Hello Paul and Danijel,
The CopyCat / RTC transport certainly does make a multitude of RTC requests in a rather short period of time, as there is a request for starting the transaction, another for preparing each query, another for executing each query, another for committing, etc. And since there are a good number of queries that need to be executed, there are many -- small -- requests, so perhaps that could be an explanation.
Paul, if I understand correctly, the firewall is letting the connection through, but only for 1 minute, and then it cuts it off because it thinks it's a flood attack, is that right? So it's not just a matter of opening the port... In that case, what did they deactivate in order to make it work?
So, if I understand correctly, maybe the RTC delayed calls could be the answer. But what does it do exactly? How can you group up requests, since we need the responses to each request in order to make the following ones (CopyCat replicates with a very synchronous logic, not asynchronously with multiple threads)?
Failing that, it looks to me like a Firewall configuration problem : isn't there some way to tell the server to allow requests coming from that client's IP address? Or set up a VPN? Because CopyCat does inevitably perform a great number of HTTP requests, and I don't see what could slow them down other than deliberately reducing the bandwidth...
Regards,
Jonathan Neve.