2025/09/12 12:21:42 Requesting https://server4:443/mnveiqbgoe. 2025/09/12 12:21:42 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:42 Increased send buffer size to 14336 kiB 2025/09/12 12:21:42 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:42 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:42 Created qlog file: /logs/qlog/dcd8bad4c092c9225dc234730b2b4bb0999cc4e2.sqlog 2025/09/12 12:21:42 client Starting new connection to server4 ([::]:36492 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, version v1 2025/09/12 12:21:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:42 client -> Sending packet 0 (1280 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, Initial 2025/09/12 12:21:42 client Long Header{Type: Initial, DestConnectionID: dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:42 client -> Sending packet 1 (1280 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, Initial 2025/09/12 12:21:42 client Long Header{Type: Initial, DestConnectionID: dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 1228, Data length: 276, Offset + Data length: 1504} 2025/09/12 12:21:42 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:42 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2229c70c77fbebf3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:42 client Received first packet. Switching destination connection ID to: 2229c70c77fbebf3 2025/09/12 12:21:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.6ms} 2025/09/12 12:21:42 client newly acked packets (1): [1] 2025/09/12 12:21:42 client updated RTT: 40.750359ms (σ: 20.375179ms) 2025/09/12 12:21:42 client setting loss timer for packet 0 (Initial) to 45.844153ms (in 2025-09-12 12:21:42.839521392 +0000 UTC m=+0.047119321) 2025/09/12 12:21:42 client <- &wire.PingFrame{} 2025/09/12 12:21:42 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:42 client -> Sending packet 2 (1280 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, Initial 2025/09/12 12:21:42 client Long Header{Type: Initial, DestConnectionID: 2229c70c77fbebf3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:42 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 12:21:42.839521392 +0000 UTC m=+0.047119321 2025/09/12 12:21:42 client lost packet 0 (time threshold) 2025/09/12 12:21:42 client -> Sending packet 3 (1280 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, Initial 2025/09/12 12:21:42 client Long Header{Type: Initial, DestConnectionID: 2229c70c77fbebf3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:42 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:42 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2229c70c77fbebf3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 2.24ms} 2025/09/12 12:21:42 client newly acked packets (1): [3] 2025/09/12 12:21:42 client updated RTT: 40.023ms (σ: 16.734ms) 2025/09/12 12:21:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:42 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:42 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:42 client Parsed a coalesced packet. Part 2: 785 bytes. Remaining: 279 bytes. 2025/09/12 12:21:42 client <- Reading packet 2 (785 bytes) for connection (empty), Handshake 2025/09/12 12:21:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2229c70c77fbebf3, PacketNumber: 2, PacketNumberLen: 2, Length: 768, Version: v1} 2025/09/12 12:21:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 746, Offset + Data length: 746} 2025/09/12 12:21:42 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:42 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, InitialSourceConnectionID: 2229c70c77fbebf3, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x6d4d6ab134615585c097b3f3d6ca23ee, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:42 client Dropping %!s(logging.PacketType=5) packet (279 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2 2025/09/12 12:21:42 client Long Header{Type: Initial, DestConnectionID: 2229c70c77fbebf3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:42 client Long Header{Type: Handshake, DestConnectionID: 2229c70c77fbebf3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:42 client Dropping Initial keys. 2025/09/12 12:21:42 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:42 client -> Sending packet 1 (40 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, Handshake 2025/09/12 12:21:42 client Long Header{Type: Handshake, DestConnectionID: 2229c70c77fbebf3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:42 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:42 client -> Sending packet 0 (46 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:42 client Short Header{DestConnectionID: 2229c70c77fbebf3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:42 client -> Sending packet 2 (90 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, Handshake 2025/09/12 12:21:42 client Long Header{Type: Handshake, DestConnectionID: 2229c70c77fbebf3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:42 client -> Sending packet 3 (90 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, Handshake 2025/09/12 12:21:42 client Long Header{Type: Handshake, DestConnectionID: 2229c70c77fbebf3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:43 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client <- &wire.PingFrame{} 2025/09/12 12:21:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:43 client -> Sending packet 1 (32 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:43 client Short Header{DestConnectionID: 2229c70c77fbebf3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 85.469µs} 2025/09/12 12:21:43 client <- Reading packet 5 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:43 client Dropping Handshake keys. 2025/09/12 12:21:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d16a7fb30d55359e, StatelessResetToken: 0x1d2ba9d430e788bee7b154e7958d9376} 2025/09/12 12:21:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0fc315b800278a4e, StatelessResetToken: 0x9a7ae7cac9f6cf01312d79787e62cb7a} 2025/09/12 12:21:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 16371a67f34001ea, StatelessResetToken: 0x74fbc9be5659cb6f5bbe10e63fd9fd68} 2025/09/12 12:21:43 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:43 client -> Sending packet 3 (53 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:43 client Short Header{DestConnectionID: d16a7fb30d55359e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 144.76µs} 2025/09/12 12:21:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:43 client -> Sending packet 4 (48 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:43 client Short Header{DestConnectionID: d16a7fb30d55359e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:43 client <- Reading packet 6 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:43 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d294c0dd8e1d56ee, StatelessResetToken: 0x1764b2dcc3123faf8b9b31e90aa2a302} 2025/09/12 12:21:43 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:43 client <- Reading packet 8 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:43 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:43 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:21:43 client -> Sending packet 5 (34 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:43 client Short Header{DestConnectionID: d16a7fb30d55359e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 75.711µs} 2025/09/12 12:21:43 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:43 client -> Sending packet 6 (30 bytes) for connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:43 client Short Header{DestConnectionID: d16a7fb30d55359e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:43 client Connection dcd8bad4c092c9225dc234730b2b4bb0999cc4e2 closed. 2025/09/12 12:21:43 Requesting https://server4:443/qlinkjptrm. 2025/09/12 12:21:43 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:43 Increased send buffer size to 14336 kiB 2025/09/12 12:21:43 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:43 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:43 Created qlog file: /logs/qlog/dec5a42bf4e412a421832bab1628e1ffed6705.sqlog 2025/09/12 12:21:43 client Starting new connection to server4 ([::]:44667 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dec5a42bf4e412a421832bab1628e1ffed6705, version v1 2025/09/12 12:21:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:43 client -> Sending packet 0 (1280 bytes) for connection dec5a42bf4e412a421832bab1628e1ffed6705, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: dec5a42bf4e412a421832bab1628e1ffed6705, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:43 client -> Sending packet 1 (1280 bytes) for connection dec5a42bf4e412a421832bab1628e1ffed6705, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: dec5a42bf4e412a421832bab1628e1ffed6705, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:43 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:43 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f526a49afe0422be, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:43 client Received first packet. Switching destination connection ID to: f526a49afe0422be 2025/09/12 12:21:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.28ms} 2025/09/12 12:21:43 client newly acked packets (2): [0 1] 2025/09/12 12:21:43 client updated RTT: 35.198078ms (σ: 17.599039ms) 2025/09/12 12:21:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:43 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:43 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:43 client Parsed a coalesced packet. Part 2: 783 bytes. Remaining: 281 bytes. 2025/09/12 12:21:43 client <- Reading packet 2 (783 bytes) for connection (empty), Handshake 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f526a49afe0422be, PacketNumber: 2, PacketNumberLen: 2, Length: 766, Version: v1} 2025/09/12 12:21:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/09/12 12:21:43 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:43 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dec5a42bf4e412a421832bab1628e1ffed6705, InitialSourceConnectionID: f526a49afe0422be, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x61826776f7723c1e827e39bfbf0d79e7, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:43 client Dropping %!s(logging.PacketType=5) packet (281 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dec5a42bf4e412a421832bab1628e1ffed6705 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: f526a49afe0422be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: f526a49afe0422be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:43 client Dropping Initial keys. 2025/09/12 12:21:43 client -> Sending packet 1 (40 bytes) for connection dec5a42bf4e412a421832bab1628e1ffed6705, Handshake 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: f526a49afe0422be, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:43 client -> Sending packet 0 (46 bytes) for connection dec5a42bf4e412a421832bab1628e1ffed6705, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:43 client Short Header{DestConnectionID: f526a49afe0422be, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:43 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.04ms} 2025/09/12 12:21:43 client Peer doesn't await address validation any longer. 2025/09/12 12:21:43 client newly acked packets (1): [0] 2025/09/12 12:21:43 client updated RTT: 34.998ms (σ: 13.599ms) 2025/09/12 12:21:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:43 client Canceling loss detection timer. 2025/09/12 12:21:43 client Dropping Handshake keys. 2025/09/12 12:21:43 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:43 client -> Sending packet 1 (32 bytes) for connection dec5a42bf4e412a421832bab1628e1ffed6705, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:43 client Short Header{DestConnectionID: f526a49afe0422be, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 79.358µs} 2025/09/12 12:21:43 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:43 client -> Sending packet 2 (30 bytes) for connection dec5a42bf4e412a421832bab1628e1ffed6705, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:43 client Short Header{DestConnectionID: f526a49afe0422be, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:43 client Connection dec5a42bf4e412a421832bab1628e1ffed6705 closed. 2025/09/12 12:21:43 Requesting https://server4:443/ldogwxkjgp. 2025/09/12 12:21:43 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:43 Increased send buffer size to 14336 kiB 2025/09/12 12:21:43 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:43 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:43 Created qlog file: /logs/qlog/7bf885fa0ee3f8a3d392669894b9ec40c0.sqlog 2025/09/12 12:21:43 client Starting new connection to server4 ([::]:52343 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7bf885fa0ee3f8a3d392669894b9ec40c0, version v1 2025/09/12 12:21:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:43 client -> Sending packet 0 (1280 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: 7bf885fa0ee3f8a3d392669894b9ec40c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:43 client -> Sending packet 1 (1280 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: 7bf885fa0ee3f8a3d392669894b9ec40c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 1231, Data length: 285, Offset + Data length: 1516} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:43 client -> Sending packet 2 (1280 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: 7bf885fa0ee3f8a3d392669894b9ec40c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:21:43 client -> Sending packet 3 (1280 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: 7bf885fa0ee3f8a3d392669894b9ec40c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 1231, Data length: 285, Offset + Data length: 1516} 2025/09/12 12:21:43 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:43 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 436114c35861d4f6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:43 client Received first packet. Switching destination connection ID to: 436114c35861d4f6 2025/09/12 12:21:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 808µs} 2025/09/12 12:21:43 client newly acked packets (1): [2] 2025/09/12 12:21:43 client updated RTT: 33.970128ms (σ: 16.985064ms) 2025/09/12 12:21:43 client <- &wire.PingFrame{} 2025/09/12 12:21:43 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:43 client -> Sending packet 4 (1280 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 12:21:43 client -> Sending packet 5 (1280 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 1231, Data length: 285, Offset + Data length: 1516} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:43 client -> Sending packet 6 (1280 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 1231, Data length: 285, Offset + Data length: 1516} 2025/09/12 12:21:43 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:21:43 client <- Reading packet 3 (130 bytes) for connection (empty), Initial 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 436114c35861d4f6, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:21:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:43 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:43 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:43 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 289 bytes. 2025/09/12 12:21:43 client <- Reading packet 4 (781 bytes) for connection (empty), Handshake 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 436114c35861d4f6, PacketNumber: 4, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 12:21:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 12:21:43 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:43 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7bf885fa0ee3f8a3d392669894b9ec40c0, InitialSourceConnectionID: 436114c35861d4f6, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x57b9d50320e4e18b886e45f5b98f5251, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:43 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0 2025/09/12 12:21:43 client Long Header{Type: Initial, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:43 client Dropping Initial keys. 2025/09/12 12:21:43 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:43 client -> Sending packet 1 (40 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Handshake 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 12:21:43 client -> Sending packet 0 (46 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:43 client Short Header{DestConnectionID: 436114c35861d4f6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:43 client -> Sending packet 2 (90 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Handshake 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:43 client -> Sending packet 3 (90 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Handshake 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:43 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:21:43 client Dropping %!s(logging.PacketType=0) packet (130 bytes) because we already dropped the keys. 2025/09/12 12:21:43 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 289 bytes. 2025/09/12 12:21:43 client <- Reading packet 6 (781 bytes) for connection (empty), Handshake 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 436114c35861d4f6, PacketNumber: 6, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 12:21:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 12:21:43 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:43 client -> Sending packet 4 (42 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Handshake 2025/09/12 12:21:43 client Long Header{Type: Handshake, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:43 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 0s} 2025/09/12 12:21:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:21:44 client -> Sending packet 5 (90 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Handshake 2025/09/12 12:21:44 client Long Header{Type: Handshake, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:44 client -> Sending packet 6 (90 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, Handshake 2025/09/12 12:21:44 client Long Header{Type: Handshake, DestConnectionID: 436114c35861d4f6, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:44 client <- Reading packet 7 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:44 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:44 client Dropping Handshake keys. 2025/09/12 12:21:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9b8ed007ff6bfcbb, StatelessResetToken: 0xfed274247df9479878b57e480c446144} 2025/09/12 12:21:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5e2ead35944c528d, StatelessResetToken: 0x1b8887a850fe20fdab77227cff3df3b8} 2025/09/12 12:21:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f54ce1d2f8ea5ee2, StatelessResetToken: 0x2b1405e20f7a7de1a90daab0fc297624} 2025/09/12 12:21:44 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:44 client -> Sending packet 2 (53 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:44 client Short Header{DestConnectionID: 9b8ed007ff6bfcbb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 101.489µs} 2025/09/12 12:21:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:44 client -> Sending packet 3 (48 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:44 client Short Header{DestConnectionID: 9b8ed007ff6bfcbb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:44 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:44 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 76b0ffbf9e063d0c, StatelessResetToken: 0x9cb26bf096d5b9e202b1b18a4bee02e1} 2025/09/12 12:21:44 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:44 client <- Reading packet 9 (24 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:44 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 200µs} 2025/09/12 12:21:44 client newly acked packets (1): [3] 2025/09/12 12:21:44 client updated RTT: 33.705ms (σ: 13.268ms) 2025/09/12 12:21:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:44 client Canceling loss detection timer. 2025/09/12 12:21:44 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:44 client -> Sending packet 4 (33 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:44 client Short Header{DestConnectionID: 9b8ed007ff6bfcbb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, DelayTime: 25.225546ms} 2025/09/12 12:21:44 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:44 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client <- &wire.PingFrame{} 2025/09/12 12:21:44 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:44 client -> Sending packet 5 (34 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:44 client Short Header{DestConnectionID: 9b8ed007ff6bfcbb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 7, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 7}}, DelayTime: 83.937µs} 2025/09/12 12:21:44 client <- Reading packet 12 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:44 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:44 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:44 client -> Sending packet 6 (1366 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:44 client Short Header{DestConnectionID: 9b8ed007ff6bfcbb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.PingFrame{} 2025/09/12 12:21:44 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:44 client -> Sending packet 7 (30 bytes) for connection 7bf885fa0ee3f8a3d392669894b9ec40c0, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:44 client Short Header{DestConnectionID: 9b8ed007ff6bfcbb, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:44 client Connection 7bf885fa0ee3f8a3d392669894b9ec40c0 closed. 2025/09/12 12:21:44 Requesting https://server4:443/zsvlwdfemw. 2025/09/12 12:21:44 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:44 Increased send buffer size to 14336 kiB 2025/09/12 12:21:44 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:44 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:44 Created qlog file: /logs/qlog/3ae39c6a4f6c51d1fd1e5baf.sqlog 2025/09/12 12:21:44 client Starting new connection to server4 ([::]:48848 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3ae39c6a4f6c51d1fd1e5baf, version v1 2025/09/12 12:21:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:44 client -> Sending packet 0 (1280 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: 3ae39c6a4f6c51d1fd1e5baf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:21:44 client -> Sending packet 1 (1280 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: 3ae39c6a4f6c51d1fd1e5baf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 12:21:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:44 client -> Sending packet 2 (1280 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: 3ae39c6a4f6c51d1fd1e5baf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:21:44 client -> Sending packet 3 (1280 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: 3ae39c6a4f6c51d1fd1e5baf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:44 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:44 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e5ba84ba6a1bba4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:44 client Received first packet. Switching destination connection ID to: 5e5ba84ba6a1bba4 2025/09/12 12:21:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.112ms} 2025/09/12 12:21:44 client newly acked packets (1): [2] 2025/09/12 12:21:44 client updated RTT: 34.51241ms (σ: 17.256205ms) 2025/09/12 12:21:44 client <- &wire.PingFrame{} 2025/09/12 12:21:44 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:44 client -> Sending packet 4 (1280 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: 5e5ba84ba6a1bba4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 12:21:44 client -> Sending packet 5 (1280 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: 5e5ba84ba6a1bba4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 12:21:44 client -> Sending packet 6 (1280 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: 5e5ba84ba6a1bba4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 12:21:44 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 12:21:44 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e5ba84ba6a1bba4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 12:21:44 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 1.336ms} 2025/09/12 12:21:44 client newly acked packets (1): [6] 2025/09/12 12:21:44 client updated RTT: 34.614ms (σ: 13.147ms) 2025/09/12 12:21:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:44 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:44 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:44 client Parsed a coalesced packet. Part 2: 777 bytes. Remaining: 285 bytes. 2025/09/12 12:21:44 client <- Reading packet 2 (777 bytes) for connection (empty), Handshake 2025/09/12 12:21:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e5ba84ba6a1bba4, PacketNumber: 2, PacketNumberLen: 2, Length: 760, Version: v1} 2025/09/12 12:21:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/09/12 12:21:44 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:44 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3ae39c6a4f6c51d1fd1e5baf, InitialSourceConnectionID: 5e5ba84ba6a1bba4, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf0506c35bf32a73ed452897bf620b8e0, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:44 client Dropping %!s(logging.PacketType=5) packet (285 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf 2025/09/12 12:21:44 client Long Header{Type: Initial, DestConnectionID: 5e5ba84ba6a1bba4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:44 client Long Header{Type: Handshake, DestConnectionID: 5e5ba84ba6a1bba4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:44 client Dropping Initial keys. 2025/09/12 12:21:44 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:44 client -> Sending packet 1 (86 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Handshake 2025/09/12 12:21:44 client Long Header{Type: Handshake, DestConnectionID: 5e5ba84ba6a1bba4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:44 client Short Header{DestConnectionID: 5e5ba84ba6a1bba4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:44 client -> Sending packet 2 (90 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Handshake 2025/09/12 12:21:44 client Long Header{Type: Handshake, DestConnectionID: 5e5ba84ba6a1bba4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:44 client -> Sending packet 3 (90 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, Handshake 2025/09/12 12:21:44 client Long Header{Type: Handshake, DestConnectionID: 5e5ba84ba6a1bba4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:44 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:44 client Dropping Handshake keys. 2025/09/12 12:21:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b4ca35cd5d3d22c5, StatelessResetToken: 0xc6614e15db8b4dd8c1f8717f92d5870d} 2025/09/12 12:21:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a8eea0f9de2be7e, StatelessResetToken: 0x53aa7942aa60b10e15141f7ce0d8645f} 2025/09/12 12:21:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 723f2f92b8d2ff67, StatelessResetToken: 0x6d3d389fdbc6adbff3cf18628cd9ad7f} 2025/09/12 12:21:44 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:44 client -> Sending packet 2 (53 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:44 client Short Header{DestConnectionID: b4ca35cd5d3d22c5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 127.488µs} 2025/09/12 12:21:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:44 client -> Sending packet 3 (48 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:44 client Short Header{DestConnectionID: b4ca35cd5d3d22c5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:44 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:44 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client <- &wire.PingFrame{} 2025/09/12 12:21:44 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:44 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:44 client -> Sending packet 4 (33 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:44 client Short Header{DestConnectionID: b4ca35cd5d3d22c5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:44 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.308699ms} 2025/09/12 12:21:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:21:45 client -> Sending packet 6 (48 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b4ca35cd5d3d22c5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 client -> Sending packet 7 (48 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b4ca35cd5d3d22c5, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 client -> Sending packet 8 (1366 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b4ca35cd5d3d22c5, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.PingFrame{} 2025/09/12 12:21:45 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9c0dc015ae2ca8e7, StatelessResetToken: 0x94714a714b58cb189647a79057467b61} 2025/09/12 12:21:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:45 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:21:45 client -> Sending packet 9 (34 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b4ca35cd5d3d22c5, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}}, DelayTime: 57.267µs} 2025/09/12 12:21:45 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:45 client -> Sending packet 10 (30 bytes) for connection 3ae39c6a4f6c51d1fd1e5baf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b4ca35cd5d3d22c5, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:45 client Connection 3ae39c6a4f6c51d1fd1e5baf closed. 2025/09/12 12:21:45 Requesting https://server4:443/zcmouzvabw. 2025/09/12 12:21:45 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:45 Increased send buffer size to 14336 kiB 2025/09/12 12:21:45 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:45 Created qlog file: /logs/qlog/86d1c94d6a33134651049528a93ee8c15f.sqlog 2025/09/12 12:21:45 client Starting new connection to server4 ([::]:37051 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 86d1c94d6a33134651049528a93ee8c15f, version v1 2025/09/12 12:21:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:45 client -> Sending packet 0 (1280 bytes) for connection 86d1c94d6a33134651049528a93ee8c15f, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 86d1c94d6a33134651049528a93ee8c15f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:21:45 client -> Sending packet 1 (1280 bytes) for connection 86d1c94d6a33134651049528a93ee8c15f, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 86d1c94d6a33134651049528a93ee8c15f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:45 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 462c774e8bb5ec43, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:45 client Received first packet. Switching destination connection ID to: 462c774e8bb5ec43 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.568ms} 2025/09/12 12:21:45 client newly acked packets (2): [0 1] 2025/09/12 12:21:45 client updated RTT: 35.334111ms (σ: 17.667055ms) 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 2: 780 bytes. Remaining: 284 bytes. 2025/09/12 12:21:45 client <- Reading packet 2 (780 bytes) for connection (empty), Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 462c774e8bb5ec43, PacketNumber: 2, PacketNumberLen: 2, Length: 763, Version: v1} 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 12:21:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 86d1c94d6a33134651049528a93ee8c15f, InitialSourceConnectionID: 462c774e8bb5ec43, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x9043b38a9149c79cc79e44878849613c, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:45 client Dropping %!s(logging.PacketType=5) packet (284 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 86d1c94d6a33134651049528a93ee8c15f 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 462c774e8bb5ec43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: 462c774e8bb5ec43, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:45 client Dropping Initial keys. 2025/09/12 12:21:45 client -> Sending packet 1 (40 bytes) for connection 86d1c94d6a33134651049528a93ee8c15f, Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: 462c774e8bb5ec43, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:45 client -> Sending packet 0 (46 bytes) for connection 86d1c94d6a33134651049528a93ee8c15f, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 462c774e8bb5ec43, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:45 client Dropping Handshake keys. 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b62f7535cdc9dafc, StatelessResetToken: 0xd6b7e508bacbb7b7013a914e9dfbc978} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 58f4c64484e4b347, StatelessResetToken: 0x381afd97e0bfc235f0a7bf9c6d4a2f8e} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a14d81e585fd4f26, StatelessResetToken: 0x9c2b8f53508d48688428bfa28a460b79} 2025/09/12 12:21:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:45 client -> Sending packet 1 (34 bytes) for connection 86d1c94d6a33134651049528a93ee8c15f, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b62f7535cdc9dafc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 158.806µs} 2025/09/12 12:21:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:45 client <- Reading packet 4 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0136064d46287225, StatelessResetToken: 0xd5a17d6967f9b3f331e4022d229e1801} 2025/09/12 12:21:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:45 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.68ms} 2025/09/12 12:21:45 client newly acked packets (1): [1] 2025/09/12 12:21:45 client updated RTT: 34.981ms (σ: 13.954ms) 2025/09/12 12:21:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:45 client lost packet 0 (time threshold) 2025/09/12 12:21:45 client Canceling loss detection timer. 2025/09/12 12:21:45 client Ignoring all packets below 4. 2025/09/12 12:21:45 client -> Sending packet 2 (51 bytes) for connection 86d1c94d6a33134651049528a93ee8c15f, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b62f7535cdc9dafc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 84.778µs} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.032ms} 2025/09/12 12:21:45 client newly acked packets (1): [2] 2025/09/12 12:21:45 client updated RTT: 34.588ms (σ: 11.251ms) 2025/09/12 12:21:45 client Canceling loss detection timer. 2025/09/12 12:21:45 client Ignoring all packets below 6. 