Hi,

trying to debug something I thought was due to some buggy package I wrote a python program to help me find the culprit that uses bts api.

status = bts.get_status(bug_id)[0]

No problem. Rock solid compared to the constant E: HTTP GET failed I get from apt-listbugs.

I don't think it is something related to some ruby packages recently updated because I've machines that run older versions that still experience the problem.

If I had to put my money on something I'd say fastly don't like how ruby-httpclient make the request (looks like a pretty old library) but like python more (python3-httplib2, python3-pycurl).

this is apt-listbugs on http/80 when it fails

13:17:19.153446 enp2s0 Out IP XXX.49176 > 151.101.2.132.http: Flags [S], seq 3148029402, win 64240, options [mss 1460,sackOK,TS val 3396528468 ecr 0,nop,wscale 10], length 0 13:17:19.158963 enp2s0 In IP 151.101.2.132.http > XXX.49176: Flags [S.], seq 1398688828, ack 3148029403, win 65535, options [mss 1392,sackOK,TS val 1515822691 ecr 3396528468,nop,wscale 9], length 0 13:17:19.159035 enp2s0 Out IP XXX.49176 > 151.101.2.132.http: Flags [.], ack 1, win 63, options [nop,nop,TS val 3396528473 ecr 1515822691], length 0 13:17:19.159968 enp2s0 Out IP XXX.49176 > 151.101.2.132.http: Flags [P.], seq 1:1275, ack 1, win 63, options [nop,nop,TS val 3396528474 ecr 1515822691], length 1274: HTTP: POST /cgi-bin/soap.cgi HTTP/1.1 13:17:19.165200 enp2s0 In IP 151.101.2.132.http > XXX.49176: Flags [.], ack 1275, win 275, options [nop,nop,TS val 1515822697 ecr 3396528474], length 0 13:17:19.165201 enp2s0 In IP 151.101.2.132.http > XXX.49176: Flags [P.], seq 1:335, ack 1275, win 275, options [nop,nop,TS val 1515822697 ecr 3396528474], length 334: HTTP: HTTP/1.1 301 Moved Permanently 13:17:19.165201 enp2s0 In IP 151.101.2.132.http > XXX.49176: Flags [F.], seq 335, ack 1275, win 275, options [nop,nop,TS val 1515822697 ecr 3396528474], length 0 13:17:19.165261 enp2s0 Out IP XXX.49176 > 151.101.2.132.http: Flags [.], ack 335, win 63, options [nop,nop,TS val 3396528480 ecr 1515822697], length 0 13:17:19.165568 enp2s0 Out IP XXX.49176 > 151.101.2.132.http: Flags [F.], seq 1275, ack 336, win 63, options [nop,nop,TS val 3396528480 ecr 1515822697], length 0 13:17:19.169754 enp2s0 In IP 151.101.2.132.http > XXX.49176: Flags [.], ack 1276, win 275, options [nop,nop,TS val 1515822702 ecr 3396528480], length 0

--
Ivan Sergio Borgonovo
https://www.webthatworks.it https://www.borgonovo.net

Reply via email to