2025/09/12 03:04:24 Requesting https://server4:443/zyaikedsqa. 2025/09/12 03:04:24 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:24 Increased send buffer size to 14336 kiB 2025/09/12 03:04:24 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:24 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:24 Created qlog file: /logs/qlog/dfae6f72ab2e21f41b7624afb49862.sqlog 2025/09/12 03:04:24 client Starting new connection to server4 ([::]:35645 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dfae6f72ab2e21f41b7624afb49862, version v1 2025/09/12 03:04:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:24 client -> Sending packet 0 (1280 bytes) for connection dfae6f72ab2e21f41b7624afb49862, Initial 2025/09/12 03:04:24 client Long Header{Type: Initial, DestConnectionID: dfae6f72ab2e21f41b7624afb49862, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:24 client -> Sending packet 1 (1280 bytes) for connection dfae6f72ab2e21f41b7624afb49862, Initial 2025/09/12 03:04:24 client Long Header{Type: Initial, DestConnectionID: dfae6f72ab2e21f41b7624afb49862, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:24 client -> &wire.CryptoFrame{Offset: 1233, Data length: 271, Offset + Data length: 1504} 2025/09/12 03:04:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:24 client -> Sending packet 2 (1280 bytes) for connection dfae6f72ab2e21f41b7624afb49862, Initial 2025/09/12 03:04:24 client Long Header{Type: Initial, DestConnectionID: dfae6f72ab2e21f41b7624afb49862, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:24 client -> Sending packet 3 (1280 bytes) for connection dfae6f72ab2e21f41b7624afb49862, Initial 2025/09/12 03:04:24 client Long Header{Type: Initial, DestConnectionID: dfae6f72ab2e21f41b7624afb49862, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:24 client -> &wire.CryptoFrame{Offset: 1233, Data length: 271, Offset + Data length: 1504} 2025/09/12 03:04:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:24 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:04:24 client <- Reading packet 1 (38 bytes) for connection (empty), Initial 2025/09/12 03:04:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 48bf54871b698df2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:04:24 client Received first packet. Switching destination connection ID to: 48bf54871b698df2 2025/09/12 03:04:24 client <- &wire.PingFrame{} 2025/09/12 03:04:24 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:04:24 client -> Sending packet 4 (1280 bytes) for connection dfae6f72ab2e21f41b7624afb49862, Initial 2025/09/12 03:04:24 client Long Header{Type: Initial, DestConnectionID: 48bf54871b698df2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:24 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:25 client -> Sending packet 5 (1280 bytes) for connection dfae6f72ab2e21f41b7624afb49862, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: 48bf54871b698df2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:25 client -> Sending packet 6 (1280 bytes) for connection dfae6f72ab2e21f41b7624afb49862, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: 48bf54871b698df2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 1233, Data length: 271, Offset + Data length: 1504} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:25 client <- Reading packet 2 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 48bf54871b698df2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 2.776ms} 2025/09/12 03:04:25 client newly acked packets (1): [5] 2025/09/12 03:04:25 client updated RTT: 36.118388ms (σ: 18.059194ms) 2025/09/12 03:04:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:25 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 284 bytes. 2025/09/12 03:04:25 client <- Reading packet 3 (778 bytes) for connection (empty), Handshake 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 48bf54871b698df2, PacketNumber: 3, PacketNumberLen: 2, Length: 761, Version: v1} 2025/09/12 03:04:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 03:04:25 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dfae6f72ab2e21f41b7624afb49862, InitialSourceConnectionID: 48bf54871b698df2, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x525c065f374ed331667b12f2d98fd8f2, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:25 client Dropping %!s(logging.PacketType=5) packet (284 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:25 client <- Reading packet 4 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 48bf54871b698df2, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 200µs} 2025/09/12 03:04:25 client newly acked packets (1): [6] 2025/09/12 03:04:25 client updated RTT: 36.121ms (σ: 13.55ms) 2025/09/12 03:04:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dfae6f72ab2e21f41b7624afb49862 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: 48bf54871b698df2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: 48bf54871b698df2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:25 client Short Header{DestConnectionID: 48bf54871b698df2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:25 client Dropping Initial keys. 2025/09/12 03:04:25 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:25 client -> Sending packet 1 (40 bytes) for connection dfae6f72ab2e21f41b7624afb49862, Handshake 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: 48bf54871b698df2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:04:25 client <- Reading packet 5 (110 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.336ms} 2025/09/12 03:04:25 client Peer doesn't await address validation any longer. 2025/09/12 03:04:25 client newly acked packets (1): [0] 2025/09/12 03:04:25 client updated RTT: 35.818ms (σ: 10.767ms) 2025/09/12 03:04:25 client Canceling loss detection timer. 2025/09/12 03:04:25 client Dropping Handshake keys. 2025/09/12 03:04:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d3bad014ec7d2ba2, StatelessResetToken: 0xc352b16f5ad4f4ec658c9929940e75ad} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 98582ec57babbe9b, StatelessResetToken: 0x18bd76b03b0d463d05fa62b32db576f9} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2614073b706a839d, StatelessResetToken: 0x765555475bf046a80f3dd7619502df47} 2025/09/12 03:04:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:25 client -> Sending packet 1 (34 bytes) for connection dfae6f72ab2e21f41b7624afb49862, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: d3bad014ec7d2ba2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 180.908µs} 2025/09/12 03:04:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:25 client <- Reading packet 7 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e3df1b25233903ef, StatelessResetToken: 0x6a213b6421790963c102888a60843c00} 2025/09/12 03:04:25 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:25 client -> Sending packet 2 (34 bytes) for connection dfae6f72ab2e21f41b7624afb49862, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: d3bad014ec7d2ba2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 115.185µs} 2025/09/12 03:04:25 client <- Reading packet 8 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.72ms} 2025/09/12 03:04:25 client newly acked packets (1): [1] 2025/09/12 03:04:25 client updated RTT: 35.422ms (σ: 8.866ms) 2025/09/12 03:04:25 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:25 client Canceling loss detection timer. 2025/09/12 03:04:25 client Ignoring all packets below 6. 2025/09/12 03:04:25 client <- Reading packet 9 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:25 client -> Sending packet 3 (30 bytes) for connection dfae6f72ab2e21f41b7624afb49862, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:25 client Short Header{DestConnectionID: d3bad014ec7d2ba2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:25 client Connection dfae6f72ab2e21f41b7624afb49862 closed. 2025/09/12 03:04:25 Requesting https://server4:443/edjteozbsh. 2025/09/12 03:04:25 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:25 Increased send buffer size to 14336 kiB 2025/09/12 03:04:25 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:25 Created qlog file: /logs/qlog/a31d31ab0f28650b7736.sqlog 2025/09/12 03:04:25 client Starting new connection to server4 ([::]:59822 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a31d31ab0f28650b7736, version v1 2025/09/12 03:04:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:25 client -> Sending packet 0 (1280 bytes) for connection a31d31ab0f28650b7736, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: a31d31ab0f28650b7736, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:04:25 client -> Sending packet 1 (1280 bytes) for connection a31d31ab0f28650b7736, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: a31d31ab0f28650b7736, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 1238, Data length: 276, Offset + Data length: 1514} 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:25 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1a98b86fc54b4aac, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:25 client Received first packet. Switching destination connection ID to: 1a98b86fc54b4aac 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.168ms} 2025/09/12 03:04:25 client newly acked packets (1): [0] 2025/09/12 03:04:25 client updated RTT: 34.373169ms (σ: 17.186584ms) 2025/09/12 03:04:25 client <- &wire.PingFrame{} 2025/09/12 03:04:25 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:25 client -> Sending packet 2 (1280 bytes) for connection a31d31ab0f28650b7736, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: 1a98b86fc54b4aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:25 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1a98b86fc54b4aac, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.368ms} 2025/09/12 03:04:25 client newly acked packets (1): [1] 2025/09/12 03:04:25 client updated RTT: 34.555ms (σ: 13.255ms) 2025/09/12 03:04:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:25 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 290 bytes. 2025/09/12 03:04:25 client <- Reading packet 2 (774 bytes) for connection (empty), Handshake 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1a98b86fc54b4aac, PacketNumber: 2, PacketNumberLen: 2, Length: 757, Version: v1} 2025/09/12 03:04:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 03:04:25 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a31d31ab0f28650b7736, InitialSourceConnectionID: 1a98b86fc54b4aac, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf0a4fc075abc2aa5cdf65af72a7cee85, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:25 client Dropping %!s(logging.PacketType=5) packet (290 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a31d31ab0f28650b7736 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: 1a98b86fc54b4aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: 1a98b86fc54b4aac, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:25 client Dropping Initial keys. 2025/09/12 03:04:25 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:25 client -> Sending packet 1 (86 bytes) for connection a31d31ab0f28650b7736, Handshake 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: 1a98b86fc54b4aac, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:25 client Short Header{DestConnectionID: 1a98b86fc54b4aac, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:25 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:25 client Dropping Handshake keys. 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d144111891b88c84, StatelessResetToken: 0x57f844c0dec570505f644fa770839113} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e2f0843799615ee, StatelessResetToken: 0xb686cefbb97d69e4e9166db849040001} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6198509ac22ef71c, StatelessResetToken: 0xa9fcbd43fba4cea55432db246c1e2591} 2025/09/12 03:04:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:25 client -> Sending packet 1 (34 bytes) for connection a31d31ab0f28650b7736, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: d144111891b88c84, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 172.783µs} 2025/09/12 03:04:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:25 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.04ms} 2025/09/12 03:04:25 client newly acked packets (1): [0] 2025/09/12 03:04:25 client updated RTT: 34.448ms (σ: 10.154ms) 2025/09/12 03:04:25 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:25 client -> Sending packet 2 (30 bytes) for connection a31d31ab0f28650b7736, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: d144111891b88c84, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:25 client Connection a31d31ab0f28650b7736 closed. 2025/09/12 03:04:25 Requesting https://server4:443/larlbgtiks. 2025/09/12 03:04:25 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:25 Increased send buffer size to 14336 kiB 2025/09/12 03:04:25 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:25 Created qlog file: /logs/qlog/e7fa610950bebce00667197f85418d3c0d561b.sqlog 2025/09/12 03:04:25 client Starting new connection to server4 ([::]:33622 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e7fa610950bebce00667197f85418d3c0d561b, version v1 2025/09/12 03:04:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:25 client -> Sending packet 0 (1280 bytes) for connection e7fa610950bebce00667197f85418d3c0d561b, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: e7fa610950bebce00667197f85418d3c0d561b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:25 client -> Sending packet 1 (1280 bytes) for connection e7fa610950bebce00667197f85418d3c0d561b, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: e7fa610950bebce00667197f85418d3c0d561b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 1229, Data length: 288, Offset + Data length: 1517} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:25 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c3466c874c5fc5e0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:25 client Received first packet. Switching destination connection ID to: c3466c874c5fc5e0 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 824µs} 2025/09/12 03:04:25 client newly acked packets (1): [0] 2025/09/12 03:04:25 client updated RTT: 33.840636ms (σ: 16.920318ms) 2025/09/12 03:04:25 client <- &wire.PingFrame{} 2025/09/12 03:04:25 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:25 client -> Sending packet 2 (1280 bytes) for connection e7fa610950bebce00667197f85418d3c0d561b, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: c3466c874c5fc5e0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:25 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c3466c874c5fc5e0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.416ms} 2025/09/12 03:04:25 client newly acked packets (1): [1] 2025/09/12 03:04:25 client updated RTT: 34.037ms (σ: 13.085ms) 2025/09/12 03:04:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:25 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 2: 782 bytes. Remaining: 282 bytes. 2025/09/12 03:04:25 client <- Reading packet 2 (782 bytes) for connection (empty), Handshake 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c3466c874c5fc5e0, PacketNumber: 2, PacketNumberLen: 2, Length: 765, Version: v1} 2025/09/12 03:04:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/09/12 03:04:25 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e7fa610950bebce00667197f85418d3c0d561b, InitialSourceConnectionID: c3466c874c5fc5e0, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xdce6f53559e4618de3f84b839c0d2cfa, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:25 client Dropping %!s(logging.PacketType=5) packet (282 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e7fa610950bebce00667197f85418d3c0d561b 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: c3466c874c5fc5e0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: c3466c874c5fc5e0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:25 client Dropping Initial keys. 2025/09/12 03:04:25 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:25 client -> Sending packet 1 (86 bytes) for connection e7fa610950bebce00667197f85418d3c0d561b, Handshake 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: c3466c874c5fc5e0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:25 client Short Header{DestConnectionID: c3466c874c5fc5e0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:25 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:25 client Dropping Handshake keys. 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9bf4875402b62136, StatelessResetToken: 0x65901843d122a4725e04c7002b9a42c4} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 117b425d8e7b07c7, StatelessResetToken: 0xa35b8082ffcc6e1fb241afc53b0841f6} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5838e7bb5a039f8b, StatelessResetToken: 0xd2c60dff75e11287bf5a59265f9702b8} 2025/09/12 03:04:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:25 client -> Sending packet 1 (34 bytes) for connection e7fa610950bebce00667197f85418d3c0d561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: 9bf4875402b62136, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 147.045µs} 2025/09/12 03:04:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:25 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.016ms} 2025/09/12 03:04:25 client newly acked packets (1): [0] 2025/09/12 03:04:25 client updated RTT: 34.019ms (σ: 9.848ms) 2025/09/12 03:04:25 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:25 client -> Sending packet 2 (30 bytes) for connection e7fa610950bebce00667197f85418d3c0d561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: 9bf4875402b62136, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:25 client Connection e7fa610950bebce00667197f85418d3c0d561b closed. 2025/09/12 03:04:25 Requesting https://server4:443/uwmeavtxwj. 2025/09/12 03:04:25 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:25 Increased send buffer size to 14336 kiB 2025/09/12 03:04:25 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:25 Created qlog file: /logs/qlog/b7d3019a2e4e3438648451ec925e7009ce108179.sqlog 2025/09/12 03:04:25 client Starting new connection to server4 ([::]:45560 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b7d3019a2e4e3438648451ec925e7009ce108179, version v1 2025/09/12 03:04:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:25 client -> Sending packet 0 (1280 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: b7d3019a2e4e3438648451ec925e7009ce108179, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:25 client -> Sending packet 1 (1280 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: b7d3019a2e4e3438648451ec925e7009ce108179, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:25 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cfe2f51f0edb7832, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:25 client Received first packet. Switching destination connection ID to: cfe2f51f0edb7832 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.48ms} 2025/09/12 03:04:25 client newly acked packets (2): [0 1] 2025/09/12 03:04:25 client updated RTT: 36.128384ms (σ: 18.064192ms) 2025/09/12 03:04:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:25 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Parsed a coalesced packet. Part 2: 785 bytes. Remaining: 279 bytes. 2025/09/12 03:04:25 client <- Reading packet 2 (785 bytes) for connection (empty), Handshake 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cfe2f51f0edb7832, PacketNumber: 2, PacketNumberLen: 2, Length: 768, Version: v1} 2025/09/12 03:04:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 746, Offset + Data length: 746} 2025/09/12 03:04:25 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b7d3019a2e4e3438648451ec925e7009ce108179, InitialSourceConnectionID: cfe2f51f0edb7832, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xce2e13745a0ca07fc0df945653fc8d8e, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:25 client Dropping %!s(logging.PacketType=5) packet (279 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: cfe2f51f0edb7832, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: cfe2f51f0edb7832, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:25 client Dropping Initial keys. 2025/09/12 03:04:25 client -> Sending packet 1 (86 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, Handshake 2025/09/12 03:04:25 client Long Header{Type: Handshake, DestConnectionID: cfe2f51f0edb7832, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:25 client Short Header{DestConnectionID: cfe2f51f0edb7832, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:25 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:25 client Dropping Handshake keys. 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e2ae4ef1d608027c, StatelessResetToken: 0x3ac907ad6d8b8c53596dc18b2031c5c1} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 840bafeca8ac9159, StatelessResetToken: 0x52426654b42cb2d5a67a16ae43fc28d4} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 333b3004fe773b64, StatelessResetToken: 0xb371cdf0bd66265fe496363e4c0c69c7} 2025/09/12 03:04:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:25 client -> Sending packet 1 (34 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: e2ae4ef1d608027c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 143.679µs} 2025/09/12 03:04:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:25 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.144ms} 2025/09/12 03:04:25 client newly acked packets (1): [0] 2025/09/12 03:04:25 client updated RTT: 35.927ms (σ: 13.948ms) 2025/09/12 03:04:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:25 client -> Sending packet 3 (29 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: e2ae4ef1d608027c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:25 client -> Sending packet 4 (29 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: e2ae4ef1d608027c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:25 client <- Reading packet 7 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3497f91722de382b, StatelessResetToken: 0xf9c95c366f3709e8f2f886b0436385e6} 2025/09/12 03:04:25 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:25 client -> Sending packet 5 (34 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: e2ae4ef1d608027c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 159.748µs} 2025/09/12 03:04:25 client <- Reading packet 8 (28 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 1.736ms} 2025/09/12 03:04:25 client <- &wire.PingFrame{} 2025/09/12 03:04:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:25 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:25 client -> Sending packet 6 (35 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: e2ae4ef1d608027c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 25.253495ms} 2025/09/12 03:04:25 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.PingFrame{} 2025/09/12 03:04:25 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:25 client -> Sending packet 7 (1366 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: e2ae4ef1d608027c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.PingFrame{} 2025/09/12 03:04:25 client -> Sending packet 8 (36 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: e2ae4ef1d608027c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 173.694µs} 2025/09/12 03:04:25 client <- Reading packet 11 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:25 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:25 client -> Sending packet 9 (30 bytes) for connection b7d3019a2e4e3438648451ec925e7009ce108179, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:25 client Short Header{DestConnectionID: e2ae4ef1d608027c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:25 client Connection b7d3019a2e4e3438648451ec925e7009ce108179 closed. 2025/09/12 03:04:25 Requesting https://server4:443/ryfnidkrry. 2025/09/12 03:04:25 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:25 Increased send buffer size to 14336 kiB 2025/09/12 03:04:25 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:25 Created qlog file: /logs/qlog/5202214295f824d8f467e226.sqlog 2025/09/12 03:04:25 client Starting new connection to server4 ([::]:46777 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5202214295f824d8f467e226, version v1 2025/09/12 03:04:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:25 client -> Sending packet 0 (1280 bytes) for connection 5202214295f824d8f467e226, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: 5202214295f824d8f467e226, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:25 client -> Sending packet 1 (1280 bytes) for connection 5202214295f824d8f467e226, Initial 2025/09/12 03:04:25 client Long Header{Type: Initial, DestConnectionID: 5202214295f824d8f467e226, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:25 client -> &wire.CryptoFrame{Offset: 1236, Data length: 283, Offset + Data length: 1519} 2025/09/12 03:04:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:26 client -> Sending packet 2 (1280 bytes) for connection 5202214295f824d8f467e226, Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 5202214295f824d8f467e226, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:04:26 client -> Sending packet 3 (1280 bytes) for connection 5202214295f824d8f467e226, Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 5202214295f824d8f467e226, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 1236, Data length: 283, Offset + Data length: 1519} 2025/09/12 03:04:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:26 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:04:26 client <- Reading packet 1 (38 bytes) for connection (empty), Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34ac17d86c3b912d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:04:26 client Received first packet. Switching destination connection ID to: 34ac17d86c3b912d 2025/09/12 03:04:26 client <- &wire.PingFrame{} 2025/09/12 03:04:26 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:04:26 client -> Sending packet 4 (1280 bytes) for connection 5202214295f824d8f467e226, Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:26 client -> Sending packet 5 (1280 bytes) for connection 5202214295f824d8f467e226, Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:26 client -> Sending packet 6 (1280 bytes) for connection 5202214295f824d8f467e226, Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 1236, Data length: 283, Offset + Data length: 1519} 2025/09/12 03:04:26 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:26 client <- Reading packet 2 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34ac17d86c3b912d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:26 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 1.8ms} 2025/09/12 03:04:26 client newly acked packets (1): [5] 2025/09/12 03:04:26 client updated RTT: 35.140086ms (σ: 17.570043ms) 2025/09/12 03:04:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:26 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:26 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:26 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 286 bytes. 2025/09/12 03:04:26 client <- Reading packet 3 (776 bytes) for connection (empty), Handshake 2025/09/12 03:04:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34ac17d86c3b912d, PacketNumber: 3, PacketNumberLen: 2, Length: 759, Version: v1} 2025/09/12 03:04:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 03:04:26 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:26 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5202214295f824d8f467e226, InitialSourceConnectionID: 34ac17d86c3b912d, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb40b8c1c921a7c041e15d1b4bd62affd, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:26 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:26 client <- Reading packet 4 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34ac17d86c3b912d, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:26 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 200µs} 2025/09/12 03:04:26 client newly acked packets (1): [6] 2025/09/12 03:04:26 client updated RTT: 35.142ms (σ: 13.181ms) 2025/09/12 03:04:26 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5202214295f824d8f467e226 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:26 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 03:04:26 client Long Header{Type: Handshake, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:26 client Dropping Initial keys. 2025/09/12 03:04:26 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:26 client -> Sending packet 1 (86 bytes) for connection 5202214295f824d8f467e226, Handshake 2025/09/12 03:04:26 client Long Header{Type: Handshake, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:26 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:04:26 client Short Header{DestConnectionID: 34ac17d86c3b912d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:26 client -> Sending packet 2 (90 bytes) for connection 5202214295f824d8f467e226, Handshake 2025/09/12 03:04:26 client Long Header{Type: Handshake, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:26 client -> Sending packet 3 (90 bytes) for connection 5202214295f824d8f467e226, Handshake 2025/09/12 03:04:26 client Long Header{Type: Handshake, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:26 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:26 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client <- &wire.PingFrame{} 2025/09/12 03:04:26 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:26 client -> Sending packet 1 (32 bytes) for connection 5202214295f824d8f467e226, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:26 client Short Header{DestConnectionID: 34ac17d86c3b912d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 112.801µs} 2025/09/12 03:04:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:04:26 client -> Sending packet 4 (90 bytes) for connection 5202214295f824d8f467e226, Handshake 2025/09/12 03:04:26 client Long Header{Type: Handshake, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:26 client -> Sending packet 5 (90 bytes) for connection 5202214295f824d8f467e226, Handshake 2025/09/12 03:04:26 client Long Header{Type: Handshake, DestConnectionID: 34ac17d86c3b912d, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:26 client <- Reading packet 7 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:26 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:26 client Dropping Handshake keys. 2025/09/12 03:04:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f7341cc451d4f527, StatelessResetToken: 0x4ca3dde94ee9331ef14d29034278f789} 2025/09/12 03:04:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 64501d70be0fce82, StatelessResetToken: 0x20340cbb20a7424953e62dc5180b9cd5} 2025/09/12 03:04:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 66e0604bb3e04496, StatelessResetToken: 0xf14c8070ca909f5cc8ac44b04ff24b4f} 2025/09/12 03:04:26 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:26 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:26 client -> Sending packet 3 (53 bytes) for connection 5202214295f824d8f467e226, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:26 client Short Header{DestConnectionID: f7341cc451d4f527, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 145.492µs} 2025/09/12 03:04:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:26 client -> Sending packet 4 (48 bytes) for connection 5202214295f824d8f467e226, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:26 client Short Header{DestConnectionID: f7341cc451d4f527, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:26 client <- Reading packet 10 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:26 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:26 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:26 client -> Sending packet 5 (34 bytes) for connection 5202214295f824d8f467e226, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:26 client Short Header{DestConnectionID: f7341cc451d4f527, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}}, DelayTime: 137.797µs} 2025/09/12 03:04:26 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:26 client -> Sending packet 6 (30 bytes) for connection 5202214295f824d8f467e226, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:26 client Short Header{DestConnectionID: f7341cc451d4f527, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:26 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:26 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:26 client Connection 5202214295f824d8f467e226 closed. 2025/09/12 03:04:26 Requesting https://server4:443/vlwtcrbpwx. 2025/09/12 03:04:26 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:26 Increased send buffer size to 14336 kiB 2025/09/12 03:04:26 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:26 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:26 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:26 Created qlog file: /logs/qlog/6ea1344592aa4678e0bc0bcca8.sqlog 2025/09/12 03:04:26 client Starting new connection to server4 ([::]:46815 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6ea1344592aa4678e0bc0bcca8, version v1 2025/09/12 03:04:26 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:26 client -> Sending packet 0 (1280 bytes) for connection 6ea1344592aa4678e0bc0bcca8, Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 6ea1344592aa4678e0bc0bcca8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:04:26 client -> Sending packet 1 (1280 bytes) for connection 6ea1344592aa4678e0bc0bcca8, Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 6ea1344592aa4678e0bc0bcca8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:26 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 03:04:26 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:26 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d9d4a0cd0ed59a3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:26 client Received first packet. Switching destination connection ID to: 3d9d4a0cd0ed59a3 2025/09/12 03:04:26 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/09/12 03:04:26 client newly acked packets (1): [0] 2025/09/12 03:04:26 client updated RTT: 34.217841ms (σ: 17.10892ms) 2025/09/12 03:04:26 client <- &wire.PingFrame{} 2025/09/12 03:04:26 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:26 client -> Sending packet 2 (1280 bytes) for connection 6ea1344592aa4678e0bc0bcca8, Initial 2025/09/12 03:04:26 client Long Header{Type: Initial, DestConnectionID: 3d9d4a0cd0ed59a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:26 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:27 client -> Sending packet 3 (1280 bytes) for connection 6ea1344592aa4678e0bc0bcca8, Initial 2025/09/12 03:04:27 client Long Header{Type: Initial, DestConnectionID: 3d9d4a0cd0ed59a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:27 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 03:04:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:27 client -> Sending packet 4 (1280 bytes) for connection 6ea1344592aa4678e0bc0bcca8, Initial 2025/09/12 03:04:27 client Long Header{Type: Initial, DestConnectionID: 3d9d4a0cd0ed59a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:27 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 03:04:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:27 client <- Reading packet 4 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d9d4a0cd0ed59a3, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:27 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 264µs} 2025/09/12 03:04:27 client newly acked packets (1): [4] 2025/09/12 03:04:27 client updated RTT: 34.102ms (σ: 13.06ms) 2025/09/12 03:04:27 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:27 client <- Reading packet 5 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d9d4a0cd0ed59a3, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:27 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:27 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:27 client Parsed a coalesced packet. Part 2: 777 bytes. Remaining: 293 bytes. 2025/09/12 03:04:27 client <- Reading packet 6 (777 bytes) for connection (empty), Handshake 2025/09/12 03:04:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3d9d4a0cd0ed59a3, PacketNumber: 6, PacketNumberLen: 2, Length: 760, Version: v1} 2025/09/12 03:04:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/09/12 03:04:27 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:27 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6ea1344592aa4678e0bc0bcca8, InitialSourceConnectionID: 3d9d4a0cd0ed59a3, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb1b8f39111905550217d2f14f4032d2d, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:27 client Dropping %!s(logging.PacketType=5) packet (293 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6ea1344592aa4678e0bc0bcca8 2025/09/12 03:04:27 client Long Header{Type: Initial, DestConnectionID: 3d9d4a0cd0ed59a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:27 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:27 client Long Header{Type: Handshake, DestConnectionID: 3d9d4a0cd0ed59a3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:27 client Dropping Initial keys. 2025/09/12 03:04:27 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:27 client -> Sending packet 1 (86 bytes) for connection 6ea1344592aa4678e0bc0bcca8, Handshake 2025/09/12 03:04:27 client Long Header{Type: Handshake, DestConnectionID: 3d9d4a0cd0ed59a3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:27 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s} 2025/09/12 03:04:27 client Short Header{DestConnectionID: 3d9d4a0cd0ed59a3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:27 client <- Reading packet 7 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:27 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:27 client Dropping Handshake keys. 2025/09/12 03:04:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d6ac0d2688255b4b, StatelessResetToken: 0x1aba7cda6f17a4c2023ab9c4e0d6938d} 2025/09/12 03:04:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 796b8a0bc4dc379f, StatelessResetToken: 0x26a2897ce18299d47078bcfe4f672939} 2025/09/12 03:04:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 027ddea8e29badb5, StatelessResetToken: 0x5dafea318f7c6ca33320dc7cfd16293a} 2025/09/12 03:04:27 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:27 client -> Sending packet 1 (34 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:27 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 135.052µs} 2025/09/12 03:04:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:27 client -> Sending packet 3 (46 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:27 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:27 client Skipping packet number 2 2025/09/12 03:04:27 client -> Sending packet 4 (29 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:27 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:27 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:27 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client <- &wire.PingFrame{} 2025/09/12 03:04:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:27 client <- Reading packet 9 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:27 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e11b6c7c9f234d9a, StatelessResetToken: 0x9ce2507d9b0e6188e1cb0baf701da44a} 2025/09/12 03:04:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:04:27 client <- Reading packet 10 (24 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:27 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 368µs} 2025/09/12 03:04:27 client newly acked packets (2): [3 4] 2025/09/12 03:04:27 client updated RTT: 33.888ms (σ: 10.221ms) 2025/09/12 03:04:27 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:27 client Canceling loss detection timer. 2025/09/12 03:04:27 client -> Sending packet 5 (32 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:27 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, DelayTime: 164.648µs} 2025/09/12 03:04:27 client <- Reading packet 12 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:27 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client <- &wire.PingFrame{} 2025/09/12 03:04:27 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:27 client -> Sending packet 6 (1366 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:27 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client -> &wire.PingFrame{} 2025/09/12 03:04:27 client -> Sending packet 7 (34 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:27 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 7, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 7}}, DelayTime: 131.676µs} 2025/09/12 03:04:27 client <- Reading packet 14 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:27 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:27 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 1.64ms} 2025/09/12 03:04:27 client newly acked packets (1): [6] 2025/09/12 03:04:28 client <- Reading packet 17 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:28 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client <- &wire.PingFrame{} 2025/09/12 03:04:28 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:28 client -> Sending packet 8 (1409 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:28 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client -> &wire.PingFrame{} 2025/09/12 03:04:28 client -> Sending packet 9 (38 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:28 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 7, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 7}}, DelayTime: 160.239µs} 2025/09/12 03:04:28 client <- Reading packet 19 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:28 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 8, DelayTime: 632µs} 2025/09/12 03:04:28 client newly acked packets (1): [8] 2025/09/12 03:04:28 client <- Reading packet 20 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:28 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client <- &wire.PingFrame{} 2025/09/12 03:04:28 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:28 client -> Sending packet 10 (40 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:28 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 7, AckRanges: {{Largest: 20, Smallest: 19}, {Largest: 17, Smallest: 17}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 7}}, DelayTime: 130.504µs} 2025/09/12 03:04:28 client <- Reading packet 21 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:28 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client <- &wire.PingFrame{} 2025/09/12 03:04:28 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:28 client -> Sending packet 11 (1430 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:28 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client -> &wire.PingFrame{} 2025/09/12 03:04:28 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:28 client -> Sending packet 12 (41 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:28 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 7, AckRanges: {{Largest: 21, Smallest: 19}, {Largest: 17, Smallest: 17}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 7}}, DelayTime: 25.376976ms} 2025/09/12 03:04:28 client <- Reading packet 22 (27 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:28 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 8, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}}, DelayTime: 1.496ms} 2025/09/12 03:04:28 client newly acked packets (1): [11] 2025/09/12 03:04:28 client updated RTT: 33.884ms (σ: 7.673ms) 2025/09/12 03:04:28 client <- Reading packet 23 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:28 client Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:28 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:28 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:28 client -> Sending packet 13 (30 bytes) for connection 6ea1344592aa4678e0bc0bcca8, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:28 client Short Header{DestConnectionID: d6ac0d2688255b4b, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:28 client Connection 6ea1344592aa4678e0bc0bcca8 closed. 