2025/09/12 12:21:45 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:45 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:45 client -> Sending packet 3 (30 bytes) for connection 86d1c94d6a33134651049528a93ee8c15f, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b62f7535cdc9dafc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:45 client Connection 86d1c94d6a33134651049528a93ee8c15f closed. 2025/09/12 12:21:45 Requesting https://server4:443/dyvsxdamig. 2025/09/12 12:21:45 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:45 Increased send buffer size to 14336 kiB 2025/09/12 12:21:45 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:45 Created qlog file: /logs/qlog/4dcdc3d92827545b.sqlog 2025/09/12 12:21:45 client Starting new connection to server4 ([::]:52182 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4dcdc3d92827545b, version v1 2025/09/12 12:21:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:45 client -> Sending packet 0 (1280 bytes) for connection 4dcdc3d92827545b, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 4dcdc3d92827545b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:45 client -> Sending packet 1 (1280 bytes) for connection 4dcdc3d92827545b, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 4dcdc3d92827545b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 1240, Data length: 278, Offset + Data length: 1518} 2025/09/12 12:21:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:45 client -> Sending packet 2 (1280 bytes) for connection 4dcdc3d92827545b, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 4dcdc3d92827545b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 12:21:45 client -> Sending packet 3 (1280 bytes) for connection 4dcdc3d92827545b, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 4dcdc3d92827545b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 1240, Data length: 278, Offset + Data length: 1518} 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:45 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aec5950f2b3570ad, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:45 client Received first packet. Switching destination connection ID to: aec5950f2b3570ad 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.216ms} 2025/09/12 12:21:45 client newly acked packets (2): [2 3] 2025/09/12 12:21:45 client updated RTT: 35.593797ms (σ: 17.796898ms) 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 292 bytes. 2025/09/12 12:21:45 client <- Reading packet 2 (772 bytes) for connection (empty), Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aec5950f2b3570ad, PacketNumber: 2, PacketNumberLen: 2, Length: 755, Version: v1} 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 12:21:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4dcdc3d92827545b, InitialSourceConnectionID: aec5950f2b3570ad, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd29f299aa0d06fdf47b51c405b951c1a, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:45 client Dropping %!s(logging.PacketType=5) packet (292 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4dcdc3d92827545b 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: aec5950f2b3570ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: aec5950f2b3570ad, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:45 client Dropping Initial keys. 2025/09/12 12:21:45 client -> Sending packet 1 (86 bytes) for connection 4dcdc3d92827545b, Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: aec5950f2b3570ad, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:45 client Short Header{DestConnectionID: aec5950f2b3570ad, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:45 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:45 client Dropping Handshake keys. 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da01cdb4f1fea11b, StatelessResetToken: 0x8886fbb58a3c9c5bfd38567bfffd14f4} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6f9f4441672fe61f, StatelessResetToken: 0xd5803a59546a37d14a3d9943794d850d} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 085f0dd566f2ed32, StatelessResetToken: 0x96c7aed23cabb2b18f5bcd83bd5a1d8a} 2025/09/12 12:21:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:45 client -> Sending packet 1 (34 bytes) for connection 4dcdc3d92827545b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: da01cdb4f1fea11b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 97.903µs} 2025/09/12 12:21:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:45 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:45 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:45 client -> Sending packet 2 (34 bytes) for connection 4dcdc3d92827545b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: da01cdb4f1fea11b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 69.449µs} 2025/09/12 12:21:45 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:45 client -> Sending packet 3 (30 bytes) for connection 4dcdc3d92827545b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: da01cdb4f1fea11b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:45 client Connection 4dcdc3d92827545b closed. 2025/09/12 12:21:45 Requesting https://server4:443/wrlwjdmqle. 2025/09/12 12:21:45 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:45 Increased send buffer size to 14336 kiB 2025/09/12 12:21:45 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:45 Created qlog file: /logs/qlog/07af6e759b592309b856d28eeb4ef69785e8de51.sqlog 2025/09/12 12:21:45 client Starting new connection to server4 ([::]:55685 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 07af6e759b592309b856d28eeb4ef69785e8de51, version v1 2025/09/12 12:21:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:45 client -> Sending packet 0 (1280 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 07af6e759b592309b856d28eeb4ef69785e8de51, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:21:45 client -> Sending packet 1 (1280 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 07af6e759b592309b856d28eeb4ef69785e8de51, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 1228, Data length: 283, Offset + Data length: 1511} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:45 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1002db2650d81da9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:45 client Received first packet. Switching destination connection ID to: 1002db2650d81da9 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 616µs} 2025/09/12 12:21:45 client newly acked packets (1): [0] 2025/09/12 12:21:45 client updated RTT: 33.402219ms (σ: 16.701109ms) 2025/09/12 12:21:45 client <- &wire.PingFrame{} 2025/09/12 12:21:45 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:45 client -> Sending packet 2 (1280 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 1002db2650d81da9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:45 client -> Sending packet 3 (1280 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 1002db2650d81da9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 1228, Data length: 283, Offset + Data length: 1511} 2025/09/12 12:21:45 client -> Sending packet 4 (1280 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 1002db2650d81da9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 1228, Data length: 283, Offset + Data length: 1511} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:45 client <- Reading packet 3 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1002db2650d81da9, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 312µs} 2025/09/12 12:21:45 client newly acked packets (1): [4] 2025/09/12 12:21:45 client updated RTT: 33.376ms (σ: 12.577ms) 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:21:45 client <- Reading packet 4 (130 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1002db2650d81da9, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 286 bytes. 2025/09/12 12:21:45 client <- Reading packet 5 (784 bytes) for connection (empty), Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1002db2650d81da9, PacketNumber: 5, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 12:21:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 07af6e759b592309b856d28eeb4ef69785e8de51, InitialSourceConnectionID: 1002db2650d81da9, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x71840c5feb124e90b0f7719f989fe96f, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:45 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: 1002db2650d81da9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: 1002db2650d81da9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:45 client Dropping Initial keys. 2025/09/12 12:21:45 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:45 client -> Sending packet 1 (40 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: 1002db2650d81da9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 12:21:45 client -> Sending packet 0 (46 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 1002db2650d81da9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:45 client Dropping Handshake keys. 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 22b421c2732f9a79, StatelessResetToken: 0x59f088471ced7d7d2f8709ce0bd198ef} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bf30e5ff49fe6663, StatelessResetToken: 0x4956e6d10073aea85022758dbb4715ee} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22736dc6a055742b, StatelessResetToken: 0x567a9a54aa7bd20c5cd5cf479caae01f} 2025/09/12 12:21:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:45 client -> Sending packet 1 (34 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 22b421c2732f9a79, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 105.837µs} 2025/09/12 12:21:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:45 client -> Sending packet 3 (46 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 22b421c2732f9a79, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 client Skipping packet number 2 2025/09/12 12:21:45 client -> Sending packet 4 (29 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 22b421c2732f9a79, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:45 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.PingFrame{} 2025/09/12 12:21:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:45 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:45 client -> Sending packet 5 (33 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 22b421c2732f9a79, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 25.328283ms} 2025/09/12 12:21:45 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 21de48daa74b0a34, StatelessResetToken: 0xa10246925fd431c10fb1783e6d0b2e0a} 2025/09/12 12:21:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:45 client <- Reading packet 10 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:21:45 client -> Sending packet 6 (34 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 22b421c2732f9a79, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}}, DelayTime: 62.376µs} 2025/09/12 12:21:45 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:45 client -> Sending packet 7 (30 bytes) for connection 07af6e759b592309b856d28eeb4ef69785e8de51, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 22b421c2732f9a79, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:45 client Connection 07af6e759b592309b856d28eeb4ef69785e8de51 closed. 2025/09/12 12:21:45 Requesting https://server4:443/nwufuscqjm. 2025/09/12 12:21:45 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:45 Increased send buffer size to 14336 kiB 2025/09/12 12:21:45 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:45 Created qlog file: /logs/qlog/e92f10893c4cca2e10b3818fc70fd21037.sqlog 2025/09/12 12:21:45 client Starting new connection to server4 ([::]:35818 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e92f10893c4cca2e10b3818fc70fd21037, version v1 2025/09/12 12:21:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:45 client -> Sending packet 0 (1280 bytes) for connection e92f10893c4cca2e10b3818fc70fd21037, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: e92f10893c4cca2e10b3818fc70fd21037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:45 client -> Sending packet 1 (1280 bytes) for connection e92f10893c4cca2e10b3818fc70fd21037, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: e92f10893c4cca2e10b3818fc70fd21037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 1231, Data length: 281, Offset + Data length: 1512} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:45 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b447c5107ada9100, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:45 client Received first packet. Switching destination connection ID to: b447c5107ada9100 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 696µs} 2025/09/12 12:21:45 client newly acked packets (1): [0] 2025/09/12 12:21:45 client updated RTT: 33.562388ms (σ: 16.781194ms) 2025/09/12 12:21:45 client <- &wire.PingFrame{} 2025/09/12 12:21:45 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:45 client -> Sending packet 2 (1280 bytes) for connection e92f10893c4cca2e10b3818fc70fd21037, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: b447c5107ada9100, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:45 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b447c5107ada9100, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.328ms} 2025/09/12 12:21:45 client newly acked packets (1): [1] 2025/09/12 12:21:45 client updated RTT: 33.75ms (σ: 12.962ms) 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 283 bytes. 2025/09/12 12:21:45 client <- Reading packet 2 (781 bytes) for connection (empty), Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b447c5107ada9100, PacketNumber: 2, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 12:21:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e92f10893c4cca2e10b3818fc70fd21037, InitialSourceConnectionID: b447c5107ada9100, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3af9ba299d782c5443df0fb065aa9764, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:45 client Dropping %!s(logging.PacketType=5) packet (283 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e92f10893c4cca2e10b3818fc70fd21037 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: b447c5107ada9100, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: b447c5107ada9100, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:45 client Dropping Initial keys. 2025/09/12 12:21:45 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:45 client -> Sending packet 1 (86 bytes) for connection e92f10893c4cca2e10b3818fc70fd21037, Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: b447c5107ada9100, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:45 client Short Header{DestConnectionID: b447c5107ada9100, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.032ms} 2025/09/12 12:21:45 client Peer doesn't await address validation any longer. 2025/09/12 12:21:45 client newly acked packets (1): [0] 2025/09/12 12:21:45 client updated RTT: 33.708ms (σ: 9.805ms) 2025/09/12 12:21:45 client Canceling loss detection timer. 2025/09/12 12:21:45 client Dropping Handshake keys. 2025/09/12 12:21:45 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:45 client -> Sending packet 1 (32 bytes) for connection e92f10893c4cca2e10b3818fc70fd21037, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b447c5107ada9100, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 58.66µs} 2025/09/12 12:21:45 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:45 client -> Sending packet 2 (30 bytes) for connection e92f10893c4cca2e10b3818fc70fd21037, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: b447c5107ada9100, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:45 client Connection e92f10893c4cca2e10b3818fc70fd21037 closed. 2025/09/12 12:21:45 Requesting https://server4:443/rpdhmtglzf. 2025/09/12 12:21:45 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:45 Increased send buffer size to 14336 kiB 2025/09/12 12:21:45 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:45 Created qlog file: /logs/qlog/ee2316bb71fe5932838e59438f643aaf23c94309.sqlog 2025/09/12 12:21:45 client Starting new connection to server4 ([::]:46158 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ee2316bb71fe5932838e59438f643aaf23c94309, version v1 2025/09/12 12:21:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:45 client -> Sending packet 0 (1280 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: ee2316bb71fe5932838e59438f643aaf23c94309, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:45 client -> Sending packet 1 (1280 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: ee2316bb71fe5932838e59438f643aaf23c94309, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:45 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cf7c1f32df7fc01e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:45 client Received first packet. Switching destination connection ID to: cf7c1f32df7fc01e 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 752µs} 2025/09/12 12:21:45 client newly acked packets (1): [1] 2025/09/12 12:21:45 client updated RTT: 34.583664ms (σ: 17.291832ms) 2025/09/12 12:21:45 client setting loss timer for packet 0 (Initial) to 38.906622ms (in 2025-09-12 12:21:45.928222767 +0000 UTC m=+3.135820686) 2025/09/12 12:21:45 client <- &wire.PingFrame{} 2025/09/12 12:21:45 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:45 client -> Sending packet 2 (1280 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: cf7c1f32df7fc01e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:45 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 12:21:45.928222767 +0000 UTC m=+3.135820686 2025/09/12 12:21:45 client lost packet 0 (time threshold) 2025/09/12 12:21:45 client -> Sending packet 3 (1280 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: cf7c1f32df7fc01e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:45 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cf7c1f32df7fc01e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.272ms} 2025/09/12 12:21:45 client newly acked packets (1): [3] 2025/09/12 12:21:45 client updated RTT: 34.503ms (σ: 13.127ms) 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Parsed a coalesced packet. Part 2: 785 bytes. Remaining: 279 bytes. 2025/09/12 12:21:45 client <- Reading packet 2 (785 bytes) for connection (empty), Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cf7c1f32df7fc01e, PacketNumber: 2, PacketNumberLen: 2, Length: 768, Version: v1} 2025/09/12 12:21:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 746, Offset + Data length: 746} 2025/09/12 12:21:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ee2316bb71fe5932838e59438f643aaf23c94309, InitialSourceConnectionID: cf7c1f32df7fc01e, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x72497b25752af7a93a7c255d1e218e36, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:45 client Dropping %!s(logging.PacketType=5) packet (279 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309 2025/09/12 12:21:45 client Long Header{Type: Initial, DestConnectionID: cf7c1f32df7fc01e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: cf7c1f32df7fc01e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:45 client Dropping Initial keys. 2025/09/12 12:21:45 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:45 client -> Sending packet 1 (40 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, Handshake 2025/09/12 12:21:45 client Long Header{Type: Handshake, DestConnectionID: cf7c1f32df7fc01e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:45 client -> Sending packet 0 (46 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: cf7c1f32df7fc01e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:45 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:45 client Dropping Handshake keys. 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 527756b8dd62823a, StatelessResetToken: 0xaa4df6e2a3972645beca5ae150de4956} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e500d42e864a2d6, StatelessResetToken: 0x18035f79a11f66500ef50e3a67ccd68b} 2025/09/12 12:21:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 61f5a43b18e8612e, StatelessResetToken: 0x15f2a3be613e49d9d03bac53a895f9b0} 2025/09/12 12:21:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:45 client -> Sending packet 1 (34 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:45 client Short Header{DestConnectionID: 527756b8dd62823a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 86.622µs} 2025/09/12 12:21:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:46 client -> Sending packet 3 (46 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 527756b8dd62823a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:46 client Skipping packet number 2 2025/09/12 12:21:46 client -> Sending packet 4 (29 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 527756b8dd62823a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:46 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 04780e203846ef96, StatelessResetToken: 0x325e636ed9465dad360c51e979919534} 2025/09/12 12:21:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:46 client -> Sending packet 5 (34 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 527756b8dd62823a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 79.559µs} 2025/09/12 12:21:46 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:46 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 568µs} 2025/09/12 12:21:46 client newly acked packets (2): [3 4] 2025/09/12 12:21:46 client updated RTT: 34.189ms (σ: 10.472ms) 2025/09/12 12:21:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:46 client Canceling loss detection timer. 2025/09/12 12:21:46 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:46 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client <- &wire.PingFrame{} 2025/09/12 12:21:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:46 client -> Sending packet 6 (1366 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 527756b8dd62823a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.PingFrame{} 2025/09/12 12:21:46 client -> Sending packet 7 (36 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 527756b8dd62823a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 169.446µs} 2025/09/12 12:21:46 client <- Reading packet 9 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:46 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:46 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:46 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:46 client -> Sending packet 8 (30 bytes) for connection ee2316bb71fe5932838e59438f643aaf23c94309, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 527756b8dd62823a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:46 client Connection ee2316bb71fe5932838e59438f643aaf23c94309 closed. 2025/09/12 12:21:46 Requesting https://server4:443/kwxjgnsnqt. 2025/09/12 12:21:46 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:46 Increased send buffer size to 14336 kiB 2025/09/12 12:21:46 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:46 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:46 Created qlog file: /logs/qlog/36050bce634bd9df.sqlog 2025/09/12 12:21:46 client Starting new connection to server4 ([::]:35448 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 36050bce634bd9df, version v1 2025/09/12 12:21:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:46 client -> Sending packet 0 (1280 bytes) for connection 36050bce634bd9df, Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: 36050bce634bd9df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:46 client -> Sending packet 1 (1280 bytes) for connection 36050bce634bd9df, Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: 36050bce634bd9df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 1240, Data length: 275, Offset + Data length: 1515} 2025/09/12 12:21:46 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:46 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: adc5bc8f396eb15e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:46 client Received first packet. Switching destination connection ID to: adc5bc8f396eb15e 2025/09/12 12:21:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.216ms} 2025/09/12 12:21:46 client newly acked packets (2): [0 1] 2025/09/12 12:21:46 client updated RTT: 35.094314ms (σ: 17.547157ms) 2025/09/12 12:21:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:46 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 293 bytes. 2025/09/12 12:21:46 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adc5bc8f396eb15e, PacketNumber: 2, PacketNumberLen: 2, Length: 754, Version: v1} 2025/09/12 12:21:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 12:21:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 36050bce634bd9df, InitialSourceConnectionID: adc5bc8f396eb15e, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x95489222a9c62fe3d69bf04a8891ce89, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:46 client Dropping %!s(logging.PacketType=5) packet (293 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 36050bce634bd9df 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: adc5bc8f396eb15e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: adc5bc8f396eb15e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:46 client Dropping Initial keys. 2025/09/12 12:21:46 client -> Sending packet 1 (86 bytes) for connection 36050bce634bd9df, Handshake 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: adc5bc8f396eb15e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:46 client Short Header{DestConnectionID: adc5bc8f396eb15e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:46 client -> Sending packet 2 (90 bytes) for connection 36050bce634bd9df, Handshake 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: adc5bc8f396eb15e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:46 client -> Sending packet 3 (90 bytes) for connection 36050bce634bd9df, Handshake 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: adc5bc8f396eb15e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:46 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:46 client Dropping Handshake keys. 2025/09/12 12:21:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 389c56051419d199, StatelessResetToken: 0x9ca7bf8a95cbf25086c8b91d0c5613af} 2025/09/12 12:21:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d81377f9cdce170, StatelessResetToken: 0xca4bc3f80e26757568c207d02793c904} 2025/09/12 12:21:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b73591750cddb22, StatelessResetToken: 0xcf07b07410eb36fb53025d168137c3fe} 2025/09/12 12:21:46 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:46 client -> Sending packet 2 (53 bytes) for connection 36050bce634bd9df, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 389c56051419d199, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 151.462µs} 2025/09/12 12:21:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:46 client -> Sending packet 3 (48 bytes) for connection 36050bce634bd9df, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 389c56051419d199, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:46 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client <- &wire.PingFrame{} 2025/09/12 12:21:46 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:46 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:46 client -> Sending packet 4 (33 bytes) for connection 36050bce634bd9df, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 389c56051419d199, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.328671ms} 2025/09/12 12:21:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:21:46 client -> Sending packet 6 (48 bytes) for connection 36050bce634bd9df, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 389c56051419d199, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:46 client -> Sending packet 7 (48 bytes) for connection 36050bce634bd9df, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 389c56051419d199, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:46 client -> Sending packet 8 (1366 bytes) for connection 36050bce634bd9df, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 389c56051419d199, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.PingFrame{} 2025/09/12 12:21:46 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 859ed9c2a5e9b896, StatelessResetToken: 0x97c9f489148dd1b40bc9fa0b7a8e0a47} 2025/09/12 12:21:46 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:46 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:46 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:21:46 client -> Sending packet 9 (34 bytes) for connection 36050bce634bd9df, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 389c56051419d199, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}}, DelayTime: 68.848µs} 2025/09/12 12:21:46 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:46 client -> Sending packet 10 (30 bytes) for connection 36050bce634bd9df, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:46 client Short Header{DestConnectionID: 389c56051419d199, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:46 client Connection 36050bce634bd9df closed. 2025/09/12 12:21:46 Requesting https://server4:443/fltsbrwexr. 2025/09/12 12:21:46 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:46 Increased send buffer size to 14336 kiB 2025/09/12 12:21:46 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:46 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:46 Created qlog file: /logs/qlog/6b45eaf4366ca9ac86e37b0f52d0687404.sqlog 2025/09/12 12:21:46 client Starting new connection to server4 ([::]:45203 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6b45eaf4366ca9ac86e37b0f52d0687404, version v1 2025/09/12 12:21:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:46 client -> Sending packet 0 (1280 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: 6b45eaf4366ca9ac86e37b0f52d0687404, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:46 client -> Sending packet 1 (1280 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: 6b45eaf4366ca9ac86e37b0f52d0687404, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 1231, Data length: 284, Offset + Data length: 1515} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:46 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:46 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a5ee9a20596cb95, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:46 client Received first packet. Switching destination connection ID to: 2a5ee9a20596cb95 2025/09/12 12:21:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 760µs} 2025/09/12 12:21:46 client newly acked packets (1): [0] 2025/09/12 12:21:46 client updated RTT: 33.671051ms (σ: 16.835525ms) 2025/09/12 12:21:46 client <- &wire.PingFrame{} 2025/09/12 12:21:46 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:46 client -> Sending packet 2 (1280 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: 2a5ee9a20596cb95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:46 client -> Sending packet 3 (1280 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: 2a5ee9a20596cb95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 1231, Data length: 284, Offset + Data length: 1515} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:46 client -> Sending packet 4 (1280 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: 2a5ee9a20596cb95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 1231, Data length: 284, Offset + Data length: 1515} 2025/09/12 12:21:46 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:46 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a5ee9a20596cb95, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:46 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.904ms} 2025/09/12 12:21:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:46 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 283 bytes. 2025/09/12 12:21:46 client <- Reading packet 2 (781 bytes) for connection (empty), Handshake 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a5ee9a20596cb95, PacketNumber: 2, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 12:21:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 12:21:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6b45eaf4366ca9ac86e37b0f52d0687404, InitialSourceConnectionID: 2a5ee9a20596cb95, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2f9fe1df89205af5c2be70f251eac047, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:46 client Dropping %!s(logging.PacketType=5) packet (283 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:46 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a5ee9a20596cb95, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 192µs} 2025/09/12 12:21:46 client newly acked packets (1): [4] 2025/09/12 12:21:46 client updated RTT: 33.835ms (σ: 12.955ms) 2025/09/12 12:21:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404 2025/09/12 12:21:46 client Long Header{Type: Initial, DestConnectionID: 2a5ee9a20596cb95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: 2a5ee9a20596cb95, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:46 client Short Header{DestConnectionID: 2a5ee9a20596cb95, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:46 client Dropping Initial keys. 2025/09/12 12:21:46 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:46 client -> Sending packet 1 (40 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, Handshake 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: 2a5ee9a20596cb95, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:46 client -> Sending packet 2 (90 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, Handshake 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: 2a5ee9a20596cb95, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:46 client -> Sending packet 3 (90 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, Handshake 2025/09/12 12:21:46 client Long Header{Type: Handshake, DestConnectionID: 2a5ee9a20596cb95, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:47 client <- Reading packet 4 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:47 client Dropping Handshake keys. 2025/09/12 12:21:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 56b9bd17971adf53, StatelessResetToken: 0xe04fa8f2ea71b0a5eeb43fc0d38bbc3b} 2025/09/12 12:21:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0396fc1117637e7d, StatelessResetToken: 0x61f90ef085923e25e6e227537bd6954a} 2025/09/12 12:21:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8aaaede623fe7cfb, StatelessResetToken: 0xdf2e17d585ef5eaf55467ade031e6156} 2025/09/12 12:21:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:47 client -> Sending packet 2 (53 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 135.152µs} 2025/09/12 12:21:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:47 client -> Sending packet 3 (48 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:47 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:47 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client <- &wire.PingFrame{} 2025/09/12 12:21:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:47 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:47 client -> Sending packet 4 (33 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 25.306485ms} 2025/09/12 12:21:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:21:47 client -> Sending packet 6 (48 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:47 client -> Sending packet 7 (48 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:47 client -> Sending packet 8 (1366 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.PingFrame{} 2025/09/12 12:21:47 client <- Reading packet 6 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:47 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a7620334fc17cda1, StatelessResetToken: 0xc6b0718a8c91cad5587aac87a4fe0399} 2025/09/12 12:21:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:47 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:47 client -> Sending packet 9 (33 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 25.337032ms} 2025/09/12 12:21:47 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:47 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client <- &wire.PingFrame{} 2025/09/12 12:21:47 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:47 client -> Sending packet 10 (34 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 4}}, DelayTime: 105.887µs} 2025/09/12 12:21:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 12:21:47 client -> Sending packet 12 (48 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:47 client -> Sending packet 13 (48 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:47 client <- Reading packet 11 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:47 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:47 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:47 client -> Sending packet 14 (30 bytes) for connection 6b45eaf4366ca9ac86e37b0f52d0687404, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:47 client Short Header{DestConnectionID: 56b9bd17971adf53, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:47 client Connection 6b45eaf4366ca9ac86e37b0f52d0687404 closed. 