2025/09/12 03:03:04 Requesting https://server4:443/hotyqznmwv. 2025/09/12 03:03:04 Increased receive buffer size to 14336 kiB 2025/09/12 03:03:04 Increased send buffer size to 14336 kiB 2025/09/12 03:03:04 Setting DF for IPv4 and IPv6. 2025/09/12 03:03:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:03:04 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:03:04 Created qlog file: /logs/qlog/70f850ad842975389069dc.sqlog 2025/09/12 03:03:04 client Starting new connection to server4 ([::]:37719 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 70f850ad842975389069dc, version v1 2025/09/12 03:03:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:03:04 client -> Sending packet 0 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:04 client Long Header{Type: Initial, DestConnectionID: 70f850ad842975389069dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 03:03:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 03:03:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:03:04 client -> Sending packet 1 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:04 client Long Header{Type: Initial, DestConnectionID: 70f850ad842975389069dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 03:03:04 client -> &wire.CryptoFrame{Offset: 1237, Data length: 282, Offset + Data length: 1519} 2025/09/12 03:03:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:03:04 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:03:04 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:03:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:03:04 client Received first packet. Switching destination connection ID to: 23060f0ffc662de0 2025/09/12 03:03:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.712ms} 2025/09/12 03:03:04 client newly acked packets (1): [0] 2025/09/12 03:03:04 client updated RTT: 40.200094ms (σ: 20.100047ms) 2025/09/12 03:03:04 client <- &wire.PingFrame{} 2025/09/12 03:03:04 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:03:04 client -> Sending packet 2 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:04 client Long Header{Type: Initial, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:03:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:03:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:03:04 client -> Sending packet 3 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:04 client Long Header{Type: Initial, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:03:04 client -> &wire.CryptoFrame{Offset: 1237, Data length: 282, Offset + Data length: 1519} 2025/09/12 03:03:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:03:04 client -> Sending packet 4 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:04 client Long Header{Type: Initial, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:03:04 client -> &wire.CryptoFrame{Offset: 1237, Data length: 282, Offset + Data length: 1519} 2025/09/12 03:03:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:03:04 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:03:04 client <- Reading packet 1 (38 bytes) for connection (empty), Initial 2025/09/12 03:03:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:03:04 client <- &wire.PingFrame{} 2025/09/12 03:03:04 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:03:04 client -> Sending packet 5 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:04 client Long Header{Type: Initial, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:03:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:03:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:03:05 client -> Sending packet 6 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:05 client Long Header{Type: Initial, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:03:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:03:05 client -> &wire.CryptoFrame{Offset: 1237, Data length: 282, Offset + Data length: 1519} 2025/09/12 03:03:05 client -> Sending packet 7 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:05 client Long Header{Type: Initial, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:03:05 client -> &wire.CryptoFrame{Offset: 1237, Data length: 282, Offset + Data length: 1519} 2025/09/12 03:03:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:03:05 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:03:05 client <- Reading packet 2 (138 bytes) for connection (empty), Initial 2025/09/12 03:03:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:03:05 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 0, Smallest: 0}}, DelayTime: 2.84ms} 2025/09/12 03:03:05 client newly acked packets (1): [7] 2025/09/12 03:03:05 client updated RTT: 39.823ms (σ: 15.828ms) 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:03:05 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:03:05 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:03:05 client Parsed a coalesced packet. Part 2: 1062 bytes. Remaining: 0 bytes. 2025/09/12 03:03:05 client <- Reading packet 3 (1062 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 3, PacketNumberLen: 2, Length: 1045, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 1023, Offset + Data length: 1023} 2025/09/12 03:03:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 70f850ad842975389069dc, InitialSourceConnectionID: 23060f0ffc662de0, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x85afd3f11902adabd336c8ef765d495c, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:03:05 client -> Sending packet 8 (1280 bytes) for connection 70f850ad842975389069dc, Initial 2025/09/12 03:03:05 client Long Header{Type: Initial, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:03:05 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:03:05 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:03:05 client -> Sending packet 0 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client Dropping Initial keys. 2025/09/12 03:03:05 client <- Reading packet 4 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 4, PacketNumberLen: 2, Length: 1183, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 1023, Data length: 1160, Offset + Data length: 2183} 2025/09/12 03:03:05 client -> Sending packet 1 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 5 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 5, PacketNumberLen: 2, Length: 1183, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 2183, Data length: 1160, Offset + Data length: 3343} 2025/09/12 03:03:05 client -> Sending packet 2 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 6 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 6, PacketNumberLen: 2, Length: 1183, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 3343, Data length: 1160, Offset + Data length: 4503} 2025/09/12 03:03:05 client -> Sending packet 3 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 7 (480 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 7, PacketNumberLen: 2, Length: 463, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 4503, Data length: 440, Offset + Data length: 4943} 2025/09/12 03:03:05 client -> Sending packet 4 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 8 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 8, PacketNumberLen: 2, Length: 1183, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 4943, Data length: 1160, Offset + Data length: 6103} 2025/09/12 03:03:05 client -> Sending packet 5 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 9 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 9, PacketNumberLen: 2, Length: 1183, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 6103, Data length: 1160, Offset + Data length: 7263} 2025/09/12 03:03:05 client -> Sending packet 6 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 10 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 10, PacketNumberLen: 2, Length: 1183, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 7263, Data length: 1160, Offset + Data length: 8423} 2025/09/12 03:03:05 client -> Sending packet 7 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 11 (240 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 11, PacketNumberLen: 2, Length: 223, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 8423, Data length: 200, Offset + Data length: 8623} 2025/09/12 03:03:05 client -> Sending packet 8 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 12 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 12, PacketNumberLen: 2, Length: 1183, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 8623, Data length: 1160, Offset + Data length: 9783} 2025/09/12 03:03:05 client -> Sending packet 9 (40 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client <- Reading packet 13 (237 bytes) for connection (empty), Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23060f0ffc662de0, PacketNumber: 13, PacketNumberLen: 2, Length: 220, Version: v1} 2025/09/12 03:03:05 client <- &wire.CryptoFrame{Offset: 9783, Data length: 197, Offset + Data length: 9980} 2025/09/12 03:03:05 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:03:05 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:03:05 client -> Sending packet 10 (95 bytes) for connection 70f850ad842975389069dc, Handshake 2025/09/12 03:03:05 client Long Header{Type: Handshake, DestConnectionID: 23060f0ffc662de0, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 78, Version: v1} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:03:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:03:05 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:03:05 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:03:05 client -> Sending packet 0 (46 bytes) for connection 70f850ad842975389069dc, 1-RTT (ECN: ECT(0)) 2025/09/12 03:03:05 client Short Header{DestConnectionID: 23060f0ffc662de0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:03:05 client <- Reading packet 14 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:03:05 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:03:05 client Dropping Handshake keys. 2025/09/12 03:03:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e2136cd330cb7ddd, StatelessResetToken: 0x79523dc7739494be96f01124475fa88c} 2025/09/12 03:03:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 780f8a839ae22757, StatelessResetToken: 0x72a7ac69462a95333089233a78751015} 2025/09/12 03:03:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a063d52a3f0d476e, StatelessResetToken: 0x6e83cf60351ff3864bd86cc827ca4bac} 2025/09/12 03:03:05 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:03:05 client -> Sending packet 1 (34 bytes) for connection 70f850ad842975389069dc, 1-RTT (ECN: ECT(0)) 2025/09/12 03:03:05 client Short Header{DestConnectionID: e2136cd330cb7ddd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 157.534µs} 2025/09/12 03:03:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:03:05 client <- Reading packet 15 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:03:05 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3.864ms} 2025/09/12 03:03:05 client newly acked packets (1): [0] 2025/09/12 03:03:05 client updated RTT: 39.266ms (σ: 12.984ms) 2025/09/12 03:03:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:03:05 client <- Reading packet 16 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:03:05 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1177, Offset + Data length: 1177} 2025/09/12 03:03:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:03:05 client <- Reading packet 17 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:03:05 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1177, Data length: 1175, Offset + Data length: 2352} 2025/09/12 03:03:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:03:05 client -> Sending packet 2 (32 bytes) for connection 70f850ad842975389069dc, 1-RTT (ECN: Not-ECT) 2025/09/12 03:03:05 client Short Header{DestConnectionID: e2136cd330cb7ddd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 14, DelayTime: 51.396µs} 2025/09/12 03:03:05 client <- Reading packet 18 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:03:05 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2352, Data length: 1175, Offset + Data length: 3527} 2025/09/12 03:03:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:03:05 client <- Reading packet 19 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:03:05 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3527, Data length: 1175, Offset + Data length: 4702} 2025/09/12 03:03:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:03:05 client -> Sending packet 3 (32 bytes) for connection 70f850ad842975389069dc, 1-RTT (ECN: Not-ECT) 2025/09/12 03:03:05 client Short Header{DestConnectionID: e2136cd330cb7ddd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 14, DelayTime: 49.171µs} 2025/09/12 03:03:05 client <- Reading packet 20 (443 bytes) for connection (empty), 1-RTT 2025/09/12 03:03:05 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 4702, Data length: 418, Offset + Data length: 5120} 2025/09/12 03:03:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:03:05 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:03:05 client -> Sending packet 4 (30 bytes) for connection 70f850ad842975389069dc, 1-RTT (ECN: Not-ECT) 2025/09/12 03:03:05 client Short Header{DestConnectionID: e2136cd330cb7ddd, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:03:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:03:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:03:05 client Connection 70f850ad842975389069dc closed.