2025/09/12 03:04:28 Requesting https://server4:443/ciqkvearli. 2025/09/12 03:04:28 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:28 Increased send buffer size to 14336 kiB 2025/09/12 03:04:28 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:28 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:28 Created qlog file: /logs/qlog/5ea90a889f71695ce7.sqlog 2025/09/12 03:04:28 client Starting new connection to server4 ([::]:41978 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5ea90a889f71695ce7, version v1 2025/09/12 03:04:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:28 client -> Sending packet 0 (1280 bytes) for connection 5ea90a889f71695ce7, Initial 2025/09/12 03:04:28 client Long Header{Type: Initial, DestConnectionID: 5ea90a889f71695ce7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:28 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:28 client -> Sending packet 1 (1280 bytes) for connection 5ea90a889f71695ce7, Initial 2025/09/12 03:04:28 client Long Header{Type: Initial, DestConnectionID: 5ea90a889f71695ce7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:28 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/12 03:04:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:28 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:28 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e63c423632e78ef2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:28 client Received first packet. Switching destination connection ID to: e63c423632e78ef2 2025/09/12 03:04:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 816µs} 2025/09/12 03:04:28 client newly acked packets (1): [0] 2025/09/12 03:04:28 client updated RTT: 33.943703ms (σ: 16.971851ms) 2025/09/12 03:04:28 client <- &wire.PingFrame{} 2025/09/12 03:04:28 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:28 client -> Sending packet 2 (1280 bytes) for connection 5ea90a889f71695ce7, Initial 2025/09/12 03:04:28 client Long Header{Type: Initial, DestConnectionID: e63c423632e78ef2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:28 client -> Sending packet 3 (1280 bytes) for connection 5ea90a889f71695ce7, Initial 2025/09/12 03:04:28 client Long Header{Type: Initial, DestConnectionID: e63c423632e78ef2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:28 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/12 03:04:28 client -> Sending packet 4 (1280 bytes) for connection 5ea90a889f71695ce7, Initial 2025/09/12 03:04:28 client Long Header{Type: Initial, DestConnectionID: e63c423632e78ef2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:28 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/12 03:04:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:29 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:29 client <- Reading packet 3 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e63c423632e78ef2, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:29 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 297 bytes. 2025/09/12 03:04:29 client <- Reading packet 4 (773 bytes) for connection (empty), Handshake 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e63c423632e78ef2, PacketNumber: 4, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 03:04:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 03:04:29 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5ea90a889f71695ce7, InitialSourceConnectionID: e63c423632e78ef2, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x498d7b4727ec1ac28846363bdafa267a, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:29 client Dropping %!s(logging.PacketType=5) packet (297 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:29 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5ea90a889f71695ce7 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: e63c423632e78ef2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: e63c423632e78ef2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:29 client Dropping Initial keys. 2025/09/12 03:04:29 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:29 client -> Sending packet 1 (86 bytes) for connection 5ea90a889f71695ce7, Handshake 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: e63c423632e78ef2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:29 client Short Header{DestConnectionID: e63c423632e78ef2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:29 client <- Reading packet 5 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:29 client Dropping Handshake keys. 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bfa955aeb66c5fb, StatelessResetToken: 0x304fa77c9634278998fb01094ec5c980} 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 611d17ebdb30cfec, StatelessResetToken: 0x203f8cc2ccd2af9a5c814e9936516a80} 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7f0e55e6c6eae24a, StatelessResetToken: 0xb49fdf834770baac097b76249cf00c76} 2025/09/12 03:04:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:29 client -> Sending packet 1 (34 bytes) for connection 5ea90a889f71695ce7, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: 6bfa955aeb66c5fb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 162.042µs} 2025/09/12 03:04:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:29 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:29 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:29 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:29 client -> Sending packet 2 (34 bytes) for connection 5ea90a889f71695ce7, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: 6bfa955aeb66c5fb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 90.599µs} 2025/09/12 03:04:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:29 client -> Sending packet 3 (30 bytes) for connection 5ea90a889f71695ce7, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: 6bfa955aeb66c5fb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:29 client Connection 5ea90a889f71695ce7 closed. 2025/09/12 03:04:29 Requesting https://server4:443/ijiaztrdjg. 2025/09/12 03:04:29 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:29 Increased send buffer size to 14336 kiB 2025/09/12 03:04:29 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:29 Created qlog file: /logs/qlog/2eb412ada09f49993e372095bcd9cf4b.sqlog 2025/09/12 03:04:29 client Starting new connection to server4 ([::]:51361 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2eb412ada09f49993e372095bcd9cf4b, version v1 2025/09/12 03:04:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:29 client -> Sending packet 0 (1280 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: 2eb412ada09f49993e372095bcd9cf4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:29 client -> Sending packet 1 (1280 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: 2eb412ada09f49993e372095bcd9cf4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 1232, Data length: 272, Offset + Data length: 1504} 2025/09/12 03:04:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:29 client -> Sending packet 2 (1280 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: 2eb412ada09f49993e372095bcd9cf4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:04:29 client -> Sending packet 3 (1280 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: 2eb412ada09f49993e372095bcd9cf4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 1232, Data length: 272, Offset + Data length: 1504} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:29 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:29 client <- Reading packet 3 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33195dc1e7d0d8a0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:29 client Received first packet. Switching destination connection ID to: 33195dc1e7d0d8a0 2025/09/12 03:04:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:29 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 289 bytes. 2025/09/12 03:04:29 client <- Reading packet 4 (781 bytes) for connection (empty), Handshake 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33195dc1e7d0d8a0, PacketNumber: 4, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 03:04:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 03:04:29 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2eb412ada09f49993e372095bcd9cf4b, InitialSourceConnectionID: 33195dc1e7d0d8a0, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x8043802e6e0e6be1a3111fa147070ce4, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:29 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:29 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: 33195dc1e7d0d8a0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: 33195dc1e7d0d8a0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:29 client Dropping Initial keys. 2025/09/12 03:04:29 client -> Sending packet 1 (40 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, Handshake 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: 33195dc1e7d0d8a0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:29 client -> Sending packet 0 (46 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: 33195dc1e7d0d8a0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:29 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:29 client -> Sending packet 2 (90 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, Handshake 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: 33195dc1e7d0d8a0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:29 client -> Sending packet 3 (90 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, Handshake 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: 33195dc1e7d0d8a0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:29 client <- Reading packet 5 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:29 client Dropping Handshake keys. 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d86e5bfa13a1a917, StatelessResetToken: 0x957c82a383fb35dace4dd9ba3d9ae035} 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d289590c0aa400f, StatelessResetToken: 0xfd81560e03e577bfd685d2f4e30238d8} 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d04b270c968ec5c8, StatelessResetToken: 0xaa16b67d4191eeebaab132fb98144aea} 2025/09/12 03:04:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:29 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:29 client -> Sending packet 2 (53 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: d86e5bfa13a1a917, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 154.729µs} 2025/09/12 03:04:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:29 client -> Sending packet 3 (48 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: d86e5bfa13a1a917, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:29 client -> Sending packet 4 (1366 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: d86e5bfa13a1a917, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.PingFrame{} 2025/09/12 03:04:29 client <- Reading packet 7 (24 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:29 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 136µs} 2025/09/12 03:04:29 client newly acked packets (2): [3 4] 2025/09/12 03:04:29 client updated RTT: 32.385009ms (σ: 16.192504ms) 2025/09/12 03:04:29 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:29 client Canceling loss detection timer. 2025/09/12 03:04:29 client <- Reading packet 8 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:29 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:29 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:29 client -> Sending packet 5 (34 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:29 client Short Header{DestConnectionID: d86e5bfa13a1a917, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 102.642µs} 2025/09/12 03:04:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:29 client -> Sending packet 6 (30 bytes) for connection 2eb412ada09f49993e372095bcd9cf4b, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:29 client Short Header{DestConnectionID: d86e5bfa13a1a917, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:29 client Connection 2eb412ada09f49993e372095bcd9cf4b closed. 2025/09/12 03:04:29 Requesting https://server4:443/ndqejhcfnq. 2025/09/12 03:04:29 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:29 Increased send buffer size to 14336 kiB 2025/09/12 03:04:29 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:29 Created qlog file: /logs/qlog/a4657141592bc2b135.sqlog 2025/09/12 03:04:29 client Starting new connection to server4 ([::]:35963 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a4657141592bc2b135, version v1 2025/09/12 03:04:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:29 client -> Sending packet 0 (1280 bytes) for connection a4657141592bc2b135, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: a4657141592bc2b135, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:29 client -> Sending packet 1 (1280 bytes) for connection a4657141592bc2b135, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: a4657141592bc2b135, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:04:29 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:29 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4ebd34092998d37, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:29 client Received first packet. Switching destination connection ID to: c4ebd34092998d37 2025/09/12 03:04:29 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.016ms} 2025/09/12 03:04:29 client newly acked packets (1): [1] 2025/09/12 03:04:29 client updated RTT: 35.240941ms (σ: 17.62047ms) 2025/09/12 03:04:29 client setting loss timer for packet 0 (Initial) to 39.646058ms (in 2025-09-12 03:04:29.869837871 +0000 UTC m=+5.182868039) 2025/09/12 03:04:29 client <- &wire.PingFrame{} 2025/09/12 03:04:29 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:29 client -> Sending packet 2 (1280 bytes) for connection a4657141592bc2b135, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: c4ebd34092998d37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:29 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:29.869837871 +0000 UTC m=+5.182868039 2025/09/12 03:04:29 client lost packet 0 (time threshold) 2025/09/12 03:04:29 client -> Sending packet 3 (1280 bytes) for connection a4657141592bc2b135, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: c4ebd34092998d37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:29 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:29 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4ebd34092998d37, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:29 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.6ms} 2025/09/12 03:04:29 client newly acked packets (1): [3] 2025/09/12 03:04:29 client updated RTT: 35.154ms (σ: 13.386ms) 2025/09/12 03:04:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:29 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 291 bytes. 2025/09/12 03:04:29 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c4ebd34092998d37, PacketNumber: 2, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 03:04:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 03:04:29 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a4657141592bc2b135, InitialSourceConnectionID: c4ebd34092998d37, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x5b3b2889032d2b7fa336eb645acdbc96, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:29 client Dropping %!s(logging.PacketType=5) packet (291 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:29 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a4657141592bc2b135 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: c4ebd34092998d37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: c4ebd34092998d37, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:29 client Dropping Initial keys. 2025/09/12 03:04:29 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:29 client -> Sending packet 1 (86 bytes) for connection a4657141592bc2b135, Handshake 2025/09/12 03:04:29 client Long Header{Type: Handshake, DestConnectionID: c4ebd34092998d37, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:29 client Short Header{DestConnectionID: c4ebd34092998d37, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:29 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:29 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:29 client Dropping Handshake keys. 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 735cd72ebaf6d02e, StatelessResetToken: 0xc09ec11c1f2ae01d82a2e1cea7eebb54} 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2f2a59fdb1ba51e8, StatelessResetToken: 0x50fb8554c7ab9b37a424500f2c908059} 2025/09/12 03:04:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ded1d5af38cabc45, StatelessResetToken: 0x0d399e3787120feb66583f2b9fd6e24a} 2025/09/12 03:04:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:29 client -> Sending packet 1 (34 bytes) for connection a4657141592bc2b135, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: 735cd72ebaf6d02e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 148.267µs} 2025/09/12 03:04:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:29 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:29 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:29 client -> Sending packet 2 (34 bytes) for connection a4657141592bc2b135, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: 735cd72ebaf6d02e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 76.583µs} 2025/09/12 03:04:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:29 client -> Sending packet 3 (30 bytes) for connection a4657141592bc2b135, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:29 client Short Header{DestConnectionID: 735cd72ebaf6d02e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:29 client Connection a4657141592bc2b135 closed. 2025/09/12 03:04:29 Requesting https://server4:443/qxzlfugmxq. 2025/09/12 03:04:29 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:29 Increased send buffer size to 14336 kiB 2025/09/12 03:04:29 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:29 Created qlog file: /logs/qlog/2527c3d4d90750f5687d8b18f6d48fb85c0cb29b.sqlog 2025/09/12 03:04:29 client Starting new connection to server4 ([::]:34746 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, version v1 2025/09/12 03:04:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:29 client -> Sending packet 0 (1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:29 client -> Sending packet 1 (1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Initial 2025/09/12 03:04:29 client Long Header{Type: Initial, DestConnectionID: 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:29 client -> &wire.CryptoFrame{Offset: 1228, Data length: 284, Offset + Data length: 1512} 2025/09/12 03:04:30 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:30 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:30 client -> Sending packet 2 (1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:30 client -> Sending packet 3 (1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 1228, Data length: 284, Offset + Data length: 1512} 2025/09/12 03:04:30 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:04:30 client <- Reading packet 1 (38 bytes) for connection (empty), Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d52772b11dfd20d5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:04:30 client Received first packet. Switching destination connection ID to: d52772b11dfd20d5 2025/09/12 03:04:30 client <- &wire.PingFrame{} 2025/09/12 03:04:30 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:04:30 client -> Sending packet 4 (1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: d52772b11dfd20d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:30 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:30 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:30 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:30 client -> Sending packet 5 (1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: d52772b11dfd20d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:04:30 client -> Sending packet 6 (1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: d52772b11dfd20d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 1228, Data length: 284, Offset + Data length: 1512} 2025/09/12 03:04:30 client <- Reading packet 2 (45 bytes) for connection (empty), Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d52772b11dfd20d5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 03:04:30 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 376µs} 2025/09/12 03:04:30 client newly acked packets (1): [6] 2025/09/12 03:04:30 client updated RTT: 33.610179ms (σ: 16.805089ms) 2025/09/12 03:04:30 client setting loss timer for packet 5 (Initial) to 37.811451ms (in 2025-09-12 03:04:30.581704006 +0000 UTC m=+5.894734193) 2025/09/12 03:04:30 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:30.581704006 +0000 UTC m=+5.894734193 2025/09/12 03:04:30 client lost packet 5 (time threshold) 2025/09/12 03:04:30 client -> Sending packet 7 (1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: d52772b11dfd20d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:30 client Parsed a coalesced packet. Part 1: 140 bytes. Remaining: 1060 bytes. 2025/09/12 03:04:30 client <- Reading packet 3 (140 bytes) for connection (empty), Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d52772b11dfd20d5, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 122, Version: v1} 2025/09/12 03:04:30 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 1.688ms} 2025/09/12 03:04:30 client newly acked packets (1): [7] 2025/09/12 03:04:30 client updated RTT: 33.773ms (σ: 12.93ms) 2025/09/12 03:04:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:30 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:30 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:30 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 276 bytes. 2025/09/12 03:04:30 client <- Reading packet 4 (784 bytes) for connection (empty), Handshake 2025/09/12 03:04:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d52772b11dfd20d5, PacketNumber: 4, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 03:04:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 03:04:30 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:30 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, InitialSourceConnectionID: d52772b11dfd20d5, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xffbd50a477414087c1994f64af2b41b1, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:30 client Dropping %!s(logging.PacketType=5) packet (276 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:30 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: d52772b11dfd20d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:30 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:30 client Long Header{Type: Handshake, DestConnectionID: d52772b11dfd20d5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:30 client Dropping Initial keys. 2025/09/12 03:04:30 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:30 client -> Sending packet 1 (86 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, Handshake 2025/09/12 03:04:30 client Long Header{Type: Handshake, DestConnectionID: d52772b11dfd20d5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:30 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:30 client Short Header{DestConnectionID: d52772b11dfd20d5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:30 client <- Reading packet 5 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:30 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:30 client Dropping Handshake keys. 2025/09/12 03:04:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c7624b63390db4c, StatelessResetToken: 0x6086568bab0df08d7c46fd540fc95326} 2025/09/12 03:04:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a8217d5f2b1e5dd, StatelessResetToken: 0x0927db0c040f51235ef842c29c36c4a0} 2025/09/12 03:04:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2cc645b7e27454ba, StatelessResetToken: 0x8c69957fbddd5971e067ce2b530435b6} 2025/09/12 03:04:30 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:30 client -> Sending packet 1 (34 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:30 client Short Header{DestConnectionID: 9c7624b63390db4c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 150.401µs} 2025/09/12 03:04:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:30 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:30 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 03:04:30 client newly acked packets (1): [0] 2025/09/12 03:04:30 client updated RTT: 33.832ms (σ: 9.816ms) 2025/09/12 03:04:30 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:30 client -> Sending packet 3 (29 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:30 client Short Header{DestConnectionID: 9c7624b63390db4c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:30 client -> Sending packet 4 (29 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:30 client Short Header{DestConnectionID: 9c7624b63390db4c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:30 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:30 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client <- &wire.PingFrame{} 2025/09/12 03:04:30 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:30 client -> Sending packet 5 (34 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:30 client Short Header{DestConnectionID: 9c7624b63390db4c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 115.976µs} 2025/09/12 03:04:30 client <- Reading packet 9 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:30 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: aefe76163d517445, StatelessResetToken: 0x75b27f74af501e4521aef104c0737a8e} 2025/09/12 03:04:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:30 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:30 client -> Sending packet 6 (35 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:30 client Short Header{DestConnectionID: 9c7624b63390db4c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 25.320215ms} 2025/09/12 03:04:30 client <- Reading packet 11 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:30 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:30 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:30 client -> Sending packet 7 (1366 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:30 client Short Header{DestConnectionID: 9c7624b63390db4c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.PingFrame{} 2025/09/12 03:04:30 client -> Sending packet 8 (36 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:30 client Short Header{DestConnectionID: 9c7624b63390db4c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 5, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 188.823µs} 2025/09/12 03:04:30 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:30 client -> Sending packet 9 (30 bytes) for connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:30 client Short Header{DestConnectionID: 9c7624b63390db4c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:30 client Connection 2527c3d4d90750f5687d8b18f6d48fb85c0cb29b closed. 2025/09/12 03:04:30 Requesting https://server4:443/bnoljssqzi. 2025/09/12 03:04:30 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:30 Increased send buffer size to 14336 kiB 2025/09/12 03:04:30 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:30 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:30 Created qlog file: /logs/qlog/77df9bbd989095e8da.sqlog 2025/09/12 03:04:30 client Starting new connection to server4 ([::]:54414 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 77df9bbd989095e8da, version v1 2025/09/12 03:04:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:30 client -> Sending packet 0 (1280 bytes) for connection 77df9bbd989095e8da, Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: 77df9bbd989095e8da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:30 client -> Sending packet 1 (1280 bytes) for connection 77df9bbd989095e8da, Initial 2025/09/12 03:04:30 client Long Header{Type: Initial, DestConnectionID: 77df9bbd989095e8da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 03:04:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:31 client -> Sending packet 2 (1280 bytes) for connection 77df9bbd989095e8da, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: 77df9bbd989095e8da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:31 client -> Sending packet 3 (1280 bytes) for connection 77df9bbd989095e8da, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: 77df9bbd989095e8da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 03:04:31 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:31 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:31 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3c29fc164839bedc, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:31 client Received first packet. Switching destination connection ID to: 3c29fc164839bedc 2025/09/12 03:04:31 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.88ms} 2025/09/12 03:04:31 client newly acked packets (1): [2] 2025/09/12 03:04:31 client updated RTT: 35.203154ms (σ: 17.601577ms) 2025/09/12 03:04:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:31 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:31 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:31 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 292 bytes. 2025/09/12 03:04:31 client <- Reading packet 2 (772 bytes) for connection (empty), Handshake 2025/09/12 03:04:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3c29fc164839bedc, PacketNumber: 2, PacketNumberLen: 2, Length: 755, Version: v1} 2025/09/12 03:04:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 03:04:31 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:31 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 77df9bbd989095e8da, InitialSourceConnectionID: 3c29fc164839bedc, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x118a122ff74376cf5697ecc8d6ea16fd, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:31 client Dropping %!s(logging.PacketType=5) packet (292 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 77df9bbd989095e8da 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: 3c29fc164839bedc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:31 client Long Header{Type: Handshake, DestConnectionID: 3c29fc164839bedc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:31 client Dropping Initial keys. 2025/09/12 03:04:31 client -> Sending packet 1 (40 bytes) for connection 77df9bbd989095e8da, Handshake 2025/09/12 03:04:31 client Long Header{Type: Handshake, DestConnectionID: 3c29fc164839bedc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:31 client -> Sending packet 0 (46 bytes) for connection 77df9bbd989095e8da, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:31 client Short Header{DestConnectionID: 3c29fc164839bedc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:31 client <- Reading packet 4 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:31 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:31 client Dropping Handshake keys. 2025/09/12 03:04:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c2dd4841353a00c6, StatelessResetToken: 0x6f7d54b407250b7bd9da8859b96f7dfe} 2025/09/12 03:04:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cbbdf48ba655adbb, StatelessResetToken: 0xb67468525f18b45d8856714344586ea4} 2025/09/12 03:04:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3aa960759d45b496, StatelessResetToken: 0xb73e62f4f09306bd3ef63e981c3bdf3b} 2025/09/12 03:04:31 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:31 client -> Sending packet 1 (34 bytes) for connection 77df9bbd989095e8da, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:31 client Short Header{DestConnectionID: c2dd4841353a00c6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 154.218µs} 2025/09/12 03:04:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:31 client -> Sending packet 3 (46 bytes) for connection 77df9bbd989095e8da, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:31 client Short Header{DestConnectionID: c2dd4841353a00c6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:31 client Skipping packet number 2 2025/09/12 03:04:31 client -> Sending packet 4 (29 bytes) for connection 77df9bbd989095e8da, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:31 client Short Header{DestConnectionID: c2dd4841353a00c6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:31 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:31 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e1772a1e31f87c72, StatelessResetToken: 0xe1a48f4245a12f197978aa3e33244c74} 2025/09/12 03:04:31 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:31 client -> Sending packet 5 (34 bytes) for connection 77df9bbd989095e8da, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:31 client Short Header{DestConnectionID: c2dd4841353a00c6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}}, DelayTime: 108.923µs} 2025/09/12 03:04:31 client <- Reading packet 9 (27 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:31 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 1.384ms} 2025/09/12 03:04:31 client newly acked packets (2): [3 4] 2025/09/12 03:04:31 client updated RTT: 34.931ms (σ: 13.744ms) 2025/09/12 03:04:31 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:31 client Canceling loss detection timer. 2025/09/12 03:04:31 client <- Reading packet 10 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:31 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:31 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:31 client -> Sending packet 6 (1366 bytes) for connection 77df9bbd989095e8da, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:31 client Short Header{DestConnectionID: c2dd4841353a00c6, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.PingFrame{} 2025/09/12 03:04:31 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:31 client -> Sending packet 7 (30 bytes) for connection 77df9bbd989095e8da, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:31 client Short Header{DestConnectionID: c2dd4841353a00c6, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:31 client Connection 77df9bbd989095e8da closed. 2025/09/12 03:04:31 Requesting https://server4:443/paoanqfgcn. 2025/09/12 03:04:31 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:31 Increased send buffer size to 14336 kiB 2025/09/12 03:04:31 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:31 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:31 Created qlog file: /logs/qlog/89a71a9a608cc79d8810d76ca295a6.sqlog 2025/09/12 03:04:31 client Starting new connection to server4 ([::]:34470 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 89a71a9a608cc79d8810d76ca295a6, version v1 2025/09/12 03:04:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:31 client -> Sending packet 0 (1280 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: 89a71a9a608cc79d8810d76ca295a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:31 client -> Sending packet 1 (1280 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: 89a71a9a608cc79d8810d76ca295a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/12 03:04:31 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:31 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0f64dc2fe208a2d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:31 client Received first packet. Switching destination connection ID to: f0f64dc2fe208a2d 2025/09/12 03:04:31 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 832µs} 2025/09/12 03:04:31 client newly acked packets (1): [1] 2025/09/12 03:04:31 client updated RTT: 35.070266ms (σ: 17.535133ms) 2025/09/12 03:04:31 client setting loss timer for packet 0 (Initial) to 39.454049ms (in 2025-09-12 03:04:31.34673713 +0000 UTC m=+6.659767298) 2025/09/12 03:04:31 client <- &wire.PingFrame{} 2025/09/12 03:04:31 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:31 client -> Sending packet 2 (1280 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: f0f64dc2fe208a2d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:31 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:31.34673713 +0000 UTC m=+6.659767298 2025/09/12 03:04:31 client lost packet 0 (time threshold) 2025/09/12 03:04:31 client -> Sending packet 3 (1280 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: f0f64dc2fe208a2d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:31 client -> Sending packet 4 (1280 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: f0f64dc2fe208a2d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:31 client -> Sending packet 5 (1280 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: f0f64dc2fe208a2d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:31 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:31 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0f64dc2fe208a2d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:31 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 1.816ms} 2025/09/12 03:04:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:31 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:31 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:31 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 283 bytes. 2025/09/12 03:04:31 client <- Reading packet 2 (779 bytes) for connection (empty), Handshake 2025/09/12 03:04:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0f64dc2fe208a2d, PacketNumber: 2, PacketNumberLen: 2, Length: 762, Version: v1} 2025/09/12 03:04:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 03:04:31 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:31 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 89a71a9a608cc79d8810d76ca295a6, InitialSourceConnectionID: f0f64dc2fe208a2d, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x037f6326b0ac9b69f30158bd0ce000b8, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:31 client Dropping %!s(logging.PacketType=5) packet (283 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 89a71a9a608cc79d8810d76ca295a6 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: f0f64dc2fe208a2d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:31 client Long Header{Type: Handshake, DestConnectionID: f0f64dc2fe208a2d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:31 client Dropping Initial keys. 2025/09/12 03:04:31 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:31 client -> Sending packet 1 (40 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, Handshake 2025/09/12 03:04:31 client Long Header{Type: Handshake, DestConnectionID: f0f64dc2fe208a2d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:31 client -> Sending packet 0 (46 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:31 client Short Header{DestConnectionID: f0f64dc2fe208a2d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:31 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:31 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:31 client Dropping Handshake keys. 2025/09/12 03:04:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e1069dda095e28e6, StatelessResetToken: 0x6de4eb1da858971eef2eec6b52cdb365} 2025/09/12 03:04:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 21d8bd08237e3ef1, StatelessResetToken: 0x15facfed48e867238a50b51fedd8c777} 2025/09/12 03:04:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d85787698af42e59, StatelessResetToken: 0x7472e4de22eeb923c0e749a663c6da5f} 2025/09/12 03:04:31 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:31 client -> Sending packet 1 (34 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:31 client Short Header{DestConnectionID: e1069dda095e28e6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 156.443µs} 2025/09/12 03:04:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:31 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:31 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.048ms} 2025/09/12 03:04:31 client newly acked packets (1): [0] 2025/09/12 03:04:31 client updated RTT: 36.539ms (σ: 16.089ms) 2025/09/12 03:04:31 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:31 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:31 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:31 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:31 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:31 client -> Sending packet 2 (30 bytes) for connection 89a71a9a608cc79d8810d76ca295a6, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:31 client Short Header{DestConnectionID: e1069dda095e28e6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:31 client Connection 89a71a9a608cc79d8810d76ca295a6 closed. 2025/09/12 03:04:31 Requesting https://server4:443/jgnfsxpwsh. 2025/09/12 03:04:31 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:31 Increased send buffer size to 14336 kiB 2025/09/12 03:04:31 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:31 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:31 Created qlog file: /logs/qlog/a74d55d3de598da58a.sqlog 2025/09/12 03:04:31 client Starting new connection to server4 ([::]:36537 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a74d55d3de598da58a, version v1 2025/09/12 03:04:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:31 client -> Sending packet 0 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: a74d55d3de598da58a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:31 client -> Sending packet 1 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: a74d55d3de598da58a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 03:04:31 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:31 client -> Sending packet 2 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: a74d55d3de598da58a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:31 client -> Sending packet 3 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: a74d55d3de598da58a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 03:04:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:31 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:31 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:04:31 client <- Reading packet 1 (38 bytes) for connection (empty), Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 45ddeaa6cafc091e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:04:31 client Received first packet. Switching destination connection ID to: 45ddeaa6cafc091e 2025/09/12 03:04:31 client <- &wire.PingFrame{} 2025/09/12 03:04:31 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:04:31 client -> Sending packet 4 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:31 client Long Header{Type: Initial, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:32 client -> Sending packet 5 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:32 client -> Sending packet 6 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:32 client <- Reading packet 2 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 45ddeaa6cafc091e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:32 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 392µs} 2025/09/12 03:04:32 client newly acked packets (1): [6] 2025/09/12 03:04:32 client updated RTT: 33.768898ms (σ: 16.884449ms) 2025/09/12 03:04:32 client setting loss timer for packet 5 (Initial) to 37.99001ms (in 2025-09-12 03:04:32.177241099 +0000 UTC m=+7.490271278) 2025/09/12 03:04:32 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:32.177241099 +0000 UTC m=+7.490271278 2025/09/12 03:04:32 client lost packet 5 (time threshold) 2025/09/12 03:04:32 client -> Sending packet 7 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:04:32 client -> Sending packet 8 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:32 client -> Sending packet 9 (1280 bytes) for connection a74d55d3de598da58a, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:32 client Parsed a coalesced packet. Part 1: 140 bytes. Remaining: 1060 bytes. 