2025/09/12 12:21:47 Requesting https://server4:443/frnmnplnlk. 2025/09/12 12:21:47 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:47 Increased send buffer size to 14336 kiB 2025/09/12 12:21:47 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:47 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:47 Created qlog file: /logs/qlog/af8a992e28063b9b5014485bd2b977ce12dffd.sqlog 2025/09/12 12:21:47 client Starting new connection to server4 ([::]:55201 -> 193.167.100.100:443), source connection ID (empty), destination connection ID af8a992e28063b9b5014485bd2b977ce12dffd, version v1 2025/09/12 12:21:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:47 client -> Sending packet 0 (1280 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: af8a992e28063b9b5014485bd2b977ce12dffd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 12:21:47 client -> Sending packet 1 (1280 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: af8a992e28063b9b5014485bd2b977ce12dffd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 12:21:47 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:47 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1af714b847d7e1b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:47 client Received first packet. Switching destination connection ID to: e1af714b847d7e1b 2025/09/12 12:21:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.832ms} 2025/09/12 12:21:47 client newly acked packets (1): [0] 2025/09/12 12:21:47 client updated RTT: 34.694148ms (σ: 17.347074ms) 2025/09/12 12:21:47 client <- &wire.PingFrame{} 2025/09/12 12:21:47 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:47 client -> Sending packet 2 (1280 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: e1af714b847d7e1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:47 client -> Sending packet 3 (1280 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: e1af714b847d7e1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:47 client -> Sending packet 4 (1280 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: e1af714b847d7e1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:47 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 12:21:47 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1af714b847d7e1b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 12:21:47 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 1.688ms} 2025/09/12 12:21:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:47 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:47 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:47 client Parsed a coalesced packet. Part 2: 783 bytes. Remaining: 279 bytes. 2025/09/12 12:21:47 client <- Reading packet 2 (783 bytes) for connection (empty), Handshake 2025/09/12 12:21:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1af714b847d7e1b, PacketNumber: 2, PacketNumberLen: 2, Length: 766, Version: v1} 2025/09/12 12:21:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/09/12 12:21:47 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:47 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: af8a992e28063b9b5014485bd2b977ce12dffd, InitialSourceConnectionID: e1af714b847d7e1b, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xdd06e636d184e158142849b902c82f90, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:47 client Dropping %!s(logging.PacketType=5) packet (279 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:47 client <- Reading packet 3 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1af714b847d7e1b, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 184µs} 2025/09/12 12:21:47 client newly acked packets (1): [4] 2025/09/12 12:21:47 client updated RTT: 34.716ms (σ: 13.055ms) 2025/09/12 12:21:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: e1af714b847d7e1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:21:47 client Long Header{Type: Handshake, DestConnectionID: e1af714b847d7e1b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:47 client Short Header{DestConnectionID: e1af714b847d7e1b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:47 client Dropping Initial keys. 2025/09/12 12:21:47 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:47 client -> Sending packet 1 (40 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd, Handshake 2025/09/12 12:21:47 client Long Header{Type: Handshake, DestConnectionID: e1af714b847d7e1b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:47 client <- Reading packet 4 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:47 client Dropping Handshake keys. 2025/09/12 12:21:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff7c9d2030bc9970, StatelessResetToken: 0xb4c20ede76cb32e96dcc27e4f989b94d} 2025/09/12 12:21:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ab49c0b2c85fc22f, StatelessResetToken: 0xe2e6802100ba884e9fc87dc803017a45} 2025/09/12 12:21:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c8c3e4bab325a21c, StatelessResetToken: 0x84c1a3056566f8227c572fca7f975d8c} 2025/09/12 12:21:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:47 client -> Sending packet 1 (34 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: ff7c9d2030bc9970, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 125.685µs} 2025/09/12 12:21:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:47 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:47 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.352ms} 2025/09/12 12:21:47 client newly acked packets (1): [0] 2025/09/12 12:21:47 client updated RTT: 34.511ms (σ: 10.2ms) 2025/09/12 12:21:47 client <- Reading packet 6 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:47 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:47 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:47 client -> Sending packet 2 (30 bytes) for connection af8a992e28063b9b5014485bd2b977ce12dffd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:47 client Short Header{DestConnectionID: ff7c9d2030bc9970, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:47 client Connection af8a992e28063b9b5014485bd2b977ce12dffd closed. 2025/09/12 12:21:47 Requesting https://server4:443/nlvudpibng. 2025/09/12 12:21:47 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:47 Increased send buffer size to 14336 kiB 2025/09/12 12:21:47 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:47 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:47 Created qlog file: /logs/qlog/188cbceb834f0b94841bea2684e3.sqlog 2025/09/12 12:21:47 client Starting new connection to server4 ([::]:35598 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 188cbceb834f0b94841bea2684e3, version v1 2025/09/12 12:21:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:47 client -> Sending packet 0 (1280 bytes) for connection 188cbceb834f0b94841bea2684e3, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: 188cbceb834f0b94841bea2684e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:47 client -> Sending packet 1 (1280 bytes) for connection 188cbceb834f0b94841bea2684e3, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: 188cbceb834f0b94841bea2684e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 1234, Data length: 274, Offset + Data length: 1508} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:47 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:47 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f61dc66983c55222, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:47 client Received first packet. Switching destination connection ID to: f61dc66983c55222 2025/09/12 12:21:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 704µs} 2025/09/12 12:21:47 client newly acked packets (1): [0] 2025/09/12 12:21:47 client updated RTT: 33.615365ms (σ: 16.807682ms) 2025/09/12 12:21:47 client <- &wire.PingFrame{} 2025/09/12 12:21:47 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:47 client -> Sending packet 2 (1280 bytes) for connection 188cbceb834f0b94841bea2684e3, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: f61dc66983c55222, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:47 client -> Sending packet 3 (1280 bytes) for connection 188cbceb834f0b94841bea2684e3, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: f61dc66983c55222, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 1234, Data length: 274, Offset + Data length: 1508} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:47 client -> Sending packet 4 (1280 bytes) for connection 188cbceb834f0b94841bea2684e3, Initial 2025/09/12 12:21:47 client Long Header{Type: Initial, DestConnectionID: f61dc66983c55222, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:47 client -> &wire.CryptoFrame{Offset: 1234, Data length: 274, Offset + Data length: 1508} 2025/09/12 12:21:48 client <- Reading packet 4 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f61dc66983c55222, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 240µs} 2025/09/12 12:21:48 client newly acked packets (1): [4] 2025/09/12 12:21:48 client updated RTT: 33.535ms (σ: 12.764ms) 2025/09/12 12:21:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:48 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:21:48 client <- Reading packet 5 (130 bytes) for connection (empty), Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f61dc66983c55222, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:21:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:48 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:48 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:48 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 292 bytes. 2025/09/12 12:21:48 client <- Reading packet 6 (778 bytes) for connection (empty), Handshake 2025/09/12 12:21:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f61dc66983c55222, PacketNumber: 6, PacketNumberLen: 2, Length: 761, Version: v1} 2025/09/12 12:21:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 12:21:48 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:48 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 188cbceb834f0b94841bea2684e3, InitialSourceConnectionID: f61dc66983c55222, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x23da5c55dcf04dc0773de8df10878882, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:48 client Dropping %!s(logging.PacketType=5) packet (292 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 188cbceb834f0b94841bea2684e3 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: f61dc66983c55222, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:48 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:21:48 client Long Header{Type: Handshake, DestConnectionID: f61dc66983c55222, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:48 client Dropping Initial keys. 2025/09/12 12:21:48 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:48 client -> Sending packet 1 (86 bytes) for connection 188cbceb834f0b94841bea2684e3, Handshake 2025/09/12 12:21:48 client Long Header{Type: Handshake, DestConnectionID: f61dc66983c55222, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:48 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s} 2025/09/12 12:21:48 client Short Header{DestConnectionID: f61dc66983c55222, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:48 client <- Reading packet 7 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:48 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:48 client Dropping Handshake keys. 2025/09/12 12:21:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 06b9ffb05c48aea5, StatelessResetToken: 0xae7c40bdd4bed993134357e1ec3bb1af} 2025/09/12 12:21:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe4cb7dc4e045298, StatelessResetToken: 0xf6c31f938f151ce6143bce03ab44d191} 2025/09/12 12:21:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7dd9538bc5fd46e0, StatelessResetToken: 0xed1850798dc8474099f6aab437f2b39e} 2025/09/12 12:21:48 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:48 client -> Sending packet 1 (34 bytes) for connection 188cbceb834f0b94841bea2684e3, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 06b9ffb05c48aea5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 139.55µs} 2025/09/12 12:21:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:48 client <- Reading packet 8 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:48 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.032ms} 2025/09/12 12:21:48 client newly acked packets (1): [0] 2025/09/12 12:21:48 client updated RTT: 33.567ms (σ: 9.638ms) 2025/09/12 12:21:48 client <- Reading packet 9 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:48 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:48 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:48 client -> Sending packet 2 (30 bytes) for connection 188cbceb834f0b94841bea2684e3, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 06b9ffb05c48aea5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:48 client Connection 188cbceb834f0b94841bea2684e3 closed. 2025/09/12 12:21:48 Requesting https://server4:443/uoxtzusnel. 2025/09/12 12:21:48 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:48 Increased send buffer size to 14336 kiB 2025/09/12 12:21:48 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:48 Created qlog file: /logs/qlog/e8757f97c0795d3c6765d5.sqlog 2025/09/12 12:21:48 client Starting new connection to server4 ([::]:52185 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e8757f97c0795d3c6765d5, version v1 2025/09/12 12:21:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:48 client -> Sending packet 0 (1280 bytes) for connection e8757f97c0795d3c6765d5, Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: e8757f97c0795d3c6765d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 12:21:48 client -> Sending packet 1 (1280 bytes) for connection e8757f97c0795d3c6765d5, Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: e8757f97c0795d3c6765d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 1237, Data length: 272, Offset + Data length: 1509} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:48 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:48 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 783799eae22d0153, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:48 client Received first packet. Switching destination connection ID to: 783799eae22d0153 2025/09/12 12:21:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.24ms} 2025/09/12 12:21:48 client newly acked packets (2): [0 1] 2025/09/12 12:21:48 client updated RTT: 35.055303ms (σ: 17.527651ms) 2025/09/12 12:21:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:48 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:48 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:48 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 289 bytes. 2025/09/12 12:21:48 client <- Reading packet 2 (775 bytes) for connection (empty), Handshake 2025/09/12 12:21:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 783799eae22d0153, PacketNumber: 2, PacketNumberLen: 2, Length: 758, Version: v1} 2025/09/12 12:21:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 12:21:48 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:48 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e8757f97c0795d3c6765d5, InitialSourceConnectionID: 783799eae22d0153, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x912ddae6d94009070b4f834e1da24c9f, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:48 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e8757f97c0795d3c6765d5 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: 783799eae22d0153, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:21:48 client Long Header{Type: Handshake, DestConnectionID: 783799eae22d0153, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:48 client Dropping Initial keys. 2025/09/12 12:21:48 client -> Sending packet 1 (86 bytes) for connection e8757f97c0795d3c6765d5, Handshake 2025/09/12 12:21:48 client Long Header{Type: Handshake, DestConnectionID: 783799eae22d0153, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:48 client Short Header{DestConnectionID: 783799eae22d0153, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:48 client -> Sending packet 2 (90 bytes) for connection e8757f97c0795d3c6765d5, Handshake 2025/09/12 12:21:48 client Long Header{Type: Handshake, DestConnectionID: 783799eae22d0153, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:48 client -> Sending packet 3 (90 bytes) for connection e8757f97c0795d3c6765d5, Handshake 2025/09/12 12:21:48 client Long Header{Type: Handshake, DestConnectionID: 783799eae22d0153, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:48 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:48 client Dropping Handshake keys. 2025/09/12 12:21:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3c80f53828f5b34a, StatelessResetToken: 0x8bdef2eadda715fef37a06fd62e76df0} 2025/09/12 12:21:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c7bb5b16c3e3fea2, StatelessResetToken: 0x72d4eef69ed9a5961978e858b33199fc} 2025/09/12 12:21:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ae56d623fef7797d, StatelessResetToken: 0x926b5d2b0bee5d2d2b15662f9c0e168e} 2025/09/12 12:21:48 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:48 client -> Sending packet 2 (53 bytes) for connection e8757f97c0795d3c6765d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 3c80f53828f5b34a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 99.966µs} 2025/09/12 12:21:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:48 client -> Sending packet 3 (48 bytes) for connection e8757f97c0795d3c6765d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 3c80f53828f5b34a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:48 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client <- &wire.PingFrame{} 2025/09/12 12:21:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:48 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:48 client -> Sending packet 4 (33 bytes) for connection e8757f97c0795d3c6765d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 3c80f53828f5b34a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.291377ms} 2025/09/12 12:21:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:21:48 client -> Sending packet 6 (48 bytes) for connection e8757f97c0795d3c6765d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 3c80f53828f5b34a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:48 client -> Sending packet 7 (48 bytes) for connection e8757f97c0795d3c6765d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 3c80f53828f5b34a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:48 client -> Sending packet 8 (1366 bytes) for connection e8757f97c0795d3c6765d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 3c80f53828f5b34a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.PingFrame{} 2025/09/12 12:21:48 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:48 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 272fda5a0591a59d, StatelessResetToken: 0x5889d57119c799e22c255f97575c07a6} 2025/09/12 12:21:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:48 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:48 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:48 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:21:48 client -> Sending packet 9 (34 bytes) for connection e8757f97c0795d3c6765d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 3c80f53828f5b34a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}}, DelayTime: 66.805µs} 2025/09/12 12:21:48 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:48 client -> Sending packet 10 (30 bytes) for connection e8757f97c0795d3c6765d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:48 client Short Header{DestConnectionID: 3c80f53828f5b34a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:48 client Connection e8757f97c0795d3c6765d5 closed. 2025/09/12 12:21:48 Requesting https://server4:443/ullhduvpku. 2025/09/12 12:21:48 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:48 Increased send buffer size to 14336 kiB 2025/09/12 12:21:48 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:48 Created qlog file: /logs/qlog/d8ebbb114481dc5975ad22504275525d15.sqlog 2025/09/12 12:21:48 client Starting new connection to server4 ([::]:52721 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d8ebbb114481dc5975ad22504275525d15, version v1 2025/09/12 12:21:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:48 client -> Sending packet 0 (1280 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: d8ebbb114481dc5975ad22504275525d15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:48 client -> Sending packet 1 (1280 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: d8ebbb114481dc5975ad22504275525d15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:48 client -> Sending packet 2 (1280 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: d8ebbb114481dc5975ad22504275525d15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:21:48 client -> Sending packet 3 (1280 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: d8ebbb114481dc5975ad22504275525d15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/09/12 12:21:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:48 client <- Reading packet 1 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec0a70d3ef00cb7f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:48 client Received first packet. Switching destination connection ID to: ec0a70d3ef00cb7f 2025/09/12 12:21:48 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 360µs} 2025/09/12 12:21:48 client newly acked packets (1): [2] 2025/09/12 12:21:48 client updated RTT: 32.449651ms (σ: 16.224825ms) 2025/09/12 12:21:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 12:21:49 client -> Sending packet 4 (1280 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Initial 2025/09/12 12:21:49 client Long Header{Type: Initial, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/09/12 12:21:49 client -> Sending packet 5 (1280 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Initial 2025/09/12 12:21:49 client Long Header{Type: Initial, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:49 client Parsed a coalesced packet. Part 1: 140 bytes. Remaining: 1060 bytes. 2025/09/12 12:21:49 client <- Reading packet 3 (140 bytes) for connection (empty), Initial 2025/09/12 12:21:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec0a70d3ef00cb7f, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 122, Version: v1} 2025/09/12 12:21:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.576ms} 2025/09/12 12:21:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:49 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:49 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:49 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 279 bytes. 2025/09/12 12:21:49 client <- Reading packet 4 (781 bytes) for connection (empty), Handshake 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ec0a70d3ef00cb7f, PacketNumber: 4, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 12:21:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 12:21:49 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:49 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d8ebbb114481dc5975ad22504275525d15, InitialSourceConnectionID: ec0a70d3ef00cb7f, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x331b2ecd0ba2310a87b1c66549daa4c0, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:49 client Dropping %!s(logging.PacketType=5) packet (279 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d8ebbb114481dc5975ad22504275525d15 2025/09/12 12:21:49 client Long Header{Type: Initial, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:49 client Dropping Initial keys. 2025/09/12 12:21:49 client -> Sending packet 1 (86 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Handshake 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:49 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 12:21:49 client Short Header{DestConnectionID: ec0a70d3ef00cb7f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:49 client -> Sending packet 2 (90 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Handshake 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:49 client -> Sending packet 3 (90 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Handshake 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:49 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:49 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:49 client <- &wire.PingFrame{} 2025/09/12 12:21:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:49 client -> Sending packet 1 (32 bytes) for connection d8ebbb114481dc5975ad22504275525d15, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:49 client Short Header{DestConnectionID: ec0a70d3ef00cb7f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:49 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 79.748µs} 2025/09/12 12:21:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:21:49 client -> Sending packet 4 (90 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Handshake 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:49 client -> Sending packet 5 (90 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Handshake 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:49 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:49 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:49 client <- &wire.PingFrame{} 2025/09/12 12:21:49 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:49 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:49 client -> Sending packet 2 (33 bytes) for connection d8ebbb114481dc5975ad22504275525d15, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:49 client Short Header{DestConnectionID: ec0a70d3ef00cb7f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:49 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 25.326381ms} 2025/09/12 12:21:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 12:21:49 client -> Sending packet 6 (90 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Handshake 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:49 client -> Sending packet 7 (90 bytes) for connection d8ebbb114481dc5975ad22504275525d15, Handshake 2025/09/12 12:21:49 client Long Header{Type: Handshake, DestConnectionID: ec0a70d3ef00cb7f, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:49 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:49 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:49 client <- &wire.PingFrame{} 2025/09/12 12:21:49 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:49 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:49 client -> Sending packet 3 (33 bytes) for connection d8ebbb114481dc5975ad22504275525d15, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:49 client Short Header{DestConnectionID: ec0a70d3ef00cb7f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:49 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 25.306163ms} 2025/09/12 12:21:50 client <- Reading packet 9 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:50 client Dropping Handshake keys. 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4a493dda0cbfb235, StatelessResetToken: 0x0934b0aa2f4aa433d36775c3e8685c22} 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 97c68ea3b0708ebc, StatelessResetToken: 0x077b0c9ae04296fc754205adc2053e54} 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b952d3290ae313bd, StatelessResetToken: 0x7d6a5aac0bde1b4b73b98039939d8167} 2025/09/12 12:21:50 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:50 client -> Sending packet 5 (53 bytes) for connection d8ebbb114481dc5975ad22504275525d15, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 4a493dda0cbfb235, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, DelayTime: 108.713µs} 2025/09/12 12:21:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:50 client -> Sending packet 6 (48 bytes) for connection d8ebbb114481dc5975ad22504275525d15, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 4a493dda0cbfb235, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:50 client <- Reading packet 11 (26 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 192µs} 2025/09/12 12:21:50 client newly acked packets (1): [6] 2025/09/12 12:21:50 client updated RTT: 32.382ms (σ: 12.3ms) 2025/09/12 12:21:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:50 client Canceling loss detection timer. 2025/09/12 12:21:50 client <- Reading packet 12 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:50 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:50 client -> Sending packet 7 (34 bytes) for connection d8ebbb114481dc5975ad22504275525d15, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 4a493dda0cbfb235, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 6}}, DelayTime: 64.21µs} 2025/09/12 12:21:50 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:50 client -> Sending packet 8 (30 bytes) for connection d8ebbb114481dc5975ad22504275525d15, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 4a493dda0cbfb235, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:50 client Connection d8ebbb114481dc5975ad22504275525d15 closed. 2025/09/12 12:21:50 Requesting https://server4:443/cqafkwhhcx. 2025/09/12 12:21:50 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:50 Increased send buffer size to 14336 kiB 2025/09/12 12:21:50 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:50 Created qlog file: /logs/qlog/68b549aa517075843920c4ee1b6214fc.sqlog 2025/09/12 12:21:50 client Starting new connection to server4 ([::]:47028 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 68b549aa517075843920c4ee1b6214fc, version v1 2025/09/12 12:21:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:50 client -> Sending packet 0 (1280 bytes) for connection 68b549aa517075843920c4ee1b6214fc, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 68b549aa517075843920c4ee1b6214fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:50 client -> Sending packet 1 (1280 bytes) for connection 68b549aa517075843920c4ee1b6214fc, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 68b549aa517075843920c4ee1b6214fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/09/12 12:21:50 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:50 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 595b97111cf234cd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:50 client Received first packet. Switching destination connection ID to: 595b97111cf234cd 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 992µs} 2025/09/12 12:21:50 client newly acked packets (1): [0] 2025/09/12 12:21:50 client updated RTT: 33.895929ms (σ: 16.947964ms) 2025/09/12 12:21:50 client <- &wire.PingFrame{} 2025/09/12 12:21:50 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:50 client -> Sending packet 2 (1280 bytes) for connection 68b549aa517075843920c4ee1b6214fc, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 595b97111cf234cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:50 client -> Sending packet 3 (1280 bytes) for connection 68b549aa517075843920c4ee1b6214fc, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 595b97111cf234cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/09/12 12:21:50 client -> Sending packet 4 (1280 bytes) for connection 68b549aa517075843920c4ee1b6214fc, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 595b97111cf234cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:50 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 12:21:50 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 595b97111cf234cd, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 1.448ms} 2025/09/12 12:21:50 client newly acked packets (1): [4] 2025/09/12 12:21:50 client updated RTT: 34.061ms (σ: 13.043ms) 2025/09/12 12:21:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:50 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 283 bytes. 