2025/09/12 02:59:40 Requesting https://server4:443/nbbiucglkh. 2025/09/12 02:59:40 Increased receive buffer size to 14336 kiB 2025/09/12 02:59:40 Increased send buffer size to 14336 kiB 2025/09/12 02:59:40 Setting DF for IPv4 and IPv6. 2025/09/12 02:59:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:59:40 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:59:40 Created qlog file: /logs/qlog/12333e325312f0f584bbbc40ed1e.sqlog 2025/09/12 02:59:40 client Starting new connection to server4 ([::]:53872 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 12333e325312f0f584bbbc40ed1e, version v1 2025/09/12 02:59:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 02:59:40 client -> Sending packet 0 (1280 bytes) for connection 12333e325312f0f584bbbc40ed1e, Initial 2025/09/12 02:59:40 client Long Header{Type: Initial, DestConnectionID: 12333e325312f0f584bbbc40ed1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:59:40 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 02:59:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:59:40 client -> Sending packet 1 (1280 bytes) for connection 12333e325312f0f584bbbc40ed1e, Initial 2025/09/12 02:59:40 client Long Header{Type: Initial, DestConnectionID: 12333e325312f0f584bbbc40ed1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:59:40 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:59:40 client -> &wire.CryptoFrame{Offset: 1234, Data length: 285, Offset + Data length: 1519} 2025/09/12 02:59:40 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 02:59:40 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 02:59:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dac2429cd4213e0a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:59:40 client Received first packet. Switching destination connection ID to: dac2429cd4213e0a 2025/09/12 02:59:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.496ms} 2025/09/12 02:59:40 client newly acked packets (1): [0] 2025/09/12 02:59:40 client updated RTT: 39.641478ms (σ: 19.820739ms) 2025/09/12 02:59:40 client <- &wire.PingFrame{} 2025/09/12 02:59:40 client Queueing packet (1157 bytes) for later decryption 2025/09/12 02:59:40 client -> Sending packet 2 (1280 bytes) for connection 12333e325312f0f584bbbc40ed1e, Initial 2025/09/12 02:59:40 client Long Header{Type: Initial, DestConnectionID: dac2429cd4213e0a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:59:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:59:40 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 02:59:40 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 02:59:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dac2429cd4213e0a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 02:59:40 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 2.064ms} 2025/09/12 02:59:40 client newly acked packets (1): [1] 2025/09/12 02:59:40 client updated RTT: 39.914ms (σ: 15.412ms) 2025/09/12 02:59:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 02:59:40 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 02:59:40 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 02:59:40 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 286 bytes. 2025/09/12 02:59:40 client <- Reading packet 2 (778 bytes) for connection (empty), Handshake 2025/09/12 02:59:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dac2429cd4213e0a, PacketNumber: 2, PacketNumberLen: 2, Length: 761, Version: v1} 2025/09/12 02:59:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 02:59:40 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 02:59:40 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 02:59:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 12333e325312f0f584bbbc40ed1e, InitialSourceConnectionID: dac2429cd4213e0a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x602e52c3a049a0bd7f1c292604107c3e, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 02:59:40 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 02:59:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 12333e325312f0f584bbbc40ed1e 2025/09/12 02:59:40 client Long Header{Type: Initial, DestConnectionID: dac2429cd4213e0a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 02:59:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:59:40 client Long Header{Type: Handshake, DestConnectionID: dac2429cd4213e0a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 02:59:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 02:59:40 client Dropping Initial keys. 2025/09/12 02:59:40 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 02:59:40 client -> Sending packet 1 (40 bytes) for connection 12333e325312f0f584bbbc40ed1e, Handshake 2025/09/12 02:59:40 client Long Header{Type: Handshake, DestConnectionID: dac2429cd4213e0a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:59:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:59:40 client -> Sending packet 0 (46 bytes) for connection 12333e325312f0f584bbbc40ed1e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:59:40 client Short Header{DestConnectionID: dac2429cd4213e0a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:59:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:59:40 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 02:59:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:59:40 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:59:40 client Dropping Handshake keys. 2025/09/12 02:59:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a62e2e521e72c102, StatelessResetToken: 0xdbea5432fade807e9dc3a2a63f525f07} 2025/09/12 02:59:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c8b9503113ea24f7, StatelessResetToken: 0x4daab41cb671cba2337913dab7edadba} 2025/09/12 02:59:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f75f95fb1aae74cd, StatelessResetToken: 0x1fe1e9443e30c8cb7f0fd018754917bd} 2025/09/12 02:59:40 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:59:40 client -> Sending packet 1 (34 bytes) for connection 12333e325312f0f584bbbc40ed1e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:59:40 client Short Header{DestConnectionID: a62e2e521e72c102, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:59:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 66.955µs} 2025/09/12 02:59:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:59:40 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 02:59:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:59:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.032ms} 2025/09/12 02:59:40 client newly acked packets (1): [0] 2025/09/12 02:59:40 client updated RTT: 39.498ms (σ: 12.39ms) 2025/09/12 02:59:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 02:59:40 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 02:59:40 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:59:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:59:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:59:40 client Closing connection with error: Application error 0x0 (local) 2025/09/12 02:59:40 client -> Sending packet 2 (30 bytes) for connection 12333e325312f0f584bbbc40ed1e, 1-RTT (ECN: Not-ECT) 2025/09/12 02:59:40 client Short Header{DestConnectionID: a62e2e521e72c102, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:59:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:59:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 02:59:40 client Connection 12333e325312f0f584bbbc40ed1e closed.