2025/09/12 03:04:32 client <- Reading packet 4 (140 bytes) for connection (empty), Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 45ddeaa6cafc091e, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 122, Version: v1} 2025/09/12 03:04:32 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 1.968ms} 2025/09/12 03:04:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:32 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:32 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:32 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 287 bytes. 2025/09/12 03:04:32 client <- Reading packet 5 (773 bytes) for connection (empty), Handshake 2025/09/12 03:04:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 45ddeaa6cafc091e, PacketNumber: 5, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 03:04:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 03:04:32 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:32 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a74d55d3de598da58a, InitialSourceConnectionID: 45ddeaa6cafc091e, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1c5fcfc3b74eebd0efedb1c107ba0e25, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:32 client Dropping %!s(logging.PacketType=5) packet (287 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:32 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a74d55d3de598da58a 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 03:04:32 client Long Header{Type: Handshake, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:32 client Dropping Initial keys. 2025/09/12 03:04:32 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:32 client -> Sending packet 1 (86 bytes) for connection a74d55d3de598da58a, Handshake 2025/09/12 03:04:32 client Long Header{Type: Handshake, DestConnectionID: 45ddeaa6cafc091e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 03:04:32 client Short Header{DestConnectionID: 45ddeaa6cafc091e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:32 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:32 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:32 client Dropping Handshake keys. 2025/09/12 03:04:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 43204bd3dfde10b3, StatelessResetToken: 0x2a8a36004a3e26b2b5150eab59c74828} 2025/09/12 03:04:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a6314b56fce72c0a, StatelessResetToken: 0x7d017c1c2ec95b04887cc117c92f6289} 2025/09/12 03:04:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 25b1a4edfb5925d2, StatelessResetToken: 0x68c6b1ecbda0aab5f81c13779b1422f8} 2025/09/12 03:04:32 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:32 client -> Sending packet 1 (34 bytes) for connection a74d55d3de598da58a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:32 client Short Header{DestConnectionID: 43204bd3dfde10b3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 208.339µs} 2025/09/12 03:04:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:32 client <- Reading packet 9 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:32 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a1e502faefa934b4, StatelessResetToken: 0xbec757ed2a4acb2744fbc5edd056b49f} 2025/09/12 03:04:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:32 client -> Sending packet 2 (34 bytes) for connection a74d55d3de598da58a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:32 client Short Header{DestConnectionID: 43204bd3dfde10b3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 131.947µs} 2025/09/12 03:04:32 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:32 client -> Sending packet 4 (46 bytes) for connection a74d55d3de598da58a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:32 client Short Header{DestConnectionID: 43204bd3dfde10b3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:32 client Skipping packet number 3 2025/09/12 03:04:32 client -> Sending packet 5 (29 bytes) for connection a74d55d3de598da58a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:32 client Short Header{DestConnectionID: 43204bd3dfde10b3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:32 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:32 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client <- &wire.PingFrame{} 2025/09/12 03:04:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:32 client -> Sending packet 6 (36 bytes) for connection a74d55d3de598da58a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:32 client Short Header{DestConnectionID: 43204bd3dfde10b3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 118.111µs} 2025/09/12 03:04:32 client <- Reading packet 12 (27 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:32 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 1.496ms} 2025/09/12 03:04:32 client newly acked packets (1): [4] 2025/09/12 03:04:32 client updated RTT: 33.637ms (σ: 12.923ms) 2025/09/12 03:04:32 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:32 client <- Reading packet 13 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:32 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:32 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:32 client -> Sending packet 7 (1366 bytes) for connection a74d55d3de598da58a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:32 client Short Header{DestConnectionID: 43204bd3dfde10b3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.PingFrame{} 2025/09/12 03:04:32 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:32 client -> Sending packet 8 (30 bytes) for connection a74d55d3de598da58a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:32 client Short Header{DestConnectionID: 43204bd3dfde10b3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:32 client Connection a74d55d3de598da58a closed. 2025/09/12 03:04:32 Requesting https://server4:443/kuebxaawas. 2025/09/12 03:04:32 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:32 Increased send buffer size to 14336 kiB 2025/09/12 03:04:32 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:32 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:32 Created qlog file: /logs/qlog/e71654f6d23595fbb1dc.sqlog 2025/09/12 03:04:32 client Starting new connection to server4 ([::]:51374 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e71654f6d23595fbb1dc, version v1 2025/09/12 03:04:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:32 client -> Sending packet 0 (1280 bytes) for connection e71654f6d23595fbb1dc, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: e71654f6d23595fbb1dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:32 client -> Sending packet 1 (1280 bytes) for connection e71654f6d23595fbb1dc, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: e71654f6d23595fbb1dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 1238, Data length: 279, Offset + Data length: 1517} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:32 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:32 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c127f4c627a73122, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:32 client Received first packet. Switching destination connection ID to: c127f4c627a73122 2025/09/12 03:04:32 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 952µs} 2025/09/12 03:04:32 client newly acked packets (1): [0] 2025/09/12 03:04:32 client updated RTT: 34.237939ms (σ: 17.118969ms) 2025/09/12 03:04:32 client <- &wire.PingFrame{} 2025/09/12 03:04:32 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:32 client -> Sending packet 2 (1280 bytes) for connection e71654f6d23595fbb1dc, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: c127f4c627a73122, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:32 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:32 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c127f4c627a73122, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:32 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.28ms} 2025/09/12 03:04:32 client newly acked packets (1): [1] 2025/09/12 03:04:32 client updated RTT: 34.399ms (σ: 13.163ms) 2025/09/12 03:04:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:32 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:32 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:32 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 289 bytes. 2025/09/12 03:04:32 client <- Reading packet 2 (775 bytes) for connection (empty), Handshake 2025/09/12 03:04:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c127f4c627a73122, PacketNumber: 2, PacketNumberLen: 2, Length: 758, Version: v1} 2025/09/12 03:04:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 03:04:32 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:32 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e71654f6d23595fbb1dc, InitialSourceConnectionID: c127f4c627a73122, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd8b0f319e3a8f174fb9990f44ec9f62a, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:32 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:32 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e71654f6d23595fbb1dc 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: c127f4c627a73122, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:32 client Long Header{Type: Handshake, DestConnectionID: c127f4c627a73122, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:32 client Dropping Initial keys. 2025/09/12 03:04:32 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:32 client -> Sending packet 1 (86 bytes) for connection e71654f6d23595fbb1dc, Handshake 2025/09/12 03:04:32 client Long Header{Type: Handshake, DestConnectionID: c127f4c627a73122, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:32 client Short Header{DestConnectionID: c127f4c627a73122, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:32 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:32 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:32 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:32 client -> Sending packet 1 (32 bytes) for connection e71654f6d23595fbb1dc, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:32 client Short Header{DestConnectionID: c127f4c627a73122, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 149.995µs} 2025/09/12 03:04:32 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:32 client -> Sending packet 2 (69 bytes) for connection e71654f6d23595fbb1dc, Handshake 2025/09/12 03:04:32 client Long Header{Type: Handshake, DestConnectionID: c127f4c627a73122, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 03:04:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:32 client Short Header{DestConnectionID: c127f4c627a73122, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:32 client Connection e71654f6d23595fbb1dc closed. 2025/09/12 03:04:32 Requesting https://server4:443/ydsidqtqcq. 2025/09/12 03:04:32 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:32 Increased send buffer size to 14336 kiB 2025/09/12 03:04:32 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:32 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:32 Created qlog file: /logs/qlog/06788598fd79b9e8e3ff04.sqlog 2025/09/12 03:04:32 client Starting new connection to server4 ([::]:54376 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 06788598fd79b9e8e3ff04, version v1 2025/09/12 03:04:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:32 client -> Sending packet 0 (1280 bytes) for connection 06788598fd79b9e8e3ff04, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: 06788598fd79b9e8e3ff04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:32 client -> Sending packet 1 (1280 bytes) for connection 06788598fd79b9e8e3ff04, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: 06788598fd79b9e8e3ff04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 1237, Data length: 274, Offset + Data length: 1511} 2025/09/12 03:04:32 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:32 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:32 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a0e4d1d3b504824c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:32 client Received first packet. Switching destination connection ID to: a0e4d1d3b504824c 2025/09/12 03:04:32 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 912µs} 2025/09/12 03:04:32 client newly acked packets (1): [0] 2025/09/12 03:04:32 client updated RTT: 34.070298ms (σ: 17.035149ms) 2025/09/12 03:04:32 client <- &wire.PingFrame{} 2025/09/12 03:04:32 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:32 client -> Sending packet 2 (1280 bytes) for connection 06788598fd79b9e8e3ff04, Initial 2025/09/12 03:04:32 client Long Header{Type: Initial, DestConnectionID: a0e4d1d3b504824c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:32 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:33 client -> Sending packet 3 (1280 bytes) for connection 06788598fd79b9e8e3ff04, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: a0e4d1d3b504824c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 1237, Data length: 274, Offset + Data length: 1511} 2025/09/12 03:04:33 client -> Sending packet 4 (1280 bytes) for connection 06788598fd79b9e8e3ff04, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: a0e4d1d3b504824c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 1237, Data length: 274, Offset + Data length: 1511} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:33 client <- Reading packet 3 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a0e4d1d3b504824c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:33 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 280µs} 2025/09/12 03:04:33 client newly acked packets (1): [4] 2025/09/12 03:04:33 client updated RTT: 33.971ms (σ: 12.973ms) 2025/09/12 03:04:33 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:33 client <- Reading packet 4 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a0e4d1d3b504824c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:33 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:33 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:33 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 294 bytes. 2025/09/12 03:04:33 client <- Reading packet 5 (776 bytes) for connection (empty), Handshake 2025/09/12 03:04:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a0e4d1d3b504824c, PacketNumber: 5, PacketNumberLen: 2, Length: 759, Version: v1} 2025/09/12 03:04:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 03:04:33 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:33 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 06788598fd79b9e8e3ff04, InitialSourceConnectionID: a0e4d1d3b504824c, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x37f3413d9d91a11ac800638f0ed10c15, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:33 client Dropping %!s(logging.PacketType=5) packet (294 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 06788598fd79b9e8e3ff04 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: a0e4d1d3b504824c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:33 client Long Header{Type: Handshake, DestConnectionID: a0e4d1d3b504824c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:33 client Dropping Initial keys. 2025/09/12 03:04:33 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:33 client -> Sending packet 1 (40 bytes) for connection 06788598fd79b9e8e3ff04, Handshake 2025/09/12 03:04:33 client Long Header{Type: Handshake, DestConnectionID: a0e4d1d3b504824c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:33 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 03:04:33 client -> Sending packet 0 (46 bytes) for connection 06788598fd79b9e8e3ff04, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:33 client Short Header{DestConnectionID: a0e4d1d3b504824c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:33 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:33 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:33 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:33 client Dropping Handshake keys. 2025/09/12 03:04:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c3df061948313c86, StatelessResetToken: 0x66edbb007e56376fa141f7ab42c9d783} 2025/09/12 03:04:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6c92502ba9fcd30d, StatelessResetToken: 0x4bf648ce86f628a0057cd451681e0d2d} 2025/09/12 03:04:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a7e3fc798dd482bd, StatelessResetToken: 0xd5ecd812f04f8c1d6d7880ffc2e8c5cf} 2025/09/12 03:04:33 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:33 client -> Sending packet 1 (34 bytes) for connection 06788598fd79b9e8e3ff04, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:33 client Short Header{DestConnectionID: c3df061948313c86, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:33 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 172.943µs} 2025/09/12 03:04:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:33 client <- Reading packet 7 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:33 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 03:04:33 client newly acked packets (1): [0] 2025/09/12 03:04:33 client updated RTT: 33.903ms (σ: 9.865ms) 2025/09/12 03:04:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:33 client <- Reading packet 8 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:33 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:33 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:33 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:33 client -> Sending packet 2 (30 bytes) for connection 06788598fd79b9e8e3ff04, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:33 client Short Header{DestConnectionID: c3df061948313c86, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:33 client Connection 06788598fd79b9e8e3ff04 closed. 2025/09/12 03:04:33 Requesting https://server4:443/rrmuifpiuj. 2025/09/12 03:04:33 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:33 Increased send buffer size to 14336 kiB 2025/09/12 03:04:33 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:33 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:33 Created qlog file: /logs/qlog/62f98143f3662e515a.sqlog 2025/09/12 03:04:33 client Starting new connection to server4 ([::]:53289 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 62f98143f3662e515a, version v1 2025/09/12 03:04:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:33 client -> Sending packet 0 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: 62f98143f3662e515a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:33 client -> Sending packet 1 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: 62f98143f3662e515a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 03:04:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:33 client -> Sending packet 2 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: 62f98143f3662e515a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:33 client -> Sending packet 3 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: 62f98143f3662e515a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 03:04:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:33 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:04:33 client <- Reading packet 1 (38 bytes) for connection (empty), Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1e8f91fdb36750a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:04:33 client Received first packet. Switching destination connection ID to: e1e8f91fdb36750a 2025/09/12 03:04:33 client <- &wire.PingFrame{} 2025/09/12 03:04:33 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:04:33 client -> Sending packet 4 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:33 client -> Sending packet 5 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:33 client -> Sending packet 6 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:33 client Long Header{Type: Initial, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 03:04:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:04:34 client -> Sending packet 7 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:34 client -> Sending packet 8 (1280 bytes) for connection 62f98143f3662e515a, Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 03:04:34 client <- Reading packet 2 (45 bytes) for connection (empty), Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1e8f91fdb36750a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 03:04:34 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 408µs} 2025/09/12 03:04:34 client newly acked packets (1): [7] 2025/09/12 03:04:34 client updated RTT: 32.76246ms (σ: 16.38123ms) 2025/09/12 03:04:34 client Parsed a coalesced packet. Part 1: 140 bytes. Remaining: 1060 bytes. 2025/09/12 03:04:34 client <- Reading packet 3 (140 bytes) for connection (empty), Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1e8f91fdb36750a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 122, Version: v1} 2025/09/12 03:04:34 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 1.72ms} 2025/09/12 03:04:34 client newly acked packets (1): [8] 2025/09/12 03:04:34 client updated RTT: 33.139ms (σ: 13.04ms) 2025/09/12 03:04:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:34 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:34 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:34 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 286 bytes. 2025/09/12 03:04:34 client <- Reading packet 4 (774 bytes) for connection (empty), Handshake 2025/09/12 03:04:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1e8f91fdb36750a, PacketNumber: 4, PacketNumberLen: 2, Length: 757, Version: v1} 2025/09/12 03:04:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 03:04:34 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:34 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 62f98143f3662e515a, InitialSourceConnectionID: e1e8f91fdb36750a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x66709c12284164bfa20c944554837f48, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:34 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 62f98143f3662e515a 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:34 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:34 client Long Header{Type: Handshake, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:34 client Dropping Initial keys. 2025/09/12 03:04:34 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:34 client -> Sending packet 1 (40 bytes) for connection 62f98143f3662e515a, Handshake 2025/09/12 03:04:34 client Long Header{Type: Handshake, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:34 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:34 client -> Sending packet 0 (46 bytes) for connection 62f98143f3662e515a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:34 client Short Header{DestConnectionID: e1e8f91fdb36750a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:34 client -> Sending packet 2 (90 bytes) for connection 62f98143f3662e515a, Handshake 2025/09/12 03:04:34 client Long Header{Type: Handshake, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:34 client -> Sending packet 3 (90 bytes) for connection 62f98143f3662e515a, Handshake 2025/09/12 03:04:34 client Long Header{Type: Handshake, DestConnectionID: e1e8f91fdb36750a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:34 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:34 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client <- &wire.PingFrame{} 2025/09/12 03:04:34 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:34 client -> Sending packet 1 (32 bytes) for connection 62f98143f3662e515a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:34 client Short Header{DestConnectionID: e1e8f91fdb36750a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 116.908µs} 2025/09/12 03:04:34 client <- Reading packet 7 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:34 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:34 client Dropping Handshake keys. 2025/09/12 03:04:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 15fd82b5752d4a4e, StatelessResetToken: 0x5c37013e3a1bf2dcf343fb71ee500f6c} 2025/09/12 03:04:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40358fcc11e7d66f, StatelessResetToken: 0xd0519fc5216e7bbd06df0629b24bfd82} 2025/09/12 03:04:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 67c733d0311568fa, StatelessResetToken: 0xb81b7411356a7be4b23f3c173e33137d} 2025/09/12 03:04:34 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:34 client -> Sending packet 3 (53 bytes) for connection 62f98143f3662e515a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:34 client Short Header{DestConnectionID: 15fd82b5752d4a4e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 180.437µs} 2025/09/12 03:04:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:34 client -> Sending packet 4 (48 bytes) for connection 62f98143f3662e515a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:34 client Short Header{DestConnectionID: 15fd82b5752d4a4e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:34 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:34 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2c5ba55ecdb03fc1, StatelessResetToken: 0x86d959396ab0ac68540408bf0e33970c} 2025/09/12 03:04:34 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:34 client <- Reading packet 10 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:34 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:34 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:04:34 client -> Sending packet 5 (34 bytes) for connection 62f98143f3662e515a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:34 client Short Header{DestConnectionID: 15fd82b5752d4a4e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}}, DelayTime: 116.878µs} 2025/09/12 03:04:34 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:34 client -> Sending packet 6 (30 bytes) for connection 62f98143f3662e515a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:34 client Short Header{DestConnectionID: 15fd82b5752d4a4e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:34 client Connection 62f98143f3662e515a closed. 2025/09/12 03:04:34 Requesting https://server4:443/zctuvfefyx. 2025/09/12 03:04:34 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:34 Increased send buffer size to 14336 kiB 2025/09/12 03:04:34 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:34 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:34 Created qlog file: /logs/qlog/c3cfba934003711e45551a2afec276d9.sqlog 2025/09/12 03:04:34 client Starting new connection to server4 ([::]:52036 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c3cfba934003711e45551a2afec276d9, version v1 2025/09/12 03:04:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:34 client -> Sending packet 0 (1280 bytes) for connection c3cfba934003711e45551a2afec276d9, Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: c3cfba934003711e45551a2afec276d9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:34 client -> Sending packet 1 (1280 bytes) for connection c3cfba934003711e45551a2afec276d9, Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: c3cfba934003711e45551a2afec276d9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 1232, Data length: 284, Offset + Data length: 1516} 2025/09/12 03:04:34 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:34 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 814e3a46b74424e8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:34 client Received first packet. Switching destination connection ID to: 814e3a46b74424e8 2025/09/12 03:04:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.032ms} 2025/09/12 03:04:34 client newly acked packets (1): [0] 2025/09/12 03:04:34 client updated RTT: 34.107434ms (σ: 17.053717ms) 2025/09/12 03:04:34 client <- &wire.PingFrame{} 2025/09/12 03:04:34 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:34 client -> Sending packet 2 (1280 bytes) for connection c3cfba934003711e45551a2afec276d9, Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:34 client -> Sending packet 3 (1280 bytes) for connection c3cfba934003711e45551a2afec276d9, Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 1232, Data length: 284, Offset + Data length: 1516} 2025/09/12 03:04:34 client -> Sending packet 4 (1280 bytes) for connection c3cfba934003711e45551a2afec276d9, Initial 2025/09/12 03:04:34 client Long Header{Type: Initial, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 1232, Data length: 284, Offset + Data length: 1516} 2025/09/12 03:04:34 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:35 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:35 client -> Sending packet 5 (1280 bytes) for connection c3cfba934003711e45551a2afec276d9, Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 1232, Data length: 284, Offset + Data length: 1516} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:35 client -> Sending packet 6 (1280 bytes) for connection c3cfba934003711e45551a2afec276d9, Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 1232, Data length: 284, Offset + Data length: 1516} 2025/09/12 03:04:35 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:35 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 814e3a46b74424e8, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:35 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 1.928ms} 2025/09/12 03:04:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:35 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:35 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:35 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 283 bytes. 2025/09/12 03:04:35 client <- Reading packet 2 (779 bytes) for connection (empty), Handshake 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 814e3a46b74424e8, PacketNumber: 2, PacketNumberLen: 2, Length: 762, Version: v1} 2025/09/12 03:04:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 03:04:35 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:35 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c3cfba934003711e45551a2afec276d9, InitialSourceConnectionID: 814e3a46b74424e8, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa882ed29c4c78274ec30af967f2e655b, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:35 client Dropping %!s(logging.PacketType=5) packet (283 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:35 client <- Reading packet 3 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 814e3a46b74424e8, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:35 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 232µs} 2025/09/12 03:04:35 client newly acked packets (1): [6] 2025/09/12 03:04:35 client updated RTT: 34.278ms (σ: 13.132ms) 2025/09/12 03:04:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c3cfba934003711e45551a2afec276d9 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/09/12 03:04:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:35 client Short Header{DestConnectionID: 814e3a46b74424e8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:35 client Dropping Initial keys. 2025/09/12 03:04:35 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:35 client -> Sending packet 1 (40 bytes) for connection c3cfba934003711e45551a2afec276d9, Handshake 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:35 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:35 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:35 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:35 client -> Sending packet 1 (32 bytes) for connection c3cfba934003711e45551a2afec276d9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:35 client Short Header{DestConnectionID: 814e3a46b74424e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 125.243µs} 2025/09/12 03:04:35 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:35 client -> Sending packet 2 (69 bytes) for connection c3cfba934003711e45551a2afec276d9, Handshake 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: 814e3a46b74424e8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 03:04:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:35 client Short Header{DestConnectionID: 814e3a46b74424e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:35 client Connection c3cfba934003711e45551a2afec276d9 closed. 2025/09/12 03:04:35 Requesting https://server4:443/loopefnfmi. 2025/09/12 03:04:35 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:35 Increased send buffer size to 14336 kiB 2025/09/12 03:04:35 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:35 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:35 Created qlog file: /logs/qlog/018b4a0a96c9435f6551a6d1407d72d727e49a.sqlog 2025/09/12 03:04:35 client Starting new connection to server4 ([::]:54833 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 018b4a0a96c9435f6551a6d1407d72d727e49a, version v1 2025/09/12 03:04:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:35 client -> Sending packet 0 (1280 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: 018b4a0a96c9435f6551a6d1407d72d727e49a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:35 client -> Sending packet 1 (1280 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: 018b4a0a96c9435f6551a6d1407d72d727e49a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 1229, Data length: 283, Offset + Data length: 1512} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:35 client -> Sending packet 2 (1280 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: 018b4a0a96c9435f6551a6d1407d72d727e49a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:04:35 client -> Sending packet 3 (1280 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: 018b4a0a96c9435f6551a6d1407d72d727e49a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 1229, Data length: 283, Offset + Data length: 1512} 2025/09/12 03:04:35 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:35 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:35 client <- Reading packet 3 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 66f89634d001151c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:35 client Received first packet. Switching destination connection ID to: 66f89634d001151c 2025/09/12 03:04:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:35 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:35 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:35 client Parsed a coalesced packet. Part 2: 783 bytes. Remaining: 287 bytes. 2025/09/12 03:04:35 client <- Reading packet 4 (783 bytes) for connection (empty), Handshake 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 66f89634d001151c, PacketNumber: 4, PacketNumberLen: 2, Length: 766, Version: v1} 2025/09/12 03:04:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/09/12 03:04:35 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:35 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 018b4a0a96c9435f6551a6d1407d72d727e49a, InitialSourceConnectionID: 66f89634d001151c, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x601abc6100324a93d5a0258f5463f538, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:35 client Dropping %!s(logging.PacketType=5) packet (287 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a 2025/09/12 03:04:35 client Long Header{Type: Initial, DestConnectionID: 66f89634d001151c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: 66f89634d001151c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:35 client Dropping Initial keys. 2025/09/12 03:04:35 client -> Sending packet 1 (40 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, Handshake 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: 66f89634d001151c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:35 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:35 client -> Sending packet 0 (46 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:35 client Short Header{DestConnectionID: 66f89634d001151c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:35 client -> Sending packet 2 (90 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, Handshake 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: 66f89634d001151c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:35 client -> Sending packet 3 (90 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, Handshake 2025/09/12 03:04:35 client Long Header{Type: Handshake, DestConnectionID: 66f89634d001151c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:35 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:35 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client <- &wire.PingFrame{} 2025/09/12 03:04:35 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:35 client -> Sending packet 1 (32 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:35 client Short Header{DestConnectionID: 66f89634d001151c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 113.652µs} 2025/09/12 03:04:35 client <- Reading packet 7 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:35 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:35 client Dropping Handshake keys. 2025/09/12 03:04:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f21c5d0acd0c3ef0, StatelessResetToken: 0x0e0929373f801699f4b4e60d356906d7} 2025/09/12 03:04:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1d844dae4b8b1d59, StatelessResetToken: 0x640297877821d1fd42a3f64ce3532bf7} 2025/09/12 03:04:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e26779f8cfde2ec3, StatelessResetToken: 0x8891942ae4a5d26feb86f3f1e6b88702} 2025/09/12 03:04:35 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:35 client -> Sending packet 3 (53 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:35 client Short Header{DestConnectionID: f21c5d0acd0c3ef0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 181.168µs} 2025/09/12 03:04:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:35 client -> Sending packet 4 (48 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:35 client Short Header{DestConnectionID: f21c5d0acd0c3ef0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:35 client -> Sending packet 5 (1366 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:35 client Short Header{DestConnectionID: f21c5d0acd0c3ef0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client -> &wire.PingFrame{} 2025/09/12 03:04:35 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:35 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bfa887343cdc3f27, StatelessResetToken: 0x06f6caede9fe842899a96ec1634d0eb1} 2025/09/12 03:04:35 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:36 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:36 client -> Sending packet 6 (33 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: f21c5d0acd0c3ef0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 25.353376ms} 2025/09/12 03:04:36 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:36 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client <- &wire.PingFrame{} 2025/09/12 03:04:36 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:36 client -> Sending packet 7 (34 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: f21c5d0acd0c3ef0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 6}}, DelayTime: 115.876µs} 2025/09/12 03:04:36 client <- Reading packet 13 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:36 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client <- &wire.PingFrame{} 2025/09/12 03:04:36 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:36 client -> Sending packet 8 (36 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: f21c5d0acd0c3ef0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 6}}, DelayTime: 120.485µs} 2025/09/12 03:04:36 client <- Reading packet 14 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:36 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:36 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:36 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:36 client -> Sending packet 9 (30 bytes) for connection 018b4a0a96c9435f6551a6d1407d72d727e49a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: f21c5d0acd0c3ef0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:36 client Connection 018b4a0a96c9435f6551a6d1407d72d727e49a closed. 2025/09/12 03:04:36 Requesting https://server4:443/jlfhweutza. 2025/09/12 03:04:36 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:36 Increased send buffer size to 14336 kiB 2025/09/12 03:04:36 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:36 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:36 Created qlog file: /logs/qlog/83324966339a3228c1d1.sqlog 2025/09/12 03:04:36 client Starting new connection to server4 ([::]:45246 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 83324966339a3228c1d1, version v1 2025/09/12 03:04:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:36 client -> Sending packet 0 (1280 bytes) for connection 83324966339a3228c1d1, Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 83324966339a3228c1d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:36 client -> Sending packet 1 (1280 bytes) for connection 83324966339a3228c1d1, Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 83324966339a3228c1d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:36 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:36 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4baee5bfe6bd1f76, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:36 client Received first packet. Switching destination connection ID to: 4baee5bfe6bd1f76 2025/09/12 03:04:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.304ms} 2025/09/12 03:04:36 client newly acked packets (1): [0] 2025/09/12 03:04:36 client updated RTT: 34.640552ms (σ: 17.320276ms) 2025/09/12 03:04:36 client <- &wire.PingFrame{} 2025/09/12 03:04:36 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:36 client -> Sending packet 2 (1280 bytes) for connection 83324966339a3228c1d1, Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 4baee5bfe6bd1f76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:36 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:36 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4baee5bfe6bd1f76, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:36 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.456ms} 2025/09/12 03:04:36 client newly acked packets (1): [1] 2025/09/12 03:04:36 client updated RTT: 34.824ms (σ: 13.358ms) 2025/09/12 03:04:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:36 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:36 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:36 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 290 bytes. 2025/09/12 03:04:36 client <- Reading packet 2 (774 bytes) for connection (empty), Handshake 2025/09/12 03:04:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4baee5bfe6bd1f76, PacketNumber: 2, PacketNumberLen: 2, Length: 757, Version: v1} 2025/09/12 03:04:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 03:04:36 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:36 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 83324966339a3228c1d1, InitialSourceConnectionID: 4baee5bfe6bd1f76, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7022eef6a3fd5ac79c0c4bb6a1395a9a, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:36 client Dropping %!s(logging.PacketType=5) packet (290 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 83324966339a3228c1d1 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 4baee5bfe6bd1f76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:36 client Long Header{Type: Handshake, DestConnectionID: 4baee5bfe6bd1f76, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:36 client Dropping Initial keys. 2025/09/12 03:04:36 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:36 client -> Sending packet 1 (40 bytes) for connection 83324966339a3228c1d1, Handshake 2025/09/12 03:04:36 client Long Header{Type: Handshake, DestConnectionID: 4baee5bfe6bd1f76, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:36 client -> Sending packet 0 (46 bytes) for connection 83324966339a3228c1d1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 4baee5bfe6bd1f76, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:36 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:36 client Dropping Handshake keys. 2025/09/12 03:04:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c42b64d3f0284a8, StatelessResetToken: 0xdb6edef0398883af86b96b3d915d2abf} 2025/09/12 03:04:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 34d218d989cb1cd3, StatelessResetToken: 0x71d12716f8bbce4088be0f7203177508} 2025/09/12 03:04:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4899d55e97e93812, StatelessResetToken: 0x8fd2a3ea77f435eef85a35b8593489d7} 2025/09/12 03:04:36 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:36 client -> Sending packet 1 (34 bytes) for connection 83324966339a3228c1d1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 6c42b64d3f0284a8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 156.742µs} 2025/09/12 03:04:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:36 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:36 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.048ms} 2025/09/12 03:04:36 client newly acked packets (1): [0] 2025/09/12 03:04:36 client updated RTT: 34.823ms (σ: 10.018ms) 2025/09/12 03:04:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:36 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:36 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:36 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:36 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:36 client -> Sending packet 2 (30 bytes) for connection 83324966339a3228c1d1, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 6c42b64d3f0284a8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:36 client Connection 83324966339a3228c1d1 closed. 