2025/09/12 12:21:50 client <- Reading packet 2 (779 bytes) for connection (empty), Handshake 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 595b97111cf234cd, PacketNumber: 2, PacketNumberLen: 2, Length: 762, Version: v1} 2025/09/12 12:21:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 12:21:50 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 68b549aa517075843920c4ee1b6214fc, InitialSourceConnectionID: 595b97111cf234cd, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2d308f053fdaf1e987b96a370585a4a4, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:50 client Dropping %!s(logging.PacketType=5) packet (283 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 68b549aa517075843920c4ee1b6214fc 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 595b97111cf234cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: 595b97111cf234cd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:50 client Dropping Initial keys. 2025/09/12 12:21:50 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:50 client -> Sending packet 1 (40 bytes) for connection 68b549aa517075843920c4ee1b6214fc, Handshake 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: 595b97111cf234cd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:50 client -> Sending packet 0 (46 bytes) for connection 68b549aa517075843920c4ee1b6214fc, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 595b97111cf234cd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:50 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:50 client Dropping Handshake keys. 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ddc87ff535714780, StatelessResetToken: 0xf8f48905232adc85fe67febfa25854e8} 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e2adb94c5233d109, StatelessResetToken: 0x2a689b0e2c3f4828972a7497760cc7b8} 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fb1b701e2adf9d4c, StatelessResetToken: 0x7fac59bbe8ab8543a0f1008d701af448} 2025/09/12 12:21:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:50 client -> Sending packet 1 (34 bytes) for connection 68b549aa517075843920c4ee1b6214fc, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: ddc87ff535714780, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 145.063µs} 2025/09/12 12:21:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:50 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.552ms} 2025/09/12 12:21:50 client newly acked packets (1): [1] 2025/09/12 12:21:50 client updated RTT: 33.834ms (σ: 10.236ms) 2025/09/12 12:21:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:50 client lost packet 0 (time threshold) 2025/09/12 12:21:50 client Canceling loss detection timer. 2025/09/12 12:21:50 client Ignoring all packets below 4. 2025/09/12 12:21:50 client -> Sending packet 2 (46 bytes) for connection 68b549aa517075843920c4ee1b6214fc, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:50 client Short Header{DestConnectionID: ddc87ff535714780, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:50 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.048ms} 2025/09/12 12:21:50 client newly acked packets (1): [2] 2025/09/12 12:21:50 client updated RTT: 33.588ms (σ: 8.168ms) 2025/09/12 12:21:50 client Canceling loss detection timer. 2025/09/12 12:21:50 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:50 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:50 client -> Sending packet 3 (32 bytes) for connection 68b549aa517075843920c4ee1b6214fc, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:50 client Short Header{DestConnectionID: ddc87ff535714780, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 65.082µs} 2025/09/12 12:21:50 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:50 client -> Sending packet 4 (30 bytes) for connection 68b549aa517075843920c4ee1b6214fc, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:50 client Short Header{DestConnectionID: ddc87ff535714780, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:50 client Connection 68b549aa517075843920c4ee1b6214fc closed. 2025/09/12 12:21:50 Requesting https://server4:443/yqtesjyspp. 2025/09/12 12:21:50 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:50 Increased send buffer size to 14336 kiB 2025/09/12 12:21:50 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:50 Created qlog file: /logs/qlog/d6641ead9b3120d136e6.sqlog 2025/09/12 12:21:50 client Starting new connection to server4 ([::]:53976 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d6641ead9b3120d136e6, version v1 2025/09/12 12:21:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:50 client -> Sending packet 0 (1280 bytes) for connection d6641ead9b3120d136e6, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: d6641ead9b3120d136e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 12:21:50 client -> Sending packet 1 (1280 bytes) for connection d6641ead9b3120d136e6, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: d6641ead9b3120d136e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 1238, Data length: 273, Offset + Data length: 1511} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:50 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:50 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dd0687ef1c04100c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:50 client Received first packet. Switching destination connection ID to: dd0687ef1c04100c 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680µs} 2025/09/12 12:21:50 client newly acked packets (1): [0] 2025/09/12 12:21:50 client updated RTT: 33.510792ms (σ: 16.755396ms) 2025/09/12 12:21:50 client <- &wire.PingFrame{} 2025/09/12 12:21:50 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:50 client -> Sending packet 2 (1280 bytes) for connection d6641ead9b3120d136e6, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: dd0687ef1c04100c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:50 client -> Sending packet 3 (1280 bytes) for connection d6641ead9b3120d136e6, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: dd0687ef1c04100c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 1238, Data length: 273, Offset + Data length: 1511} 2025/09/12 12:21:50 client -> Sending packet 4 (1280 bytes) for connection d6641ead9b3120d136e6, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: dd0687ef1c04100c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 1238, Data length: 273, Offset + Data length: 1511} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:50 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dd0687ef1c04100c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 312µs} 2025/09/12 12:21:50 client <- Reading packet 4 (41 bytes) for connection (empty), Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dd0687ef1c04100c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 248µs} 2025/09/12 12:21:50 client newly acked packets (1): [4] 2025/09/12 12:21:50 client updated RTT: 33.444ms (σ: 12.697ms) 2025/09/12 12:21:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:50 client -> Sending packet 5 (1280 bytes) for connection d6641ead9b3120d136e6, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: dd0687ef1c04100c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:50 client -> &wire.PingFrame{} 2025/09/12 12:21:50 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:21:50 client <- Reading packet 7 (130 bytes) for connection (empty), Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dd0687ef1c04100c, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:21:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:50 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 296 bytes. 2025/09/12 12:21:50 client <- Reading packet 8 (774 bytes) for connection (empty), Handshake 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dd0687ef1c04100c, PacketNumber: 8, PacketNumberLen: 2, Length: 757, Version: v1} 2025/09/12 12:21:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 12:21:50 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d6641ead9b3120d136e6, InitialSourceConnectionID: dd0687ef1c04100c, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xbf0e520aaedaab4e3fbe81a9d2252e1c, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:50 client Dropping %!s(logging.PacketType=5) packet (296 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d6641ead9b3120d136e6 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: dd0687ef1c04100c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: dd0687ef1c04100c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:50 client Dropping Initial keys. 2025/09/12 12:21:50 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:50 client -> Sending packet 1 (40 bytes) for connection d6641ead9b3120d136e6, Handshake 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: dd0687ef1c04100c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/09/12 12:21:50 client -> Sending packet 0 (46 bytes) for connection d6641ead9b3120d136e6, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: dd0687ef1c04100c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:50 client <- Reading packet 9 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:50 client Dropping Handshake keys. 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 499fb930deedfb31, StatelessResetToken: 0xfbf190bc2850f75788da1aabc6042862} 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b1710e3025b99969, StatelessResetToken: 0xaa7cba5ea0b329103be5b57a512f4047} 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f9ac99c497ee01a7, StatelessResetToken: 0xdb1deb39887ab79996b03c4d349bdcfd} 2025/09/12 12:21:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:50 client -> Sending packet 1 (34 bytes) for connection d6641ead9b3120d136e6, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 499fb930deedfb31, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 121.717µs} 2025/09/12 12:21:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:50 client <- Reading packet 11 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:50 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:50 client -> Sending packet 2 (34 bytes) for connection d6641ead9b3120d136e6, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 499fb930deedfb31, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 9, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}}, DelayTime: 73.005µs} 2025/09/12 12:21:50 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:50 client -> Sending packet 3 (30 bytes) for connection d6641ead9b3120d136e6, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 499fb930deedfb31, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:50 client Connection d6641ead9b3120d136e6 closed. 2025/09/12 12:21:50 Requesting https://server4:443/eoaarglodb. 2025/09/12 12:21:50 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:50 Increased send buffer size to 14336 kiB 2025/09/12 12:21:50 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:50 Created qlog file: /logs/qlog/12e5f4d302164f9b9a4b149b.sqlog 2025/09/12 12:21:50 client Starting new connection to server4 ([::]:54757 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 12e5f4d302164f9b9a4b149b, version v1 2025/09/12 12:21:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:50 client -> Sending packet 0 (1280 bytes) for connection 12e5f4d302164f9b9a4b149b, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 12e5f4d302164f9b9a4b149b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:21:50 client -> Sending packet 1 (1280 bytes) for connection 12e5f4d302164f9b9a4b149b, Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 12e5f4d302164f9b9a4b149b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 1236, Data length: 275, Offset + Data length: 1511} 2025/09/12 12:21:50 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:50 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8e2d59f36963a54e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:50 client Received first packet. Switching destination connection ID to: 8e2d59f36963a54e 2025/09/12 12:21:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.216ms} 2025/09/12 12:21:50 client newly acked packets (2): [0 1] 2025/09/12 12:21:50 client updated RTT: 34.881075ms (σ: 17.440537ms) 2025/09/12 12:21:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:50 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 288 bytes. 2025/09/12 12:21:50 client <- Reading packet 2 (776 bytes) for connection (empty), Handshake 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8e2d59f36963a54e, PacketNumber: 2, PacketNumberLen: 2, Length: 759, Version: v1} 2025/09/12 12:21:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 12:21:50 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 12e5f4d302164f9b9a4b149b, InitialSourceConnectionID: 8e2d59f36963a54e, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa5f0f230570fad11c0c73d51d49f8bc4, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:50 client Dropping %!s(logging.PacketType=5) packet (288 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 12e5f4d302164f9b9a4b149b 2025/09/12 12:21:50 client Long Header{Type: Initial, DestConnectionID: 8e2d59f36963a54e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: 8e2d59f36963a54e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:50 client Dropping Initial keys. 2025/09/12 12:21:50 client -> Sending packet 1 (40 bytes) for connection 12e5f4d302164f9b9a4b149b, Handshake 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: 8e2d59f36963a54e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:50 client -> Sending packet 0 (46 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: 8e2d59f36963a54e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:50 client -> Sending packet 2 (90 bytes) for connection 12e5f4d302164f9b9a4b149b, Handshake 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: 8e2d59f36963a54e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:50 client -> Sending packet 3 (90 bytes) for connection 12e5f4d302164f9b9a4b149b, Handshake 2025/09/12 12:21:50 client Long Header{Type: Handshake, DestConnectionID: 8e2d59f36963a54e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:50 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:50 client Dropping Handshake keys. 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c099f29d49b06849, StatelessResetToken: 0x7faa7aa20fbedbb653b73059603b7a1f} 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d984f042587ccb58, StatelessResetToken: 0x45e2fe067825e963fa983e652849fd45} 2025/09/12 12:21:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 895f70bf6a9c1eed, StatelessResetToken: 0xccaee2931829aaf5a37217b415fe876d} 2025/09/12 12:21:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:50 client -> Sending packet 2 (53 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: c099f29d49b06849, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 108.302µs} 2025/09/12 12:21:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:50 client -> Sending packet 3 (48 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:50 client Short Header{DestConnectionID: c099f29d49b06849, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:51 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:51 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client <- &wire.PingFrame{} 2025/09/12 12:21:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:51 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:51 client -> Sending packet 4 (33 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:51 client Short Header{DestConnectionID: c099f29d49b06849, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.320099ms} 2025/09/12 12:21:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:21:51 client -> Sending packet 6 (48 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:51 client Short Header{DestConnectionID: c099f29d49b06849, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:51 client -> Sending packet 7 (48 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:51 client Short Header{DestConnectionID: c099f29d49b06849, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:51 client -> Sending packet 8 (1366 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:51 client Short Header{DestConnectionID: c099f29d49b06849, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client -> &wire.PingFrame{} 2025/09/12 12:21:51 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:51 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 581468b91339d461, StatelessResetToken: 0x16bd60eed90921ff4668cb37f47cc663} 2025/09/12 12:21:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:51 client <- Reading packet 6 (24 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:51 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 104µs} 2025/09/12 12:21:51 client newly acked packets (1): [7] 2025/09/12 12:21:51 client updated RTT: 34.527ms (σ: 13.786ms) 2025/09/12 12:21:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:51 client Canceling loss detection timer. 2025/09/12 12:21:51 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:51 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:21:51 client -> Sending packet 9 (32 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:51 client Short Header{DestConnectionID: c099f29d49b06849, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 57.507µs} 2025/09/12 12:21:51 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:51 client -> Sending packet 10 (30 bytes) for connection 12e5f4d302164f9b9a4b149b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:51 client Short Header{DestConnectionID: c099f29d49b06849, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:51 client Connection 12e5f4d302164f9b9a4b149b closed. 2025/09/12 12:21:51 Requesting https://server4:443/ouxjjwsjbc. 2025/09/12 12:21:51 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:51 Increased send buffer size to 14336 kiB 2025/09/12 12:21:51 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:51 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:51 Created qlog file: /logs/qlog/39792ec84ef96ed207535a.sqlog 2025/09/12 12:21:51 client Starting new connection to server4 ([::]:47862 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 39792ec84ef96ed207535a, version v1 2025/09/12 12:21:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:51 client -> Sending packet 0 (1280 bytes) for connection 39792ec84ef96ed207535a, Initial 2025/09/12 12:21:51 client Long Header{Type: Initial, DestConnectionID: 39792ec84ef96ed207535a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 12:21:51 client -> Sending packet 1 (1280 bytes) for connection 39792ec84ef96ed207535a, Initial 2025/09/12 12:21:51 client Long Header{Type: Initial, DestConnectionID: 39792ec84ef96ed207535a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:51 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:51 client -> Sending packet 2 (1280 bytes) for connection 39792ec84ef96ed207535a, Initial 2025/09/12 12:21:51 client Long Header{Type: Initial, DestConnectionID: 39792ec84ef96ed207535a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:51 client -> Sending packet 3 (1280 bytes) for connection 39792ec84ef96ed207535a, Initial 2025/09/12 12:21:51 client Long Header{Type: Initial, DestConnectionID: 39792ec84ef96ed207535a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:51 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 12:21:51 client <- Reading packet 2 (38 bytes) for connection (empty), Initial 2025/09/12 12:21:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c58ff03d1ca3f334, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 12:21:51 client Received first packet. Switching destination connection ID to: c58ff03d1ca3f334 2025/09/12 12:21:51 client <- &wire.PingFrame{} 2025/09/12 12:21:51 client Queueing packet (1162 bytes) for later decryption 2025/09/12 12:21:51 client -> Sending packet 4 (1280 bytes) for connection 39792ec84ef96ed207535a, Initial 2025/09/12 12:21:51 client Long Header{Type: Initial, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:51 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 12:21:51 client <- Reading packet 3 (138 bytes) for connection (empty), Initial 2025/09/12 12:21:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c58ff03d1ca3f334, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 12:21:51 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.456ms} 2025/09/12 12:21:51 client newly acked packets (2): [2 3] 2025/09/12 12:21:51 client updated RTT: 35.157191ms (σ: 17.578595ms) 2025/09/12 12:21:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:51 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:51 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:51 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 287 bytes. 2025/09/12 12:21:51 client <- Reading packet 4 (775 bytes) for connection (empty), Handshake 2025/09/12 12:21:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c58ff03d1ca3f334, PacketNumber: 4, PacketNumberLen: 2, Length: 758, Version: v1} 2025/09/12 12:21:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 12:21:51 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:51 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 39792ec84ef96ed207535a, InitialSourceConnectionID: c58ff03d1ca3f334, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x09433e4d348a8ee7c1b4723451d3d30b, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:51 client Dropping %!s(logging.PacketType=5) packet (287 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 39792ec84ef96ed207535a 2025/09/12 12:21:51 client Long Header{Type: Initial, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:51 client Long Header{Type: Handshake, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:51 client Dropping Initial keys. 2025/09/12 12:21:51 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:51 client -> Sending packet 1 (86 bytes) for connection 39792ec84ef96ed207535a, Handshake 2025/09/12 12:21:51 client Long Header{Type: Handshake, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 12:21:51 client Short Header{DestConnectionID: c58ff03d1ca3f334, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:51 client -> Sending packet 2 (90 bytes) for connection 39792ec84ef96ed207535a, Handshake 2025/09/12 12:21:51 client Long Header{Type: Handshake, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:51 client -> Sending packet 3 (90 bytes) for connection 39792ec84ef96ed207535a, Handshake 2025/09/12 12:21:51 client Long Header{Type: Handshake, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:21:51 client -> Sending packet 4 (90 bytes) for connection 39792ec84ef96ed207535a, Handshake 2025/09/12 12:21:51 client Long Header{Type: Handshake, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:51 client -> Sending packet 5 (90 bytes) for connection 39792ec84ef96ed207535a, Handshake 2025/09/12 12:21:51 client Long Header{Type: Handshake, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:52 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 12:21:52 client -> Sending packet 6 (90 bytes) for connection 39792ec84ef96ed207535a, Handshake 2025/09/12 12:21:52 client Long Header{Type: Handshake, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:52 client -> Sending packet 7 (90 bytes) for connection 39792ec84ef96ed207535a, Handshake 2025/09/12 12:21:52 client Long Header{Type: Handshake, DestConnectionID: c58ff03d1ca3f334, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:52 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:52 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client <- &wire.PingFrame{} 2025/09/12 12:21:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:52 client -> Sending packet 1 (32 bytes) for connection 39792ec84ef96ed207535a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:52 client Short Header{DestConnectionID: c58ff03d1ca3f334, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 86.09µs} 2025/09/12 12:21:52 client <- Reading packet 12 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:52 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client <- &wire.PingFrame{} 2025/09/12 12:21:52 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:52 client -> Sending packet 2 (34 bytes) for connection 39792ec84ef96ed207535a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:52 client Short Header{DestConnectionID: c58ff03d1ca3f334, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 8, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 8}}, DelayTime: 130.483µs} 2025/09/12 12:21:52 client <- Reading packet 13 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:52 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:52 client Dropping Handshake keys. 2025/09/12 12:21:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 72212250aaa3bb2a, StatelessResetToken: 0x4c9eb1e64f7b944dc12d32a8719a95b3} 2025/09/12 12:21:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eabe6dd5e81b1062, StatelessResetToken: 0xe9f36ac004aeefdadd61f8f1110923ef} 2025/09/12 12:21:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: de25771a9842de03, StatelessResetToken: 0x0eccb9eea869351d8210efb67afb10c8} 2025/09/12 12:21:52 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:52 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:52 client -> Sending packet 4 (55 bytes) for connection 39792ec84ef96ed207535a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:52 client Short Header{DestConnectionID: 72212250aaa3bb2a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 8, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 8, Smallest: 8}}, DelayTime: 111.949µs} 2025/09/12 12:21:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:52 client -> Sending packet 5 (48 bytes) for connection 39792ec84ef96ed207535a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:52 client Short Header{DestConnectionID: 72212250aaa3bb2a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:52 client <- Reading packet 14 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:52 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f16cc6a738fec16a, StatelessResetToken: 0xd4efc56d8cd69bf075c429cb0d22c8fe} 2025/09/12 12:21:52 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:52 client <- Reading packet 15 (26 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:52 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:52 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 272µs} 2025/09/12 12:21:52 client newly acked packets (1): [5] 2025/09/12 12:21:52 client updated RTT: 34.742ms (σ: 14.012ms) 2025/09/12 12:21:52 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:52 client Canceling loss detection timer. 2025/09/12 12:21:53 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:53 client -> Sending packet 6 (35 bytes) for connection 39792ec84ef96ed207535a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:53 client Short Header{DestConnectionID: 72212250aaa3bb2a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 8, AckRanges: {{Largest: 15, Smallest: 12}, {Largest: 8, Smallest: 8}}, DelayTime: 25.320932ms} 2025/09/12 12:21:53 client <- Reading packet 17 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:53 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client <- &wire.PingFrame{} 2025/09/12 12:21:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:53 client -> Sending packet 7 (36 bytes) for connection 39792ec84ef96ed207535a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:53 client Short Header{DestConnectionID: 72212250aaa3bb2a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 8, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 12}, {Largest: 8, Smallest: 8}}, DelayTime: 92.773µs} 2025/09/12 12:21:53 client <- Reading packet 18 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:53 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:53 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:53 client -> Sending packet 8 (30 bytes) for connection 39792ec84ef96ed207535a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:53 client Short Header{DestConnectionID: 72212250aaa3bb2a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:53 client Connection 39792ec84ef96ed207535a closed. 2025/09/12 12:21:53 Requesting https://server4:443/yyxhcwczeg. 2025/09/12 12:21:53 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:53 Increased send buffer size to 14336 kiB 2025/09/12 12:21:53 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:53 Created qlog file: /logs/qlog/5a519289d40f80ed306c44f46b9107533bcd660b.sqlog 2025/09/12 12:21:53 client Starting new connection to server4 ([::]:48793 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5a519289d40f80ed306c44f46b9107533bcd660b, version v1 2025/09/12 12:21:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:53 client -> Sending packet 0 (1280 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, Initial 2025/09/12 12:21:53 client Long Header{Type: Initial, DestConnectionID: 5a519289d40f80ed306c44f46b9107533bcd660b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:21:53 client -> Sending packet 1 (1280 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, Initial 2025/09/12 12:21:53 client Long Header{Type: Initial, DestConnectionID: 5a519289d40f80ed306c44f46b9107533bcd660b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 1228, Data length: 279, Offset + Data length: 1507} 2025/09/12 12:21:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:53 client -> Sending packet 2 (1280 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, Initial 2025/09/12 12:21:53 client Long Header{Type: Initial, DestConnectionID: 5a519289d40f80ed306c44f46b9107533bcd660b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:21:53 client -> Sending packet 3 (1280 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, Initial 2025/09/12 12:21:53 client Long Header{Type: Initial, DestConnectionID: 5a519289d40f80ed306c44f46b9107533bcd660b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 1228, Data length: 279, Offset + Data length: 1507} 2025/09/12 12:21:53 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:53 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e5173918a48c287, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:53 client Received first packet. Switching destination connection ID to: 1e5173918a48c287 2025/09/12 12:21:53 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.72ms} 2025/09/12 12:21:53 client newly acked packets (1): [2] 2025/09/12 12:21:53 client updated RTT: 34.80455ms (σ: 17.402275ms) 2025/09/12 12:21:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:53 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:53 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:53 client Parsed a coalesced packet. Part 2: 785 bytes. Remaining: 279 bytes. 2025/09/12 12:21:53 client <- Reading packet 2 (785 bytes) for connection (empty), Handshake 2025/09/12 12:21:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1e5173918a48c287, PacketNumber: 2, PacketNumberLen: 2, Length: 768, Version: v1} 2025/09/12 12:21:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 746, Offset + Data length: 746} 2025/09/12 12:21:53 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:53 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5a519289d40f80ed306c44f46b9107533bcd660b, InitialSourceConnectionID: 1e5173918a48c287, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb1f1390f6fa0bb61540ffc293539416c, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:53 client Dropping %!s(logging.PacketType=5) packet (279 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b 2025/09/12 12:21:53 client Long Header{Type: Initial, DestConnectionID: 1e5173918a48c287, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:21:53 client Long Header{Type: Handshake, DestConnectionID: 1e5173918a48c287, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:53 client Dropping Initial keys. 2025/09/12 12:21:53 client -> Sending packet 1 (40 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, Handshake 2025/09/12 12:21:53 client Long Header{Type: Handshake, DestConnectionID: 1e5173918a48c287, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:53 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:53 client -> Sending packet 0 (46 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:53 client Short Header{DestConnectionID: 1e5173918a48c287, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:53 client <- Reading packet 4 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:53 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:53 client Dropping Handshake keys. 2025/09/12 12:21:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a2d09dfe199682bd, StatelessResetToken: 0x258e416cb0ba74e5ba6bf736accc5a85} 2025/09/12 12:21:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e9b6a5eb28323a8, StatelessResetToken: 0x58018abfa0c196a626032d57ed113896} 2025/09/12 12:21:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c78b074762c2e9c0, StatelessResetToken: 0x535ba504f7172f42958bff91c13a90bd} 2025/09/12 12:21:53 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:53 client -> Sending packet 1 (34 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:53 client Short Header{DestConnectionID: a2d09dfe199682bd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 112.88µs} 2025/09/12 12:21:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:53 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:53 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client <- &wire.PingFrame{} 2025/09/12 12:21:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:53 client -> Sending packet 3 (52 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:53 client Short Header{DestConnectionID: a2d09dfe199682bd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 2.174374ms} 2025/09/12 12:21:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:53 client Skipping packet number 2 2025/09/12 12:21:53 client -> Sending packet 4 (29 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:53 client Short Header{DestConnectionID: a2d09dfe199682bd, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:53 client <- Reading packet 6 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:53 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 973e14e9182d876e, StatelessResetToken: 0x4ed4c67b72c2ef773c08b22987d102b3} 2025/09/12 12:21:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:53 client <- Reading packet 7 (24 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:53 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 368µs} 2025/09/12 12:21:53 client newly acked packets (2): [3 4] 2025/09/12 12:21:53 client updated RTT: 34.435ms (σ: 13.789ms) 2025/09/12 12:21:53 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:53 client Canceling loss detection timer. 2025/09/12 12:21:53 client Ignoring all packets below 6. 