flags [P.], seq 1:1427, ack 919, win 2324, length 1426
18:51:55.372204 IP 192.168.1.47.56744 > lb1-e1-2.netsample.com.http: Flags [.], ack 1427, win 16294, length 0
18:51:55.627042 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:51:58.963433 IP 192.168.1.47.56676 > lb1-e1-2.netsample.com.http: Flags [R.], seq 1, ack 1, win 16384, length 0
18:51:59.163889 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:52:00.372526 IP lb1-e1-2.netsample.com.http > 192.168.1.47.56744: Flags [F.], seq 1427, ack 919, win 2324, length 0
18:52:00.372707 IP 192.168.1.47.56744 > lb1-e1-2.netsample.com.http: Flags [.], ack 1428, win 16384, length 0
18:52:03.187866 IP 192.168.1.47.56706 > lb1-e1-2.netsample.com.http: Flags [F.], seq 0, ack 1, win 16384, length 0
18:52:04.802803 IP 192.168.1.47.56744 > lb1-e1-2.netsample.com.http: Flags [F.], seq 919, ack 1428, win 16384, length 0
20 packets captured
403 packets received by filter
0 packets dropped by kernel