2025/09/12 03:04:36 Requesting https://server4:443/itxiestfxt. 2025/09/12 03:04:36 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:36 Increased send buffer size to 14336 kiB 2025/09/12 03:04:36 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:36 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:36 Created qlog file: /logs/qlog/835eb64475b87d9ccacd9aa765.sqlog 2025/09/12 03:04:36 client Starting new connection to server4 ([::]:41971 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 835eb64475b87d9ccacd9aa765, version v1 2025/09/12 03:04:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:36 client -> Sending packet 0 (1280 bytes) for connection 835eb64475b87d9ccacd9aa765, Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 835eb64475b87d9ccacd9aa765, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:04:36 client -> Sending packet 1 (1280 bytes) for connection 835eb64475b87d9ccacd9aa765, Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 835eb64475b87d9ccacd9aa765, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/12 03:04:36 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:36 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6e3a629cdcfd4e3a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:36 client Received first packet. Switching destination connection ID to: 6e3a629cdcfd4e3a 2025/09/12 03:04:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 904µs} 2025/09/12 03:04:36 client newly acked packets (1): [0] 2025/09/12 03:04:36 client updated RTT: 34.040792ms (σ: 17.020396ms) 2025/09/12 03:04:36 client <- &wire.PingFrame{} 2025/09/12 03:04:36 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:36 client -> Sending packet 2 (1280 bytes) for connection 835eb64475b87d9ccacd9aa765, Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 6e3a629cdcfd4e3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:36 client -> Sending packet 3 (1280 bytes) for connection 835eb64475b87d9ccacd9aa765, Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 6e3a629cdcfd4e3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:36 client -> Sending packet 4 (1280 bytes) for connection 835eb64475b87d9ccacd9aa765, Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 6e3a629cdcfd4e3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:36 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:36 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6e3a629cdcfd4e3a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:36 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 1.704ms} 2025/09/12 03:04:36 client newly acked packets (1): [4] 2025/09/12 03:04:36 client updated RTT: 34.283ms (σ: 13.252ms) 2025/09/12 03:04:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:36 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:36 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:36 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 286 bytes. 2025/09/12 03:04:36 client <- Reading packet 2 (776 bytes) for connection (empty), Handshake 2025/09/12 03:04:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6e3a629cdcfd4e3a, PacketNumber: 2, PacketNumberLen: 2, Length: 759, Version: v1} 2025/09/12 03:04:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 03:04:36 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:36 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 835eb64475b87d9ccacd9aa765, InitialSourceConnectionID: 6e3a629cdcfd4e3a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3f4d6fccf8e61c67ee972df33cbd3c2d, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:36 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 835eb64475b87d9ccacd9aa765 2025/09/12 03:04:36 client Long Header{Type: Initial, DestConnectionID: 6e3a629cdcfd4e3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:36 client Long Header{Type: Handshake, DestConnectionID: 6e3a629cdcfd4e3a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:36 client Dropping Initial keys. 2025/09/12 03:04:36 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:36 client -> Sending packet 1 (40 bytes) for connection 835eb64475b87d9ccacd9aa765, Handshake 2025/09/12 03:04:36 client Long Header{Type: Handshake, DestConnectionID: 6e3a629cdcfd4e3a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:36 client -> Sending packet 0 (46 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 6e3a629cdcfd4e3a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:36 client -> Sending packet 2 (90 bytes) for connection 835eb64475b87d9ccacd9aa765, Handshake 2025/09/12 03:04:36 client Long Header{Type: Handshake, DestConnectionID: 6e3a629cdcfd4e3a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:36 client -> Sending packet 3 (90 bytes) for connection 835eb64475b87d9ccacd9aa765, Handshake 2025/09/12 03:04:36 client Long Header{Type: Handshake, DestConnectionID: 6e3a629cdcfd4e3a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:36 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:36 client Dropping Handshake keys. 2025/09/12 03:04:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 87e6e0c0eb32c7cc, StatelessResetToken: 0xa1a18a580a205944340525a71283c026} 2025/09/12 03:04:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 72745933099b7a45, StatelessResetToken: 0x7c0d3012a38d11ef3f7ee1721788a0b7} 2025/09/12 03:04:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 96d96cb9f9ef61e2, StatelessResetToken: 0x8ff77736e1d4da9b3d0e715d3c6e6066} 2025/09/12 03:04:36 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:36 client -> Sending packet 2 (53 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 166.14µs} 2025/09/12 03:04:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:36 client -> Sending packet 3 (48 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:36 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:36 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client <- &wire.PingFrame{} 2025/09/12 03:04:36 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:36 client -> Sending packet 4 (34 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 100.288µs} 2025/09/12 03:04:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:04:36 client -> Sending packet 6 (48 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:36 client -> Sending packet 7 (48 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:36 client -> Sending packet 8 (1366 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:36 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:36 client -> &wire.PingFrame{} 2025/09/12 03:04:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:37 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:37 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client <- &wire.PingFrame{} 2025/09/12 03:04:37 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:37 client -> Sending packet 9 (36 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:37 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 198.65µs} 2025/09/12 03:04:37 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:37 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client <- &wire.PingFrame{} 2025/09/12 03:04:37 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:37 client -> Sending packet 10 (38 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:37 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 3, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 122.919µs} 2025/09/12 03:04:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 03:04:37 client Skipping packet number 12 2025/09/12 03:04:37 client -> Sending packet 13 (48 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:37 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:37 client -> Sending packet 14 (48 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:37 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:37 client <- Reading packet 14 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:37 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client <- &wire.PingFrame{} 2025/09/12 03:04:37 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:37 client -> Sending packet 15 (40 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:37 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 3, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 113.301µs} 2025/09/12 03:04:37 client <- Reading packet 15 (1075 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:37 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4989b4c0b7d91a10, StatelessResetToken: 0x398ddbfa09c06d80bd866e3e33716a5c} 2025/09/12 03:04:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:37 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:37 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:37 client -> Sending packet 16 (30 bytes) for connection 835eb64475b87d9ccacd9aa765, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:37 client Short Header{DestConnectionID: 87e6e0c0eb32c7cc, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:37 client Connection 835eb64475b87d9ccacd9aa765 closed. 2025/09/12 03:04:37 Requesting https://server4:443/wmzvlsjrck. 2025/09/12 03:04:37 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:37 Increased send buffer size to 14336 kiB 2025/09/12 03:04:37 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:37 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:37 Created qlog file: /logs/qlog/9ad087a05b54f13b96d71b2733975bda2d.sqlog 2025/09/12 03:04:37 client Starting new connection to server4 ([::]:34807 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9ad087a05b54f13b96d71b2733975bda2d, version v1 2025/09/12 03:04:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:37 client -> Sending packet 0 (1280 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 9ad087a05b54f13b96d71b2733975bda2d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:37 client -> Sending packet 1 (1280 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 9ad087a05b54f13b96d71b2733975bda2d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:37 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:37 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 88f253a1d0a1fb7c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:37 client Received first packet. Switching destination connection ID to: 88f253a1d0a1fb7c 2025/09/12 03:04:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 968µs} 2025/09/12 03:04:37 client newly acked packets (1): [0] 2025/09/12 03:04:37 client updated RTT: 34.254453ms (σ: 17.127226ms) 2025/09/12 03:04:37 client <- &wire.PingFrame{} 2025/09/12 03:04:37 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:37 client -> Sending packet 2 (1280 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 88f253a1d0a1fb7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:37 client -> Sending packet 3 (1280 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 88f253a1d0a1fb7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 03:04:37 client -> Sending packet 4 (1280 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 88f253a1d0a1fb7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 03:04:37 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:37 client -> Sending packet 5 (1280 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 88f253a1d0a1fb7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 03:04:37 client -> Sending packet 6 (1280 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 88f253a1d0a1fb7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 03:04:37 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:37 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 88f253a1d0a1fb7c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:37 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 1.88ms} 2025/09/12 03:04:37 client newly acked packets (1): [6] 2025/09/12 03:04:37 client updated RTT: 34.495ms (σ: 13.327ms) 2025/09/12 03:04:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:37 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:37 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:37 client Parsed a coalesced packet. Part 2: 782 bytes. Remaining: 280 bytes. 2025/09/12 03:04:37 client <- Reading packet 2 (782 bytes) for connection (empty), Handshake 2025/09/12 03:04:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 88f253a1d0a1fb7c, PacketNumber: 2, PacketNumberLen: 2, Length: 765, Version: v1} 2025/09/12 03:04:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/09/12 03:04:37 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:37 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9ad087a05b54f13b96d71b2733975bda2d, InitialSourceConnectionID: 88f253a1d0a1fb7c, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x171d43c2b72d1809fceb1636cadee04e, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:37 client Dropping %!s(logging.PacketType=5) packet (280 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 88f253a1d0a1fb7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/09/12 03:04:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:37 client Long Header{Type: Handshake, DestConnectionID: 88f253a1d0a1fb7c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:37 client Short Header{DestConnectionID: 88f253a1d0a1fb7c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:37 client Dropping Initial keys. 2025/09/12 03:04:37 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:37 client -> Sending packet 1 (40 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, Handshake 2025/09/12 03:04:37 client Long Header{Type: Handshake, DestConnectionID: 88f253a1d0a1fb7c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:37 client <- Reading packet 3 (110 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:37 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.208ms} 2025/09/12 03:04:37 client Peer doesn't await address validation any longer. 2025/09/12 03:04:37 client newly acked packets (1): [0] 2025/09/12 03:04:37 client updated RTT: 34.365ms (σ: 10.253ms) 2025/09/12 03:04:37 client Canceling loss detection timer. 2025/09/12 03:04:37 client Dropping Handshake keys. 2025/09/12 03:04:37 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9915552aa2b290c, StatelessResetToken: 0xf68d252f5990bce0c6219baa7d3a4c74} 2025/09/12 03:04:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a4b70357c1b3db67, StatelessResetToken: 0x0aaaeae687503e716eb3003cb6fc75e6} 2025/09/12 03:04:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b2acf0ab48673746, StatelessResetToken: 0xeb55af54f9daac3b9e28ac7bec86751f} 2025/09/12 03:04:37 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:37 client -> Sending packet 1 (34 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:37 client Short Header{DestConnectionID: f9915552aa2b290c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 206.706µs} 2025/09/12 03:04:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:37 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:37 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8179683b4ff7710f, StatelessResetToken: 0x12524e08c7e7bfeddeca5e1db56814c0} 2025/09/12 03:04:37 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:37 client -> Sending packet 2 (34 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:37 client Short Header{DestConnectionID: f9915552aa2b290c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 134.32µs} 2025/09/12 03:04:37 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:37 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.76ms} 2025/09/12 03:04:37 client newly acked packets (1): [1] 2025/09/12 03:04:37 client updated RTT: 34.158ms (σ: 8.103ms) 2025/09/12 03:04:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:37 client Canceling loss detection timer. 2025/09/12 03:04:37 client Ignoring all packets below 4. 2025/09/12 03:04:37 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:37 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:37 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:37 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:37 client -> Sending packet 3 (30 bytes) for connection 9ad087a05b54f13b96d71b2733975bda2d, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:37 client Short Header{DestConnectionID: f9915552aa2b290c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:37 client Connection 9ad087a05b54f13b96d71b2733975bda2d closed. 2025/09/12 03:04:37 Requesting https://server4:443/odlloluwib. 2025/09/12 03:04:37 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:37 Increased send buffer size to 14336 kiB 2025/09/12 03:04:37 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:37 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:37 Created qlog file: /logs/qlog/9c969473515c2744929cbe9194.sqlog 2025/09/12 03:04:37 client Starting new connection to server4 ([::]:34312 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9c969473515c2744929cbe9194, version v1 2025/09/12 03:04:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:37 client -> Sending packet 0 (1280 bytes) for connection 9c969473515c2744929cbe9194, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 9c969473515c2744929cbe9194, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:04:37 client -> Sending packet 1 (1280 bytes) for connection 9c969473515c2744929cbe9194, Initial 2025/09/12 03:04:37 client Long Header{Type: Initial, DestConnectionID: 9c969473515c2744929cbe9194, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:37 client -> &wire.CryptoFrame{Offset: 1235, Data length: 283, Offset + Data length: 1518} 2025/09/12 03:04:37 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:38 client -> Sending packet 2 (1280 bytes) for connection 9c969473515c2744929cbe9194, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 9c969473515c2744929cbe9194, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:04:38 client -> Sending packet 3 (1280 bytes) for connection 9c969473515c2744929cbe9194, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 9c969473515c2744929cbe9194, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 1235, Data length: 283, Offset + Data length: 1518} 2025/09/12 03:04:38 client <- Reading packet 1 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e8e236a2f0afef5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:38 client Received first packet. Switching destination connection ID to: 2e8e236a2f0afef5 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 440µs} 2025/09/12 03:04:38 client newly acked packets (1): [2] 2025/09/12 03:04:38 client updated RTT: 32.689375ms (σ: 16.344687ms) 2025/09/12 03:04:38 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:04:38 client <- Reading packet 2 (38 bytes) for connection (empty), Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e8e236a2f0afef5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:04:38 client <- &wire.PingFrame{} 2025/09/12 03:04:38 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:04:38 client -> Sending packet 4 (1280 bytes) for connection 9c969473515c2744929cbe9194, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:38 client -> Sending packet 5 (1280 bytes) for connection 9c969473515c2744929cbe9194, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 1235, Data length: 283, Offset + Data length: 1518} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:38 client -> Sending packet 6 (1280 bytes) for connection 9c969473515c2744929cbe9194, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 1235, Data length: 283, Offset + Data length: 1518} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:38 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:38 client <- Reading packet 3 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e8e236a2f0afef5, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 2.128ms} 2025/09/12 03:04:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:38 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:38 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:38 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 288 bytes. 2025/09/12 03:04:38 client <- Reading packet 4 (776 bytes) for connection (empty), Handshake 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2e8e236a2f0afef5, PacketNumber: 4, PacketNumberLen: 2, Length: 759, Version: v1} 2025/09/12 03:04:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 03:04:38 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:38 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9c969473515c2744929cbe9194, InitialSourceConnectionID: 2e8e236a2f0afef5, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x50f06304675ff8e389094f097c2fc629, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:38 client Dropping %!s(logging.PacketType=5) packet (288 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:38 client <- Reading packet 5 (41 bytes) for connection (empty), Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e8e236a2f0afef5, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 240µs} 2025/09/12 03:04:38 client newly acked packets (1): [6] 2025/09/12 03:04:38 client updated RTT: 33.045ms (σ: 12.97ms) 2025/09/12 03:04:38 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9c969473515c2744929cbe9194 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s} 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:38 client Dropping Initial keys. 2025/09/12 03:04:38 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:38 client -> Sending packet 1 (86 bytes) for connection 9c969473515c2744929cbe9194, Handshake 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:38 client Short Header{DestConnectionID: 2e8e236a2f0afef5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:38 client -> Sending packet 2 (90 bytes) for connection 9c969473515c2744929cbe9194, Handshake 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:38 client -> Sending packet 3 (90 bytes) for connection 9c969473515c2744929cbe9194, Handshake 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:04:38 client -> Sending packet 4 (90 bytes) for connection 9c969473515c2744929cbe9194, Handshake 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:38 client -> Sending packet 5 (90 bytes) for connection 9c969473515c2744929cbe9194, Handshake 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: 2e8e236a2f0afef5, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:38 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:38 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:38 client Dropping Handshake keys. 2025/09/12 03:04:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e5a8cf1f095d6ec, StatelessResetToken: 0x0a88eb0de6503c3359015858f2383599} 2025/09/12 03:04:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1a1881d3c6a45f72, StatelessResetToken: 0xda796ce9cced585c76140a6abc102976} 2025/09/12 03:04:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a0670c7926e8bd16, StatelessResetToken: 0xc20709a3e1c00c1a934cffd00e3b5df0} 2025/09/12 03:04:38 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:38 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:38 client -> Sending packet 2 (53 bytes) for connection 9c969473515c2744929cbe9194, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 1e5a8cf1f095d6ec, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 151.313µs} 2025/09/12 03:04:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:38 client -> Sending packet 3 (48 bytes) for connection 9c969473515c2744929cbe9194, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 1e5a8cf1f095d6ec, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:38 client <- Reading packet 7 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:38 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7988cda4353edf2f, StatelessResetToken: 0x97a1ff49791432be6862bf81cea1d0ec} 2025/09/12 03:04:38 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:38 client <- Reading packet 8 (24 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:38 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 80µs} 2025/09/12 03:04:38 client newly acked packets (1): [3] 2025/09/12 03:04:38 client updated RTT: 32.929ms (σ: 9.958ms) 2025/09/12 03:04:38 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:38 client Canceling loss detection timer. 2025/09/12 03:04:38 client <- Reading packet 9 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:38 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:38 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:04:38 client -> Sending packet 4 (32 bytes) for connection 9c969473515c2744929cbe9194, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 1e5a8cf1f095d6ec, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, DelayTime: 72.515µs} 2025/09/12 03:04:38 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:38 client -> Sending packet 5 (30 bytes) for connection 9c969473515c2744929cbe9194, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 1e5a8cf1f095d6ec, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:38 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:38 client Connection 9c969473515c2744929cbe9194 closed. 2025/09/12 03:04:38 Requesting https://server4:443/mpmvfswbqr. 2025/09/12 03:04:38 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:38 Increased send buffer size to 14336 kiB 2025/09/12 03:04:38 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:38 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:38 Created qlog file: /logs/qlog/8fdf97d778d33b81483d.sqlog 2025/09/12 03:04:38 client Starting new connection to server4 ([::]:35868 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8fdf97d778d33b81483d, version v1 2025/09/12 03:04:38 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:38 client -> Sending packet 0 (1280 bytes) for connection 8fdf97d778d33b81483d, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 8fdf97d778d33b81483d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:04:38 client -> Sending packet 1 (1280 bytes) for connection 8fdf97d778d33b81483d, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 8fdf97d778d33b81483d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 1238, Data length: 268, Offset + Data length: 1506} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:38 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:38 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f43220c4e2851d6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:38 client Received first packet. Switching destination connection ID to: 1f43220c4e2851d6 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 936µs} 2025/09/12 03:04:38 client newly acked packets (1): [0] 2025/09/12 03:04:38 client updated RTT: 34.077335ms (σ: 17.038667ms) 2025/09/12 03:04:38 client <- &wire.PingFrame{} 2025/09/12 03:04:38 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:38 client -> Sending packet 2 (1280 bytes) for connection 8fdf97d778d33b81483d, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 1f43220c4e2851d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:38 client -> Sending packet 3 (1280 bytes) for connection 8fdf97d778d33b81483d, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 1f43220c4e2851d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 1238, Data length: 268, Offset + Data length: 1506} 2025/09/12 03:04:38 client -> Sending packet 4 (1280 bytes) for connection 8fdf97d778d33b81483d, Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 1f43220c4e2851d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 1238, Data length: 268, Offset + Data length: 1506} 2025/09/12 03:04:38 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:38 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f43220c4e2851d6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.712ms} 2025/09/12 03:04:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:38 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:38 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:38 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 290 bytes. 2025/09/12 03:04:38 client <- Reading packet 2 (774 bytes) for connection (empty), Handshake 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1f43220c4e2851d6, PacketNumber: 2, PacketNumberLen: 2, Length: 757, Version: v1} 2025/09/12 03:04:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 03:04:38 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:38 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8fdf97d778d33b81483d, InitialSourceConnectionID: 1f43220c4e2851d6, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd7d78cabd337a37e00f4e1c062510ea2, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:38 client Dropping %!s(logging.PacketType=5) packet (290 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:38 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f43220c4e2851d6, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 216µs} 2025/09/12 03:04:38 client newly acked packets (1): [4] 2025/09/12 03:04:38 client updated RTT: 34.204ms (σ: 13.033ms) 2025/09/12 03:04:38 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8fdf97d778d33b81483d 2025/09/12 03:04:38 client Long Header{Type: Initial, DestConnectionID: 1f43220c4e2851d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: 1f43220c4e2851d6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:38 client Short Header{DestConnectionID: 1f43220c4e2851d6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:38 client Dropping Initial keys. 2025/09/12 03:04:38 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:38 client -> Sending packet 1 (40 bytes) for connection 8fdf97d778d33b81483d, Handshake 2025/09/12 03:04:38 client Long Header{Type: Handshake, DestConnectionID: 1f43220c4e2851d6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:38 client <- Reading packet 4 (110 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:38 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.344ms} 2025/09/12 03:04:38 client Peer doesn't await address validation any longer. 2025/09/12 03:04:38 client newly acked packets (1): [0] 2025/09/12 03:04:38 client updated RTT: 34.127ms (σ: 9.927ms) 2025/09/12 03:04:38 client Canceling loss detection timer. 2025/09/12 03:04:38 client Dropping Handshake keys. 2025/09/12 03:04:38 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3b9d661bad049892, StatelessResetToken: 0xf8a237ef2305df02bcd67cef4492c4a8} 2025/09/12 03:04:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aa5b21001fdb0367, StatelessResetToken: 0x26eba3e2bde2960bd2a7cd03bf6e68ac} 2025/09/12 03:04:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: caff3077c7afb72a, StatelessResetToken: 0x233b41dd29cc4bcd53380dbd3c22bb19} 2025/09/12 03:04:38 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:38 client -> Sending packet 1 (34 bytes) for connection 8fdf97d778d33b81483d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 3b9d661bad049892, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 243.045µs} 2025/09/12 03:04:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:38 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:38 client -> Sending packet 3 (29 bytes) for connection 8fdf97d778d33b81483d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 3b9d661bad049892, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:38 client -> Sending packet 4 (29 bytes) for connection 8fdf97d778d33b81483d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 3b9d661bad049892, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:38 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:38 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client <- &wire.PingFrame{} 2025/09/12 03:04:38 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:38 client -> Sending packet 5 (34 bytes) for connection 8fdf97d778d33b81483d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 3b9d661bad049892, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}}, DelayTime: 120.806µs} 2025/09/12 03:04:38 client <- Reading packet 9 (26 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:38 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 48µs} 2025/09/12 03:04:38 client newly acked packets (1): [4] 2025/09/12 03:04:38 client updated RTT: 33.928ms (σ: 7.841ms) 2025/09/12 03:04:38 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:38 client Canceling loss detection timer. 2025/09/12 03:04:38 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:38 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client <- &wire.PingFrame{} 2025/09/12 03:04:38 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:38 client -> Sending packet 6 (1366 bytes) for connection 8fdf97d778d33b81483d, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 3b9d661bad049892, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.PingFrame{} 2025/09/12 03:04:38 client -> Sending packet 7 (36 bytes) for connection 8fdf97d778d33b81483d, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:38 client Short Header{DestConnectionID: 3b9d661bad049892, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:38 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 4, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 4, Smallest: 4}}, DelayTime: 150.641µs} 2025/09/12 03:04:39 client <- Reading packet 12 (1075 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e03f76f410887725, StatelessResetToken: 0xf169c52c6e1320e0019a1c224af6212f} 2025/09/12 03:04:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:39 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:39 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:39 client -> Sending packet 8 (30 bytes) for connection 8fdf97d778d33b81483d, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 3b9d661bad049892, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:39 client Connection 8fdf97d778d33b81483d closed. 2025/09/12 03:04:39 Requesting https://server4:443/whgeheokao. 2025/09/12 03:04:39 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:39 Increased send buffer size to 14336 kiB 2025/09/12 03:04:39 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:39 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:39 Created qlog file: /logs/qlog/afe731c0d53a413255aa.sqlog 2025/09/12 03:04:39 client Starting new connection to server4 ([::]:58453 -> 193.167.100.100:443), source connection ID (empty), destination connection ID afe731c0d53a413255aa, version v1 2025/09/12 03:04:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:39 client -> Sending packet 0 (1280 bytes) for connection afe731c0d53a413255aa, Initial 2025/09/12 03:04:39 client Long Header{Type: Initial, DestConnectionID: afe731c0d53a413255aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:39 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:04:39 client -> Sending packet 1 (1280 bytes) for connection afe731c0d53a413255aa, Initial 2025/09/12 03:04:39 client Long Header{Type: Initial, DestConnectionID: afe731c0d53a413255aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:39 client -> &wire.CryptoFrame{Offset: 1238, Data length: 281, Offset + Data length: 1519} 2025/09/12 03:04:39 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:39 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:39 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 860b025cb23fc637, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:39 client Received first packet. Switching destination connection ID to: 860b025cb23fc637 2025/09/12 03:04:39 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.48ms} 2025/09/12 03:04:39 client newly acked packets (2): [0 1] 2025/09/12 03:04:39 client updated RTT: 35.874215ms (σ: 17.937107ms) 2025/09/12 03:04:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:39 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:39 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:39 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 290 bytes. 2025/09/12 03:04:39 client <- Reading packet 2 (774 bytes) for connection (empty), Handshake 2025/09/12 03:04:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 860b025cb23fc637, PacketNumber: 2, PacketNumberLen: 2, Length: 757, Version: v1} 2025/09/12 03:04:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 03:04:39 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:39 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: afe731c0d53a413255aa, InitialSourceConnectionID: 860b025cb23fc637, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3f23956f6dfdb673aa4661c326efe0f3, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:39 client Dropping %!s(logging.PacketType=5) packet (290 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection afe731c0d53a413255aa 2025/09/12 03:04:39 client Long Header{Type: Initial, DestConnectionID: 860b025cb23fc637, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:39 client Long Header{Type: Handshake, DestConnectionID: 860b025cb23fc637, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:39 client Dropping Initial keys. 2025/09/12 03:04:39 client -> Sending packet 1 (86 bytes) for connection afe731c0d53a413255aa, Handshake 2025/09/12 03:04:39 client Long Header{Type: Handshake, DestConnectionID: 860b025cb23fc637, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:39 client Short Header{DestConnectionID: 860b025cb23fc637, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:39 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:39 client Dropping Handshake keys. 2025/09/12 03:04:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 392e472273ab1aa3, StatelessResetToken: 0xfd766d99215dbbfdddee764ec90ad6d0} 2025/09/12 03:04:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d40e22a3a86ef459, StatelessResetToken: 0x5e658dd96b561c6b58cb83e0de0e909e} 2025/09/12 03:04:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0f06e73a6d95962c, StatelessResetToken: 0x5110cd14447ec4b1b0c247dab37fcbd3} 2025/09/12 03:04:39 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:39 client -> Sending packet 1 (34 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 186.698µs} 2025/09/12 03:04:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:39 client <- Reading packet 6 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2d45f86dc859b33c, StatelessResetToken: 0xb132fefea45a0067651afb4c4055f52f} 2025/09/12 03:04:39 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:39 client -> Sending packet 2 (34 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 127.579µs} 2025/09/12 03:04:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:39 client -> Sending packet 4 (46 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:39 client Skipping packet number 3 2025/09/12 03:04:39 client -> Sending packet 5 (29 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:39 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.PingFrame{} 2025/09/12 03:04:39 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:39 client -> Sending packet 6 (36 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 133.609µs} 2025/09/12 03:04:39 client <- Reading packet 9 (27 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 1.32ms} 2025/09/12 03:04:39 client newly acked packets (1): [5] 2025/09/12 03:04:39 client updated RTT: 35.446ms (σ: 14.307ms) 2025/09/12 03:04:39 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:39 client setting loss timer for packet 4 (1-RTT) to 39.87675ms (in 2025-09-12 03:04:39.25792377 +0000 UTC m=+14.570953938) 2025/09/12 03:04:39 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:39.25792377 +0000 UTC m=+14.570953938 2025/09/12 03:04:39 client lost packet 4 (time threshold) 2025/09/12 03:04:39 client Canceling loss detection timer. 2025/09/12 03:04:39 client -> Sending packet 7 (46 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:39 client <- Reading packet 10 (29 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 1.288ms} 2025/09/12 03:04:39 client newly acked packets (1): [7] 2025/09/12 03:04:39 client updated RTT: 35.098ms (σ: 11.425ms) 2025/09/12 03:04:39 client Canceling loss detection timer. 2025/09/12 03:04:39 client -> Sending packet 8 (1366 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.PingFrame{} 2025/09/12 03:04:39 client <- Reading packet 11 (29 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 1.44ms} 2025/09/12 03:04:39 client newly acked packets (1): [8] 2025/09/12 03:04:39 client updated RTT: 34.922ms (σ: 8.92ms) 2025/09/12 03:04:39 client <- Reading packet 13 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.PingFrame{} 2025/09/12 03:04:39 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:39 client -> Sending packet 9 (1409 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.PingFrame{} 2025/09/12 03:04:39 client -> Sending packet 10 (38 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:39 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 3, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 169.938µs} 2025/09/12 03:04:39 client <- Reading packet 14 (29 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:39 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:39 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 1.632ms} 2025/09/12 03:04:39 client newly acked packets (1): [9] 2025/09/12 03:04:39 client updated RTT: 34.807ms (σ: 6.919ms) 2025/09/12 03:04:40 client <- Reading packet 15 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:40 client <- &wire.PingFrame{} 2025/09/12 03:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:40 client -> Sending packet 11 (1430 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:40 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:40 client -> &wire.PingFrame{} 2025/09/12 03:04:40 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:40 client -> Sending packet 12 (39 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:40 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:40 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 3, AckRanges: {{Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 25.419877ms} 2025/09/12 03:04:42 client <- Reading packet 16 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:42 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:42 client <- &wire.PingFrame{} 2025/09/12 03:04:42 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:42 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:42 client -> Sending packet 13 (39 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:42 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:42 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 3, AckRanges: {{Largest: 16, Smallest: 13}, {Largest: 11, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 25.405912ms} 2025/09/12 03:04:42 client <- Reading packet 17 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:42 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:42 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:42 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:42 client -> Sending packet 14 (30 bytes) for connection afe731c0d53a413255aa, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:42 client Short Header{DestConnectionID: 392e472273ab1aa3, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:42 client Connection afe731c0d53a413255aa closed. 