2025/09/12 12:21:53 client -> Sending packet 5 (1366 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:53 client Short Header{DestConnectionID: a2d09dfe199682bd, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.PingFrame{} 2025/09/12 12:21:53 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:53 client -> Sending packet 6 (33 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:53 client Short Header{DestConnectionID: a2d09dfe199682bd, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 25.34742ms} 2025/09/12 12:21:53 client <- Reading packet 9 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:53 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:53 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 1.224ms} 2025/09/12 12:21:53 client newly acked packets (1): [5] 2025/09/12 12:21:57 client <- Reading packet 14 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.PingFrame{} 2025/09/12 12:21:57 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:57 client -> Sending packet 7 (1409 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:57 client Short Header{DestConnectionID: a2d09dfe199682bd, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.PingFrame{} 2025/09/12 12:21:57 client -> Sending packet 8 (36 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:57 client Short Header{DestConnectionID: a2d09dfe199682bd, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 6, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 176.349µs} 2025/09/12 12:21:57 client <- Reading packet 15 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:57 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:57 client -> Sending packet 9 (30 bytes) for connection 5a519289d40f80ed306c44f46b9107533bcd660b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:57 client Short Header{DestConnectionID: a2d09dfe199682bd, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:57 client Connection 5a519289d40f80ed306c44f46b9107533bcd660b closed. 2025/09/12 12:21:57 Requesting https://server4:443/slcvndefag. 2025/09/12 12:21:57 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:57 Increased send buffer size to 14336 kiB 2025/09/12 12:21:57 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:57 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:57 Created qlog file: /logs/qlog/7300827b2c6c7792546a0c7da9c959fce78244.sqlog 2025/09/12 12:21:57 client Starting new connection to server4 ([::]:58077 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7300827b2c6c7792546a0c7da9c959fce78244, version v1 2025/09/12 12:21:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:57 client -> Sending packet 0 (1280 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 7300827b2c6c7792546a0c7da9c959fce78244, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:57 client -> Sending packet 1 (1280 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 7300827b2c6c7792546a0c7da9c959fce78244, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:57 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:57 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9ab1ee1def28cf33, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:57 client Received first packet. Switching destination connection ID to: 9ab1ee1def28cf33 2025/09/12 12:21:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 792µs} 2025/09/12 12:21:57 client newly acked packets (1): [0] 2025/09/12 12:21:57 client updated RTT: 33.707183ms (σ: 16.853591ms) 2025/09/12 12:21:57 client <- &wire.PingFrame{} 2025/09/12 12:21:57 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:57 client -> Sending packet 2 (1280 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 9ab1ee1def28cf33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:57 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:57 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9ab1ee1def28cf33, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.264ms} 2025/09/12 12:21:57 client newly acked packets (1): [1] 2025/09/12 12:21:57 client updated RTT: 33.889ms (σ: 13.005ms) 2025/09/12 12:21:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:57 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:57 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:57 client Parsed a coalesced packet. Part 2: 783 bytes. Remaining: 281 bytes. 2025/09/12 12:21:57 client <- Reading packet 2 (783 bytes) for connection (empty), Handshake 2025/09/12 12:21:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ab1ee1def28cf33, PacketNumber: 2, PacketNumberLen: 2, Length: 766, Version: v1} 2025/09/12 12:21:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/09/12 12:21:57 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:57 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7300827b2c6c7792546a0c7da9c959fce78244, InitialSourceConnectionID: 9ab1ee1def28cf33, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf7f3e2925b160ddf0193abae06e64a52, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:57 client Dropping %!s(logging.PacketType=5) packet (281 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 9ab1ee1def28cf33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:57 client Long Header{Type: Handshake, DestConnectionID: 9ab1ee1def28cf33, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:57 client Dropping Initial keys. 2025/09/12 12:21:57 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:57 client -> Sending packet 1 (40 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, Handshake 2025/09/12 12:21:57 client Long Header{Type: Handshake, DestConnectionID: 9ab1ee1def28cf33, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:57 client -> Sending packet 0 (46 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:57 client Short Header{DestConnectionID: 9ab1ee1def28cf33, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:57 client -> Sending packet 2 (90 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, Handshake 2025/09/12 12:21:57 client Long Header{Type: Handshake, DestConnectionID: 9ab1ee1def28cf33, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:57 client -> Sending packet 3 (90 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, Handshake 2025/09/12 12:21:57 client Long Header{Type: Handshake, DestConnectionID: 9ab1ee1def28cf33, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:57 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:57 client Dropping Handshake keys. 2025/09/12 12:21:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9fc1983898149f0e, StatelessResetToken: 0x73ae2aedf61cae42a1a9ef8f773b6513} 2025/09/12 12:21:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b0afe4dcfc88126a, StatelessResetToken: 0x1876dd561ee5a0e07f237c93de5d6ad4} 2025/09/12 12:21:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 48f929dc9e26dd48, StatelessResetToken: 0x9850e9d54bf129d95250e62f7cf4d47f} 2025/09/12 12:21:57 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:57 client -> Sending packet 2 (53 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:57 client Short Header{DestConnectionID: 9fc1983898149f0e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 102.772µs} 2025/09/12 12:21:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:57 client -> Sending packet 3 (48 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:57 client Short Header{DestConnectionID: 9fc1983898149f0e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:57 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 1.08ms} 2025/09/12 12:21:57 client newly acked packets (1): [3] 2025/09/12 12:21:57 client updated RTT: 33.639ms (σ: 10.252ms) 2025/09/12 12:21:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:21:57 client Canceling loss detection timer. 2025/09/12 12:21:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:57 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.PingFrame{} 2025/09/12 12:21:57 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:57 client -> Sending packet 4 (36 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:57 client Short Header{DestConnectionID: 9fc1983898149f0e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 80.841µs} 2025/09/12 12:21:57 client <- Reading packet 8 (1075 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: befdb0e8d9a559cb, StatelessResetToken: 0xcc520900bcb0600d17d7574e0f0945e9} 2025/09/12 12:21:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:57 client -> Sending packet 5 (1366 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:57 client Short Header{DestConnectionID: 9fc1983898149f0e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.PingFrame{} 2025/09/12 12:21:57 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:57 client -> Sending packet 6 (30 bytes) for connection 7300827b2c6c7792546a0c7da9c959fce78244, 1-RTT (ECN: Not-ECT) 2025/09/12 12:21:57 client Short Header{DestConnectionID: 9fc1983898149f0e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:57 client Connection 7300827b2c6c7792546a0c7da9c959fce78244 closed. 2025/09/12 12:21:57 Requesting https://server4:443/uexuzzddqu. 2025/09/12 12:21:57 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:57 Increased send buffer size to 14336 kiB 2025/09/12 12:21:57 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:57 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:57 Created qlog file: /logs/qlog/abc1bddf5f9894325283ceac601c.sqlog 2025/09/12 12:21:57 client Starting new connection to server4 ([::]:41714 -> 193.167.100.100:443), source connection ID (empty), destination connection ID abc1bddf5f9894325283ceac601c, version v1 2025/09/12 12:21:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:57 client -> Sending packet 0 (1280 bytes) for connection abc1bddf5f9894325283ceac601c, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: abc1bddf5f9894325283ceac601c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 12:21:57 client -> Sending packet 1 (1280 bytes) for connection abc1bddf5f9894325283ceac601c, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: abc1bddf5f9894325283ceac601c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/09/12 12:21:57 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:57 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4471f0fcc1936d96, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:57 client Received first packet. Switching destination connection ID to: 4471f0fcc1936d96 2025/09/12 12:21:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 808µs} 2025/09/12 12:21:57 client newly acked packets (1): [0] 2025/09/12 12:21:57 client updated RTT: 33.851954ms (σ: 16.925977ms) 2025/09/12 12:21:57 client <- &wire.PingFrame{} 2025/09/12 12:21:57 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:57 client -> Sending packet 2 (1280 bytes) for connection abc1bddf5f9894325283ceac601c, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 4471f0fcc1936d96, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:57 client -> Sending packet 3 (1280 bytes) for connection abc1bddf5f9894325283ceac601c, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 4471f0fcc1936d96, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:57 client -> Sending packet 4 (1280 bytes) for connection abc1bddf5f9894325283ceac601c, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 4471f0fcc1936d96, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:57 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:21:57 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4471f0fcc1936d96, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:21:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.616ms} 2025/09/12 12:21:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:57 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:57 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:57 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 286 bytes. 2025/09/12 12:21:57 client <- Reading packet 2 (778 bytes) for connection (empty), Handshake 2025/09/12 12:21:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4471f0fcc1936d96, PacketNumber: 2, PacketNumberLen: 2, Length: 761, Version: v1} 2025/09/12 12:21:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 12:21:57 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:57 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: abc1bddf5f9894325283ceac601c, InitialSourceConnectionID: 4471f0fcc1936d96, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2b4e57400d52ce4df1642627cce4f68d, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:57 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection abc1bddf5f9894325283ceac601c 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 4471f0fcc1936d96, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:57 client Long Header{Type: Handshake, DestConnectionID: 4471f0fcc1936d96, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:57 client Dropping Initial keys. 2025/09/12 12:21:57 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:57 client -> Sending packet 1 (86 bytes) for connection abc1bddf5f9894325283ceac601c, Handshake 2025/09/12 12:21:57 client Long Header{Type: Handshake, DestConnectionID: 4471f0fcc1936d96, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:57 client Short Header{DestConnectionID: 4471f0fcc1936d96, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:57 client <- Reading packet 4 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:57 client Dropping Handshake keys. 2025/09/12 12:21:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9113dbdcda8af68f, StatelessResetToken: 0x13f82430e4e38191b58d504ec1d68cbd} 2025/09/12 12:21:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d9a915d47bf6732, StatelessResetToken: 0xbb85916cfca2548adab95585eeaf8595} 2025/09/12 12:21:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6d0e8208d1244494, StatelessResetToken: 0x194e9b5f095ad46362e9193470e934fd} 2025/09/12 12:21:57 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:57 client -> Sending packet 1 (34 bytes) for connection abc1bddf5f9894325283ceac601c, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:57 client Short Header{DestConnectionID: 9113dbdcda8af68f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 110.165µs} 2025/09/12 12:21:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:57 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.048ms} 2025/09/12 12:21:57 client newly acked packets (1): [0] 2025/09/12 12:21:57 client updated RTT: 33.86ms (σ: 12.713ms) 2025/09/12 12:21:57 client <- Reading packet 6 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:57 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:21:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:57 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:21:57 client -> Sending packet 2 (30 bytes) for connection abc1bddf5f9894325283ceac601c, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:57 client Short Header{DestConnectionID: 9113dbdcda8af68f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:21:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:21:57 client Connection abc1bddf5f9894325283ceac601c closed. 2025/09/12 12:21:57 Requesting https://server4:443/saxzylpdod. 2025/09/12 12:21:57 Increased receive buffer size to 14336 kiB 2025/09/12 12:21:57 Increased send buffer size to 14336 kiB 2025/09/12 12:21:57 Setting DF for IPv4 and IPv6. 2025/09/12 12:21:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:21:57 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:21:57 Created qlog file: /logs/qlog/6eff4274b4332be0f40ddf.sqlog 2025/09/12 12:21:57 client Starting new connection to server4 ([::]:48422 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6eff4274b4332be0f40ddf, version v1 2025/09/12 12:21:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:21:57 client -> Sending packet 0 (1280 bytes) for connection 6eff4274b4332be0f40ddf, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 6eff4274b4332be0f40ddf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:21:57 client -> Sending packet 1 (1280 bytes) for connection 6eff4274b4332be0f40ddf, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 6eff4274b4332be0f40ddf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/09/12 12:21:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:57 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:21:57 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56fd22b8a55e9768, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:21:57 client Received first packet. Switching destination connection ID to: 56fd22b8a55e9768 2025/09/12 12:21:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 872µs} 2025/09/12 12:21:57 client newly acked packets (1): [0] 2025/09/12 12:21:57 client updated RTT: 33.760335ms (σ: 16.880167ms) 2025/09/12 12:21:57 client <- &wire.PingFrame{} 2025/09/12 12:21:57 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:21:57 client -> Sending packet 2 (1280 bytes) for connection 6eff4274b4332be0f40ddf, Initial 2025/09/12 12:21:57 client Long Header{Type: Initial, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:21:58 client -> Sending packet 3 (1280 bytes) for connection 6eff4274b4332be0f40ddf, Initial 2025/09/12 12:21:58 client Long Header{Type: Initial, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/09/12 12:21:58 client -> Sending packet 4 (1280 bytes) for connection 6eff4274b4332be0f40ddf, Initial 2025/09/12 12:21:58 client Long Header{Type: Initial, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:21:58 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 12:21:58 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 12:21:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56fd22b8a55e9768, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 12:21:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 1.536ms} 2025/09/12 12:21:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:21:58 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:58 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:58 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 288 bytes. 2025/09/12 12:21:58 client <- Reading packet 2 (774 bytes) for connection (empty), Handshake 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56fd22b8a55e9768, PacketNumber: 2, PacketNumberLen: 2, Length: 757, Version: v1} 2025/09/12 12:21:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 12:21:58 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:58 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:21:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6eff4274b4332be0f40ddf, InitialSourceConnectionID: 56fd22b8a55e9768, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x63fceab067f55668c2776d0bebc23593, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:21:58 client Dropping %!s(logging.PacketType=5) packet (288 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6eff4274b4332be0f40ddf 2025/09/12 12:21:58 client Long Header{Type: Initial, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:21:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:58 client Dropping Initial keys. 2025/09/12 12:21:58 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:21:58 client -> Sending packet 1 (40 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:21:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:21:58 client -> Sending packet 0 (46 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:58 client Short Header{DestConnectionID: 56fd22b8a55e9768, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:21:58 client -> Sending packet 2 (90 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:58 client -> Sending packet 3 (90 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:21:58 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:58 client <- &wire.PingFrame{} 2025/09/12 12:21:58 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:21:58 client -> Sending packet 1 (32 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:58 client Short Header{DestConnectionID: 56fd22b8a55e9768, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:58 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 102.972µs} 2025/09/12 12:21:58 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:58 client <- &wire.PingFrame{} 2025/09/12 12:21:58 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:58 client -> Sending packet 2 (34 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:58 client Short Header{DestConnectionID: 56fd22b8a55e9768, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:58 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 121.477µs} 2025/09/12 12:21:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:21:58 client -> Sending packet 4 (90 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:58 client -> Sending packet 5 (90 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:58 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:58 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:58 client <- &wire.PingFrame{} 2025/09/12 12:21:58 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:58 client Sending ACK because the ACK timer expired. 2025/09/12 12:21:58 client -> Sending packet 3 (35 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:58 client Short Header{DestConnectionID: 56fd22b8a55e9768, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:58 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 25.359643ms} 2025/09/12 12:21:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 12:21:58 client -> Sending packet 6 (90 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:58 client -> Sending packet 7 (90 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:58 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/09/12 12:21:59 client -> Sending packet 8 (90 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:59 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:59 client -> Sending packet 9 (90 bytes) for connection 6eff4274b4332be0f40ddf, Handshake 2025/09/12 12:21:59 client Long Header{Type: Handshake, DestConnectionID: 56fd22b8a55e9768, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:21:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:21:59 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:59 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:59 client <- &wire.PingFrame{} 2025/09/12 12:21:59 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:21:59 client -> Sending packet 4 (36 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:59 client Short Header{DestConnectionID: 56fd22b8a55e9768, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:59 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 108.622µs} 2025/09/12 12:21:59 client <- Reading packet 10 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:21:59 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:59 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:21:59 client Dropping Handshake keys. 2025/09/12 12:21:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9ce78849cd4e2983, StatelessResetToken: 0xc35e527d4d7898e5150274f2b403c933} 2025/09/12 12:21:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 997a415fbe024d89, StatelessResetToken: 0xbb769d687e8bdd535566692e082654fa} 2025/09/12 12:21:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 44ec821299f193b0, StatelessResetToken: 0x5cb96c4879668790cb46030f924ee03b} 2025/09/12 12:21:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:21:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:21:59 client -> Sending packet 6 (57 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:59 client Short Header{DestConnectionID: 9ce78849cd4e2983, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:59 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 133.148µs} 2025/09/12 12:21:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:21:59 client -> Sending packet 7 (48 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:21:59 client Short Header{DestConnectionID: 9ce78849cd4e2983, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:21:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:21:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:00 client <- Reading packet 13 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:00 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:00 client -> Sending packet 8 (38 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 9ce78849cd4e2983, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 4, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 113.912µs} 2025/09/12 12:22:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:00 client -> Sending packet 9 (30 bytes) for connection 6eff4274b4332be0f40ddf, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 9ce78849cd4e2983, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:00 client Connection 6eff4274b4332be0f40ddf closed. 2025/09/12 12:22:00 Requesting https://server4:443/tembllnskw. 2025/09/12 12:22:00 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:00 Increased send buffer size to 14336 kiB 2025/09/12 12:22:00 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:00 Created qlog file: /logs/qlog/ea21cce550a2fc4877f3ace8.sqlog 2025/09/12 12:22:00 client Starting new connection to server4 ([::]:37217 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ea21cce550a2fc4877f3ace8, version v1 2025/09/12 12:22:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:00 client -> Sending packet 0 (1280 bytes) for connection ea21cce550a2fc4877f3ace8, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: ea21cce550a2fc4877f3ace8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:22:00 client -> Sending packet 1 (1280 bytes) for connection ea21cce550a2fc4877f3ace8, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: ea21cce550a2fc4877f3ace8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 1236, Data length: 270, Offset + Data length: 1506} 2025/09/12 12:22:00 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:00 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3527f7e9ef9a5d0b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:00 client Received first packet. Switching destination connection ID to: 3527f7e9ef9a5d0b 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.232ms} 2025/09/12 12:22:00 client newly acked packets (2): [0 1] 2025/09/12 12:22:00 client updated RTT: 36.288267ms (σ: 18.144133ms) 2025/09/12 12:22:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 288 bytes. 2025/09/12 12:22:00 client <- Reading packet 2 (776 bytes) for connection (empty), Handshake 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3527f7e9ef9a5d0b, PacketNumber: 2, PacketNumberLen: 2, Length: 759, Version: v1} 2025/09/12 12:22:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 12:22:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ea21cce550a2fc4877f3ace8, InitialSourceConnectionID: 3527f7e9ef9a5d0b, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x46989cb3aea65f33a6ace4ac44621726, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:00 client Dropping %!s(logging.PacketType=5) packet (288 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ea21cce550a2fc4877f3ace8 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: 3527f7e9ef9a5d0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: 3527f7e9ef9a5d0b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:00 client Dropping Initial keys. 2025/09/12 12:22:00 client -> Sending packet 1 (86 bytes) for connection ea21cce550a2fc4877f3ace8, Handshake 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: 3527f7e9ef9a5d0b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:00 client Short Header{DestConnectionID: 3527f7e9ef9a5d0b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:00 client -> Sending packet 2 (90 bytes) for connection ea21cce550a2fc4877f3ace8, Handshake 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: 3527f7e9ef9a5d0b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:00 client -> Sending packet 3 (90 bytes) for connection ea21cce550a2fc4877f3ace8, Handshake 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: 3527f7e9ef9a5d0b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:00 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:00 client Dropping Handshake keys. 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 73b44ba269ec19c3, StatelessResetToken: 0xb90fbd18214b8fc202c79355a9b468a3} 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 169ea55a5c320846, StatelessResetToken: 0xce5bcd24e3bec1ac7a472cda1e2b7bcf} 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0f82dd9114fa77b6, StatelessResetToken: 0x39bcb157398f730fb4ba6345aece2e3f} 2025/09/12 12:22:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:00 client -> Sending packet 2 (53 bytes) for connection ea21cce550a2fc4877f3ace8, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 73b44ba269ec19c3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 153.316µs} 2025/09/12 12:22:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:00 client -> Sending packet 3 (48 bytes) for connection ea21cce550a2fc4877f3ace8, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 73b44ba269ec19c3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:00 client <- Reading packet 4 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b283b1584952ae3, StatelessResetToken: 0x0cde7c0fcd0b550ae561583939bb820c} 2025/09/12 12:22:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:00 client <- Reading packet 5 (24 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 88µs} 2025/09/12 12:22:00 client newly acked packets (1): [3] 2025/09/12 12:22:00 client updated RTT: 35.725ms (σ: 14.732ms) 2025/09/12 12:22:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:00 client Canceling loss detection timer. 2025/09/12 12:22:00 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:00 client -> Sending packet 4 (33 bytes) for connection ea21cce550a2fc4877f3ace8, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 73b44ba269ec19c3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 25.250664ms} 2025/09/12 12:22:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:00 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.PingFrame{} 2025/09/12 12:22:00 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:00 client -> Sending packet 5 (34 bytes) for connection ea21cce550a2fc4877f3ace8, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 73b44ba269ec19c3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}}, DelayTime: 86.06µs} 2025/09/12 12:22:00 client <- Reading packet 8 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:00 client -> Sending packet 6 (30 bytes) for connection ea21cce550a2fc4877f3ace8, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 73b44ba269ec19c3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:00 client Connection ea21cce550a2fc4877f3ace8 closed. 2025/09/12 12:22:00 Requesting https://server4:443/jphekawfqe. 2025/09/12 12:22:00 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:00 Increased send buffer size to 14336 kiB 2025/09/12 12:22:00 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:00 Created qlog file: /logs/qlog/0fa2b205a0104dbf7f2b.sqlog 2025/09/12 12:22:00 client Starting new connection to server4 ([::]:40224 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0fa2b205a0104dbf7f2b, version v1 2025/09/12 12:22:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:00 client -> Sending packet 0 (1280 bytes) for connection 0fa2b205a0104dbf7f2b, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: 0fa2b205a0104dbf7f2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:00 client -> Sending packet 1 (1280 bytes) for connection 0fa2b205a0104dbf7f2b, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: 0fa2b205a0104dbf7f2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:00 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:00 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b558809b405ebb0d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:00 client Received first packet. Switching destination connection ID to: b558809b405ebb0d 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 912µs} 2025/09/12 12:22:00 client newly acked packets (1): [1] 2025/09/12 12:22:00 client updated RTT: 34.819924ms (σ: 17.409962ms) 2025/09/12 12:22:00 client setting loss timer for packet 0 (Initial) to 39.172414ms (in 2025-09-12 12:22:00.402849516 +0000 UTC m=+17.610447435) 2025/09/12 12:22:00 client <- &wire.PingFrame{} 2025/09/12 12:22:00 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:00 client -> Sending packet 2 (1280 bytes) for connection 0fa2b205a0104dbf7f2b, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: b558809b405ebb0d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:00 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 12:22:00.402849516 +0000 UTC m=+17.610447435 2025/09/12 12:22:00 client lost packet 0 (time threshold) 2025/09/12 12:22:00 client -> Sending packet 3 (1280 bytes) for connection 0fa2b205a0104dbf7f2b, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: b558809b405ebb0d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 12:22:00 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:00 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b558809b405ebb0d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.448ms} 2025/09/12 12:22:00 client newly acked packets (1): [3] 2025/09/12 12:22:00 client updated RTT: 34.738ms (σ: 13.218ms) 2025/09/12 12:22:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 291 bytes. 2025/09/12 12:22:00 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b558809b405ebb0d, PacketNumber: 2, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 12:22:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 12:22:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0fa2b205a0104dbf7f2b, InitialSourceConnectionID: b558809b405ebb0d, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x04ca997e061d0af577df425e4d5ab1a7, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:00 client Dropping %!s(logging.PacketType=5) packet (291 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0fa2b205a0104dbf7f2b 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: b558809b405ebb0d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: b558809b405ebb0d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:00 client Dropping Initial keys. 2025/09/12 12:22:00 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:00 client -> Sending packet 1 (40 bytes) for connection 0fa2b205a0104dbf7f2b, Handshake 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: b558809b405ebb0d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:00 client -> Sending packet 0 (46 bytes) for connection 0fa2b205a0104dbf7f2b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:00 client Short Header{DestConnectionID: b558809b405ebb0d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:00 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:00 client Dropping Handshake keys. 