2025-04-30 09:11:31,846 Generated random file: nbpiodaffz of size: 10240 2025-04-30 09:11:31,846 Requests: https://server4:443/nbpiodaffz 2025-04-30 09:11:31,913 2025-04-30 09:11:31,913 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_zdv4mnmd/ TESTCASE_SERVER=retry TESTCASE_CLIENT=retry WWW=/tmp/www_gpyb1kfj/ DOWNLOADS=/tmp/download_ty563et5/ SERVER_LOGS=/tmp/logs_server_41xuv1lb CLIENT_LOGS=/tmp/logs_client_tvv0omhj SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=aiortc/aioquic-qns:latest REQUESTS="https://server4:443/nbpiodaffz" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-04-30 09:11:46,111 Container sim Created Container client Recreate Container server Recreate Container server Recreated Container client Recreated Attaching to client, server, sim sim | waiting 10s for server:443 client | Setting up routes... server | Setting up routes... server | Actual changes: server | tx-checksumming: off server | tx-checksum-ip-generic: off server | tx-checksum-sctp: off server | tcp-segmentation-offload: off server | tx-tcp-segmentation: off [requested on] server | tx-tcp-ecn-segmentation: off [requested on] server | tx-tcp-mangleid-segmentation: off [requested on] client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off server | tx-tcp6-segmentation: off [requested on] server | tx-udp-segmentation: off [requested on] client | Endpoint's IPv4 address is 193.167.0.100 server | Endpoint's IPv4 address is 193.167.100.100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 server | Starting server client | Certificate was added to keystore client | wait-for-it.sh: waiting 30 seconds for sim:57832 sim | server:443 is available after 1.003728187s sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes sim | tcpdump: listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 11:34.203 Creating connection with server4:443 with v1 client | 11:34.300 Original destination connection id: 7261f34e1195e85c (scid: d00226166d3db480) client | >- CryptoStream[I|ClientHello] client | 11:34.467 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) client | 11:34.507 <- (1) Packet I|-|R|295| Retry Token (256): 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 client | 11:34.537 -> Packet I|1|L|1201|2 Token=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 CryptoFrame[0,257] Padding(640) client | 11:34.574 <- (2) Packet I|0|L|177|2 Token=[] AckFrame[1|?2] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 11:34.610 -> Packet I|2|L|1202|2 Token=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 AckFrame[0|?0] Padding(897) client | 11:34.574 <- (2) Packet H|1|L|775|1 CryptoFrame[0,728] client | >- CryptoStream[H|Finished] client | 11:34.646 -> Packet H|0|L|80|1 CryptoFrame[0,36] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 11:34.650 -> Packet H|1|L|46|1 AckFrame[1|?0] client | 11:34.574 <- (2) Packet A|2|S0|d00226166d3db480|248|2 CryptoFrame[0,89] Padding(128) client | -< CryptoStream[A|NewSessionTicket] client | 11:34.657 -> Packet A|0|S0|b363dca2d7e80687|47|1 StreamFrame[0(CIB),0,17,fin] client | 11:34.679 -> Packet A|1|S0|b363dca2d7e80687|32|1 AckFrame[2|?19] client | 11:34.679 <- (3) Packet A|3|S0|d00226166d3db480|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|afcf0d18dbd8d584|e9ca634f7e42b7a356711fae88538a5a] client | 11:34.694 <- (4) Packet A|4|S0|d00226166d3db480|33|1 AckFrame[0|?5] client | 11:34.700 <- (5) Packet A|5|S0|d00226166d3db480|1200|1 StreamFrame[0(CIB),0,1169] client | 11:34.701 <- (6) Packet A|6|S0|d00226166d3db480|1200|1 StreamFrame[0(CIB),1169,1167] client | 11:34.702 <- (7) Packet A|7|S0|d00226166d3db480|1200|1 StreamFrame[0(CIB),2336,1167] client | 11:34.703 -> Packet A|2|S0|b363dca2d7e80687|32|1 AckFrame[5-2|?17] client | 11:34.706 -> Packet A|3|S0|b363dca2d7e80687|32|1 AckFrame[7-2|?2] client | 11:34.708 <- (8) Packet A|8|S0|d00226166d3db480|1200|1 StreamFrame[0(CIB),3503,1167] client | 11:34.708 <- (9) Packet A|9|S0|d00226166d3db480|1200|1 StreamFrame[0(CIB),4670,1167] client | 11:34.711 <- (10) Packet A|10|S0|d00226166d3db480|1200|1 StreamFrame[0(CIB),5837,1167] client | 11:34.711 -> Packet A|4|S0|b363dca2d7e80687|32|1 AckFrame[9-2|?2] client | 11:34.720 <- (11) Packet A|11|S0|d00226166d3db480|1200|1 StreamFrame[0(CIB),7004,1167] client | 11:34.721 <- (12) Packet A|12|S0|d00226166d3db480|1200|1 StreamFrame[0(CIB),8171,1167] client | 11:34.722 -> Packet A|5|S0|b363dca2d7e80687|32|1 AckFrame[12-2|?9] client | 11:34.727 <- (13) Packet A|13|S0|d00226166d3db480|935|1 StreamFrame[0(CIB),9338,902,fin] client | Get requested finished in 0.43 sec (0.02 MB/s) : tech.kwik.h09.client.HttpResponseImpl@2ddc8ecb client | 11:34.742 Closing ClientConnection[7261f34e1195e85c/d00226166d3db480(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 11:34.745 -> Packet A|6|S0|b363dca2d7e80687|36|2 ConnectionCloseFrame[0|0|] AckFrame[13-2|?16] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container client Stopping Container server Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-04-30 09:11:46,210 Using the server's key log file. 2025-04-30 09:11:46,220 2025-04-30 09:11:46,220 Using the server's key log file. 2025-04-30 09:11:46,221 Using the server's key log file. 2025-04-30 09:11:46,229 2025-04-30 09:11:46,230 Using the server's key log file. 2025-04-30 09:11:46,833 Check of downloaded files succeeded. 2025-04-30 09:11:47,461 Check of Retry succeeded. Token used: 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