2025/09/12 03:04:42 Requesting https://server4:443/wopcmavxyu. 2025/09/12 03:04:42 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:42 Increased send buffer size to 14336 kiB 2025/09/12 03:04:42 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:42 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:42 Created qlog file: /logs/qlog/75c491fd2816ed9d7099071da2f3561b.sqlog 2025/09/12 03:04:42 client Starting new connection to server4 ([::]:33545 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 75c491fd2816ed9d7099071da2f3561b, version v1 2025/09/12 03:04:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:42 client -> Sending packet 0 (1280 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Initial 2025/09/12 03:04:42 client Long Header{Type: Initial, DestConnectionID: 75c491fd2816ed9d7099071da2f3561b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:42 client -> Sending packet 1 (1280 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Initial 2025/09/12 03:04:42 client Long Header{Type: Initial, DestConnectionID: 75c491fd2816ed9d7099071da2f3561b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 1232, Data length: 273, Offset + Data length: 1505} 2025/09/12 03:04:42 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:42 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 76bcfbdc8ced8020, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:42 client Received first packet. Switching destination connection ID to: 76bcfbdc8ced8020 2025/09/12 03:04:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.512ms} 2025/09/12 03:04:42 client newly acked packets (2): [0 1] 2025/09/12 03:04:42 client updated RTT: 35.849871ms (σ: 17.924935ms) 2025/09/12 03:04:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:42 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:42 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:42 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 285 bytes. 2025/09/12 03:04:42 client <- Reading packet 2 (779 bytes) for connection (empty), Handshake 2025/09/12 03:04:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 76bcfbdc8ced8020, PacketNumber: 2, PacketNumberLen: 2, Length: 762, Version: v1} 2025/09/12 03:04:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 03:04:42 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:42 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 75c491fd2816ed9d7099071da2f3561b, InitialSourceConnectionID: 76bcfbdc8ced8020, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xedd31bcdd06c661d9e38945ea5f814d9, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:42 client Dropping %!s(logging.PacketType=5) packet (285 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 75c491fd2816ed9d7099071da2f3561b 2025/09/12 03:04:42 client Long Header{Type: Initial, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:42 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:42 client Dropping Initial keys. 2025/09/12 03:04:42 client -> Sending packet 1 (40 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:42 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:42 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:42 client -> Sending packet 0 (46 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:42 client Short Header{DestConnectionID: 76bcfbdc8ced8020, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:42 client -> Sending packet 2 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:42 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:42 client -> Sending packet 3 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:42 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:04:42 client -> Sending packet 4 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:42 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:42 client -> Sending packet 5 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:42 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 03:04:43 client -> Sending packet 6 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:43 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:43 client -> Sending packet 7 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:43 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/09/12 03:04:44 client -> Sending packet 8 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:44 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:44 client -> Sending packet 9 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:44 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:44 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:44 client <- &wire.PingFrame{} 2025/09/12 03:04:44 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:44 client -> Sending packet 1 (32 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:44 client Short Header{DestConnectionID: 76bcfbdc8ced8020, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:44 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 114.864µs} 2025/09/12 03:04:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 5 2025/09/12 03:04:45 client -> Sending packet 10 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:45 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:45 client -> Sending packet 11 (90 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, Handshake 2025/09/12 03:04:45 client Long Header{Type: Handshake, DestConnectionID: 76bcfbdc8ced8020, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:46 client <- Reading packet 12 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:46 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client <- &wire.PingFrame{} 2025/09/12 03:04:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:46 client -> Sending packet 2 (34 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:46 client Short Header{DestConnectionID: 76bcfbdc8ced8020, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 7, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 7}}, DelayTime: 123.23µs} 2025/09/12 03:04:46 client <- Reading packet 13 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:46 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:46 client Dropping Handshake keys. 2025/09/12 03:04:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03b0458d6a5f1f78, StatelessResetToken: 0x216947d399394c73f9d9afe8711b425c} 2025/09/12 03:04:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2e60c8f3b31f51c6, StatelessResetToken: 0x93fc41f783c1c98d9ccd295f3e946f43} 2025/09/12 03:04:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 17ca446a884c2d13, StatelessResetToken: 0xceb7e00ff14b74156df24622162ff1cc} 2025/09/12 03:04:46 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:46 client -> Sending packet 4 (55 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:46 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 7, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 7, Smallest: 7}}, DelayTime: 199.221µs} 2025/09/12 03:04:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:46 client -> Sending packet 5 (48 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:46 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:46 client <- Reading packet 15 (27 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:46 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 1.08ms} 2025/09/12 03:04:46 client <- Reading packet 17 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:46 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client <- &wire.PingFrame{} 2025/09/12 03:04:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:46 client -> Sending packet 6 (38 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:46 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 7, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 7, Smallest: 7}}, DelayTime: 150.371µs} 2025/09/12 03:04:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:04:46 client -> Sending packet 8 (48 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:46 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:46 client -> Sending packet 9 (48 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:46 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:46 client -> Sending packet 10 (1366 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:46 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client -> &wire.PingFrame{} 2025/09/12 03:04:46 client <- Reading packet 19 (28 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:46 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:46 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 112µs} 2025/09/12 03:04:46 client newly acked packets (2): [9 10] 2025/09/12 03:04:46 client updated RTT: 35.427ms (σ: 14.286ms) 2025/09/12 03:04:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:46 client Canceling loss detection timer. 2025/09/12 03:04:47 client <- Reading packet 20 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:47 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:47 client <- &wire.PingFrame{} 2025/09/12 03:04:47 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:47 client -> Sending packet 11 (1409 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:47 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:47 client -> &wire.PingFrame{} 2025/09/12 03:04:47 client -> Sending packet 12 (40 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:47 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:47 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 7, AckRanges: {{Largest: 20, Smallest: 19}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 7, Smallest: 7}}, DelayTime: 173.384µs} 2025/09/12 03:04:47 client <- Reading packet 21 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:47 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:47 client <- &wire.PingFrame{} 2025/09/12 03:04:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:47 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:47 client -> Sending packet 13 (41 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:47 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:47 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 7, AckRanges: {{Largest: 21, Smallest: 19}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 7, Smallest: 7}}, DelayTime: 25.392128ms} 2025/09/12 03:04:47 client <- Reading packet 23 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:47 client Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:47 client <- &wire.PingFrame{} 2025/09/12 03:04:47 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:47 client -> Sending packet 14 (42 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:47 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:47 client -> &wire.AckFrame{LargestAcked: 23, LowestAcked: 7, AckRanges: {{Largest: 23, Smallest: 23}, {Largest: 21, Smallest: 19}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 7, Smallest: 7}}, DelayTime: 140.903µs} 2025/09/12 03:04:48 client <- Reading packet 25 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:48 client Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client <- &wire.PingFrame{} 2025/09/12 03:04:48 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:48 client -> Sending packet 15 (44 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:48 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 7, AckRanges: {{Largest: 25, Smallest: 25}, {Largest: 23, Smallest: 23}, {Largest: 21, Smallest: 19}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 7, Smallest: 7}}, DelayTime: 142.636µs} 2025/09/12 03:04:48 client <- Reading packet 26 (1075 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:48 client Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3f07453fab60d6b0, StatelessResetToken: 0x0be8083635c3c3a31ed0bbf13429bca9} 2025/09/12 03:04:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:48 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:48 client -> Sending packet 16 (30 bytes) for connection 75c491fd2816ed9d7099071da2f3561b, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:48 client Short Header{DestConnectionID: 03b0458d6a5f1f78, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:48 client Connection 75c491fd2816ed9d7099071da2f3561b closed. 2025/09/12 03:04:48 Requesting https://server4:443/cxlfdsajhs. 2025/09/12 03:04:48 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:48 Increased send buffer size to 14336 kiB 2025/09/12 03:04:48 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:48 Created qlog file: /logs/qlog/f9b4acb5e180c27058a9c7bac95f38.sqlog 2025/09/12 03:04:48 client Starting new connection to server4 ([::]:42894 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f9b4acb5e180c27058a9c7bac95f38, version v1 2025/09/12 03:04:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:48 client -> Sending packet 0 (1280 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: f9b4acb5e180c27058a9c7bac95f38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:48 client -> Sending packet 1 (1280 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: f9b4acb5e180c27058a9c7bac95f38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/12 03:04:48 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:48 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dff11956c2645ccd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:48 client Received first packet. Switching destination connection ID to: dff11956c2645ccd 2025/09/12 03:04:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.104ms} 2025/09/12 03:04:48 client newly acked packets (1): [0] 2025/09/12 03:04:48 client updated RTT: 34.222192ms (σ: 17.111096ms) 2025/09/12 03:04:48 client <- &wire.PingFrame{} 2025/09/12 03:04:48 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:48 client -> Sending packet 2 (1280 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: dff11956c2645ccd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:48 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:48 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dff11956c2645ccd, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.408ms} 2025/09/12 03:04:48 client newly acked packets (1): [1] 2025/09/12 03:04:48 client updated RTT: 34.408ms (σ: 13.205ms) 2025/09/12 03:04:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:48 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:48 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:48 client Parsed a coalesced packet. Part 2: 780 bytes. Remaining: 284 bytes. 2025/09/12 03:04:48 client <- Reading packet 2 (780 bytes) for connection (empty), Handshake 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dff11956c2645ccd, PacketNumber: 2, PacketNumberLen: 2, Length: 763, Version: v1} 2025/09/12 03:04:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 03:04:48 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:48 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f9b4acb5e180c27058a9c7bac95f38, InitialSourceConnectionID: dff11956c2645ccd, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x025d281c2c3cc63a04d04b458c2bd512, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:48 client Dropping %!s(logging.PacketType=5) packet (284 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f9b4acb5e180c27058a9c7bac95f38 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: dff11956c2645ccd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: dff11956c2645ccd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:48 client Dropping Initial keys. 2025/09/12 03:04:48 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:48 client -> Sending packet 1 (86 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, Handshake 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: dff11956c2645ccd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:48 client Short Header{DestConnectionID: dff11956c2645ccd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:48 client -> Sending packet 2 (90 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, Handshake 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: dff11956c2645ccd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:48 client -> Sending packet 3 (90 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, Handshake 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: dff11956c2645ccd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:48 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:48 client Dropping Handshake keys. 2025/09/12 03:04:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d3c7b5aa57453384, StatelessResetToken: 0x664361da88ba43783f07ab581c177417} 2025/09/12 03:04:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 79d04c6d3c434cb8, StatelessResetToken: 0x8d41e8b38a0013439997825b2638805a} 2025/09/12 03:04:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eeb18a038cbf6b72, StatelessResetToken: 0x0164e6aff191fb33e53477c7e977c8b3} 2025/09/12 03:04:48 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:48 client -> Sending packet 2 (53 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: d3c7b5aa57453384, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 221.223µs} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client -> Sending packet 3 (48 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: d3c7b5aa57453384, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:04:48 client -> Sending packet 5 (48 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: d3c7b5aa57453384, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client -> Sending packet 6 (48 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: d3c7b5aa57453384, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client -> Sending packet 7 (1366 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: d3c7b5aa57453384, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.PingFrame{} 2025/09/12 03:04:48 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:48 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f24a42cfdde6d8bc, StatelessResetToken: 0x19d71203a77a9fe8e732f54b79b4d3f2} 2025/09/12 03:04:48 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:48 client -> Sending packet 8 (34 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: d3c7b5aa57453384, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 144.73µs} 2025/09/12 03:04:48 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:48 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:48 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:48 client -> Sending packet 9 (36 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: d3c7b5aa57453384, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 69.9µs} 2025/09/12 03:04:48 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:48 client -> Sending packet 10 (30 bytes) for connection f9b4acb5e180c27058a9c7bac95f38, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: d3c7b5aa57453384, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:48 client Connection f9b4acb5e180c27058a9c7bac95f38 closed. 2025/09/12 03:04:48 Requesting https://server4:443/tcviybvufl. 2025/09/12 03:04:48 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:48 Increased send buffer size to 14336 kiB 2025/09/12 03:04:48 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:48 Created qlog file: /logs/qlog/257f47930c78670cb95223368e6cfe.sqlog 2025/09/12 03:04:48 client Starting new connection to server4 ([::]:52666 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 257f47930c78670cb95223368e6cfe, version v1 2025/09/12 03:04:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:48 client -> Sending packet 0 (1280 bytes) for connection 257f47930c78670cb95223368e6cfe, Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: 257f47930c78670cb95223368e6cfe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:48 client -> Sending packet 1 (1280 bytes) for connection 257f47930c78670cb95223368e6cfe, Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: 257f47930c78670cb95223368e6cfe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/09/12 03:04:48 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:48 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6394109462a2e19, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:48 client Received first packet. Switching destination connection ID to: e6394109462a2e19 2025/09/12 03:04:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.016ms} 2025/09/12 03:04:48 client newly acked packets (1): [0] 2025/09/12 03:04:48 client updated RTT: 34.175577ms (σ: 17.087788ms) 2025/09/12 03:04:48 client <- &wire.PingFrame{} 2025/09/12 03:04:48 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:48 client -> Sending packet 2 (1280 bytes) for connection 257f47930c78670cb95223368e6cfe, Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: e6394109462a2e19, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:48 client -> Sending packet 3 (1280 bytes) for connection 257f47930c78670cb95223368e6cfe, Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: e6394109462a2e19, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/09/12 03:04:48 client -> Sending packet 4 (1280 bytes) for connection 257f47930c78670cb95223368e6cfe, Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: e6394109462a2e19, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/09/12 03:04:48 client <- Reading packet 3 (44 bytes) for connection (empty), Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6394109462a2e19, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:04:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 560µs} 2025/09/12 03:04:48 client newly acked packets (1): [4] 2025/09/12 03:04:48 client updated RTT: 34.136ms (σ: 12.892ms) 2025/09/12 03:04:48 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:48 client <- Reading packet 4 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6394109462a2e19, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:48 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:48 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:48 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 291 bytes. 2025/09/12 03:04:48 client <- Reading packet 5 (779 bytes) for connection (empty), Handshake 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e6394109462a2e19, PacketNumber: 5, PacketNumberLen: 2, Length: 762, Version: v1} 2025/09/12 03:04:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 03:04:48 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:48 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 257f47930c78670cb95223368e6cfe, InitialSourceConnectionID: e6394109462a2e19, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4fe62d3bff6eb530a100d3f2c1280cdd, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:48 client Dropping %!s(logging.PacketType=5) packet (291 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 257f47930c78670cb95223368e6cfe 2025/09/12 03:04:48 client Long Header{Type: Initial, DestConnectionID: e6394109462a2e19, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: e6394109462a2e19, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:48 client Dropping Initial keys. 2025/09/12 03:04:48 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:48 client -> Sending packet 1 (40 bytes) for connection 257f47930c78670cb95223368e6cfe, Handshake 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: e6394109462a2e19, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 03:04:48 client -> Sending packet 0 (46 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: e6394109462a2e19, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:48 client -> Sending packet 2 (90 bytes) for connection 257f47930c78670cb95223368e6cfe, Handshake 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: e6394109462a2e19, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:48 client -> Sending packet 3 (90 bytes) for connection 257f47930c78670cb95223368e6cfe, Handshake 2025/09/12 03:04:48 client Long Header{Type: Handshake, DestConnectionID: e6394109462a2e19, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:48 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:48 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:48 client Dropping Handshake keys. 2025/09/12 03:04:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 68ae2267e9f8a2b1, StatelessResetToken: 0x0d95ecd163d481a2b06d5b6cdabae542} 2025/09/12 03:04:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f84b8c851ece11b8, StatelessResetToken: 0xba0e8127641f23317b6d0b412ce2a483} 2025/09/12 03:04:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 357e6d9f3abc6e97, StatelessResetToken: 0xb3789eab456fc581c9594169aaeaec8a} 2025/09/12 03:04:48 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:48 client -> Sending packet 2 (53 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 172.231µs} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client -> Sending packet 3 (48 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:04:48 client -> Sending packet 5 (48 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client -> Sending packet 6 (48 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:48 client -> Sending packet 7 (1366 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:48 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.PingFrame{} 2025/09/12 03:04:48 client <- Reading packet 9 (26 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:48 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 120µs} 2025/09/12 03:04:48 client newly acked packets (1): [7] 2025/09/12 03:04:48 client updated RTT: 33.95ms (σ: 10.04ms) 2025/09/12 03:04:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:48 client setting loss timer for packet 6 (1-RTT) to 38.19375ms (in 2025-09-12 03:04:48.996930247 +0000 UTC m=+24.309960425) 2025/09/12 03:04:48 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:48.996930247 +0000 UTC m=+24.309960425 2025/09/12 03:04:48 client lost packet 6 (time threshold) 2025/09/12 03:04:48 client Canceling loss detection timer. 2025/09/12 03:04:48 client -> Sending packet 8 (48 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:48 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:49 client -> Sending packet 10 (48 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:49 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:49 client -> Sending packet 11 (48 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:49 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:49 client <- Reading packet 12 (29 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 5, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 1.192ms} 2025/09/12 03:04:49 client newly acked packets (1): [11] 2025/09/12 03:04:49 client updated RTT: 33.828ms (σ: 7.773ms) 2025/09/12 03:04:49 client Canceling loss detection timer. 2025/09/12 03:04:49 client -> Sending packet 12 (1409 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:49 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.PingFrame{} 2025/09/12 03:04:49 client <- Reading packet 13 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.PingFrame{} 2025/09/12 03:04:49 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:49 client -> Sending packet 13 (36 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:49 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 164.186µs} 2025/09/12 03:04:49 client <- Reading packet 14 (1075 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a02ef0c2bad0a263, StatelessResetToken: 0x8170e15ba906bf01c20a94d902ac1fde} 2025/09/12 03:04:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:49 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:49 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:49 client -> Sending packet 14 (30 bytes) for connection 257f47930c78670cb95223368e6cfe, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:49 client Short Header{DestConnectionID: 68ae2267e9f8a2b1, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:49 client Connection 257f47930c78670cb95223368e6cfe closed. 2025/09/12 03:04:49 Requesting https://server4:443/abrypjngli. 2025/09/12 03:04:49 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:49 Increased send buffer size to 14336 kiB 2025/09/12 03:04:49 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:49 Created qlog file: /logs/qlog/3a46ba6c36cd7f78dd5082a2e87400376a.sqlog 2025/09/12 03:04:49 client Starting new connection to server4 ([::]:47262 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3a46ba6c36cd7f78dd5082a2e87400376a, version v1 2025/09/12 03:04:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:49 client -> Sending packet 0 (1280 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 3a46ba6c36cd7f78dd5082a2e87400376a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:49 client -> Sending packet 1 (1280 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 3a46ba6c36cd7f78dd5082a2e87400376a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 277, Offset + Data length: 1508} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:49 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:49 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8255b9b3acfe2bc3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:49 client Received first packet. Switching destination connection ID to: 8255b9b3acfe2bc3 2025/09/12 03:04:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.064ms} 2025/09/12 03:04:49 client newly acked packets (1): [1] 2025/09/12 03:04:49 client updated RTT: 35.302589ms (σ: 17.651294ms) 2025/09/12 03:04:49 client setting loss timer for packet 0 (Initial) to 39.715412ms (in 2025-09-12 03:04:49.288214894 +0000 UTC m=+24.601245052) 2025/09/12 03:04:49 client <- &wire.PingFrame{} 2025/09/12 03:04:49 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:49 client -> Sending packet 2 (1280 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 8255b9b3acfe2bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:49 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:49.288214894 +0000 UTC m=+24.601245052 2025/09/12 03:04:49 client lost packet 0 (time threshold) 2025/09/12 03:04:49 client -> Sending packet 3 (1280 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 8255b9b3acfe2bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:49 client -> Sending packet 4 (1280 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 8255b9b3acfe2bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:49 client -> Sending packet 5 (1280 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 8255b9b3acfe2bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:49 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:49 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8255b9b3acfe2bc3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:49 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 1.88ms} 2025/09/12 03:04:49 client newly acked packets (1): [5] 2025/09/12 03:04:49 client updated RTT: 35.424ms (σ: 13.482ms) 2025/09/12 03:04:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:49 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:49 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:49 client Parsed a coalesced packet. Part 2: 780 bytes. Remaining: 282 bytes. 2025/09/12 03:04:49 client <- Reading packet 2 (780 bytes) for connection (empty), Handshake 2025/09/12 03:04:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8255b9b3acfe2bc3, PacketNumber: 2, PacketNumberLen: 2, Length: 763, Version: v1} 2025/09/12 03:04:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 03:04:49 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:49 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3a46ba6c36cd7f78dd5082a2e87400376a, InitialSourceConnectionID: 8255b9b3acfe2bc3, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1f6a9f6641a5375acd6415c1621debd5, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:49 client Dropping %!s(logging.PacketType=5) packet (282 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 8255b9b3acfe2bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:49 client Long Header{Type: Handshake, DestConnectionID: 8255b9b3acfe2bc3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:49 client Dropping Initial keys. 2025/09/12 03:04:49 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:49 client -> Sending packet 1 (40 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, Handshake 2025/09/12 03:04:49 client Long Header{Type: Handshake, DestConnectionID: 8255b9b3acfe2bc3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:49 client -> Sending packet 0 (46 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:49 client Short Header{DestConnectionID: 8255b9b3acfe2bc3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:49 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:49 client Dropping Handshake keys. 2025/09/12 03:04:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8553d16f64c9d2f, StatelessResetToken: 0x20a275b8349ce06d25d483ab146c28bc} 2025/09/12 03:04:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d17909ec72170177, StatelessResetToken: 0xe0901458ea162bf21930066032b71039} 2025/09/12 03:04:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcfc3511e9e7d8c6, StatelessResetToken: 0x564b92151de08593a460c2a3e7570193} 2025/09/12 03:04:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:49 client -> Sending packet 1 (34 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:49 client Short Header{DestConnectionID: c8553d16f64c9d2f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 180.918µs} 2025/09/12 03:04:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:49 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.112ms} 2025/09/12 03:04:49 client newly acked packets (1): [0] 2025/09/12 03:04:49 client updated RTT: 35.325ms (σ: 10.309ms) 2025/09/12 03:04:49 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:49 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:49 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:49 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:49 client -> Sending packet 2 (30 bytes) for connection 3a46ba6c36cd7f78dd5082a2e87400376a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:49 client Short Header{DestConnectionID: c8553d16f64c9d2f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:49 client Connection 3a46ba6c36cd7f78dd5082a2e87400376a closed. 2025/09/12 03:04:49 Requesting https://server4:443/xarotxkstv. 2025/09/12 03:04:49 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:49 Increased send buffer size to 14336 kiB 2025/09/12 03:04:49 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:49 Created qlog file: /logs/qlog/023bb4471860f7d00bf83fdf3954b117.sqlog 2025/09/12 03:04:49 client Starting new connection to server4 ([::]:35679 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 023bb4471860f7d00bf83fdf3954b117, version v1 2025/09/12 03:04:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:49 client -> Sending packet 0 (1280 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 023bb4471860f7d00bf83fdf3954b117, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:49 client -> Sending packet 1 (1280 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 023bb4471860f7d00bf83fdf3954b117, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 1232, Data length: 287, Offset + Data length: 1519} 2025/09/12 03:04:49 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:49 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4c2341f5e2d22601, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:49 client Received first packet. Switching destination connection ID to: 4c2341f5e2d22601 2025/09/12 03:04:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.008ms} 2025/09/12 03:04:49 client newly acked packets (1): [1] 2025/09/12 03:04:49 client updated RTT: 35.343439ms (σ: 17.671719ms) 2025/09/12 03:04:49 client setting loss timer for packet 0 (Initial) to 39.761368ms (in 2025-09-12 03:04:49.508753115 +0000 UTC m=+24.821783273) 2025/09/12 03:04:49 client <- &wire.PingFrame{} 2025/09/12 03:04:49 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:49 client -> Sending packet 2 (1280 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 4c2341f5e2d22601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:49 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:49.508753115 +0000 UTC m=+24.821783273 2025/09/12 03:04:49 client lost packet 0 (time threshold) 2025/09/12 03:04:49 client -> Sending packet 3 (1280 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 4c2341f5e2d22601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:04:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:49 client -> Sending packet 4 (1280 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 4c2341f5e2d22601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:49 client -> Sending packet 5 (1280 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 4c2341f5e2d22601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:04:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:49 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:49 client <- Reading packet 3 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4c2341f5e2d22601, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:49 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:49 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:49 client Parsed a coalesced packet. Part 2: 780 bytes. Remaining: 290 bytes. 2025/09/12 03:04:49 client <- Reading packet 4 (780 bytes) for connection (empty), Handshake 2025/09/12 03:04:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4c2341f5e2d22601, PacketNumber: 4, PacketNumberLen: 2, Length: 763, Version: v1} 2025/09/12 03:04:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 03:04:49 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:49 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 023bb4471860f7d00bf83fdf3954b117, InitialSourceConnectionID: 4c2341f5e2d22601, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1f0bf4cdcd7ebf75e0c65d8f054fa8d8, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:49 client Dropping %!s(logging.PacketType=5) packet (290 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 023bb4471860f7d00bf83fdf3954b117 2025/09/12 03:04:49 client Long Header{Type: Initial, DestConnectionID: 4c2341f5e2d22601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:49 client Long Header{Type: Handshake, DestConnectionID: 4c2341f5e2d22601, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:49 client Short Header{DestConnectionID: 4c2341f5e2d22601, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:49 client Dropping Initial keys. 2025/09/12 03:04:49 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:49 client -> Sending packet 1 (40 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, Handshake 2025/09/12 03:04:49 client Long Header{Type: Handshake, DestConnectionID: 4c2341f5e2d22601, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:49 client <- Reading packet 5 (110 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.264ms} 2025/09/12 03:04:49 client Peer doesn't await address validation any longer. 2025/09/12 03:04:49 client newly acked packets (1): [0] 2025/09/12 03:04:49 client updated RTT: 35.135ms (σ: 13.668ms) 2025/09/12 03:04:49 client Canceling loss detection timer. 2025/09/12 03:04:49 client Dropping Handshake keys. 2025/09/12 03:04:49 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7beb18ed788c4ac, StatelessResetToken: 0x2987a5be79baeb467cd88008e783e9ee} 2025/09/12 03:04:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c4fc0bdc6904b29f, StatelessResetToken: 0x41ea2133f76cd458c0463b9f0ca33a6c} 2025/09/12 03:04:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f5d5c59e2fb8e7e3, StatelessResetToken: 0xb02a632c3143c4dec27a795ffde74f54} 2025/09/12 03:04:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:49 client -> Sending packet 1 (34 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:49 client Short Header{DestConnectionID: e7beb18ed788c4ac, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 215.452µs} 2025/09/12 03:04:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:49 client <- Reading packet 7 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4ca534f0027640bf, StatelessResetToken: 0x9fd11e712fa538cd735879c1181710da} 2025/09/12 03:04:49 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:49 client -> Sending packet 2 (34 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:49 client Short Header{DestConnectionID: e7beb18ed788c4ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 143.619µs} 2025/09/12 03:04:49 client <- Reading packet 8 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:49 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.88ms} 2025/09/12 03:04:49 client newly acked packets (1): [1] 2025/09/12 03:04:49 client updated RTT: 34.856ms (σ: 10.807ms) 2025/09/12 03:04:49 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:49 client Canceling loss detection timer. 2025/09/12 03:04:49 client Ignoring all packets below 6. 2025/09/12 03:04:50 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:50 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client <- &wire.PingFrame{} 2025/09/12 03:04:50 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:50 client -> Sending packet 3 (1366 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:50 client Short Header{DestConnectionID: e7beb18ed788c4ac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.PingFrame{} 2025/09/12 03:04:50 client -> Sending packet 4 (34 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:50 client Short Header{DestConnectionID: e7beb18ed788c4ac, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}}, DelayTime: 173.083µs} 2025/09/12 03:04:50 client <- Reading packet 11 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:50 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:50 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:50 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:50 client -> Sending packet 5 (30 bytes) for connection 023bb4471860f7d00bf83fdf3954b117, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:50 client Short Header{DestConnectionID: e7beb18ed788c4ac, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:50 Received 1 packets after sending CONNECTION_CLOSE. Retransmitting. 2025/09/12 03:04:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:50 client Connection 023bb4471860f7d00bf83fdf3954b117 closed. 2025/09/12 03:04:50 Requesting https://server4:443/cjxmzmmkee. 2025/09/12 03:04:50 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:50 Increased send buffer size to 14336 kiB 2025/09/12 03:04:50 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:50 Created qlog file: /logs/qlog/7d21b9bd0e544f51007c7c967b53665f46.sqlog 2025/09/12 03:04:50 client Starting new connection to server4 ([::]:42751 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7d21b9bd0e544f51007c7c967b53665f46, version v1 2025/09/12 03:04:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:50 client -> Sending packet 0 (1280 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 7d21b9bd0e544f51007c7c967b53665f46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:50 client -> Sending packet 1 (1280 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 7d21b9bd0e544f51007c7c967b53665f46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 1231, Data length: 278, Offset + Data length: 1509} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:50 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:50 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8f2ef0c5e0a20486, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:50 client Received first packet. Switching destination connection ID to: 8f2ef0c5e0a20486 2025/09/12 03:04:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.04ms} 2025/09/12 03:04:50 client newly acked packets (1): [0] 2025/09/12 03:04:50 client updated RTT: 34.232985ms (σ: 17.116492ms) 2025/09/12 03:04:50 client <- &wire.PingFrame{} 2025/09/12 03:04:50 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:50 client -> Sending packet 2 (1280 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 8f2ef0c5e0a20486, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:50 client -> Sending packet 3 (1280 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 8f2ef0c5e0a20486, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 1231, Data length: 278, Offset + Data length: 1509} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:50 client -> Sending packet 4 (1280 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 8f2ef0c5e0a20486, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 1231, Data length: 278, Offset + Data length: 1509} 2025/09/12 03:04:50 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:50 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8f2ef0c5e0a20486, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:50 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.912ms} 2025/09/12 03:04:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:50 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:50 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:50 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 283 bytes. 