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a5b1fc522f7ba5fa, StatelessResetToken: 0xa260924514d44d65c6e6b14ee66fb876} 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b1a8c981bf504621, StatelessResetToken: 0x0125993dbf9455b24f27b27e3c0f85b0} 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8d85fb6dd396c8ed, StatelessResetToken: 0x586323100291031b2abb084616172986} 2025/09/12 12:22:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:00 client -> Sending packet 1 (34 bytes) for connection 0fa2b205a0104dbf7f2b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:00 client Short Header{DestConnectionID: a5b1fc522f7ba5fa, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 169.395µs} 2025/09/12 12:22:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:00 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 12:22:00 client newly acked packets (1): [0] 2025/09/12 12:22:00 client updated RTT: 34.653ms (σ: 10.081ms) 2025/09/12 12:22:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:00 client <- Reading packet 6 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1e094fbb4dabf50c, StatelessResetToken: 0x9a0bc0dfb16d58fb96f25494556f1d5d} 2025/09/12 12:22:00 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:00 client -> Sending packet 2 (34 bytes) for connection 0fa2b205a0104dbf7f2b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:00 client Short Header{DestConnectionID: a5b1fc522f7ba5fa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 59.291µs} 2025/09/12 12:22:00 client <- Reading packet 7 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.552ms} 2025/09/12 12:22:00 client newly acked packets (1): [1] 2025/09/12 12:22:00 client updated RTT: 34.35ms (σ: 8.164ms) 2025/09/12 12:22:00 client Canceling loss detection timer. 2025/09/12 12:22:00 client Ignoring all packets below 4. 2025/09/12 12:22:00 client <- Reading packet 8 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:00 client -> Sending packet 3 (30 bytes) for connection 0fa2b205a0104dbf7f2b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:00 client Short Header{DestConnectionID: a5b1fc522f7ba5fa, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:00 client Connection 0fa2b205a0104dbf7f2b closed. 2025/09/12 12:22:00 Requesting https://server4:443/uaqnjomsbv. 2025/09/12 12:22:00 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:00 Increased send buffer size to 14336 kiB 2025/09/12 12:22:00 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:00 Created qlog file: /logs/qlog/b0582fde5115e616b1434b88d4678396747601d6.sqlog 2025/09/12 12:22:00 client Starting new connection to server4 ([::]:46147 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b0582fde5115e616b1434b88d4678396747601d6, version v1 2025/09/12 12:22:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:00 client -> Sending packet 0 (1280 bytes) for connection b0582fde5115e616b1434b88d4678396747601d6, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: b0582fde5115e616b1434b88d4678396747601d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:00 client -> Sending packet 1 (1280 bytes) for connection b0582fde5115e616b1434b88d4678396747601d6, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: b0582fde5115e616b1434b88d4678396747601d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 1228, Data length: 278, Offset + Data length: 1506} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:00 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:00 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ca0ac2ab86a971fa, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:00 client Received first packet. Switching destination connection ID to: ca0ac2ab86a971fa 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.272ms} 2025/09/12 12:22:00 client newly acked packets (2): [0 1] 2025/09/12 12:22:00 client updated RTT: 35.214558ms (σ: 17.607279ms) 2025/09/12 12:22:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 280 bytes. 2025/09/12 12:22:00 client <- Reading packet 2 (784 bytes) for connection (empty), Handshake 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ca0ac2ab86a971fa, PacketNumber: 2, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 12:22:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 12:22:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b0582fde5115e616b1434b88d4678396747601d6, InitialSourceConnectionID: ca0ac2ab86a971fa, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x5511f14f5c41fe4e6fc1fbba08992ce3, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:00 client Dropping %!s(logging.PacketType=5) packet (280 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b0582fde5115e616b1434b88d4678396747601d6 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: ca0ac2ab86a971fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: ca0ac2ab86a971fa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:00 client Dropping Initial keys. 2025/09/12 12:22:00 client -> Sending packet 1 (86 bytes) for connection b0582fde5115e616b1434b88d4678396747601d6, Handshake 2025/09/12 12:22:00 client Long Header{Type: Handshake, DestConnectionID: ca0ac2ab86a971fa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:00 client Short Header{DestConnectionID: ca0ac2ab86a971fa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:00 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:00 client Dropping Handshake keys. 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9e559fd834eef547, StatelessResetToken: 0xe7ebf401580ee280e4627d524e293ace} 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e9de1af5a2ed768b, StatelessResetToken: 0xb9291f55f91a661361935bdb7c9f4344} 2025/09/12 12:22:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e6a12b4e89faedd7, StatelessResetToken: 0x73b8e37cf4e02e9f0ed3278eb49808ad} 2025/09/12 12:22:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:00 client -> Sending packet 1 (34 bytes) for connection b0582fde5115e616b1434b88d4678396747601d6, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 9e559fd834eef547, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 100.057µs} 2025/09/12 12:22:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:00 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.032ms} 2025/09/12 12:22:00 client newly acked packets (1): [0] 2025/09/12 12:22:00 client updated RTT: 34.996ms (σ: 13.639ms) 2025/09/12 12:22:00 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:00 client -> Sending packet 2 (30 bytes) for connection b0582fde5115e616b1434b88d4678396747601d6, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:00 client Short Header{DestConnectionID: 9e559fd834eef547, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:00 client Connection b0582fde5115e616b1434b88d4678396747601d6 closed. 2025/09/12 12:22:00 Requesting https://server4:443/ssnhvxihqn. 2025/09/12 12:22:00 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:00 Increased send buffer size to 14336 kiB 2025/09/12 12:22:00 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:00 Created qlog file: /logs/qlog/af4c0dc0e3e3158aa0cbfd14b44fee2ba04f.sqlog 2025/09/12 12:22:00 client Starting new connection to server4 ([::]:42561 -> 193.167.100.100:443), source connection ID (empty), destination connection ID af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, version v1 2025/09/12 12:22:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:00 client -> Sending packet 0 (1280 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 12:22:00 client -> Sending packet 1 (1280 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 1230, Data length: 289, Offset + Data length: 1519} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:00 client -> Sending packet 2 (1280 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:00 client -> Sending packet 3 (1280 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 1230, Data length: 289, Offset + Data length: 1519} 2025/09/12 12:22:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:00 client <- Reading packet 1 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1971b15398509517, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:00 client Received first packet. Switching destination connection ID to: 1971b15398509517 2025/09/12 12:22:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 336µs} 2025/09/12 12:22:00 client newly acked packets (1): [2] 2025/09/12 12:22:00 client updated RTT: 32.185494ms (σ: 16.092747ms) 2025/09/12 12:22:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 12:22:01 client -> Sending packet 4 (1280 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 1230, Data length: 289, Offset + Data length: 1519} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:01 client -> Sending packet 5 (1280 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 1230, Data length: 289, Offset + Data length: 1519} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:01 client Parsed a coalesced packet. Part 1: 140 bytes. Remaining: 1060 bytes. 2025/09/12 12:22:01 client <- Reading packet 3 (140 bytes) for connection (empty), Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1971b15398509517, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 122, Version: v1} 2025/09/12 12:22:01 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.752ms} 2025/09/12 12:22:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:01 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 279 bytes. 2025/09/12 12:22:01 client <- Reading packet 4 (781 bytes) for connection (empty), Handshake 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1971b15398509517, PacketNumber: 4, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 12:22:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 12:22:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, InitialSourceConnectionID: 1971b15398509517, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd78d1bb3c7569d5fa66b4c1badba8e0e, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:01 client Dropping %!s(logging.PacketType=5) packet (279 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:01 client Dropping Initial keys. 2025/09/12 12:22:01 client -> Sending packet 1 (40 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Handshake 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 12:22:01 client -> Sending packet 0 (46 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:01 client Short Header{DestConnectionID: 1971b15398509517, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:01 client -> Sending packet 2 (90 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Handshake 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:01 client -> Sending packet 3 (90 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Handshake 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:22:01 client -> Sending packet 4 (90 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Handshake 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:01 client -> Sending packet 5 (90 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, Handshake 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: 1971b15398509517, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:01 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.PingFrame{} 2025/09/12 12:22:01 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:01 client -> Sending packet 1 (32 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:01 client Short Header{DestConnectionID: 1971b15398509517, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 109.565µs} 2025/09/12 12:22:01 client <- Reading packet 8 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:01 client Dropping Handshake keys. 2025/09/12 12:22:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8df3f02e290c9f45, StatelessResetToken: 0x7a61748cb4ad5aa298e8b5865b98a295} 2025/09/12 12:22:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0add8f8bdf0abfb, StatelessResetToken: 0xdebfd9d8cc981d29f505e480fd3e8380} 2025/09/12 12:22:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4b95d30ed8a56214, StatelessResetToken: 0xc3217c46f3d27dbb039643016e1777ed} 2025/09/12 12:22:01 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:01 client -> Sending packet 3 (53 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:01 client Short Header{DestConnectionID: 8df3f02e290c9f45, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 141.553µs} 2025/09/12 12:22:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:01 client -> Sending packet 4 (48 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:01 client Short Header{DestConnectionID: 8df3f02e290c9f45, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:01 client <- Reading packet 9 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c2b1ace206b98657, StatelessResetToken: 0x04854c2b38785a4117d0b4c50e0ddbc3} 2025/09/12 12:22:01 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:01 client <- Reading packet 10 (26 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 168µs} 2025/09/12 12:22:01 client newly acked packets (1): [4] 2025/09/12 12:22:01 client updated RTT: 32.16ms (σ: 12.118ms) 2025/09/12 12:22:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:01 client Canceling loss detection timer. 2025/09/12 12:22:01 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:01 client -> Sending packet 5 (33 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:01 client Short Header{DestConnectionID: 8df3f02e290c9f45, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, DelayTime: 25.265484ms} 2025/09/12 12:22:01 client <- Reading packet 12 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.PingFrame{} 2025/09/12 12:22:01 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:01 client -> Sending packet 6 (34 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:01 client Short Header{DestConnectionID: 8df3f02e290c9f45, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 7, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 7}}, DelayTime: 108.813µs} 2025/09/12 12:22:01 client <- Reading packet 13 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:01 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:01 client -> Sending packet 7 (1366 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:01 client Short Header{DestConnectionID: 8df3f02e290c9f45, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.PingFrame{} 2025/09/12 12:22:01 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:01 client -> Sending packet 8 (30 bytes) for connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:01 client Short Header{DestConnectionID: 8df3f02e290c9f45, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:01 client Connection af4c0dc0e3e3158aa0cbfd14b44fee2ba04f closed. 2025/09/12 12:22:01 Requesting https://server4:443/jtuvxoityw. 2025/09/12 12:22:01 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:01 Increased send buffer size to 14336 kiB 2025/09/12 12:22:01 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:01 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:01 Created qlog file: /logs/qlog/bb5fbde2ac0c792cdedd.sqlog 2025/09/12 12:22:01 client Starting new connection to server4 ([::]:43938 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bb5fbde2ac0c792cdedd, version v1 2025/09/12 12:22:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:01 client -> Sending packet 0 (1280 bytes) for connection bb5fbde2ac0c792cdedd, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: bb5fbde2ac0c792cdedd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:01 client -> Sending packet 1 (1280 bytes) for connection bb5fbde2ac0c792cdedd, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: bb5fbde2ac0c792cdedd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 1238, Data length: 269, Offset + Data length: 1507} 2025/09/12 12:22:01 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:01 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af5474a5659b8508, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:01 client Received first packet. Switching destination connection ID to: af5474a5659b8508 2025/09/12 12:22:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 808µs} 2025/09/12 12:22:01 client newly acked packets (1): [0] 2025/09/12 12:22:01 client updated RTT: 33.697313ms (σ: 16.848656ms) 2025/09/12 12:22:01 client <- &wire.PingFrame{} 2025/09/12 12:22:01 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:01 client -> Sending packet 2 (1280 bytes) for connection bb5fbde2ac0c792cdedd, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: af5474a5659b8508, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:01 client -> Sending packet 3 (1280 bytes) for connection bb5fbde2ac0c792cdedd, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: af5474a5659b8508, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 1238, Data length: 269, Offset + Data length: 1507} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:01 client -> Sending packet 4 (1280 bytes) for connection bb5fbde2ac0c792cdedd, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: af5474a5659b8508, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 1238, Data length: 269, Offset + Data length: 1507} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:01 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:22:01 client <- Reading packet 3 (130 bytes) for connection (empty), Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af5474a5659b8508, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:22:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:01 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 297 bytes. 2025/09/12 12:22:01 client <- Reading packet 4 (773 bytes) for connection (empty), Handshake 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af5474a5659b8508, PacketNumber: 4, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 12:22:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 12:22:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bb5fbde2ac0c792cdedd, InitialSourceConnectionID: af5474a5659b8508, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x13038d2059303701d519f77491e93f52, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:01 client Dropping %!s(logging.PacketType=5) packet (297 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bb5fbde2ac0c792cdedd 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: af5474a5659b8508, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: af5474a5659b8508, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:01 client Dropping Initial keys. 2025/09/12 12:22:01 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:01 client -> Sending packet 1 (86 bytes) for connection bb5fbde2ac0c792cdedd, Handshake 2025/09/12 12:22:01 client Long Header{Type: Handshake, DestConnectionID: af5474a5659b8508, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 12:22:01 client Short Header{DestConnectionID: af5474a5659b8508, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:01 client <- Reading packet 5 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:01 client Dropping Handshake keys. 2025/09/12 12:22:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f80afc94caac0701, StatelessResetToken: 0xdf6d9905df5b336115231c41b0514d69} 2025/09/12 12:22:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fb41d09ba1381a3e, StatelessResetToken: 0xbc6c48e83138431e82ae021f7ed9f920} 2025/09/12 12:22:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 15e6153a26a4ba35, StatelessResetToken: 0xdce17e4c3c502ddca7b751a9a641d9a9} 2025/09/12 12:22:01 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:01 client -> Sending packet 1 (34 bytes) for connection bb5fbde2ac0c792cdedd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:01 client Short Header{DestConnectionID: f80afc94caac0701, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 143.428µs} 2025/09/12 12:22:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:01 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.088ms} 2025/09/12 12:22:01 client newly acked packets (1): [0] 2025/09/12 12:22:01 client updated RTT: 33.717ms (σ: 12.676ms) 2025/09/12 12:22:01 client <- Reading packet 9 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.624ms} 2025/09/12 12:22:01 client newly acked packets (1): [1] 2025/09/12 12:22:01 client updated RTT: 33.54ms (σ: 9.859ms) 2025/09/12 12:22:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:01 client Canceling loss detection timer. 2025/09/12 12:22:01 client Ignoring all packets below 6. 2025/09/12 12:22:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:01 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.PingFrame{} 2025/09/12 12:22:01 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:01 client -> Sending packet 2 (34 bytes) for connection bb5fbde2ac0c792cdedd, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:01 client Short Header{DestConnectionID: f80afc94caac0701, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 100.417µs} 2025/09/12 12:22:01 client <- Reading packet 11 (1075 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:01 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4fb141cb78703d99, StatelessResetToken: 0x58a728b4d07208e27bc6d501158ae673} 2025/09/12 12:22:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:01 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:01 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:01 client -> Sending packet 3 (30 bytes) for connection bb5fbde2ac0c792cdedd, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:01 client Short Header{DestConnectionID: f80afc94caac0701, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:01 client Connection bb5fbde2ac0c792cdedd closed. 2025/09/12 12:22:01 Requesting https://server4:443/smkqggxugp. 2025/09/12 12:22:01 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:01 Increased send buffer size to 14336 kiB 2025/09/12 12:22:01 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:01 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:01 Created qlog file: /logs/qlog/1bbd3e50cf67940590a47e9b.sqlog 2025/09/12 12:22:01 client Starting new connection to server4 ([::]:47830 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1bbd3e50cf67940590a47e9b, version v1 2025/09/12 12:22:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:01 client -> Sending packet 0 (1280 bytes) for connection 1bbd3e50cf67940590a47e9b, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: 1bbd3e50cf67940590a47e9b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:01 client -> Sending packet 1 (1280 bytes) for connection 1bbd3e50cf67940590a47e9b, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: 1bbd3e50cf67940590a47e9b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:01 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:01 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: be04d5573dd5621a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:01 client Received first packet. Switching destination connection ID to: be04d5573dd5621a 2025/09/12 12:22:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 920µs} 2025/09/12 12:22:01 client newly acked packets (1): [1] 2025/09/12 12:22:01 client updated RTT: 34.811004ms (σ: 17.405502ms) 2025/09/12 12:22:01 client setting loss timer for packet 0 (Initial) to 39.162379ms (in 2025-09-12 12:22:01.981240205 +0000 UTC m=+19.188838135) 2025/09/12 12:22:01 client <- &wire.PingFrame{} 2025/09/12 12:22:01 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:01 client -> Sending packet 2 (1280 bytes) for connection 1bbd3e50cf67940590a47e9b, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: be04d5573dd5621a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:01 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 12:22:01.981240205 +0000 UTC m=+19.188838135 2025/09/12 12:22:01 client lost packet 0 (time threshold) 2025/09/12 12:22:01 client -> Sending packet 3 (1280 bytes) for connection 1bbd3e50cf67940590a47e9b, Initial 2025/09/12 12:22:01 client Long Header{Type: Initial, DestConnectionID: be04d5573dd5621a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:22:02 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:02 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: be04d5573dd5621a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:02 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.584ms} 2025/09/12 12:22:02 client newly acked packets (1): [3] 2025/09/12 12:22:02 client updated RTT: 34.755ms (σ: 13.164ms) 2025/09/12 12:22:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:02 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 289 bytes. 2025/09/12 12:22:02 client <- Reading packet 2 (775 bytes) for connection (empty), Handshake 2025/09/12 12:22:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: be04d5573dd5621a, PacketNumber: 2, PacketNumberLen: 2, Length: 758, Version: v1} 2025/09/12 12:22:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 12:22:02 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:02 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1bbd3e50cf67940590a47e9b, InitialSourceConnectionID: be04d5573dd5621a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3e2f197012d85ebb72e570a5a88e3022, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:02 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1bbd3e50cf67940590a47e9b 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: be04d5573dd5621a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:02 client Long Header{Type: Handshake, DestConnectionID: be04d5573dd5621a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:02 client Dropping Initial keys. 2025/09/12 12:22:02 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:02 client -> Sending packet 1 (86 bytes) for connection 1bbd3e50cf67940590a47e9b, Handshake 2025/09/12 12:22:02 client Long Header{Type: Handshake, DestConnectionID: be04d5573dd5621a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:02 client Short Header{DestConnectionID: be04d5573dd5621a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:02 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:02 client Dropping Handshake keys. 2025/09/12 12:22:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8cee3faef1d7e5ea, StatelessResetToken: 0xf50da8f2de37bd97586d93cd4ee5b9a7} 2025/09/12 12:22:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 402406fc16eb8f17, StatelessResetToken: 0x207507ce885b55e724185c2eb3a7fa95} 2025/09/12 12:22:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8daa6a6b74a82459, StatelessResetToken: 0xaede0859c63357e9088ce23da35e6e51} 2025/09/12 12:22:02 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:02 client -> Sending packet 1 (34 bytes) for connection 1bbd3e50cf67940590a47e9b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:02 client Short Header{DestConnectionID: 8cee3faef1d7e5ea, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 110.947µs} 2025/09/12 12:22:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:02 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client <- &wire.PingFrame{} 2025/09/12 12:22:02 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:02 client -> Sending packet 3 (52 bytes) for connection 1bbd3e50cf67940590a47e9b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:02 client Short Header{DestConnectionID: 8cee3faef1d7e5ea, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 3.223571ms} 2025/09/12 12:22:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:02 client Skipping packet number 2 2025/09/12 12:22:02 client -> Sending packet 4 (29 bytes) for connection 1bbd3e50cf67940590a47e9b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:02 client Short Header{DestConnectionID: 8cee3faef1d7e5ea, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:02 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 1.096ms} 2025/09/12 12:22:02 client newly acked packets (1): [3] 2025/09/12 12:22:02 client updated RTT: 34.395ms (σ: 10.591ms) 2025/09/12 12:22:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:02 client Ignoring all packets below 5. 2025/09/12 12:22:02 client <- Reading packet 6 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:02 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:02 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:02 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:02 client -> Sending packet 5 (30 bytes) for connection 1bbd3e50cf67940590a47e9b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:02 client Short Header{DestConnectionID: 8cee3faef1d7e5ea, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:02 client Connection 1bbd3e50cf67940590a47e9b closed. 2025/09/12 12:22:02 Requesting https://server4:443/soeakmmnnn. 2025/09/12 12:22:02 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:02 Increased send buffer size to 14336 kiB 2025/09/12 12:22:02 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:02 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:02 Created qlog file: /logs/qlog/6232b71cb4921d1fbe26601662d5.sqlog 2025/09/12 12:22:02 client Starting new connection to server4 ([::]:36324 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6232b71cb4921d1fbe26601662d5, version v1 2025/09/12 12:22:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:02 client -> Sending packet 0 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: 6232b71cb4921d1fbe26601662d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 12:22:02 client -> Sending packet 1 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: 6232b71cb4921d1fbe26601662d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 1234, Data length: 278, Offset + Data length: 1512} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:02 client -> Sending packet 2 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: 6232b71cb4921d1fbe26601662d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:02 client -> Sending packet 3 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: 6232b71cb4921d1fbe26601662d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 1234, Data length: 278, Offset + Data length: 1512} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:02 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1162 bytes. 2025/09/12 12:22:02 client <- Reading packet 2 (38 bytes) for connection (empty), Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 807ce96fa5f6ad10, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 12:22:02 client Received first packet. Switching destination connection ID to: 807ce96fa5f6ad10 2025/09/12 12:22:02 client <- &wire.PingFrame{} 2025/09/12 12:22:02 client Queueing packet (1162 bytes) for later decryption 2025/09/12 12:22:02 client -> Sending packet 4 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: 807ce96fa5f6ad10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 12:22:02 client -> Sending packet 5 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: 807ce96fa5f6ad10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 12:22:02 client -> Sending packet 6 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:02 client Long Header{Type: Initial, DestConnectionID: 807ce96fa5f6ad10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 1234, Data length: 278, Offset + Data length: 1512} 2025/09/12 12:22:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 12:22:03 client -> Sending packet 7 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:03 client Long Header{Type: Initial, DestConnectionID: 807ce96fa5f6ad10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 12:22:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:03 client -> Sending packet 8 (1280 bytes) for connection 6232b71cb4921d1fbe26601662d5, Initial 2025/09/12 12:22:03 client Long Header{Type: Initial, DestConnectionID: 807ce96fa5f6ad10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:03 client -> &wire.CryptoFrame{Offset: 1234, Data length: 278, Offset + Data length: 1512} 2025/09/12 12:22:03 client Parsed a coalesced packet. Part 1: 142 bytes. Remaining: 1058 bytes. 2025/09/12 12:22:03 client <- Reading packet 4 (142 bytes) for connection (empty), Initial 2025/09/12 12:22:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 807ce96fa5f6ad10, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 124, Version: v1} 2025/09/12 12:22:03 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.384ms} 2025/09/12 12:22:03 client newly acked packets (2): [7 8] 2025/09/12 12:22:03 client updated RTT: 35.34985ms (σ: 17.674925ms) 2025/09/12 12:22:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:03 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:03 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:03 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 279 bytes. 