2025/09/12 03:04:50 client <- Reading packet 2 (781 bytes) for connection (empty), Handshake 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8f2ef0c5e0a20486, PacketNumber: 2, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 03:04:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 03:04:50 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:50 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7d21b9bd0e544f51007c7c967b53665f46, InitialSourceConnectionID: 8f2ef0c5e0a20486, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x6ab53c1942a1b247fddba360c6c5ac5a, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:50 client Dropping %!s(logging.PacketType=5) packet (283 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 8f2ef0c5e0a20486, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: 8f2ef0c5e0a20486, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:50 client Dropping Initial keys. 2025/09/12 03:04:50 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:50 client -> Sending packet 1 (40 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, Handshake 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: 8f2ef0c5e0a20486, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:50 client -> Sending packet 0 (46 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 8f2ef0c5e0a20486, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:50 client -> Sending packet 2 (90 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, Handshake 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: 8f2ef0c5e0a20486, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:50 client -> Sending packet 3 (90 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, Handshake 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: 8f2ef0c5e0a20486, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:50 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:50 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client <- &wire.PingFrame{} 2025/09/12 03:04:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:50 client -> Sending packet 1 (32 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 8f2ef0c5e0a20486, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 118.692µs} 2025/09/12 03:04:50 client <- Reading packet 7 (1132 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:50 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:50 client Dropping Handshake keys. 2025/09/12 03:04:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 85ec877666cf3adb, StatelessResetToken: 0x42ea387159b67fb17a4578bf016782b4} 2025/09/12 03:04:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 57fdadd5153960f8, StatelessResetToken: 0x9b010326820ed40db1e6f4eb31bd945c} 2025/09/12 03:04:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 04f3ad31d823d8bb, StatelessResetToken: 0xc1b9593438e67d05fa2db650869a032d} 2025/09/12 03:04:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:50 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:50 client -> Sending packet 3 (53 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 85ec877666cf3adb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 177.13µs} 2025/09/12 03:04:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:50 client -> Sending packet 4 (48 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 85ec877666cf3adb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:50 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:50 client -> Sending packet 5 (30 bytes) for connection 7d21b9bd0e544f51007c7c967b53665f46, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 85ec877666cf3adb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:50 client Connection 7d21b9bd0e544f51007c7c967b53665f46 closed. 2025/09/12 03:04:50 Requesting https://server4:443/yjjuzrbsco. 2025/09/12 03:04:50 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:50 Increased send buffer size to 14336 kiB 2025/09/12 03:04:50 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:50 Created qlog file: /logs/qlog/013c10c360bb8bba3a.sqlog 2025/09/12 03:04:50 client Starting new connection to server4 ([::]:40959 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 013c10c360bb8bba3a, version v1 2025/09/12 03:04:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:50 client -> Sending packet 0 (1280 bytes) for connection 013c10c360bb8bba3a, Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 013c10c360bb8bba3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:50 client -> Sending packet 1 (1280 bytes) for connection 013c10c360bb8bba3a, Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 013c10c360bb8bba3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 1239, Data length: 266, Offset + Data length: 1505} 2025/09/12 03:04:50 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:50 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 413e773305713ca7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:50 client Received first packet. Switching destination connection ID to: 413e773305713ca7 2025/09/12 03:04:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 872µs} 2025/09/12 03:04:50 client newly acked packets (1): [0] 2025/09/12 03:04:50 client updated RTT: 33.926731ms (σ: 16.963365ms) 2025/09/12 03:04:50 client <- &wire.PingFrame{} 2025/09/12 03:04:50 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:50 client -> Sending packet 2 (1280 bytes) for connection 013c10c360bb8bba3a, Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 413e773305713ca7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:50 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:50 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 413e773305713ca7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.296ms} 2025/09/12 03:04:50 client newly acked packets (1): [1] 2025/09/12 03:04:50 client updated RTT: 34.099ms (σ: 13.068ms) 2025/09/12 03:04:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:50 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:50 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:50 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 291 bytes. 2025/09/12 03:04:50 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 413e773305713ca7, PacketNumber: 2, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 03:04:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 03:04:50 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:50 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 013c10c360bb8bba3a, InitialSourceConnectionID: 413e773305713ca7, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x9a2c5bd56be366f3b239f7a7b02611df, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:50 client Dropping %!s(logging.PacketType=5) packet (291 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 013c10c360bb8bba3a 2025/09/12 03:04:50 client Long Header{Type: Initial, DestConnectionID: 413e773305713ca7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: 413e773305713ca7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:50 client Dropping Initial keys. 2025/09/12 03:04:50 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:50 client -> Sending packet 1 (40 bytes) for connection 013c10c360bb8bba3a, Handshake 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: 413e773305713ca7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:50 client -> Sending packet 0 (46 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 413e773305713ca7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:50 client -> Sending packet 2 (90 bytes) for connection 013c10c360bb8bba3a, Handshake 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: 413e773305713ca7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:50 client -> Sending packet 3 (90 bytes) for connection 013c10c360bb8bba3a, Handshake 2025/09/12 03:04:50 client Long Header{Type: Handshake, DestConnectionID: 413e773305713ca7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:50 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:50 client Dropping Handshake keys. 2025/09/12 03:04:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 39b41539a1127517, StatelessResetToken: 0xa040f12fbba75b1c99ce7fa5be54316a} 2025/09/12 03:04:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3e5e8cb5dd69196d, StatelessResetToken: 0x4a85ac6abbf41e21c01e0beed5525f45} 2025/09/12 03:04:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8b4c7736f2ba2a22, StatelessResetToken: 0x6cb57deef4f7195bfcd024370eeb1987} 2025/09/12 03:04:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:50 client -> Sending packet 2 (53 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 195.716µs} 2025/09/12 03:04:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:50 client -> Sending packet 3 (48 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:50 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:50 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client <- &wire.PingFrame{} 2025/09/12 03:04:50 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:50 client -> Sending packet 4 (1366 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.PingFrame{} 2025/09/12 03:04:50 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:50 client -> Sending packet 5 (33 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:50 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:50 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.527614ms} 2025/09/12 03:04:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:04:51 client -> Sending packet 7 (48 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:51 client -> Sending packet 8 (48 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 03:04:51 client -> Sending packet 10 (48 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:51 client -> Sending packet 11 (48 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:51 client <- Reading packet 7 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:51 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ad4e2e315c45054d, StatelessResetToken: 0xc7b990f51c5aee88a080ddd7fa676560} 2025/09/12 03:04:51 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:51 client -> Sending packet 12 (34 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 120.135µs} 2025/09/12 03:04:51 client <- Reading packet 8 (28 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:51 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 4, Smallest: 4}}, DelayTime: 1.104ms} 2025/09/12 03:04:51 client newly acked packets (1): [4] 2025/09/12 03:04:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:51 client <- &wire.PingFrame{} 2025/09/12 03:04:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:51 client -> Sending packet 13 (1409 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.PingFrame{} 2025/09/12 03:04:51 client <- Reading packet 9 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:51 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:04:51 client -> Sending packet 14 (34 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 76.12µs} 2025/09/12 03:04:51 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:51 client -> Sending packet 15 (30 bytes) for connection 013c10c360bb8bba3a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 39b41539a1127517, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:51 client Connection 013c10c360bb8bba3a closed. 2025/09/12 03:04:51 Requesting https://server4:443/nwuhmqmxeg. 2025/09/12 03:04:51 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:51 Increased send buffer size to 14336 kiB 2025/09/12 03:04:51 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:51 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:51 Created qlog file: /logs/qlog/0015909b3265055b18d3.sqlog 2025/09/12 03:04:51 client Starting new connection to server4 ([::]:33039 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0015909b3265055b18d3, version v1 2025/09/12 03:04:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:51 client -> Sending packet 0 (1280 bytes) for connection 0015909b3265055b18d3, Initial 2025/09/12 03:04:51 client Long Header{Type: Initial, DestConnectionID: 0015909b3265055b18d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:04:51 client -> Sending packet 1 (1280 bytes) for connection 0015909b3265055b18d3, Initial 2025/09/12 03:04:51 client Long Header{Type: Initial, DestConnectionID: 0015909b3265055b18d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 1238, Data length: 279, Offset + Data length: 1517} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:51 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:51 client -> Sending packet 2 (1280 bytes) for connection 0015909b3265055b18d3, Initial 2025/09/12 03:04:51 client Long Header{Type: Initial, DestConnectionID: 0015909b3265055b18d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:51 client -> Sending packet 3 (1280 bytes) for connection 0015909b3265055b18d3, Initial 2025/09/12 03:04:51 client Long Header{Type: Initial, DestConnectionID: 0015909b3265055b18d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 1238, Data length: 279, Offset + Data length: 1517} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:51 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:51 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 78ab8aa975803f67, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:51 client Received first packet. Switching destination connection ID to: 78ab8aa975803f67 2025/09/12 03:04:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.928ms} 2025/09/12 03:04:51 client newly acked packets (1): [2] 2025/09/12 03:04:51 client updated RTT: 35.405739ms (σ: 17.702869ms) 2025/09/12 03:04:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:51 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:51 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:51 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 291 bytes. 2025/09/12 03:04:51 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/09/12 03:04:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 78ab8aa975803f67, PacketNumber: 2, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 03:04:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 03:04:51 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:51 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0015909b3265055b18d3, InitialSourceConnectionID: 78ab8aa975803f67, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3f2aff7ecb2e8483220420dd8146f196, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:51 client Dropping %!s(logging.PacketType=5) packet (291 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0015909b3265055b18d3 2025/09/12 03:04:51 client Long Header{Type: Initial, DestConnectionID: 78ab8aa975803f67, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:51 client Long Header{Type: Handshake, DestConnectionID: 78ab8aa975803f67, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:51 client Dropping Initial keys. 2025/09/12 03:04:51 client -> Sending packet 1 (40 bytes) for connection 0015909b3265055b18d3, Handshake 2025/09/12 03:04:51 client Long Header{Type: Handshake, DestConnectionID: 78ab8aa975803f67, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:51 client -> Sending packet 0 (46 bytes) for connection 0015909b3265055b18d3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:51 client Short Header{DestConnectionID: 78ab8aa975803f67, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:51 client <- Reading packet 4 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:51 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:51 client Dropping Handshake keys. 2025/09/12 03:04:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b005068e17ebf090, StatelessResetToken: 0x9355aa6f75162b8d3ebaf1093936f656} 2025/09/12 03:04:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2d33b51697a40bc, StatelessResetToken: 0xb598e77c99dda66da2264fba7ade7b60} 2025/09/12 03:04:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ecc03da9d1fe9747, StatelessResetToken: 0x42e9fa0ef067068924754c7e744c7e81} 2025/09/12 03:04:51 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:51 client -> Sending packet 1 (34 bytes) for connection 0015909b3265055b18d3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:51 client Short Header{DestConnectionID: b005068e17ebf090, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 158.636µs} 2025/09/12 03:04:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:51 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:51 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.752ms} 2025/09/12 03:04:51 client newly acked packets (1): [1] 2025/09/12 03:04:51 client updated RTT: 35.09ms (σ: 13.906ms) 2025/09/12 03:04:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:51 client lost packet 0 (time threshold) 2025/09/12 03:04:51 client Canceling loss detection timer. 2025/09/12 03:04:51 client Ignoring all packets below 5. 2025/09/12 03:04:51 client -> Sending packet 2 (46 bytes) for connection 0015909b3265055b18d3, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:51 client Short Header{DestConnectionID: b005068e17ebf090, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:51 client <- Reading packet 7 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:51 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.064ms} 2025/09/12 03:04:51 client newly acked packets (1): [2] 2025/09/12 03:04:51 client updated RTT: 34.73ms (σ: 11.149ms) 2025/09/12 03:04:51 client Canceling loss detection timer. 2025/09/12 03:04:52 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:52 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client <- &wire.PingFrame{} 2025/09/12 03:04:52 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:52 client -> Sending packet 3 (1366 bytes) for connection 0015909b3265055b18d3, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:52 client Short Header{DestConnectionID: b005068e17ebf090, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.PingFrame{} 2025/09/12 03:04:52 client -> Sending packet 4 (34 bytes) for connection 0015909b3265055b18d3, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:52 client Short Header{DestConnectionID: b005068e17ebf090, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 166.902µs} 2025/09/12 03:04:52 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:52 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client <- &wire.PingFrame{} 2025/09/12 03:04:52 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:52 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:52 client -> Sending packet 5 (35 bytes) for connection 0015909b3265055b18d3, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:52 client Short Header{DestConnectionID: b005068e17ebf090, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 25.429963ms} 2025/09/12 03:04:52 client <- Reading packet 11 (1075 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:52 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8278ac2fa96f2cd7, StatelessResetToken: 0x065635e0b03fb204cf15dc090a678d88} 2025/09/12 03:04:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:52 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:52 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:52 client -> Sending packet 6 (30 bytes) for connection 0015909b3265055b18d3, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:52 client Short Header{DestConnectionID: b005068e17ebf090, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:52 client Connection 0015909b3265055b18d3 closed. 2025/09/12 03:04:52 Requesting https://server4:443/guasjlxtip. 2025/09/12 03:04:52 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:52 Increased send buffer size to 14336 kiB 2025/09/12 03:04:52 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:52 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:52 Created qlog file: /logs/qlog/f60b8e9b24c441a0798a.sqlog 2025/09/12 03:04:52 client Starting new connection to server4 ([::]:36983 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f60b8e9b24c441a0798a, version v1 2025/09/12 03:04:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:52 client -> Sending packet 0 (1280 bytes) for connection f60b8e9b24c441a0798a, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: f60b8e9b24c441a0798a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:52 client -> Sending packet 1 (1280 bytes) for connection f60b8e9b24c441a0798a, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: f60b8e9b24c441a0798a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:52 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:52 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 06e518258549b44f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:52 client Received first packet. Switching destination connection ID to: 06e518258549b44f 2025/09/12 03:04:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.136ms} 2025/09/12 03:04:52 client newly acked packets (1): [0] 2025/09/12 03:04:52 client updated RTT: 34.469954ms (σ: 17.234977ms) 2025/09/12 03:04:52 client <- &wire.PingFrame{} 2025/09/12 03:04:52 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:52 client -> Sending packet 2 (1280 bytes) for connection f60b8e9b24c441a0798a, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:52 client -> Sending packet 3 (1280 bytes) for connection f60b8e9b24c441a0798a, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 03:04:52 client -> Sending packet 4 (1280 bytes) for connection f60b8e9b24c441a0798a, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 03:04:52 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:52 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 06e518258549b44f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:52 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 2.104ms} 2025/09/12 03:04:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:52 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:52 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:52 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 291 bytes. 2025/09/12 03:04:52 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 06e518258549b44f, PacketNumber: 2, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 03:04:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 03:04:52 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:52 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f60b8e9b24c441a0798a, InitialSourceConnectionID: 06e518258549b44f, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xff1c7d8df8a37c237219a06e0e876ade, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:52 client Dropping %!s(logging.PacketType=5) packet (291 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f60b8e9b24c441a0798a 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:52 client Dropping Initial keys. 2025/09/12 03:04:52 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:52 client -> Sending packet 1 (86 bytes) for connection f60b8e9b24c441a0798a, Handshake 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:52 client Short Header{DestConnectionID: 06e518258549b44f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:52 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:52 client -> Sending packet 2 (90 bytes) for connection f60b8e9b24c441a0798a, Handshake 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:52 client -> Sending packet 3 (90 bytes) for connection f60b8e9b24c441a0798a, Handshake 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:52 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:52 client Dropping %!s(logging.PacketType=0) packet (130 bytes) because we already dropped the keys. 2025/09/12 03:04:52 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 297 bytes. 2025/09/12 03:04:52 client <- Reading packet 4 (773 bytes) for connection (empty), Handshake 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 06e518258549b44f, PacketNumber: 4, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 03:04:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 03:04:52 client Dropping %!s(logging.PacketType=5) packet (297 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:52 client -> Sending packet 4 (42 bytes) for connection f60b8e9b24c441a0798a, Handshake 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: 06e518258549b44f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/12 03:04:52 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:52 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client <- &wire.PingFrame{} 2025/09/12 03:04:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:52 client -> Sending packet 1 (32 bytes) for connection f60b8e9b24c441a0798a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:52 client Short Header{DestConnectionID: 06e518258549b44f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 139.16µs} 2025/09/12 03:04:52 client <- Reading packet 7 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:52 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:52 client Dropping Handshake keys. 2025/09/12 03:04:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8159a8a4a015cfe1, StatelessResetToken: 0x29da7990cba0422982e4e03f7ae33443} 2025/09/12 03:04:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0d4401c1432efe9c, StatelessResetToken: 0x02e475cb6c0b11a692fbcbcf47208c83} 2025/09/12 03:04:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2641c907d607f45e, StatelessResetToken: 0xdeaf0f8c2cd640173600d9f95346f8ff} 2025/09/12 03:04:52 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:52 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:52 client -> Sending packet 3 (53 bytes) for connection f60b8e9b24c441a0798a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:52 client Short Header{DestConnectionID: 8159a8a4a015cfe1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 176.55µs} 2025/09/12 03:04:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:52 client -> Sending packet 4 (48 bytes) for connection f60b8e9b24c441a0798a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:52 client Short Header{DestConnectionID: 8159a8a4a015cfe1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:52 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:52 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7c5e1064546ff151, StatelessResetToken: 0x4fd1e31999bbf3419f0df48f9938ad04} 2025/09/12 03:04:52 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:52 client <- Reading packet 9 (26 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:52 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 88µs} 2025/09/12 03:04:52 client newly acked packets (1): [4] 2025/09/12 03:04:52 client updated RTT: 34.191ms (σ: 13.481ms) 2025/09/12 03:04:52 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:52 client Canceling loss detection timer. 2025/09/12 03:04:52 client <- Reading packet 10 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:52 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:04:52 client -> Sending packet 5 (32 bytes) for connection f60b8e9b24c441a0798a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:52 client Short Header{DestConnectionID: 8159a8a4a015cfe1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, DelayTime: 78.136µs} 2025/09/12 03:04:52 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:52 client -> Sending packet 6 (30 bytes) for connection f60b8e9b24c441a0798a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:52 client Short Header{DestConnectionID: 8159a8a4a015cfe1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:52 client Connection f60b8e9b24c441a0798a closed. 2025/09/12 03:04:52 Requesting https://server4:443/yxkksahnzk. 2025/09/12 03:04:52 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:52 Increased send buffer size to 14336 kiB 2025/09/12 03:04:52 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:52 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:52 Created qlog file: /logs/qlog/4a44db9629875d4fca70cd6c6f0653308c.sqlog 2025/09/12 03:04:52 client Starting new connection to server4 ([::]:37646 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4a44db9629875d4fca70cd6c6f0653308c, version v1 2025/09/12 03:04:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:52 client -> Sending packet 0 (1280 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: 4a44db9629875d4fca70cd6c6f0653308c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:52 client -> Sending packet 1 (1280 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: 4a44db9629875d4fca70cd6c6f0653308c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 1231, Data length: 282, Offset + Data length: 1513} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:52 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:52 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e9936e9616ffdbae, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:52 client Received first packet. Switching destination connection ID to: e9936e9616ffdbae 2025/09/12 03:04:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.048ms} 2025/09/12 03:04:52 client newly acked packets (1): [1] 2025/09/12 03:04:52 client updated RTT: 35.248518ms (σ: 17.624259ms) 2025/09/12 03:04:52 client setting loss timer for packet 0 (Initial) to 39.654582ms (in 2025-09-12 03:04:52.806988098 +0000 UTC m=+28.120018267) 2025/09/12 03:04:52 client <- &wire.PingFrame{} 2025/09/12 03:04:52 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:52 client -> Sending packet 2 (1280 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:52 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:52.806988098 +0000 UTC m=+28.120018267 2025/09/12 03:04:52 client lost packet 0 (time threshold) 2025/09/12 03:04:52 client -> Sending packet 3 (1280 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:52 client -> Sending packet 4 (1280 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:52 client -> Sending packet 5 (1280 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:52 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:52 client <- Reading packet 4 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e9936e9616ffdbae, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:52 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:52 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:52 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 289 bytes. 2025/09/12 03:04:52 client <- Reading packet 5 (781 bytes) for connection (empty), Handshake 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e9936e9616ffdbae, PacketNumber: 5, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 03:04:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 03:04:52 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:52 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4a44db9629875d4fca70cd6c6f0653308c, InitialSourceConnectionID: e9936e9616ffdbae, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa20693a33b237cf2664d4e3eb4608848, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:52 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c 2025/09/12 03:04:52 client Long Header{Type: Initial, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:52 client Dropping Initial keys. 2025/09/12 03:04:52 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:52 client -> Sending packet 1 (86 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Handshake 2025/09/12 03:04:52 client Long Header{Type: Handshake, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:52 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 03:04:52 client Short Header{DestConnectionID: e9936e9616ffdbae, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:53 client -> Sending packet 2 (90 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Handshake 2025/09/12 03:04:53 client Long Header{Type: Handshake, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:53 client -> Sending packet 3 (90 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, Handshake 2025/09/12 03:04:53 client Long Header{Type: Handshake, DestConnectionID: e9936e9616ffdbae, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:53 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:53 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client <- &wire.PingFrame{} 2025/09/12 03:04:53 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:53 client -> Sending packet 1 (32 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:53 client Short Header{DestConnectionID: e9936e9616ffdbae, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 109.795µs} 2025/09/12 03:04:53 client <- Reading packet 8 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:53 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:53 client Dropping Handshake keys. 2025/09/12 03:04:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 87c5fd5f3fd4a506, StatelessResetToken: 0x18397eb6979ff547036575e8fba44766} 2025/09/12 03:04:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 072361e9adf03294, StatelessResetToken: 0xccbe0c64b70979701b783c5bb72797b0} 2025/09/12 03:04:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cba897e514a534f5, StatelessResetToken: 0xd4782aa53dda7310123ac9bf55e7b1c1} 2025/09/12 03:04:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:53 client -> Sending packet 3 (53 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:53 client Short Header{DestConnectionID: 87c5fd5f3fd4a506, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 165.479µs} 2025/09/12 03:04:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:53 client -> Sending packet 4 (48 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:53 client Short Header{DestConnectionID: 87c5fd5f3fd4a506, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:53 client <- Reading packet 9 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:53 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 17d73f393a4dc4b9, StatelessResetToken: 0x929102c14b78bebcc774737e35fd26cc} 2025/09/12 03:04:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:53 client <- Reading packet 10 (26 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:53 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 96µs} 2025/09/12 03:04:53 client newly acked packets (1): [4] 2025/09/12 03:04:53 client updated RTT: 34.877ms (σ: 13.958ms) 2025/09/12 03:04:53 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:53 client Canceling loss detection timer. 2025/09/12 03:04:53 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:53 client -> Sending packet 5 (33 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:53 client Short Header{DestConnectionID: 87c5fd5f3fd4a506, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, DelayTime: 25.260637ms} 2025/09/12 03:04:53 client <- Reading packet 13 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:53 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client <- &wire.PingFrame{} 2025/09/12 03:04:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:53 client -> Sending packet 6 (1366 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:53 client Short Header{DestConnectionID: 87c5fd5f3fd4a506, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client -> &wire.PingFrame{} 2025/09/12 03:04:53 client -> Sending packet 7 (34 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:53 client Short Header{DestConnectionID: 87c5fd5f3fd4a506, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 7, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 7}}, DelayTime: 173.433µs} 2025/09/12 03:04:53 client <- Reading packet 14 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:53 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:53 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 1.472ms} 2025/09/12 03:04:53 client newly acked packets (1): [6] 2025/09/12 03:04:53 client updated RTT: 34.728ms (σ: 10.764ms) 2025/09/12 03:04:54 client <- Reading packet 15 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:54 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:54 client <- &wire.PingFrame{} 2025/09/12 03:04:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:54 client -> Sending packet 8 (1409 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:54 client Short Header{DestConnectionID: 87c5fd5f3fd4a506, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:54 client -> &wire.PingFrame{} 2025/09/12 03:04:54 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:54 client -> Sending packet 9 (35 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:54 client Short Header{DestConnectionID: 87c5fd5f3fd4a506, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:54 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 7, AckRanges: {{Largest: 15, Smallest: 13}, {Largest: 10, Smallest: 7}}, DelayTime: 25.426163ms} 2025/09/12 03:04:54 client <- Reading packet 16 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:54 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:54 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:54 client -> Sending packet 10 (30 bytes) for connection 4a44db9629875d4fca70cd6c6f0653308c, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:54 client Short Header{DestConnectionID: 87c5fd5f3fd4a506, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:54 client Connection 4a44db9629875d4fca70cd6c6f0653308c closed. 2025/09/12 03:04:54 Requesting https://server4:443/tzmfrfuqhh. 2025/09/12 03:04:54 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:54 Increased send buffer size to 14336 kiB 2025/09/12 03:04:54 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:54 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:54 Created qlog file: /logs/qlog/5ed927b43af9d8a5bd729fa3897c13e25c92db.sqlog 2025/09/12 03:04:54 client Starting new connection to server4 ([::]:52750 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5ed927b43af9d8a5bd729fa3897c13e25c92db, version v1 2025/09/12 03:04:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:54 client -> Sending packet 0 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: 5ed927b43af9d8a5bd729fa3897c13e25c92db, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:54 client -> Sending packet 1 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: 5ed927b43af9d8a5bd729fa3897c13e25c92db, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/12 03:04:54 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:54 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4c0afcd57eb5f2f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:54 client Received first packet. Switching destination connection ID to: f4c0afcd57eb5f2f 2025/09/12 03:04:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 752µs} 2025/09/12 03:04:54 client newly acked packets (1): [0] 2025/09/12 03:04:54 client updated RTT: 35.480475ms (σ: 17.740237ms) 2025/09/12 03:04:54 client <- &wire.PingFrame{} 2025/09/12 03:04:54 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:54 client -> Sending packet 2 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:54 client -> Sending packet 3 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:54 client -> Sending packet 4 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/12 03:04:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:54 client -> Sending packet 5 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:54 client -> Sending packet 6 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/12 03:04:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:54 client <- Reading packet 5 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4c0afcd57eb5f2f, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:54 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 424µs} 2025/09/12 03:04:54 client <- Reading packet 6 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4c0afcd57eb5f2f, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:54 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 248µs} 2025/09/12 03:04:54 client newly acked packets (1): [6] 2025/09/12 03:04:54 client updated RTT: 35.193ms (σ: 13.879ms) 2025/09/12 03:04:54 client -> Sending packet 7 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:54 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:54 client -> &wire.PingFrame{} 2025/09/12 03:04:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 03:04:55 client -> Sending packet 8 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:55 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:55 client -> &wire.PingFrame{} 2025/09/12 03:04:55 client -> Sending packet 9 (1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Initial 2025/09/12 03:04:55 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:55 client -> &wire.PingFrame{} 2025/09/12 03:04:55 client <- Reading packet 10 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4c0afcd57eb5f2f, Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:55 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 224µs} 2025/09/12 03:04:55 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:55 client <- Reading packet 12 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4c0afcd57eb5f2f, Token: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:55 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:55 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:55 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 286 bytes. 2025/09/12 03:04:55 client <- Reading packet 13 (784 bytes) for connection (empty), Handshake 2025/09/12 03:04:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f4c0afcd57eb5f2f, PacketNumber: 13, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 03:04:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 03:04:55 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:55 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5ed927b43af9d8a5bd729fa3897c13e25c92db, InitialSourceConnectionID: f4c0afcd57eb5f2f, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xc5d6a84e18ab51e0b4ac5ee45c1e2f19, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:55 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db 2025/09/12 03:04:55 client Long Header{Type: Initial, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:55 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:55 client Long Header{Type: Handshake, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:55 client Dropping Initial keys. 2025/09/12 03:04:55 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:55 client -> Sending packet 1 (86 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Handshake 2025/09/12 03:04:55 client Long Header{Type: Handshake, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:55 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 13, DelayTime: 0s} 2025/09/12 03:04:55 client Short Header{DestConnectionID: f4c0afcd57eb5f2f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:55 client -> Sending packet 2 (90 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Handshake 2025/09/12 03:04:55 client Long Header{Type: Handshake, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:55 client -> Sending packet 3 (90 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, Handshake 2025/09/12 03:04:55 client Long Header{Type: Handshake, DestConnectionID: f4c0afcd57eb5f2f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:55 client <- Reading packet 15 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:55 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client <- &wire.PingFrame{} 2025/09/12 03:04:55 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:55 client -> Sending packet 1 (32 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:55 client Short Header{DestConnectionID: f4c0afcd57eb5f2f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 15, DelayTime: 127.468µs} 2025/09/12 03:04:55 client <- Reading packet 16 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:55 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:55 client Dropping Handshake keys. 2025/09/12 03:04:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 470eea16c963aceb, StatelessResetToken: 0x0496c513233d539eae62e9797ca46cb2} 2025/09/12 03:04:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5a44a16f8336b12f, StatelessResetToken: 0xd82f17167d59c75a1f40faa2fbce87ec} 2025/09/12 03:04:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 765e78f1520af198, StatelessResetToken: 0xc270c68aad3fc7f4f40c7f0a9fbd0871} 2025/09/12 03:04:55 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:55 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:55 client -> Sending packet 3 (53 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:55 client Short Header{DestConnectionID: 470eea16c963aceb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 15, DelayTime: 146.925µs} 2025/09/12 03:04:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:55 client -> Sending packet 4 (48 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:55 client Short Header{DestConnectionID: 470eea16c963aceb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:55 client <- Reading packet 17 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:55 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 56a7d312426df830, StatelessResetToken: 0x382f543f75ac8ec0fb297e960d0e5e8b} 2025/09/12 03:04:55 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:55 client <- Reading packet 18 (27 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:55 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 1.144ms} 2025/09/12 03:04:55 client <- Reading packet 19 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:55 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:55 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:04:55 client -> Sending packet 5 (32 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:55 client Short Header{DestConnectionID: 470eea16c963aceb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 15, DelayTime: 78.907µs} 2025/09/12 03:04:55 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:55 client -> Sending packet 6 (30 bytes) for connection 5ed927b43af9d8a5bd729fa3897c13e25c92db, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:55 client Short Header{DestConnectionID: 470eea16c963aceb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:55 client Connection 5ed927b43af9d8a5bd729fa3897c13e25c92db closed. 2025/09/12 03:04:55 Requesting https://server4:443/dqcovddmkh. 2025/09/12 03:04:55 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:55 Increased send buffer size to 14336 kiB 2025/09/12 03:04:55 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:55 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:55 Created qlog file: /logs/qlog/68e48899dcded936f1830637089d203d943d1a.sqlog 2025/09/12 03:04:55 client Starting new connection to server4 ([::]:55615 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 68e48899dcded936f1830637089d203d943d1a, version v1 2025/09/12 03:04:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:55 client -> Sending packet 0 (1280 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, Initial 2025/09/12 03:04:55 client Long Header{Type: Initial, DestConnectionID: 68e48899dcded936f1830637089d203d943d1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:04:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:55 client -> Sending packet 1 (1280 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, Initial 2025/09/12 03:04:55 client Long Header{Type: Initial, DestConnectionID: 68e48899dcded936f1830637089d203d943d1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:55 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/09/12 03:04:55 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:56 client -> Sending packet 2 (1280 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 68e48899dcded936f1830637089d203d943d1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:04:56 client -> Sending packet 3 (1280 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 68e48899dcded936f1830637089d203d943d1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:56 client <- Reading packet 1 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 15ca9eb016a7efb4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:56 client Received first packet. Switching destination connection ID to: 15ca9eb016a7efb4 2025/09/12 03:04:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 384µs} 2025/09/12 03:04:56 client newly acked packets (1): [2] 2025/09/12 03:04:56 client updated RTT: 32.809231ms (σ: 16.404615ms) 2025/09/12 03:04:56 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:04:56 client <- Reading packet 2 (38 bytes) for connection (empty), Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 15ca9eb016a7efb4, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:04:56 client <- &wire.PingFrame{} 2025/09/12 03:04:56 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:04:56 client -> Sending packet 4 (1280 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 15ca9eb016a7efb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:04:56 client -> Sending packet 5 (1280 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 15ca9eb016a7efb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/09/12 03:04:56 client -> Sending packet 6 (1280 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 15ca9eb016a7efb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:56 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:56 client <- Reading packet 3 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 15ca9eb016a7efb4, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:56 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 1.872ms} 2025/09/12 03:04:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:56 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:56 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:56 client Parsed a coalesced packet. Part 2: 783 bytes. Remaining: 281 bytes. 2025/09/12 03:04:56 client <- Reading packet 4 (783 bytes) for connection (empty), Handshake 2025/09/12 03:04:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 15ca9eb016a7efb4, PacketNumber: 4, PacketNumberLen: 2, Length: 766, Version: v1} 2025/09/12 03:04:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/09/12 03:04:56 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:56 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 68e48899dcded936f1830637089d203d943d1a, InitialSourceConnectionID: 15ca9eb016a7efb4, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1432733d648f33316da4338e0f16c241, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:56 client Dropping %!s(logging.PacketType=5) packet (281 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 68e48899dcded936f1830637089d203d943d1a 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 15ca9eb016a7efb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:56 client Long Header{Type: Handshake, DestConnectionID: 15ca9eb016a7efb4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:56 client Dropping Initial keys. 2025/09/12 03:04:56 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:56 client -> Sending packet 1 (40 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, Handshake 2025/09/12 03:04:56 client Long Header{Type: Handshake, DestConnectionID: 15ca9eb016a7efb4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:56 client -> Sending packet 0 (46 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 15ca9eb016a7efb4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:56 client <- Reading packet 7 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:56 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.096ms} 2025/09/12 03:04:56 client Peer doesn't await address validation any longer. 2025/09/12 03:04:56 client newly acked packets (1): [0] 2025/09/12 03:04:56 client updated RTT: 32.865ms (σ: 12.415ms) 2025/09/12 03:04:56 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:56 client Canceling loss detection timer. 2025/09/12 03:04:56 client Dropping Handshake keys. 2025/09/12 03:04:56 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:56 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client <- &wire.PingFrame{} 2025/09/12 03:04:56 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:56 client -> Sending packet 1 (1366 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 15ca9eb016a7efb4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.PingFrame{} 2025/09/12 03:04:56 client -> Sending packet 2 (34 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 15ca9eb016a7efb4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}}, DelayTime: 186.539µs} 2025/09/12 03:04:56 client <- Reading packet 11 (1132 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:56 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 313e796594a69f4d, StatelessResetToken: 0x5f03460d613d260d9ba2ca1a1c141083} 2025/09/12 03:04:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 13481ac59b860397, StatelessResetToken: 0x59d9c1e89f2aba80f8721dba5f2a42f9} 2025/09/12 03:04:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cef2a00ec82f8204, StatelessResetToken: 0x92ed1caa877d724506c784f1bd3066ed} 2025/09/12 03:04:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:56 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:56 client <- Reading packet 12 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:56 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 608µs} 2025/09/12 03:04:56 client newly acked packets (1): [1] 2025/09/12 03:04:56 client -> Sending packet 3 (36 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 313e796594a69f4d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 7, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 7, Smallest: 7}}, DelayTime: 159.578µs} 2025/09/12 03:04:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:56 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:56 client -> Sending packet 4 (30 bytes) for connection 68e48899dcded936f1830637089d203d943d1a, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 313e796594a69f4d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:56 client Connection 68e48899dcded936f1830637089d203d943d1a closed. 2025/09/12 03:04:56 Requesting https://server4:443/zjstaxtrso. 2025/09/12 03:04:56 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:56 Increased send buffer size to 14336 kiB 2025/09/12 03:04:56 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:56 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:56 Created qlog file: /logs/qlog/79464817c9e27d8f44530d76047d7c.sqlog 2025/09/12 03:04:56 client Starting new connection to server4 ([::]:47864 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 79464817c9e27d8f44530d76047d7c, version v1 2025/09/12 03:04:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:56 client -> Sending packet 0 (1280 bytes) for connection 79464817c9e27d8f44530d76047d7c, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 79464817c9e27d8f44530d76047d7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:56 client -> Sending packet 1 (1280 bytes) for connection 79464817c9e27d8f44530d76047d7c, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 79464817c9e27d8f44530d76047d7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 1233, Data length: 271, Offset + Data length: 1504} 2025/09/12 03:04:56 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:56 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6ba2c1986e4f229c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:56 client Received first packet. Switching destination connection ID to: 6ba2c1986e4f229c 2025/09/12 03:04:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.264ms} 2025/09/12 03:04:56 client newly acked packets (2): [0 1] 2025/09/12 03:04:56 client updated RTT: 35.315247ms (σ: 17.657623ms) 2025/09/12 03:04:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:56 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:56 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:56 client Parsed a coalesced packet. Part 2: 780 bytes. Remaining: 284 bytes. 2025/09/12 03:04:56 client <- Reading packet 2 (780 bytes) for connection (empty), Handshake 2025/09/12 03:04:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6ba2c1986e4f229c, PacketNumber: 2, PacketNumberLen: 2, Length: 763, Version: v1} 2025/09/12 03:04:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 03:04:56 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:56 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 79464817c9e27d8f44530d76047d7c, InitialSourceConnectionID: 6ba2c1986e4f229c, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x9d29cbca526c69764e5d583d170bad67, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:56 client Dropping %!s(logging.PacketType=5) packet (284 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 79464817c9e27d8f44530d76047d7c 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 6ba2c1986e4f229c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:56 client Long Header{Type: Handshake, DestConnectionID: 6ba2c1986e4f229c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:56 client Dropping Initial keys. 2025/09/12 03:04:56 client -> Sending packet 1 (40 bytes) for connection 79464817c9e27d8f44530d76047d7c, Handshake 2025/09/12 03:04:56 client Long Header{Type: Handshake, DestConnectionID: 6ba2c1986e4f229c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:56 client -> Sending packet 0 (46 bytes) for connection 79464817c9e27d8f44530d76047d7c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 6ba2c1986e4f229c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:56 client -> Sending packet 2 (90 bytes) for connection 79464817c9e27d8f44530d76047d7c, Handshake 2025/09/12 03:04:56 client Long Header{Type: Handshake, DestConnectionID: 6ba2c1986e4f229c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:56 client -> Sending packet 3 (90 bytes) for connection 79464817c9e27d8f44530d76047d7c, Handshake 2025/09/12 03:04:56 client Long Header{Type: Handshake, DestConnectionID: 6ba2c1986e4f229c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:56 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:56 client Dropping Handshake keys. 2025/09/12 03:04:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 035fe40ef3f98635, StatelessResetToken: 0x7b00e27ebe380d9045158fbf9009a610} 2025/09/12 03:04:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a2f634cdadc8de8f, StatelessResetToken: 0xeb694f2ac51b627e322fb3e49254f340} 2025/09/12 03:04:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c90739e100b001dc, StatelessResetToken: 0x06834bbc4f3ac6aad2a4a5827fc0214c} 2025/09/12 03:04:56 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:56 client -> Sending packet 2 (53 bytes) for connection 79464817c9e27d8f44530d76047d7c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 035fe40ef3f98635, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 171.11µs} 2025/09/12 03:04:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:56 client -> Sending packet 3 (48 bytes) for connection 79464817c9e27d8f44530d76047d7c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 035fe40ef3f98635, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:56 client <- Reading packet 6 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:56 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:56 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:56 client -> Sending packet 4 (34 bytes) for connection 79464817c9e27d8f44530d76047d7c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 035fe40ef3f98635, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 120.605µs} 2025/09/12 03:04:56 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:56 client -> Sending packet 5 (30 bytes) for connection 79464817c9e27d8f44530d76047d7c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:56 client Short Header{DestConnectionID: 035fe40ef3f98635, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:56 client Connection 79464817c9e27d8f44530d76047d7c closed. 2025/09/12 03:04:56 Requesting https://server4:443/fotjlpbede. 2025/09/12 03:04:56 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:56 Increased send buffer size to 14336 kiB 2025/09/12 03:04:56 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:56 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:56 Created qlog file: /logs/qlog/2544fc146c71f3cbf29472dcc9.sqlog 2025/09/12 03:04:56 client Starting new connection to server4 ([::]:54332 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2544fc146c71f3cbf29472dcc9, version v1 2025/09/12 03:04:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:56 client -> Sending packet 0 (1280 bytes) for connection 2544fc146c71f3cbf29472dcc9, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 2544fc146c71f3cbf29472dcc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:04:56 client -> Sending packet 1 (1280 bytes) for connection 2544fc146c71f3cbf29472dcc9, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 2544fc146c71f3cbf29472dcc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 1235, Data length: 271, Offset + Data length: 1506} 2025/09/12 03:04:56 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:56 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19a77800110b464a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:56 client Received first packet. Switching destination connection ID to: 19a77800110b464a 2025/09/12 03:04:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.088ms} 2025/09/12 03:04:56 client newly acked packets (1): [1] 2025/09/12 03:04:56 client updated RTT: 35.261288ms (σ: 17.630644ms) 2025/09/12 03:04:56 client setting loss timer for packet 0 (Initial) to 39.668949ms (in 2025-09-12 03:04:56.971945769 +0000 UTC m=+32.284976078) 2025/09/12 03:04:56 client <- &wire.PingFrame{} 2025/09/12 03:04:56 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:56 client -> Sending packet 2 (1280 bytes) for connection 2544fc146c71f3cbf29472dcc9, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:56 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:56.971945769 +0000 UTC m=+32.284976078 2025/09/12 03:04:56 client lost packet 0 (time threshold) 2025/09/12 03:04:56 client -> Sending packet 3 (1280 bytes) for connection 2544fc146c71f3cbf29472dcc9, Initial 2025/09/12 03:04:56 client Long Header{Type: Initial, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:04:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:57 client -> Sending packet 4 (1280 bytes) for connection 2544fc146c71f3cbf29472dcc9, Initial 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:04:57 client -> Sending packet 5 (1280 bytes) for connection 2544fc146c71f3cbf29472dcc9, Initial 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:57 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:57 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19a77800110b464a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:57 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 1.864ms} 2025/09/12 03:04:57 client newly acked packets (1): [5] 2025/09/12 03:04:57 client updated RTT: 35.37ms (σ: 13.44ms) 2025/09/12 03:04:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:57 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:57 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:57 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 286 bytes. 2025/09/12 03:04:57 client <- Reading packet 2 (776 bytes) for connection (empty), Handshake 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19a77800110b464a, PacketNumber: 2, PacketNumberLen: 2, Length: 759, Version: v1} 2025/09/12 03:04:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 03:04:57 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:57 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2544fc146c71f3cbf29472dcc9, InitialSourceConnectionID: 19a77800110b464a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xe62b04cb5507b55039e6e73381ecb3e0, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:57 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2544fc146c71f3cbf29472dcc9 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:57 client Dropping Initial keys. 2025/09/12 03:04:57 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:57 client -> Sending packet 1 (40 bytes) for connection 2544fc146c71f3cbf29472dcc9, Handshake 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:57 client -> Sending packet 0 (46 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 19a77800110b464a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:57 client -> Sending packet 2 (90 bytes) for connection 2544fc146c71f3cbf29472dcc9, Handshake 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:57 client -> Sending packet 3 (90 bytes) for connection 2544fc146c71f3cbf29472dcc9, Handshake 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: 19a77800110b464a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:57 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:57 client Dropping Handshake keys. 2025/09/12 03:04:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2cbc43400470e485, StatelessResetToken: 0xe1afd169399788ac22e3293acfea1385} 2025/09/12 03:04:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c91ab9aebd89fdd5, StatelessResetToken: 0xcbf4e0cc7ddb80fd54f3b58f82858839} 2025/09/12 03:04:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2ac850a4288b6a36, StatelessResetToken: 0x2580fde9b0d5dd350fddeba61030419a} 2025/09/12 03:04:57 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:57 client -> Sending packet 2 (53 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 2cbc43400470e485, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 176.883µs} 2025/09/12 03:04:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 client -> Sending packet 3 (48 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 2cbc43400470e485, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:57 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.PingFrame{} 2025/09/12 03:04:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:57 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:57 client -> Sending packet 4 (33 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 2cbc43400470e485, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.396966ms} 2025/09/12 03:04:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:04:57 client -> Sending packet 6 (48 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 2cbc43400470e485, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 client -> Sending packet 7 (48 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 2cbc43400470e485, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 client -> Sending packet 8 (1366 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 2cbc43400470e485, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.PingFrame{} 2025/09/12 03:04:57 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 451011b1ac4e19fe, StatelessResetToken: 0xf6a3cb295f0b0262bfb3d534cbb8a3be} 2025/09/12 03:04:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:57 client <- Reading packet 6 (24 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 88µs} 2025/09/12 03:04:57 client newly acked packets (1): [7] 2025/09/12 03:04:57 client updated RTT: 34.987ms (σ: 10.844ms) 2025/09/12 03:04:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:57 client Canceling loss detection timer. 2025/09/12 03:04:57 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:57 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:04:57 client -> Sending packet 9 (32 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 2cbc43400470e485, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 70.692µs} 2025/09/12 03:04:57 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:57 client -> Sending packet 10 (30 bytes) for connection 2544fc146c71f3cbf29472dcc9, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:57 client Short Header{DestConnectionID: 2cbc43400470e485, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:57 client Connection 2544fc146c71f3cbf29472dcc9 closed. 2025/09/12 03:04:57 Requesting https://server4:443/hsatiubyjq. 2025/09/12 03:04:57 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:57 Increased send buffer size to 14336 kiB 2025/09/12 03:04:57 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:57 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:57 Created qlog file: /logs/qlog/fed777011e7b5dde3ef0d8ad3e7db6d4a927ed.sqlog 2025/09/12 03:04:57 client Starting new connection to server4 ([::]:44022 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, version v1 2025/09/12 03:04:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:57 client -> Sending packet 0 (1280 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, Initial 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:04:57 client -> Sending packet 1 (1280 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, Initial 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 1229, Data length: 290, Offset + Data length: 1519} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:57 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:57 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 108fd684569da278, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:57 client Received first packet. Switching destination connection ID to: 108fd684569da278 2025/09/12 03:04:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 720µs} 2025/09/12 03:04:57 client newly acked packets (1): [0] 2025/09/12 03:04:57 client updated RTT: 33.732692ms (σ: 16.866346ms) 2025/09/12 03:04:57 client <- &wire.PingFrame{} 2025/09/12 03:04:57 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:57 client -> Sending packet 2 (1280 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, Initial 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: 108fd684569da278, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:57 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:57 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 108fd684569da278, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.256ms} 2025/09/12 03:04:57 client newly acked packets (1): [1] 2025/09/12 03:04:57 client updated RTT: 33.903ms (σ: 12.992ms) 2025/09/12 03:04:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:57 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:57 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:57 client Parsed a coalesced packet. Part 2: 783 bytes. Remaining: 281 bytes. 2025/09/12 03:04:57 client <- Reading packet 2 (783 bytes) for connection (empty), Handshake 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 108fd684569da278, PacketNumber: 2, PacketNumberLen: 2, Length: 766, Version: v1} 2025/09/12 03:04:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/09/12 03:04:57 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:57 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, InitialSourceConnectionID: 108fd684569da278, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xbd6e0f3df6020cb3c72955e28b766f79, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:57 client Dropping %!s(logging.PacketType=5) packet (281 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed 2025/09/12 03:04:57 client Long Header{Type: Initial, DestConnectionID: 108fd684569da278, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: 108fd684569da278, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:57 client Dropping Initial keys. 2025/09/12 03:04:57 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:57 client -> Sending packet 1 (86 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, Handshake 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: 108fd684569da278, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:57 client Short Header{DestConnectionID: 108fd684569da278, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:57 client -> Sending packet 2 (90 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, Handshake 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: 108fd684569da278, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:57 client -> Sending packet 3 (90 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, Handshake 2025/09/12 03:04:57 client Long Header{Type: Handshake, DestConnectionID: 108fd684569da278, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:57 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:57 client Dropping Handshake keys. 2025/09/12 03:04:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e853e8c9327e1712, StatelessResetToken: 0x97e020dd83a1b8a18895d5c20be3282e} 2025/09/12 03:04:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8d5ef946d89d98bd, StatelessResetToken: 0x90698abf56d505a98993499c9118096b} 2025/09/12 03:04:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 582ff5fb46859d26, StatelessResetToken: 0xfbdaef94d9002f7ba1966ce7dfc86f33} 2025/09/12 03:04:57 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:57 client -> Sending packet 2 (53 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 171.099µs} 2025/09/12 03:04:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 client -> Sending packet 3 (48 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:57 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.PingFrame{} 2025/09/12 03:04:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:57 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:57 client -> Sending packet 4 (33 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.41556ms} 2025/09/12 03:04:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:04:57 client -> Sending packet 6 (48 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 client -> Sending packet 7 (48 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:57 client -> Sending packet 8 (1366 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:57 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.PingFrame{} 2025/09/12 03:04:57 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 941f07f9e936fcc0, StatelessResetToken: 0xb6190ec0d48d1e3083535ee99b8841bc} 2025/09/12 03:04:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:57 client <- Reading packet 6 (26 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:57 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 232µs} 2025/09/12 03:04:57 client newly acked packets (1): [7] 2025/09/12 03:04:57 client updated RTT: 33.711ms (σ: 10.126ms) 2025/09/12 03:04:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:57 client Canceling loss detection timer. 2025/09/12 03:04:57 client Sending ACK because the ACK timer expired. 2025/09/12 03:04:57 client -> Sending packet 9 (33 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:57 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:57 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 25.239953ms} 2025/09/12 03:04:58 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:58 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client <- &wire.PingFrame{} 2025/09/12 03:04:58 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:58 client -> Sending packet 10 (34 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:58 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 3}}, DelayTime: 112.52µs} 2025/09/12 03:04:58 client <- Reading packet 11 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:58 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:58 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:58 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:58 client -> Sending packet 11 (30 bytes) for connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:58 client Short Header{DestConnectionID: e853e8c9327e1712, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:58 client Connection fed777011e7b5dde3ef0d8ad3e7db6d4a927ed closed. 2025/09/12 03:04:58 Requesting https://server4:443/stynptosrj. 2025/09/12 03:04:58 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:58 Increased send buffer size to 14336 kiB 2025/09/12 03:04:58 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:58 Created qlog file: /logs/qlog/d1b752591e0e63d0c60f65e1.sqlog 2025/09/12 03:04:58 client Starting new connection to server4 ([::]:37923 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d1b752591e0e63d0c60f65e1, version v1 2025/09/12 03:04:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:58 client -> Sending packet 0 (1280 bytes) for connection d1b752591e0e63d0c60f65e1, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: d1b752591e0e63d0c60f65e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:58 client -> Sending packet 1 (1280 bytes) for connection d1b752591e0e63d0c60f65e1, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: d1b752591e0e63d0c60f65e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 1236, Data length: 270, Offset + Data length: 1506} 2025/09/12 03:04:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:58 client -> Sending packet 2 (1280 bytes) for connection d1b752591e0e63d0c60f65e1, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: d1b752591e0e63d0c60f65e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:58 client -> Sending packet 3 (1280 bytes) for connection d1b752591e0e63d0c60f65e1, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: d1b752591e0e63d0c60f65e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 1236, Data length: 270, Offset + Data length: 1506} 2025/09/12 03:04:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:58 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 03:04:58 client <- Reading packet 2 (38 bytes) for connection (empty), Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1df2722cbaf73737, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:04:58 client Received first packet. Switching destination connection ID to: 1df2722cbaf73737 2025/09/12 03:04:58 client <- &wire.PingFrame{} 2025/09/12 03:04:58 client Queueing packet (1162 bytes) for later decryption 2025/09/12 03:04:58 client -> Sending packet 4 (1280 bytes) for connection d1b752591e0e63d0c60f65e1, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: 1df2722cbaf73737, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:58 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:58 client <- Reading packet 3 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1df2722cbaf73737, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.4ms} 2025/09/12 03:04:58 client newly acked packets (2): [2 3] 2025/09/12 03:04:58 client updated RTT: 35.536976ms (σ: 17.768488ms) 2025/09/12 03:04:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:58 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:58 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:58 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 287 bytes. 2025/09/12 03:04:58 client <- Reading packet 4 (775 bytes) for connection (empty), Handshake 2025/09/12 03:04:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1df2722cbaf73737, PacketNumber: 4, PacketNumberLen: 2, Length: 758, Version: v1} 2025/09/12 03:04:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 03:04:58 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:58 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d1b752591e0e63d0c60f65e1, InitialSourceConnectionID: 1df2722cbaf73737, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3d2638ed9cfb9067e69c28914e303a44, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:58 client Dropping %!s(logging.PacketType=5) packet (287 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d1b752591e0e63d0c60f65e1 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: 1df2722cbaf73737, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:58 client Long Header{Type: Handshake, DestConnectionID: 1df2722cbaf73737, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:58 client Dropping Initial keys. 2025/09/12 03:04:58 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:58 client -> Sending packet 1 (40 bytes) for connection d1b752591e0e63d0c60f65e1, Handshake 2025/09/12 03:04:58 client Long Header{Type: Handshake, DestConnectionID: 1df2722cbaf73737, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 03:04:58 client -> Sending packet 0 (46 bytes) for connection d1b752591e0e63d0c60f65e1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:58 client Short Header{DestConnectionID: 1df2722cbaf73737, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:58 client <- Reading packet 5 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:58 client Dropping Handshake keys. 2025/09/12 03:04:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8079a74eea7f6852, StatelessResetToken: 0x1835bcbdeb6b56b37641222eca0d7baa} 2025/09/12 03:04:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 09a05e46cee02f09, StatelessResetToken: 0xda63ff2d7bf87f0ba123d20b8727a6d6} 2025/09/12 03:04:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3e3b0827c51d8e46, StatelessResetToken: 0x911ec0d8ffee656484d0965ea1d84e3c} 2025/09/12 03:04:58 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:58 client -> Sending packet 1 (34 bytes) for connection d1b752591e0e63d0c60f65e1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:58 client Short Header{DestConnectionID: 8079a74eea7f6852, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 155.901µs} 2025/09/12 03:04:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:58 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:58 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:58 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:58 client -> Sending packet 2 (34 bytes) for connection d1b752591e0e63d0c60f65e1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:58 client Short Header{DestConnectionID: 8079a74eea7f6852, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 72.696µs} 2025/09/12 03:04:58 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:58 client -> Sending packet 3 (30 bytes) for connection d1b752591e0e63d0c60f65e1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:58 client Short Header{DestConnectionID: 8079a74eea7f6852, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:58 client Connection d1b752591e0e63d0c60f65e1 closed. 2025/09/12 03:04:58 Requesting https://server4:443/iicebqjwpq. 2025/09/12 03:04:58 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:58 Increased send buffer size to 14336 kiB 2025/09/12 03:04:58 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:58 Created qlog file: /logs/qlog/b8594cd8f19d28d2.sqlog 2025/09/12 03:04:58 client Starting new connection to server4 ([::]:52216 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b8594cd8f19d28d2, version v1 2025/09/12 03:04:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:58 client -> Sending packet 0 (1280 bytes) for connection b8594cd8f19d28d2, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: b8594cd8f19d28d2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:04:58 client -> Sending packet 1 (1280 bytes) for connection b8594cd8f19d28d2, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: b8594cd8f19d28d2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:58 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:58 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0220aa3260e2ac13, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:58 client Received first packet. Switching destination connection ID to: 0220aa3260e2ac13 2025/09/12 03:04:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.336ms} 2025/09/12 03:04:58 client newly acked packets (2): [0 1] 2025/09/12 03:04:58 client updated RTT: 35.569786ms (σ: 17.784893ms) 2025/09/12 03:04:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:58 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:58 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:58 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 293 bytes. 2025/09/12 03:04:58 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/09/12 03:04:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0220aa3260e2ac13, PacketNumber: 2, PacketNumberLen: 2, Length: 754, Version: v1} 2025/09/12 03:04:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 03:04:58 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:58 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b8594cd8f19d28d2, InitialSourceConnectionID: 0220aa3260e2ac13, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xebcc072d24fca37d8854b5ffac1a6333, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:58 client Dropping %!s(logging.PacketType=5) packet (293 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b8594cd8f19d28d2 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: 0220aa3260e2ac13, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:04:58 client Long Header{Type: Handshake, DestConnectionID: 0220aa3260e2ac13, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:58 client Dropping Initial keys. 2025/09/12 03:04:58 client -> Sending packet 1 (86 bytes) for connection b8594cd8f19d28d2, Handshake 2025/09/12 03:04:58 client Long Header{Type: Handshake, DestConnectionID: 0220aa3260e2ac13, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:58 client Short Header{DestConnectionID: 0220aa3260e2ac13, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:04:58 client -> Sending packet 2 (90 bytes) for connection b8594cd8f19d28d2, Handshake 2025/09/12 03:04:58 client Long Header{Type: Handshake, DestConnectionID: 0220aa3260e2ac13, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:58 client -> Sending packet 3 (90 bytes) for connection b8594cd8f19d28d2, Handshake 2025/09/12 03:04:58 client Long Header{Type: Handshake, DestConnectionID: 0220aa3260e2ac13, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:58 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:58 client Dropping Handshake keys. 2025/09/12 03:04:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fe8b3a91c5ec4527, StatelessResetToken: 0xc8db9990706deb1173b64666f376e402} 2025/09/12 03:04:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 64e4288f30ce1013, StatelessResetToken: 0x57f18c321409008b8b9e08ba643fc8c7} 2025/09/12 03:04:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f5c7386f1aba38b1, StatelessResetToken: 0x015e5b5a16a58c5e4e57c087d4fbd033} 2025/09/12 03:04:58 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:04:58 client -> Sending packet 2 (53 bytes) for connection b8594cd8f19d28d2, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:58 client Short Header{DestConnectionID: fe8b3a91c5ec4527, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 253.586µs} 2025/09/12 03:04:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:58 client -> Sending packet 3 (48 bytes) for connection b8594cd8f19d28d2, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:58 client Short Header{DestConnectionID: fe8b3a91c5ec4527, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:58 client <- Reading packet 5 (24 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 72µs} 2025/09/12 03:04:58 client newly acked packets (1): [3] 2025/09/12 03:04:58 client updated RTT: 35.162ms (σ: 14.15ms) 2025/09/12 03:04:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:04:58 client Canceling loss detection timer. 2025/09/12 03:04:58 client <- Reading packet 6 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:58 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:58 client -> Sending packet 4 (34 bytes) for connection b8594cd8f19d28d2, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:58 client Short Header{DestConnectionID: fe8b3a91c5ec4527, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 68.698µs} 2025/09/12 03:04:58 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:58 client -> Sending packet 5 (30 bytes) for connection b8594cd8f19d28d2, 1-RTT (ECN: Not-ECT) 2025/09/12 03:04:58 client Short Header{DestConnectionID: fe8b3a91c5ec4527, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:58 client Connection b8594cd8f19d28d2 closed. 2025/09/12 03:04:58 Requesting https://server4:443/bzxuckfcsm. 