2025/09/12 12:22:03 client <- Reading packet 5 (779 bytes) for connection (empty), Handshake 2025/09/12 12:22:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 807ce96fa5f6ad10, PacketNumber: 5, PacketNumberLen: 2, Length: 762, Version: v1} 2025/09/12 12:22:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 12:22:03 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:03 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6232b71cb4921d1fbe26601662d5, InitialSourceConnectionID: 807ce96fa5f6ad10, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x35a7603ec57a205090cd07255f546d41, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:03 client Dropping %!s(logging.PacketType=5) packet (279 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6232b71cb4921d1fbe26601662d5 2025/09/12 12:22:03 client Long Header{Type: Initial, DestConnectionID: 807ce96fa5f6ad10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:03 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/12 12:22:03 client Long Header{Type: Handshake, DestConnectionID: 807ce96fa5f6ad10, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:03 client Dropping Initial keys. 2025/09/12 12:22:03 client Dropping %!s(logging.PacketType=5) packet (1162 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:03 client -> Sending packet 1 (86 bytes) for connection 6232b71cb4921d1fbe26601662d5, Handshake 2025/09/12 12:22:03 client Long Header{Type: Handshake, DestConnectionID: 807ce96fa5f6ad10, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:03 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 12:22:03 client Short Header{DestConnectionID: 807ce96fa5f6ad10, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:03 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:03 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:03 client Dropping Handshake keys. 2025/09/12 12:22:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08bfc353a17353c0, StatelessResetToken: 0x7c05be156e1536fd22330e630016c2bf} 2025/09/12 12:22:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75b2b0fd239a2d29, StatelessResetToken: 0xdb9d13689c1d5f6f743a87aa6d27df4f} 2025/09/12 12:22:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 176c461e81ba149c, StatelessResetToken: 0x023d7f5ab1e6ee9613d5a98adebe2d9a} 2025/09/12 12:22:03 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:03 client -> Sending packet 1 (34 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:03 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 110.266µs} 2025/09/12 12:22:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:03 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:03 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client <- &wire.PingFrame{} 2025/09/12 12:22:03 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:03 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:03 client -> Sending packet 3 (52 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:03 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 22.16928ms} 2025/09/12 12:22:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:03 client Skipping packet number 2 2025/09/12 12:22:03 client -> Sending packet 4 (29 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:03 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:03 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:03 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 78d985ef1c6aad4f, StatelessResetToken: 0x03c996c30e1ca6b8ead700d7c7576e09} 2025/09/12 12:22:03 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:03 client -> Sending packet 5 (1366 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:03 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client -> &wire.PingFrame{} 2025/09/12 12:22:03 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:03 client -> Sending packet 6 (33 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:03 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 25.443232ms} 2025/09/12 12:22:03 client <- Reading packet 12 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:03 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client <- &wire.PingFrame{} 2025/09/12 12:22:03 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:03 client -> Sending packet 7 (34 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:03 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:03 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 6}}, DelayTime: 96.319µs} 2025/09/12 12:22:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:22:04 client -> Sending packet 9 (46 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:04 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:04 client Skipping packet number 8 2025/09/12 12:22:04 client -> Sending packet 10 (29 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:04 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:04 client <- Reading packet 14 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:04 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client <- &wire.PingFrame{} 2025/09/12 12:22:04 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:04 client -> Sending packet 11 (36 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:04 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 6, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 6}}, DelayTime: 125.273µs} 2025/09/12 12:22:04 client <- Reading packet 16 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:04 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client <- &wire.PingFrame{} 2025/09/12 12:22:04 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:04 client -> Sending packet 12 (38 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:04 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 6, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 6}}, DelayTime: 130.854µs} 2025/09/12 12:22:04 client <- Reading packet 18 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:04 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client <- &wire.PingFrame{} 2025/09/12 12:22:04 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:04 client -> Sending packet 13 (40 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:04 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 6, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 6}}, DelayTime: 83.535µs} 2025/09/12 12:22:04 client <- Reading packet 19 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:04 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client <- &wire.PingFrame{} 2025/09/12 12:22:04 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 12:22:04 client -> Sending packet 15 (60 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:04 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 6, AckRanges: {{Largest: 19, Smallest: 18}, {Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 6}}, DelayTime: 2.103691ms} 2025/09/12 12:22:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:04 client Skipping packet number 14 2025/09/12 12:22:04 client -> Sending packet 16 (29 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:04 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:05 client <- Reading packet 21 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.PingFrame{} 2025/09/12 12:22:05 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:05 client -> Sending packet 17 (42 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 6, AckRanges: {{Largest: 21, Smallest: 21}, {Largest: 19, Smallest: 18}, {Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 6}}, DelayTime: 106.749µs} 2025/09/12 12:22:05 client <- Reading packet 22 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:05 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:05 client -> Sending packet 18 (30 bytes) for connection 6232b71cb4921d1fbe26601662d5, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 08bfc353a17353c0, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:05 client Connection 6232b71cb4921d1fbe26601662d5 closed. 2025/09/12 12:22:05 Requesting https://server4:443/xojhmtocqi. 2025/09/12 12:22:05 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:05 Increased send buffer size to 14336 kiB 2025/09/12 12:22:05 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:05 Created qlog file: /logs/qlog/e66a191508b99d4874a080c9e58037.sqlog 2025/09/12 12:22:05 client Starting new connection to server4 ([::]:42634 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e66a191508b99d4874a080c9e58037, version v1 2025/09/12 12:22:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:05 client -> Sending packet 0 (1280 bytes) for connection e66a191508b99d4874a080c9e58037, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: e66a191508b99d4874a080c9e58037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:05 client -> Sending packet 1 (1280 bytes) for connection e66a191508b99d4874a080c9e58037, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: e66a191508b99d4874a080c9e58037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 1233, Data length: 271, Offset + Data length: 1504} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:05 client -> Sending packet 2 (1280 bytes) for connection e66a191508b99d4874a080c9e58037, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: e66a191508b99d4874a080c9e58037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:05 client -> Sending packet 3 (1280 bytes) for connection e66a191508b99d4874a080c9e58037, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: e66a191508b99d4874a080c9e58037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 1233, Data length: 271, Offset + Data length: 1504} 2025/09/12 12:22:05 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:05 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 13c4bdc9ffc348f5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:05 client Received first packet. Switching destination connection ID to: 13c4bdc9ffc348f5 2025/09/12 12:22:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.816ms} 2025/09/12 12:22:05 client newly acked packets (1): [2] 2025/09/12 12:22:05 client updated RTT: 34.741669ms (σ: 17.370834ms) 2025/09/12 12:22:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:05 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:05 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:05 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 286 bytes. 2025/09/12 12:22:05 client <- Reading packet 2 (778 bytes) for connection (empty), Handshake 2025/09/12 12:22:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 13c4bdc9ffc348f5, PacketNumber: 2, PacketNumberLen: 2, Length: 761, Version: v1} 2025/09/12 12:22:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 12:22:05 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:05 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e66a191508b99d4874a080c9e58037, InitialSourceConnectionID: 13c4bdc9ffc348f5, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xc34d9f8617bffaac39ac064da385b262, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:05 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e66a191508b99d4874a080c9e58037 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: 13c4bdc9ffc348f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:22:05 client Long Header{Type: Handshake, DestConnectionID: 13c4bdc9ffc348f5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:05 client Dropping Initial keys. 2025/09/12 12:22:05 client -> Sending packet 1 (86 bytes) for connection e66a191508b99d4874a080c9e58037, Handshake 2025/09/12 12:22:05 client Long Header{Type: Handshake, DestConnectionID: 13c4bdc9ffc348f5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:05 client Short Header{DestConnectionID: 13c4bdc9ffc348f5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:05 client <- Reading packet 4 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:05 client Dropping Handshake keys. 2025/09/12 12:22:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 95c8db93609204bf, StatelessResetToken: 0x2bb443fc1fb4724abb93c16b8b2e3c8b} 2025/09/12 12:22:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f157278c32ff9936, StatelessResetToken: 0x08129e965ca97f68612b82242c2aa0f3} 2025/09/12 12:22:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c2ae289174641eeb, StatelessResetToken: 0x9cec68f11eab8fe94de59ada742cf781} 2025/09/12 12:22:05 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:05 client -> Sending packet 1 (34 bytes) for connection e66a191508b99d4874a080c9e58037, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 95c8db93609204bf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 100.428µs} 2025/09/12 12:22:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:05 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 12:22:05 client newly acked packets (1): [0] 2025/09/12 12:22:05 client updated RTT: 34.614ms (σ: 13.28ms) 2025/09/12 12:22:05 client <- Reading packet 6 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:05 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:05 client -> Sending packet 2 (30 bytes) for connection e66a191508b99d4874a080c9e58037, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 95c8db93609204bf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:05 client Connection e66a191508b99d4874a080c9e58037 closed. 2025/09/12 12:22:05 Requesting https://server4:443/qrsteaelqf. 2025/09/12 12:22:05 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:05 Increased send buffer size to 14336 kiB 2025/09/12 12:22:05 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:05 Created qlog file: /logs/qlog/87047e2ce57b02be02.sqlog 2025/09/12 12:22:05 client Starting new connection to server4 ([::]:35182 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 87047e2ce57b02be02, version v1 2025/09/12 12:22:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:05 client -> Sending packet 0 (1280 bytes) for connection 87047e2ce57b02be02, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: 87047e2ce57b02be02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:05 client -> Sending packet 1 (1280 bytes) for connection 87047e2ce57b02be02, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: 87047e2ce57b02be02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 12:22:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:05 client -> Sending packet 2 (1280 bytes) for connection 87047e2ce57b02be02, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: 87047e2ce57b02be02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 12:22:05 client -> Sending packet 3 (1280 bytes) for connection 87047e2ce57b02be02, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: 87047e2ce57b02be02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 12:22:05 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 12:22:05 client <- Reading packet 3 (138 bytes) for connection (empty), Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dadfe6cc36d214b9, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 12:22:05 client Received first packet. Switching destination connection ID to: dadfe6cc36d214b9 2025/09/12 12:22:05 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.504ms} 2025/09/12 12:22:05 client newly acked packets (2): [2 3] 2025/09/12 12:22:05 client updated RTT: 35.328072ms (σ: 17.664036ms) 2025/09/12 12:22:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:05 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:05 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:05 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 289 bytes. 2025/09/12 12:22:05 client <- Reading packet 4 (773 bytes) for connection (empty), Handshake 2025/09/12 12:22:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dadfe6cc36d214b9, PacketNumber: 4, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 12:22:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 12:22:05 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:05 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 87047e2ce57b02be02, InitialSourceConnectionID: dadfe6cc36d214b9, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x430ed3b44b9719580a7a3242b60b9779, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:05 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 87047e2ce57b02be02 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: dadfe6cc36d214b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 12:22:05 client Long Header{Type: Handshake, DestConnectionID: dadfe6cc36d214b9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:05 client Dropping Initial keys. 2025/09/12 12:22:05 client -> Sending packet 1 (40 bytes) for connection 87047e2ce57b02be02, Handshake 2025/09/12 12:22:05 client Long Header{Type: Handshake, DestConnectionID: dadfe6cc36d214b9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 12:22:05 client -> Sending packet 0 (46 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: dadfe6cc36d214b9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:05 client -> Sending packet 2 (90 bytes) for connection 87047e2ce57b02be02, Handshake 2025/09/12 12:22:05 client Long Header{Type: Handshake, DestConnectionID: dadfe6cc36d214b9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:05 client -> Sending packet 3 (90 bytes) for connection 87047e2ce57b02be02, Handshake 2025/09/12 12:22:05 client Long Header{Type: Handshake, DestConnectionID: dadfe6cc36d214b9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:05 client <- Reading packet 5 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:05 client Dropping Handshake keys. 2025/09/12 12:22:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1a0c3ef7988516c8, StatelessResetToken: 0xaf82a92c6c1772990f10b02165573fd8} 2025/09/12 12:22:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1ce5c414c8841feb, StatelessResetToken: 0x68ba636af8e621209c66daa974358a3b} 2025/09/12 12:22:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 020587d6a8096381, StatelessResetToken: 0x1d2f4624529f5a07954fdc064452b07d} 2025/09/12 12:22:05 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:05 client -> Sending packet 2 (53 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 1a0c3ef7988516c8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 121.597µs} 2025/09/12 12:22:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:05 client -> Sending packet 3 (48 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 1a0c3ef7988516c8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:05 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.PingFrame{} 2025/09/12 12:22:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:05 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:05 client -> Sending packet 4 (33 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 1a0c3ef7988516c8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 25.355829ms} 2025/09/12 12:22:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:22:05 client -> Sending packet 6 (48 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 1a0c3ef7988516c8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:05 client -> Sending packet 7 (48 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 1a0c3ef7988516c8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:05 client -> Sending packet 8 (1366 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 1a0c3ef7988516c8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.PingFrame{} 2025/09/12 12:22:05 client <- Reading packet 7 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cd8a3f40c8bb85f7, StatelessResetToken: 0xf9762993acb6e03083b7df8748303a0c} 2025/09/12 12:22:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:05 client <- Reading packet 8 (27 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 104µs} 2025/09/12 12:22:05 client newly acked packets (1): [7] 2025/09/12 12:22:05 client updated RTT: 34.928ms (σ: 14.047ms) 2025/09/12 12:22:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:05 client Canceling loss detection timer. 2025/09/12 12:22:05 client <- &wire.PingFrame{} 2025/09/12 12:22:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:22:05 client -> Sending packet 9 (32 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 1a0c3ef7988516c8, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, DelayTime: 148.877µs} 2025/09/12 12:22:05 client <- Reading packet 9 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:05 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:05 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:05 client -> Sending packet 10 (30 bytes) for connection 87047e2ce57b02be02, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:05 client Short Header{DestConnectionID: 1a0c3ef7988516c8, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:05 client Connection 87047e2ce57b02be02 closed. 2025/09/12 12:22:05 Requesting https://server4:443/oiqtmhstem. 2025/09/12 12:22:05 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:05 Increased send buffer size to 14336 kiB 2025/09/12 12:22:05 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:05 Created qlog file: /logs/qlog/ef761d45cc9fbd3ea4.sqlog 2025/09/12 12:22:05 client Starting new connection to server4 ([::]:47894 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ef761d45cc9fbd3ea4, version v1 2025/09/12 12:22:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:05 client -> Sending packet 0 (1280 bytes) for connection ef761d45cc9fbd3ea4, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: ef761d45cc9fbd3ea4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 12:22:05 client -> Sending packet 1 (1280 bytes) for connection ef761d45cc9fbd3ea4, Initial 2025/09/12 12:22:05 client Long Header{Type: Initial, DestConnectionID: ef761d45cc9fbd3ea4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 277, Offset + Data length: 1516} 2025/09/12 12:22:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:06 client -> Sending packet 2 (1280 bytes) for connection ef761d45cc9fbd3ea4, Initial 2025/09/12 12:22:06 client Long Header{Type: Initial, DestConnectionID: ef761d45cc9fbd3ea4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 12:22:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 12:22:06 client -> Sending packet 3 (1280 bytes) for connection ef761d45cc9fbd3ea4, Initial 2025/09/12 12:22:06 client Long Header{Type: Initial, DestConnectionID: ef761d45cc9fbd3ea4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 12:22:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:06 client -> &wire.CryptoFrame{Offset: 1239, Data length: 277, Offset + Data length: 1516} 2025/09/12 12:22:06 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:06 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5be99561f8407ce1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:06 client Received first packet. Switching destination connection ID to: 5be99561f8407ce1 2025/09/12 12:22:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.672ms} 2025/09/12 12:22:06 client newly acked packets (1): [2] 2025/09/12 12:22:06 client updated RTT: 34.574724ms (σ: 17.287362ms) 2025/09/12 12:22:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:06 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:06 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:06 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 290 bytes. 2025/09/12 12:22:06 client <- Reading packet 2 (774 bytes) for connection (empty), Handshake 2025/09/12 12:22:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5be99561f8407ce1, PacketNumber: 2, PacketNumberLen: 2, Length: 757, Version: v1} 2025/09/12 12:22:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 12:22:06 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:06 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ef761d45cc9fbd3ea4, InitialSourceConnectionID: 5be99561f8407ce1, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xc49ad024783ee905bacda132a963939e, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:06 client Dropping %!s(logging.PacketType=5) packet (290 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ef761d45cc9fbd3ea4 2025/09/12 12:22:06 client Long Header{Type: Initial, DestConnectionID: 5be99561f8407ce1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:22:06 client Long Header{Type: Handshake, DestConnectionID: 5be99561f8407ce1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:06 client Dropping Initial keys. 2025/09/12 12:22:06 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/09/12 12:22:06 client -> Sending packet 1 (86 bytes) for connection ef761d45cc9fbd3ea4, Handshake 2025/09/12 12:22:06 client Long Header{Type: Handshake, DestConnectionID: 5be99561f8407ce1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:06 client Short Header{DestConnectionID: 5be99561f8407ce1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:06 client -> Sending packet 2 (90 bytes) for connection ef761d45cc9fbd3ea4, Handshake 2025/09/12 12:22:06 client Long Header{Type: Handshake, DestConnectionID: 5be99561f8407ce1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:06 client -> Sending packet 3 (90 bytes) for connection ef761d45cc9fbd3ea4, Handshake 2025/09/12 12:22:06 client Long Header{Type: Handshake, DestConnectionID: 5be99561f8407ce1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:06 client <- Reading packet 4 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:06 client Dropping Handshake keys. 2025/09/12 12:22:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00af5c6fdcc58f41, StatelessResetToken: 0x30e87250547a662afceefc12df8f8831} 2025/09/12 12:22:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b3827a131809895b, StatelessResetToken: 0x6393a5a0f9a75b1ba35e2b79e15b16b7} 2025/09/12 12:22:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 631db5685c02bdbb, StatelessResetToken: 0x7a1d0408e1ff60112aff0311df40b6ef} 2025/09/12 12:22:06 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:06 client -> Sending packet 2 (53 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:06 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 134.811µs} 2025/09/12 12:22:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:06 client -> Sending packet 3 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:06 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:22:06 client -> Sending packet 5 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:06 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:06 client -> Sending packet 6 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:06 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:06 client -> Sending packet 7 (1366 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:06 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client -> &wire.PingFrame{} 2025/09/12 12:22:06 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:06 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client <- &wire.PingFrame{} 2025/09/12 12:22:06 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:06 client -> Sending packet 8 (34 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:06 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:06 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 103.443µs} 2025/09/12 12:22:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 12:22:07 client -> Sending packet 10 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:07 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:07 client -> Sending packet 11 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:07 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:07 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:07 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:07 client <- &wire.PingFrame{} 2025/09/12 12:22:07 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:07 client -> Sending packet 12 (36 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:07 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:07 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 4, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 130.724µs} 2025/09/12 12:22:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 12:22:08 client -> Sending packet 14 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:08 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:08 client -> Sending packet 15 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:08 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:08 client <- Reading packet 12 (29 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:08 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 7, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}}, DelayTime: 1.4ms} 2025/09/12 12:22:08 client newly acked packets (1): [7] 2025/09/12 12:22:08 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:08 client -> Sending packet 16 (1409 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:08 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client -> &wire.PingFrame{} 2025/09/12 12:22:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:08 client -> Sending packet 18 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:08 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:08 client -> Sending packet 19 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:08 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:08 client <- Reading packet 13 (31 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:08 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 7, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}}, DelayTime: 1.424ms} 2025/09/12 12:22:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:22:08 client -> Sending packet 21 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:08 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:08 client -> Sending packet 22 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:08 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:08 client <- Reading packet 14 (33 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:08 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:08 client <- &wire.AckFrame{LargestAcked: 21, LowestAcked: 7, AckRanges: {{Largest: 21, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}}, DelayTime: 1.44ms} 2025/09/12 12:22:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 12:22:09 client -> Sending packet 24 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:09 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:09 client -> Sending packet 25 (48 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:09 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:09 client <- Reading packet 16 (36 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:09 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:09 client <- &wire.AckFrame{LargestAcked: 25, LowestAcked: 7, AckRanges: {{Largest: 25, Smallest: 25}, {Largest: 21, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}}, DelayTime: 1.48ms} 2025/09/12 12:22:09 client newly acked packets (1): [25] 2025/09/12 12:22:09 client updated RTT: 34.344ms (σ: 13.425ms) 2025/09/12 12:22:09 client lost packet 16 (time threshold) 2025/09/12 12:22:09 client Canceling loss detection timer. 2025/09/12 12:22:09 client <- &wire.PingFrame{} 2025/09/12 12:22:09 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:09 client -> Sending packet 26 (1387 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:09 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:09 client -> &wire.PingFrame{} 2025/09/12 12:22:09 client -> Sending packet 27 (38 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:09 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:09 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 4, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 211.906µs} 2025/09/12 12:22:09 client <- Reading packet 17 (35 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:09 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:09 client <- &wire.AckFrame{LargestAcked: 26, LowestAcked: 7, AckRanges: {{Largest: 26, Smallest: 25}, {Largest: 21, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}}, DelayTime: 1.296ms} 2025/09/12 12:22:09 client newly acked packets (1): [26] 2025/09/12 12:22:09 client updated RTT: 34.192ms (σ: 10.372ms) 2025/09/12 12:22:11 client <- Reading packet 18 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:11 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:11 client <- &wire.PingFrame{} 2025/09/12 12:22:11 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:11 client -> Sending packet 28 (1419 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:11 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:11 client -> &wire.PingFrame{} 2025/09/12 12:22:11 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:11 client -> Sending packet 29 (39 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:11 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:11 client -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 4, AckRanges: {{Largest: 18, Smallest: 16}, {Largest: 14, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 25.354161ms} 2025/09/12 12:22:15 client <- Reading packet 19 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:15 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client <- &wire.PingFrame{} 2025/09/12 12:22:15 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:15 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:15 client -> Sending packet 30 (39 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:15 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 4, AckRanges: {{Largest: 19, Smallest: 16}, {Largest: 14, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 25.350657ms} 2025/09/12 12:22:15 client <- Reading packet 21 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:15 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client <- &wire.PingFrame{} 2025/09/12 12:22:15 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:15 client -> Sending packet 31 (40 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:15 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 4, AckRanges: {{Largest: 21, Smallest: 21}, {Largest: 19, Smallest: 16}, {Largest: 14, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 97.071µs} 2025/09/12 12:22:15 client <- Reading packet 22 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:15 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client <- &wire.PingFrame{} 2025/09/12 12:22:15 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:15 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:15 client -> Sending packet 32 (41 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:15 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 4, AckRanges: {{Largest: 22, Smallest: 21}, {Largest: 19, Smallest: 16}, {Largest: 14, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 25.325271ms} 2025/09/12 12:22:15 client <- Reading packet 23 (1075 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:15 client Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 072e81c5fcea14e0, StatelessResetToken: 0x20f250b6b70af1132a7b9364c21cbafd} 2025/09/12 12:22:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:15 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:15 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:15 client -> Sending packet 33 (30 bytes) for connection ef761d45cc9fbd3ea4, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:15 client Short Header{DestConnectionID: 00af5c6fdcc58f41, PacketNumber: 33, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:15 client Connection ef761d45cc9fbd3ea4 closed. 2025/09/12 12:22:15 Requesting https://server4:443/aywuffgrtp. 2025/09/12 12:22:15 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:15 Increased send buffer size to 14336 kiB 2025/09/12 12:22:15 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:15 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:15 Created qlog file: /logs/qlog/fae072b77ca3e283f497ac9ee3ba555313e7.sqlog 2025/09/12 12:22:15 client Starting new connection to server4 ([::]:40837 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fae072b77ca3e283f497ac9ee3ba555313e7, version v1 2025/09/12 12:22:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:15 client -> Sending packet 0 (1280 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, Initial 2025/09/12 12:22:15 client Long Header{Type: Initial, DestConnectionID: fae072b77ca3e283f497ac9ee3ba555313e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 12:22:15 client -> Sending packet 1 (1280 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, Initial 2025/09/12 12:22:15 client Long Header{Type: Initial, DestConnectionID: fae072b77ca3e283f497ac9ee3ba555313e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:15 client -> &wire.CryptoFrame{Offset: 1230, Data length: 288, Offset + Data length: 1518} 2025/09/12 12:22:15 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:15 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 96e709efd410ba65, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:15 client Received first packet. Switching destination connection ID to: 96e709efd410ba65 2025/09/12 12:22:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 712µs} 2025/09/12 12:22:15 client newly acked packets (1): [0] 2025/09/12 12:22:15 client updated RTT: 33.749445ms (σ: 16.874722ms) 2025/09/12 12:22:15 client <- &wire.PingFrame{} 2025/09/12 12:22:15 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:15 client -> Sending packet 2 (1280 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, Initial 2025/09/12 12:22:15 client Long Header{Type: Initial, DestConnectionID: 96e709efd410ba65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:15 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:15 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 96e709efd410ba65, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:15 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.256ms} 2025/09/12 12:22:15 client newly acked packets (1): [1] 2025/09/12 12:22:15 client updated RTT: 33.92ms (σ: 12.997ms) 2025/09/12 12:22:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:15 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:15 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:15 client Parsed a coalesced packet. Part 2: 782 bytes. Remaining: 282 bytes. 