2025/09/12 03:04:58 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:58 Increased send buffer size to 14336 kiB 2025/09/12 03:04:58 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:58 Created qlog file: /logs/qlog/9a664230c64b3245.sqlog 2025/09/12 03:04:58 client Starting new connection to server4 ([::]:46395 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9a664230c64b3245, version v1 2025/09/12 03:04:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:58 client -> Sending packet 0 (1280 bytes) for connection 9a664230c64b3245, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: 9a664230c64b3245, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:04:58 client -> Sending packet 1 (1280 bytes) for connection 9a664230c64b3245, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: 9a664230c64b3245, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 1240, Data length: 276, Offset + Data length: 1516} 2025/09/12 03:04:58 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:58 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30f7640e51a2080c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:58 client Received first packet. Switching destination connection ID to: 30f7640e51a2080c 2025/09/12 03:04:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.144ms} 2025/09/12 03:04:58 client newly acked packets (1): [0] 2025/09/12 03:04:58 client updated RTT: 34.58157ms (σ: 17.290785ms) 2025/09/12 03:04:58 client <- &wire.PingFrame{} 2025/09/12 03:04:58 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:58 client -> Sending packet 2 (1280 bytes) for connection 9a664230c64b3245, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: 30f7640e51a2080c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:58 client -> Sending packet 3 (1280 bytes) for connection 9a664230c64b3245, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: 30f7640e51a2080c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 1240, Data length: 276, Offset + Data length: 1516} 2025/09/12 03:04:58 client -> Sending packet 4 (1280 bytes) for connection 9a664230c64b3245, Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: 30f7640e51a2080c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 1240, Data length: 276, Offset + Data length: 1516} 2025/09/12 03:04:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:58 client <- Reading packet 3 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30f7640e51a2080c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 376µs} 2025/09/12 03:04:58 client newly acked packets (1): [4] 2025/09/12 03:04:58 client updated RTT: 34.447ms (σ: 13.234ms) 2025/09/12 03:04:59 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:04:59 client <- Reading packet 4 (130 bytes) for connection (empty), Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30f7640e51a2080c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 03:04:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:59 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 298 bytes. 2025/09/12 03:04:59 client <- Reading packet 5 (772 bytes) for connection (empty), Handshake 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 30f7640e51a2080c, PacketNumber: 5, PacketNumberLen: 2, Length: 755, Version: v1} 2025/09/12 03:04:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 03:04:59 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9a664230c64b3245, InitialSourceConnectionID: 30f7640e51a2080c, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4fb7b0d046887c1e4f33d813b2e0998f, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:59 client Dropping %!s(logging.PacketType=5) packet (298 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9a664230c64b3245 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: 30f7640e51a2080c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: 30f7640e51a2080c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:59 client Dropping Initial keys. 2025/09/12 03:04:59 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:59 client -> Sending packet 1 (40 bytes) for connection 9a664230c64b3245, Handshake 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: 30f7640e51a2080c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 03:04:59 client -> Sending packet 0 (46 bytes) for connection 9a664230c64b3245, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: 30f7640e51a2080c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:59 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:59 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:59 client Dropping Handshake keys. 2025/09/12 03:04:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e393ce786e0560f, StatelessResetToken: 0xd348cef9d3b2ce6779e40954c01ac17a} 2025/09/12 03:04:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2983bf996e986bf1, StatelessResetToken: 0xa8b7a931038c224198394113c95beac6} 2025/09/12 03:04:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9be232ca43649faf, StatelessResetToken: 0x15c185533f413332ff33bfa219a43969} 2025/09/12 03:04:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:59 client -> Sending packet 1 (34 bytes) for connection 9a664230c64b3245, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: 7e393ce786e0560f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 139.61µs} 2025/09/12 03:04:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:59 client <- Reading packet 8 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:59 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:59 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:04:59 client -> Sending packet 2 (34 bytes) for connection 9a664230c64b3245, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: 7e393ce786e0560f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 77.625µs} 2025/09/12 03:04:59 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:59 client -> Sending packet 3 (30 bytes) for connection 9a664230c64b3245, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: 7e393ce786e0560f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:59 client Connection 9a664230c64b3245 closed. 2025/09/12 03:04:59 Requesting https://server4:443/rhkgfsosya. 2025/09/12 03:04:59 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:59 Increased send buffer size to 14336 kiB 2025/09/12 03:04:59 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:59 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:59 Created qlog file: /logs/qlog/288ee37b712c82e2.sqlog 2025/09/12 03:04:59 client Starting new connection to server4 ([::]:60639 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 288ee37b712c82e2, version v1 2025/09/12 03:04:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:59 client -> Sending packet 0 (1280 bytes) for connection 288ee37b712c82e2, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: 288ee37b712c82e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:04:59 client -> Sending packet 1 (1280 bytes) for connection 288ee37b712c82e2, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: 288ee37b712c82e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 1240, Data length: 270, Offset + Data length: 1510} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:59 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:59 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d7c13ef8cd0889bf, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:59 client Received first packet. Switching destination connection ID to: d7c13ef8cd0889bf 2025/09/12 03:04:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.096ms} 2025/09/12 03:04:59 client newly acked packets (1): [1] 2025/09/12 03:04:59 client updated RTT: 35.027834ms (σ: 17.513917ms) 2025/09/12 03:04:59 client setting loss timer for packet 0 (Initial) to 39.406313ms (in 2025-09-12 03:04:59.176156106 +0000 UTC m=+34.489186274) 2025/09/12 03:04:59 client <- &wire.PingFrame{} 2025/09/12 03:04:59 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:59 client -> Sending packet 2 (1280 bytes) for connection 288ee37b712c82e2, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: d7c13ef8cd0889bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:59 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:04:59.176156106 +0000 UTC m=+34.489186274 2025/09/12 03:04:59 client lost packet 0 (time threshold) 2025/09/12 03:04:59 client -> Sending packet 3 (1280 bytes) for connection 288ee37b712c82e2, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: d7c13ef8cd0889bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:04:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:59 client -> Sending packet 4 (1280 bytes) for connection 288ee37b712c82e2, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: d7c13ef8cd0889bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:04:59 client -> Sending packet 5 (1280 bytes) for connection 288ee37b712c82e2, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: d7c13ef8cd0889bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:04:59 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 03:04:59 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d7c13ef8cd0889bf, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 03:04:59 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 1.776ms} 2025/09/12 03:04:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:59 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 291 bytes. 2025/09/12 03:04:59 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d7c13ef8cd0889bf, PacketNumber: 2, PacketNumberLen: 2, Length: 754, Version: v1} 2025/09/12 03:04:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 03:04:59 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 288ee37b712c82e2, InitialSourceConnectionID: d7c13ef8cd0889bf, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf4bb024fcc9a539376da1975cce739ee, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:59 client Dropping %!s(logging.PacketType=5) packet (291 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 288ee37b712c82e2 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: d7c13ef8cd0889bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: d7c13ef8cd0889bf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:59 client Dropping Initial keys. 2025/09/12 03:04:59 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:59 client -> Sending packet 1 (86 bytes) for connection 288ee37b712c82e2, Handshake 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: d7c13ef8cd0889bf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:59 client Short Header{DestConnectionID: d7c13ef8cd0889bf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:04:59 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:59 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.048ms} 2025/09/12 03:04:59 client Peer doesn't await address validation any longer. 2025/09/12 03:04:59 client newly acked packets (1): [0] 2025/09/12 03:04:59 client updated RTT: 34.941ms (σ: 13.305ms) 2025/09/12 03:04:59 client Canceling loss detection timer. 2025/09/12 03:04:59 client Dropping Handshake keys. 2025/09/12 03:04:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:04:59 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:59 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client <- &wire.PingFrame{} 2025/09/12 03:04:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:04:59 client -> Sending packet 1 (1366 bytes) for connection 288ee37b712c82e2, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: d7c13ef8cd0889bf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.PingFrame{} 2025/09/12 03:04:59 client -> Sending packet 2 (34 bytes) for connection 288ee37b712c82e2, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: d7c13ef8cd0889bf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 187.58µs} 2025/09/12 03:04:59 client <- Reading packet 8 (1132 bytes) for connection (empty), 1-RTT 2025/09/12 03:04:59 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:04:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 057d9e101ccd0601, StatelessResetToken: 0xadc15c7d8d61fac1fe9fa519aec175de} 2025/09/12 03:04:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a86e9c53dd09e8da, StatelessResetToken: 0xafa26be9d6f9e1bb37e59e66dbb4eb14} 2025/09/12 03:04:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 79d08172c6354cc4, StatelessResetToken: 0x0b585c8c837b19a3465af0f2bed1728b} 2025/09/12 03:04:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:04:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:04:59 client -> Sending packet 3 (36 bytes) for connection 288ee37b712c82e2, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: 057d9e101ccd0601, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 188.341µs} 2025/09/12 03:04:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:04:59 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:04:59 client -> Sending packet 4 (30 bytes) for connection 288ee37b712c82e2, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: 057d9e101ccd0601, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:04:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:04:59 client Connection 288ee37b712c82e2 closed. 2025/09/12 03:04:59 Requesting https://server4:443/ilzuqomqjg. 2025/09/12 03:04:59 Increased receive buffer size to 14336 kiB 2025/09/12 03:04:59 Increased send buffer size to 14336 kiB 2025/09/12 03:04:59 Setting DF for IPv4 and IPv6. 2025/09/12 03:04:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:04:59 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:04:59 Created qlog file: /logs/qlog/c571e365ffa0c25baefa1e23.sqlog 2025/09/12 03:04:59 client Starting new connection to server4 ([::]:33207 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c571e365ffa0c25baefa1e23, version v1 2025/09/12 03:04:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:04:59 client -> Sending packet 0 (1280 bytes) for connection c571e365ffa0c25baefa1e23, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: c571e365ffa0c25baefa1e23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:04:59 client -> Sending packet 1 (1280 bytes) for connection c571e365ffa0c25baefa1e23, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: c571e365ffa0c25baefa1e23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:59 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:04:59 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 517c1636b7a00cca, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:04:59 client Received first packet. Switching destination connection ID to: 517c1636b7a00cca 2025/09/12 03:04:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 984µs} 2025/09/12 03:04:59 client newly acked packets (1): [0] 2025/09/12 03:04:59 client updated RTT: 34.155797ms (σ: 17.077898ms) 2025/09/12 03:04:59 client <- &wire.PingFrame{} 2025/09/12 03:04:59 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:04:59 client -> Sending packet 2 (1280 bytes) for connection c571e365ffa0c25baefa1e23, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: 517c1636b7a00cca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:04:59 client -> Sending packet 3 (1280 bytes) for connection c571e365ffa0c25baefa1e23, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: 517c1636b7a00cca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/09/12 03:04:59 client -> Sending packet 4 (1280 bytes) for connection c571e365ffa0c25baefa1e23, Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: 517c1636b7a00cca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/09/12 03:04:59 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:04:59 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 517c1636b7a00cca, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:04:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.952ms} 2025/09/12 03:04:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:04:59 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Parsed a coalesced packet. Part 2: 777 bytes. Remaining: 287 bytes. 2025/09/12 03:04:59 client <- Reading packet 2 (777 bytes) for connection (empty), Handshake 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 517c1636b7a00cca, PacketNumber: 2, PacketNumberLen: 2, Length: 760, Version: v1} 2025/09/12 03:04:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/09/12 03:04:59 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:04:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c571e365ffa0c25baefa1e23, InitialSourceConnectionID: 517c1636b7a00cca, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xddb581ec77ccb22bbf220be2788803a3, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:04:59 client Dropping %!s(logging.PacketType=5) packet (287 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c571e365ffa0c25baefa1e23 2025/09/12 03:04:59 client Long Header{Type: Initial, DestConnectionID: 517c1636b7a00cca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: 517c1636b7a00cca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:04:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:04:59 client Dropping Initial keys. 2025/09/12 03:04:59 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:04:59 client -> Sending packet 1 (40 bytes) for connection c571e365ffa0c25baefa1e23, Handshake 2025/09/12 03:04:59 client Long Header{Type: Handshake, DestConnectionID: 517c1636b7a00cca, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:04:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:04:59 client -> Sending packet 0 (46 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: ECT(0)) 2025/09/12 03:04:59 client Short Header{DestConnectionID: 517c1636b7a00cca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:04:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:05:00 client -> Sending packet 2 (90 bytes) for connection c571e365ffa0c25baefa1e23, Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 517c1636b7a00cca, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:00 client -> Sending packet 3 (90 bytes) for connection c571e365ffa0c25baefa1e23, Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 517c1636b7a00cca, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:05:00 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:05:00 client Dropping Handshake keys. 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ea786677469b47b7, StatelessResetToken: 0x11b9cb9a8352aeb049e641edd25c8824} 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 203355a484b297ec, StatelessResetToken: 0xc536b401d86fca7094d454fa25e3ef88} 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c4d940b8c4ca788d, StatelessResetToken: 0x9adc5efdb65f37b51233799c3aafa739} 2025/09/12 03:05:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:05:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:05:00 client -> Sending packet 2 (53 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: ea786677469b47b7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 143.538µs} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client -> Sending packet 3 (48 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: ea786677469b47b7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.PingFrame{} 2025/09/12 03:05:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:05:00 client Sending ACK because the ACK timer expired. 2025/09/12 03:05:00 client -> Sending packet 4 (33 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: ea786677469b47b7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.315491ms} 2025/09/12 03:05:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:05:00 client -> Sending packet 6 (48 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: ea786677469b47b7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client -> Sending packet 7 (48 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: ea786677469b47b7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client -> Sending packet 8 (1366 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: ea786677469b47b7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.PingFrame{} 2025/09/12 03:05:00 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a6623b02abae5602, StatelessResetToken: 0x07d62cd55994abcaa16f02e1b8d640e5} 2025/09/12 03:05:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:05:00 client <- Reading packet 6 (26 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 192µs} 2025/09/12 03:05:00 client newly acked packets (1): [7] 2025/09/12 03:05:00 client updated RTT: 33.886ms (σ: 13.345ms) 2025/09/12 03:05:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:05:00 client Canceling loss detection timer. 2025/09/12 03:05:00 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:05:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:05:00 client -> Sending packet 9 (32 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: Not-ECT) 2025/09/12 03:05:00 client Short Header{DestConnectionID: ea786677469b47b7, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 60.793µs} 2025/09/12 03:05:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:05:00 client Skipping packet number 10 2025/09/12 03:05:00 client -> Sending packet 11 (30 bytes) for connection c571e365ffa0c25baefa1e23, 1-RTT (ECN: Not-ECT) 2025/09/12 03:05:00 client Short Header{DestConnectionID: ea786677469b47b7, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:05:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:05:00 client Connection c571e365ffa0c25baefa1e23 closed. 2025/09/12 03:05:00 Requesting https://server4:443/pnaptacrzf. 2025/09/12 03:05:00 Increased receive buffer size to 14336 kiB 2025/09/12 03:05:00 Increased send buffer size to 14336 kiB 2025/09/12 03:05:00 Setting DF for IPv4 and IPv6. 2025/09/12 03:05:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:05:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:05:00 Created qlog file: /logs/qlog/c9ea3223997bf00ae0e3a9313b024b8f.sqlog 2025/09/12 03:05:00 client Starting new connection to server4 ([::]:60902 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c9ea3223997bf00ae0e3a9313b024b8f, version v1 2025/09/12 03:05:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:05:00 client -> Sending packet 0 (1280 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, Initial 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: c9ea3223997bf00ae0e3a9313b024b8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:05:00 client -> Sending packet 1 (1280 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, Initial 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: c9ea3223997bf00ae0e3a9313b024b8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:05:00 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:05:00 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d30401122ed1f23, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:05:00 client Received first packet. Switching destination connection ID to: 9d30401122ed1f23 2025/09/12 03:05:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.336ms} 2025/09/12 03:05:00 client newly acked packets (2): [0 1] 2025/09/12 03:05:00 client updated RTT: 35.300491ms (σ: 17.650245ms) 2025/09/12 03:05:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:05:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:00 client Parsed a coalesced packet. Part 2: 780 bytes. Remaining: 284 bytes. 2025/09/12 03:05:00 client <- Reading packet 2 (780 bytes) for connection (empty), Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9d30401122ed1f23, PacketNumber: 2, PacketNumberLen: 2, Length: 763, Version: v1} 2025/09/12 03:05:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 03:05:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c9ea3223997bf00ae0e3a9313b024b8f, InitialSourceConnectionID: 9d30401122ed1f23, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x51cc5bfe77c1695b82de4d27f07e9122, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:05:00 client Dropping %!s(logging.PacketType=5) packet (284 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:05:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: 9d30401122ed1f23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 9d30401122ed1f23, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:00 client Dropping Initial keys. 2025/09/12 03:05:00 client -> Sending packet 1 (40 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 9d30401122ed1f23, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:05:00 client -> Sending packet 0 (46 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 9d30401122ed1f23, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:05:00 client -> Sending packet 2 (90 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 9d30401122ed1f23, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:00 client -> Sending packet 3 (90 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 9d30401122ed1f23, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:00 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:05:00 client Dropping Handshake keys. 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65b5aab2c442b300, StatelessResetToken: 0xce3d61ceb4030cb828c969bcbf3e7c90} 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 85939ff670f2c454, StatelessResetToken: 0xbc47c1cdc09dae5b2451619748ae0661} 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81eb04d958d36190, StatelessResetToken: 0x5273da30c660e27198abb5cae9a6628b} 2025/09/12 03:05:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:05:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:05:00 client -> Sending packet 2 (53 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 65b5aab2c442b300, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 185.456µs} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client -> Sending packet 3 (48 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 65b5aab2c442b300, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client <- Reading packet 4 (47 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d4dbe8c129017a40, StatelessResetToken: 0xf6c77a93c0a4b2e867e43ffb376effd1} 2025/09/12 03:05:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:05:00 client Sending ACK because the ACK timer expired. 2025/09/12 03:05:00 client -> Sending packet 4 (33 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 65b5aab2c442b300, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.310341ms} 2025/09/12 03:05:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:05:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:05:00 client -> Sending packet 6 (48 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 65b5aab2c442b300, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client -> Sending packet 7 (48 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 65b5aab2c442b300, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client -> Sending packet 8 (1366 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 65b5aab2c442b300, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.PingFrame{} 2025/09/12 03:05:00 client <- Reading packet 8 (28 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 2}}, DelayTime: 1.448ms} 2025/09/12 03:05:00 client newly acked packets (1): [7] 2025/09/12 03:05:00 client updated RTT: 34.997ms (σ: 13.842ms) 2025/09/12 03:05:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 03:05:00 client Canceling loss detection timer. 2025/09/12 03:05:00 client <- &wire.PingFrame{} 2025/09/12 03:05:00 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:05:00 client -> Sending packet 9 (34 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: Not-ECT) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 65b5aab2c442b300, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}}, DelayTime: 156.793µs} 2025/09/12 03:05:00 client <- Reading packet 9 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:05:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:05:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:05:00 client -> Sending packet 10 (30 bytes) for connection c9ea3223997bf00ae0e3a9313b024b8f, 1-RTT (ECN: Not-ECT) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 65b5aab2c442b300, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:05:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:05:00 client Connection c9ea3223997bf00ae0e3a9313b024b8f closed. 2025/09/12 03:05:00 Requesting https://server4:443/edtzdrscij. 2025/09/12 03:05:00 Increased receive buffer size to 14336 kiB 2025/09/12 03:05:00 Increased send buffer size to 14336 kiB 2025/09/12 03:05:00 Setting DF for IPv4 and IPv6. 2025/09/12 03:05:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:05:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:05:00 Created qlog file: /logs/qlog/5a3d56e40c609d08.sqlog 2025/09/12 03:05:00 client Starting new connection to server4 ([::]:40477 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5a3d56e40c609d08, version v1 2025/09/12 03:05:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:05:00 client -> Sending packet 0 (1280 bytes) for connection 5a3d56e40c609d08, Initial 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: 5a3d56e40c609d08, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:05:00 client -> Sending packet 1 (1280 bytes) for connection 5a3d56e40c609d08, Initial 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: 5a3d56e40c609d08, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:05:00 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:05:00 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0f6120c7ed81cff3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:05:00 client Received first packet. Switching destination connection ID to: 0f6120c7ed81cff3 2025/09/12 03:05:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 888µs} 2025/09/12 03:05:00 client newly acked packets (1): [0] 2025/09/12 03:05:00 client updated RTT: 33.999623ms (σ: 16.999811ms) 2025/09/12 03:05:00 client <- &wire.PingFrame{} 2025/09/12 03:05:00 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:05:00 client -> Sending packet 2 (1280 bytes) for connection 5a3d56e40c609d08, Initial 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: 0f6120c7ed81cff3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:05:00 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:05:00 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0f6120c7ed81cff3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:05:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.296ms} 2025/09/12 03:05:00 client newly acked packets (1): [1] 2025/09/12 03:05:00 client updated RTT: 34.405ms (σ: 13.562ms) 2025/09/12 03:05:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:05:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:00 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 291 bytes. 2025/09/12 03:05:00 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0f6120c7ed81cff3, PacketNumber: 2, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 03:05:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 03:05:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5a3d56e40c609d08, InitialSourceConnectionID: 0f6120c7ed81cff3, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2ae83b6cfd0b714596eb23bffb7a5fa9, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:05:00 client Dropping %!s(logging.PacketType=5) packet (291 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:05:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5a3d56e40c609d08 2025/09/12 03:05:00 client Long Header{Type: Initial, DestConnectionID: 0f6120c7ed81cff3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 0f6120c7ed81cff3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:00 client Dropping Initial keys. 2025/09/12 03:05:00 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:05:00 client -> Sending packet 1 (86 bytes) for connection 5a3d56e40c609d08, Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 0f6120c7ed81cff3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:05:00 client Short Header{DestConnectionID: 0f6120c7ed81cff3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:05:00 client -> Sending packet 2 (90 bytes) for connection 5a3d56e40c609d08, Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 0f6120c7ed81cff3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:00 client -> Sending packet 3 (90 bytes) for connection 5a3d56e40c609d08, Handshake 2025/09/12 03:05:00 client Long Header{Type: Handshake, DestConnectionID: 0f6120c7ed81cff3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:00 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:05:00 client Dropping Handshake keys. 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 576933e192e97791, StatelessResetToken: 0xcc63208cdee7ee523c277f90a409745d} 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0b6484d8677f9168, StatelessResetToken: 0x97d66de5a770a1301a4e49b59db541dd} 2025/09/12 03:05:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d2f1cdd4ce554a5c, StatelessResetToken: 0x586a29400bd3d5b3365d4cb929395d9c} 2025/09/12 03:05:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:05:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:05:00 client -> Sending packet 2 (53 bytes) for connection 5a3d56e40c609d08, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 576933e192e97791, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 174.696µs} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:00 client -> Sending packet 3 (48 bytes) for connection 5a3d56e40c609d08, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:00 client Short Header{DestConnectionID: 576933e192e97791, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:05:01 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client <- &wire.PingFrame{} 2025/09/12 03:05:01 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:05:01 client Sending ACK because the ACK timer expired. 2025/09/12 03:05:01 client -> Sending packet 4 (33 bytes) for connection 5a3d56e40c609d08, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:01 client Short Header{DestConnectionID: 576933e192e97791, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.481774ms} 2025/09/12 03:05:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 03:05:01 client -> Sending packet 6 (48 bytes) for connection 5a3d56e40c609d08, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:01 client Short Header{DestConnectionID: 576933e192e97791, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:01 client -> Sending packet 7 (48 bytes) for connection 5a3d56e40c609d08, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:01 client Short Header{DestConnectionID: 576933e192e97791, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:05:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:01 client -> Sending packet 8 (1366 bytes) for connection 5a3d56e40c609d08, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:01 client Short Header{DestConnectionID: 576933e192e97791, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client -> &wire.PingFrame{} 2025/09/12 03:05:01 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:05:01 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:05:01 client -> Sending packet 9 (34 bytes) for connection 5a3d56e40c609d08, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:01 client Short Header{DestConnectionID: 576933e192e97791, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 113.512µs} 2025/09/12 03:05:01 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:05:01 client -> Sending packet 10 (30 bytes) for connection 5a3d56e40c609d08, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:01 client Short Header{DestConnectionID: 576933e192e97791, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:05:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:05:01 client Connection 5a3d56e40c609d08 closed. 2025/09/12 03:05:01 Requesting https://server4:443/abzqworlbm. 2025/09/12 03:05:01 Increased receive buffer size to 14336 kiB 2025/09/12 03:05:01 Increased send buffer size to 14336 kiB 2025/09/12 03:05:01 Setting DF for IPv4 and IPv6. 2025/09/12 03:05:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:05:01 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:05:01 Created qlog file: /logs/qlog/fc47e19b66e9c7cf5805fe4e6d7c.sqlog 2025/09/12 03:05:01 client Starting new connection to server4 ([::]:55648 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fc47e19b66e9c7cf5805fe4e6d7c, version v1 2025/09/12 03:05:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:05:01 client -> Sending packet 0 (1280 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Initial 2025/09/12 03:05:01 client Long Header{Type: Initial, DestConnectionID: fc47e19b66e9c7cf5805fe4e6d7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:05:01 client -> Sending packet 1 (1280 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Initial 2025/09/12 03:05:01 client Long Header{Type: Initial, DestConnectionID: fc47e19b66e9c7cf5805fe4e6d7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 1234, Data length: 270, Offset + Data length: 1504} 2025/09/12 03:05:01 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:05:01 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:05:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 70ba51ead3191ee7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:05:01 client Received first packet. Switching destination connection ID to: 70ba51ead3191ee7 2025/09/12 03:05:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.088ms} 2025/09/12 03:05:01 client newly acked packets (1): [0] 2025/09/12 03:05:01 client updated RTT: 34.338102ms (σ: 17.169051ms) 2025/09/12 03:05:01 client <- &wire.PingFrame{} 2025/09/12 03:05:01 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:05:01 client -> Sending packet 2 (1280 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Initial 2025/09/12 03:05:01 client Long Header{Type: Initial, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:05:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:05:01 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:05:01 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:05:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 70ba51ead3191ee7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:05:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.272ms} 2025/09/12 03:05:01 client newly acked packets (1): [1] 2025/09/12 03:05:01 client updated RTT: 34.504ms (σ: 13.21ms) 2025/09/12 03:05:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:05:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:01 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 286 bytes. 2025/09/12 03:05:01 client <- Reading packet 2 (778 bytes) for connection (empty), Handshake 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 70ba51ead3191ee7, PacketNumber: 2, PacketNumberLen: 2, Length: 761, Version: v1} 2025/09/12 03:05:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 03:05:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:05:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fc47e19b66e9c7cf5805fe4e6d7c, InitialSourceConnectionID: 70ba51ead3191ee7, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x91bdf3e8d0dfdb9c5936745a9c989697, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:05:01 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:05:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c 2025/09/12 03:05:01 client Long Header{Type: Initial, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:05:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:01 client Dropping Initial keys. 2025/09/12 03:05:01 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:05:01 client -> Sending packet 1 (86 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:05:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:05:01 client Short Header{DestConnectionID: 70ba51ead3191ee7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:05:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:05:01 client -> Sending packet 2 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:01 client -> Sending packet 3 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:01 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client <- &wire.PingFrame{} 2025/09/12 03:05:01 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:05:01 client -> Sending packet 1 (32 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:01 client Short Header{DestConnectionID: 70ba51ead3191ee7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 122.76µs} 2025/09/12 03:05:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:05:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:05:01 client -> Sending packet 4 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:01 client -> Sending packet 5 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 03:05:01 client -> Sending packet 6 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:01 client -> Sending packet 7 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:01 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/09/12 03:05:02 client -> Sending packet 8 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:02 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:02 client -> Sending packet 9 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:02 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:04 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 5 2025/09/12 03:05:04 client -> Sending packet 10 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:04 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:04 client -> Sending packet 11 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:04 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 6 2025/09/12 03:05:06 client -> Sending packet 12 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:06 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:06 client -> Sending packet 13 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:06 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:09 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:09 client <- &wire.PingFrame{} 2025/09/12 03:05:09 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:05:09 client -> Sending packet 2 (34 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:09 client Short Header{DestConnectionID: 70ba51ead3191ee7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:09 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}}, DelayTime: 112.28µs} 2025/09/12 03:05:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 7 2025/09/12 03:05:12 client -> Sending packet 14 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:12 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:12 client -> Sending packet 15 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:12 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:17 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:05:17 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:17 client <- &wire.PingFrame{} 2025/09/12 03:05:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:05:17 client Sending ACK because the ACK timer expired. 2025/09/12 03:05:17 client -> Sending packet 3 (35 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:05:17 client Short Header{DestConnectionID: 70ba51ead3191ee7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:05:17 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 4, Smallest: 4}}, DelayTime: 25.290709ms} 2025/09/12 03:05:23 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 8 2025/09/12 03:05:23 client -> Sending packet 16 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:23 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:23 client -> Sending packet 17 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:23 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 9 2025/09/12 03:05:45 client -> Sending packet 18 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:45 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:45 client -> Sending packet 19 (90 bytes) for connection fc47e19b66e9c7cf5805fe4e6d7c, Handshake 2025/09/12 03:05:45 client Long Header{Type: Handshake, DestConnectionID: 70ba51ead3191ee7, SrcConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:05:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:05:53 client Destroying connection: timeout: no recent network activity 2025/09/12 03:05:53 Removing connection ID (empty). 2025/09/12 03:05:53 client Connection fc47e19b66e9c7cf5805fe4e6d7c closed.