2025/09/12 12:22:15 client <- Reading packet 2 (782 bytes) for connection (empty), Handshake 2025/09/12 12:22:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 96e709efd410ba65, PacketNumber: 2, PacketNumberLen: 2, Length: 765, Version: v1} 2025/09/12 12:22:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/09/12 12:22:15 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:15 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fae072b77ca3e283f497ac9ee3ba555313e7, InitialSourceConnectionID: 96e709efd410ba65, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1b3734a9b248985740388c8eb2d77ba2, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:15 client Dropping %!s(logging.PacketType=5) packet (282 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7 2025/09/12 12:22:15 client Long Header{Type: Initial, DestConnectionID: 96e709efd410ba65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:15 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:15 client Long Header{Type: Handshake, DestConnectionID: 96e709efd410ba65, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:15 client Dropping Initial keys. 2025/09/12 12:22:15 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:15 client -> Sending packet 1 (86 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, Handshake 2025/09/12 12:22:15 client Long Header{Type: Handshake, DestConnectionID: 96e709efd410ba65, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:15 client Short Header{DestConnectionID: 96e709efd410ba65, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:15 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:15 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:15 client Dropping Handshake keys. 2025/09/12 12:22:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d24a69a483663423, StatelessResetToken: 0x34ec34f90d4892ad25aa7c0ac53c553c} 2025/09/12 12:22:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dc8c827cf8e4ad12, StatelessResetToken: 0xfeb46746ba4190a1e912f6f81b7f2315} 2025/09/12 12:22:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 88027367d29f58ba, StatelessResetToken: 0xa9cfb12a9520f879fa37206bfc9ba0f0} 2025/09/12 12:22:15 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:15 client -> Sending packet 1 (34 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:15 client Short Header{DestConnectionID: d24a69a483663423, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 105.957µs} 2025/09/12 12:22:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:15 client -> Sending packet 3 (46 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:15 client Short Header{DestConnectionID: d24a69a483663423, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:15 client Skipping packet number 2 2025/09/12 12:22:15 client -> Sending packet 4 (29 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:15 client Short Header{DestConnectionID: d24a69a483663423, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:15 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:15 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7498e09208813c74, StatelessResetToken: 0x4ad07562770e63f43ba4c2e47749ffae} 2025/09/12 12:22:15 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:15 client -> Sending packet 5 (34 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:15 client Short Header{DestConnectionID: d24a69a483663423, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 80.179µs} 2025/09/12 12:22:15 client <- Reading packet 6 (24 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:15 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:15 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 376µs} 2025/09/12 12:22:15 client newly acked packets (2): [3 4] 2025/09/12 12:22:15 client updated RTT: 33.689ms (σ: 10.209ms) 2025/09/12 12:22:15 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:15 client Canceling loss detection timer. 2025/09/12 12:22:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:16 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:16 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:16 client <- &wire.PingFrame{} 2025/09/12 12:22:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:16 client -> Sending packet 6 (1366 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:16 client Short Header{DestConnectionID: d24a69a483663423, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:16 client -> &wire.PingFrame{} 2025/09/12 12:22:16 client -> Sending packet 7 (36 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:16 client Short Header{DestConnectionID: d24a69a483663423, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:16 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 188.532µs} 2025/09/12 12:22:17 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:17 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:17 client <- &wire.PingFrame{} 2025/09/12 12:22:17 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:17 client -> Sending packet 8 (38 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:17 client Short Header{DestConnectionID: d24a69a483663423, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:17 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 3, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 120.024µs} 2025/09/12 12:22:17 client <- Reading packet 12 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:17 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:17 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:17 client -> Sending packet 9 (30 bytes) for connection fae072b77ca3e283f497ac9ee3ba555313e7, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:17 client Short Header{DestConnectionID: d24a69a483663423, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:17 client Connection fae072b77ca3e283f497ac9ee3ba555313e7 closed. 2025/09/12 12:22:17 Requesting https://server4:443/ecrciaggug. 2025/09/12 12:22:17 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:17 Increased send buffer size to 14336 kiB 2025/09/12 12:22:17 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:17 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:17 Created qlog file: /logs/qlog/6d27019feb84648db3990aef67c3c1373d.sqlog 2025/09/12 12:22:17 client Starting new connection to server4 ([::]:44473 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6d27019feb84648db3990aef67c3c1373d, version v1 2025/09/12 12:22:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:17 client -> Sending packet 0 (1280 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Initial 2025/09/12 12:22:17 client Long Header{Type: Initial, DestConnectionID: 6d27019feb84648db3990aef67c3c1373d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:22:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:22:17 client -> Sending packet 1 (1280 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Initial 2025/09/12 12:22:17 client Long Header{Type: Initial, DestConnectionID: 6d27019feb84648db3990aef67c3c1373d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:22:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:17 client -> &wire.CryptoFrame{Offset: 1231, Data length: 283, Offset + Data length: 1514} 2025/09/12 12:22:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:17 client -> Sending packet 2 (1280 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Initial 2025/09/12 12:22:17 client Long Header{Type: Initial, DestConnectionID: 6d27019feb84648db3990aef67c3c1373d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:22:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:22:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:17 client -> Sending packet 3 (1280 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Initial 2025/09/12 12:22:17 client Long Header{Type: Initial, DestConnectionID: 6d27019feb84648db3990aef67c3c1373d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:22:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:17 client -> &wire.CryptoFrame{Offset: 1231, Data length: 283, Offset + Data length: 1514} 2025/09/12 12:22:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:18 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3604e78afade0fd8, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:18 client Received first packet. Switching destination connection ID to: 3604e78afade0fd8 2025/09/12 12:22:18 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 280µs} 2025/09/12 12:22:18 client newly acked packets (1): [2] 2025/09/12 12:22:18 client updated RTT: 33.817553ms (σ: 16.908776ms) 2025/09/12 12:22:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 12:22:18 client -> Sending packet 4 (1280 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: 3604e78afade0fd8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 1231, Data length: 283, Offset + Data length: 1514} 2025/09/12 12:22:18 client -> Sending packet 5 (1280 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: 3604e78afade0fd8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 1231, Data length: 283, Offset + Data length: 1514} 2025/09/12 12:22:18 client <- Reading packet 7 (41 bytes) for connection (empty), Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3604e78afade0fd8, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:18 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 360µs} 2025/09/12 12:22:18 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:22:18 client <- Reading packet 8 (130 bytes) for connection (empty), Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3604e78afade0fd8, Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:22:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:18 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:18 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:18 client Parsed a coalesced packet. Part 2: 780 bytes. Remaining: 290 bytes. 2025/09/12 12:22:18 client <- Reading packet 9 (780 bytes) for connection (empty), Handshake 2025/09/12 12:22:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3604e78afade0fd8, PacketNumber: 9, PacketNumberLen: 2, Length: 763, Version: v1} 2025/09/12 12:22:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 12:22:18 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:18 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6d27019feb84648db3990aef67c3c1373d, InitialSourceConnectionID: 3604e78afade0fd8, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xded95408b18b0e7a4c3652e7c0f4f51f, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:18 client Dropping %!s(logging.PacketType=5) packet (290 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d27019feb84648db3990aef67c3c1373d 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: 3604e78afade0fd8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 12:22:18 client Long Header{Type: Handshake, DestConnectionID: 3604e78afade0fd8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:18 client Dropping Initial keys. 2025/09/12 12:22:18 client -> Sending packet 1 (40 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Handshake 2025/09/12 12:22:18 client Long Header{Type: Handshake, DestConnectionID: 3604e78afade0fd8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 0s} 2025/09/12 12:22:18 client -> Sending packet 0 (46 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 3604e78afade0fd8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:18 client -> Sending packet 2 (90 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Handshake 2025/09/12 12:22:18 client Long Header{Type: Handshake, DestConnectionID: 3604e78afade0fd8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:18 client -> Sending packet 3 (90 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, Handshake 2025/09/12 12:22:18 client Long Header{Type: Handshake, DestConnectionID: 3604e78afade0fd8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:18 client <- Reading packet 10 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:18 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:18 client Dropping Handshake keys. 2025/09/12 12:22:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2f775d2d5bda9054, StatelessResetToken: 0x980d9debc6eb38d5fde20554ba219bf2} 2025/09/12 12:22:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe5443b02424dfb2, StatelessResetToken: 0x05b38ee2526fa6de259c81d12edd9027} 2025/09/12 12:22:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8af8c662c0e586b3, StatelessResetToken: 0x8afedef3a7bbd64d6a7ba0f390a92b6a} 2025/09/12 12:22:18 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:18 client -> Sending packet 2 (53 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 2f775d2d5bda9054, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 126.967µs} 2025/09/12 12:22:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:18 client -> Sending packet 3 (48 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 2f775d2d5bda9054, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:18 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:18 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client <- &wire.PingFrame{} 2025/09/12 12:22:18 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:18 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:18 client -> Sending packet 4 (33 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 2f775d2d5bda9054, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 10, DelayTime: 25.28742ms} 2025/09/12 12:22:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:22:18 client -> Sending packet 6 (48 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 2f775d2d5bda9054, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:18 client -> Sending packet 7 (48 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 2f775d2d5bda9054, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:18 client -> Sending packet 8 (1366 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 2f775d2d5bda9054, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.PingFrame{} 2025/09/12 12:22:18 client <- Reading packet 13 (26 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:18 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 128µs} 2025/09/12 12:22:18 client newly acked packets (2): [7 8] 2025/09/12 12:22:18 client updated RTT: 33.61ms (σ: 13.093ms) 2025/09/12 12:22:18 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:18 client Canceling loss detection timer. 2025/09/12 12:22:18 client <- Reading packet 14 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:18 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:18 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:18 client -> Sending packet 9 (34 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 2f775d2d5bda9054, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 10, AckRanges: {{Largest: 14, Smallest: 13}, {Largest: 11, Smallest: 10}}, DelayTime: 71.764µs} 2025/09/12 12:22:18 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:18 client -> Sending packet 10 (30 bytes) for connection 6d27019feb84648db3990aef67c3c1373d, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:18 client Short Header{DestConnectionID: 2f775d2d5bda9054, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:18 client Connection 6d27019feb84648db3990aef67c3c1373d closed. 2025/09/12 12:22:18 Requesting https://server4:443/ijabymnbdu. 2025/09/12 12:22:18 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:18 Increased send buffer size to 14336 kiB 2025/09/12 12:22:18 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:18 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:18 Created qlog file: /logs/qlog/e05c282d58f5003655846ef1eabeb8.sqlog 2025/09/12 12:22:18 client Starting new connection to server4 ([::]:54255 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e05c282d58f5003655846ef1eabeb8, version v1 2025/09/12 12:22:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:18 client -> Sending packet 0 (1280 bytes) for connection e05c282d58f5003655846ef1eabeb8, Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: e05c282d58f5003655846ef1eabeb8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 12:22:18 client -> Sending packet 1 (1280 bytes) for connection e05c282d58f5003655846ef1eabeb8, Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: e05c282d58f5003655846ef1eabeb8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:18 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:18 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ae370edf6641622c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:18 client Received first packet. Switching destination connection ID to: ae370edf6641622c 2025/09/12 12:22:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680µs} 2025/09/12 12:22:18 client newly acked packets (1): [0] 2025/09/12 12:22:18 client updated RTT: 33.465174ms (σ: 16.732587ms) 2025/09/12 12:22:18 client <- &wire.PingFrame{} 2025/09/12 12:22:18 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:18 client -> Sending packet 2 (1280 bytes) for connection e05c282d58f5003655846ef1eabeb8, Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: ae370edf6641622c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:18 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:18 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ae370edf6641622c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.512ms} 2025/09/12 12:22:18 client newly acked packets (1): [1] 2025/09/12 12:22:18 client updated RTT: 33.679ms (σ: 12.978ms) 2025/09/12 12:22:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:18 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:18 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:18 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 285 bytes. 2025/09/12 12:22:18 client <- Reading packet 2 (779 bytes) for connection (empty), Handshake 2025/09/12 12:22:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ae370edf6641622c, PacketNumber: 2, PacketNumberLen: 2, Length: 762, Version: v1} 2025/09/12 12:22:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 12:22:18 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:18 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e05c282d58f5003655846ef1eabeb8, InitialSourceConnectionID: ae370edf6641622c, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x6e81fb8ffb2236aa1074c3b4d69cf86f, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:18 client Dropping %!s(logging.PacketType=5) packet (285 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e05c282d58f5003655846ef1eabeb8 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: ae370edf6641622c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:18 client Long Header{Type: Handshake, DestConnectionID: ae370edf6641622c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:18 client Dropping Initial keys. 2025/09/12 12:22:18 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:18 client -> Sending packet 1 (40 bytes) for connection e05c282d58f5003655846ef1eabeb8, Handshake 2025/09/12 12:22:18 client Long Header{Type: Handshake, DestConnectionID: ae370edf6641622c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:18 client -> Sending packet 0 (46 bytes) for connection e05c282d58f5003655846ef1eabeb8, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: ae370edf6641622c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:18 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:18 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:18 client Dropping Handshake keys. 2025/09/12 12:22:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cd3a42bccda5b754, StatelessResetToken: 0x77323ba7bc6f4f6a502a679d32a171f4} 2025/09/12 12:22:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2ab9a39e6a7066f5, StatelessResetToken: 0x886df3dd97bb86ba9c78ffc941ea0cf8} 2025/09/12 12:22:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c10483d6b5b4dc78, StatelessResetToken: 0xd43f5a2ce241e3c92107f7d717c55906} 2025/09/12 12:22:18 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:18 client -> Sending packet 1 (34 bytes) for connection e05c282d58f5003655846ef1eabeb8, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:18 client Short Header{DestConnectionID: cd3a42bccda5b754, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 109.374µs} 2025/09/12 12:22:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:18 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:18 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.08ms} 2025/09/12 12:22:18 client newly acked packets (1): [0] 2025/09/12 12:22:18 client updated RTT: 33.663ms (σ: 9.764ms) 2025/09/12 12:22:18 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:18 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:18 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:18 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:18 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:18 client -> Sending packet 2 (30 bytes) for connection e05c282d58f5003655846ef1eabeb8, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:18 client Short Header{DestConnectionID: cd3a42bccda5b754, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:18 client Connection e05c282d58f5003655846ef1eabeb8 closed. 2025/09/12 12:22:18 Requesting https://server4:443/tjevnvaldi. 2025/09/12 12:22:18 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:18 Increased send buffer size to 14336 kiB 2025/09/12 12:22:18 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:18 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:18 Created qlog file: /logs/qlog/fc722a7e539f3a2a.sqlog 2025/09/12 12:22:18 client Starting new connection to server4 ([::]:38349 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fc722a7e539f3a2a, version v1 2025/09/12 12:22:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:18 client -> Sending packet 0 (1280 bytes) for connection fc722a7e539f3a2a, Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: fc722a7e539f3a2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 12:22:18 client -> Sending packet 1 (1280 bytes) for connection fc722a7e539f3a2a, Initial 2025/09/12 12:22:18 client Long Header{Type: Initial, DestConnectionID: fc722a7e539f3a2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 1240, Data length: 273, Offset + Data length: 1513} 2025/09/12 12:22:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:19 client -> Sending packet 2 (1280 bytes) for connection fc722a7e539f3a2a, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: fc722a7e539f3a2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 12:22:19 client -> Sending packet 3 (1280 bytes) for connection fc722a7e539f3a2a, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: fc722a7e539f3a2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 1240, Data length: 273, Offset + Data length: 1513} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:19 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4a252b2d095d4582, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:19 client Received first packet. Switching destination connection ID to: 4a252b2d095d4582 2025/09/12 12:22:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 376µs} 2025/09/12 12:22:19 client newly acked packets (1): [2] 2025/09/12 12:22:19 client updated RTT: 32.508381ms (σ: 16.25419ms) 2025/09/12 12:22:19 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:22:19 client <- Reading packet 4 (130 bytes) for connection (empty), Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4a252b2d095d4582, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:22:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:19 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 298 bytes. 2025/09/12 12:22:19 client <- Reading packet 5 (772 bytes) for connection (empty), Handshake 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4a252b2d095d4582, PacketNumber: 5, PacketNumberLen: 2, Length: 755, Version: v1} 2025/09/12 12:22:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 12:22:19 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fc722a7e539f3a2a, InitialSourceConnectionID: 4a252b2d095d4582, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1afed55667a84c5ae468dc88401eb336, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:19 client Dropping %!s(logging.PacketType=5) packet (298 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fc722a7e539f3a2a 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 4a252b2d095d4582, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: 4a252b2d095d4582, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:19 client Dropping Initial keys. 2025/09/12 12:22:19 client -> Sending packet 1 (86 bytes) for connection fc722a7e539f3a2a, Handshake 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: 4a252b2d095d4582, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 12:22:19 client Short Header{DestConnectionID: 4a252b2d095d4582, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:19 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:19 client Dropping Handshake keys. 2025/09/12 12:22:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5a0a60feb0b7441e, StatelessResetToken: 0xd94f3c4a241cc490e73e4af3d493adad} 2025/09/12 12:22:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6352c6e2d1cad035, StatelessResetToken: 0x8d686faa2215b10c61e4d68ab0da32ac} 2025/09/12 12:22:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0861df279119b535, StatelessResetToken: 0x79eb2c59e22535f962f367661a8b9f7b} 2025/09/12 12:22:19 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:19 client -> Sending packet 1 (34 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 142.487µs} 2025/09/12 12:22:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:19 client -> Sending packet 3 (46 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:19 client Skipping packet number 2 2025/09/12 12:22:19 client -> Sending packet 4 (29 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:19 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.PingFrame{} 2025/09/12 12:22:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:19 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:19 client -> Sending packet 5 (33 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 25.240365ms} 2025/09/12 12:22:19 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8311bdcd61a8e73b, StatelessResetToken: 0x6c21ebcd8182747086714c8caebc4f31} 2025/09/12 12:22:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:19 client <- Reading packet 9 (24 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 432µs} 2025/09/12 12:22:19 client newly acked packets (2): [3 4] 2025/09/12 12:22:19 client updated RTT: 32.429ms (σ: 12.347ms) 2025/09/12 12:22:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:19 client Canceling loss detection timer. 2025/09/12 12:22:19 client -> Sending packet 6 (1366 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.PingFrame{} 2025/09/12 12:22:19 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:19 client -> Sending packet 7 (33 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, DelayTime: 25.289735ms} 2025/09/12 12:22:19 client <- Reading packet 11 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 1.368ms} 2025/09/12 12:22:19 client newly acked packets (1): [6] 2025/09/12 12:22:19 client updated RTT: 32.52ms (σ: 9.442ms) 2025/09/12 12:22:19 client <- Reading packet 12 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.PingFrame{} 2025/09/12 12:22:19 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:19 client -> Sending packet 8 (34 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 6}}, DelayTime: 102.16µs} 2025/09/12 12:22:19 client <- Reading packet 13 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.PingFrame{} 2025/09/12 12:22:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:19 client -> Sending packet 9 (1409 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.PingFrame{} 2025/09/12 12:22:19 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:19 client -> Sending packet 10 (35 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 11}, {Largest: 9, Smallest: 6}}, DelayTime: 25.410541ms} 2025/09/12 12:22:19 client <- Reading packet 14 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:19 client -> Sending packet 11 (30 bytes) for connection fc722a7e539f3a2a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:19 client Short Header{DestConnectionID: 5a0a60feb0b7441e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:19 client Connection fc722a7e539f3a2a closed. 2025/09/12 12:22:19 Requesting https://server4:443/skosvvurql. 2025/09/12 12:22:19 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:19 Increased send buffer size to 14336 kiB 2025/09/12 12:22:19 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:19 Created qlog file: /logs/qlog/87c9dcb0012ee9a9.sqlog 2025/09/12 12:22:19 client Starting new connection to server4 ([::]:50112 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 87c9dcb0012ee9a9, version v1 2025/09/12 12:22:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:19 client -> Sending packet 0 (1280 bytes) for connection 87c9dcb0012ee9a9, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 87c9dcb0012ee9a9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 12:22:19 client -> Sending packet 1 (1280 bytes) for connection 87c9dcb0012ee9a9, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 87c9dcb0012ee9a9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 1240, Data length: 278, Offset + Data length: 1518} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:19 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:19 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fe1ce75db9559a4e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:19 client Received first packet. Switching destination connection ID to: fe1ce75db9559a4e 2025/09/12 12:22:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 712µs} 2025/09/12 12:22:19 client newly acked packets (1): [0] 2025/09/12 12:22:19 client updated RTT: 33.588336ms (σ: 16.794168ms) 2025/09/12 12:22:19 client <- &wire.PingFrame{} 2025/09/12 12:22:19 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:19 client -> Sending packet 2 (1280 bytes) for connection 87c9dcb0012ee9a9, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: fe1ce75db9559a4e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:19 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:19 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fe1ce75db9559a4e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.24ms} 2025/09/12 12:22:19 client newly acked packets (1): [1] 2025/09/12 12:22:19 client updated RTT: 33.763ms (σ: 12.946ms) 2025/09/12 12:22:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:19 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 292 bytes. 2025/09/12 12:22:19 client <- Reading packet 2 (772 bytes) for connection (empty), Handshake 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fe1ce75db9559a4e, PacketNumber: 2, PacketNumberLen: 2, Length: 755, Version: v1} 2025/09/12 12:22:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 12:22:19 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 87c9dcb0012ee9a9, InitialSourceConnectionID: fe1ce75db9559a4e, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xfe278459241dddb60608440f70983749, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:19 client Dropping %!s(logging.PacketType=5) packet (292 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 87c9dcb0012ee9a9 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: fe1ce75db9559a4e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: fe1ce75db9559a4e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:19 client Dropping Initial keys. 2025/09/12 12:22:19 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:19 client -> Sending packet 1 (40 bytes) for connection 87c9dcb0012ee9a9, Handshake 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: fe1ce75db9559a4e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:19 client -> Sending packet 0 (46 bytes) for connection 87c9dcb0012ee9a9, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:19 client Short Header{DestConnectionID: fe1ce75db9559a4e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:19 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.072ms} 2025/09/12 12:22:19 client Peer doesn't await address validation any longer. 2025/09/12 12:22:19 client newly acked packets (1): [0] 2025/09/12 12:22:19 client updated RTT: 33.766ms (σ: 9.716ms) 2025/09/12 12:22:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:19 client Canceling loss detection timer. 2025/09/12 12:22:19 client Dropping Handshake keys. 2025/09/12 12:22:19 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:19 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:19 client -> Sending packet 1 (32 bytes) for connection 87c9dcb0012ee9a9, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:19 client Short Header{DestConnectionID: fe1ce75db9559a4e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 62.938µs} 2025/09/12 12:22:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:19 client -> Sending packet 2 (30 bytes) for connection 87c9dcb0012ee9a9, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:19 client Short Header{DestConnectionID: fe1ce75db9559a4e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:19 client Connection 87c9dcb0012ee9a9 closed. 2025/09/12 12:22:19 Requesting https://server4:443/vrilhbsnum. 2025/09/12 12:22:19 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:19 Increased send buffer size to 14336 kiB 2025/09/12 12:22:19 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:19 Created qlog file: /logs/qlog/3c92f4cb141907dffe07.sqlog 2025/09/12 12:22:19 client Starting new connection to server4 ([::]:55338 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3c92f4cb141907dffe07, version v1 2025/09/12 12:22:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:19 client -> Sending packet 0 (1280 bytes) for connection 3c92f4cb141907dffe07, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 3c92f4cb141907dffe07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 12:22:19 client -> Sending packet 1 (1280 bytes) for connection 3c92f4cb141907dffe07, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 3c92f4cb141907dffe07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 1238, Data length: 280, Offset + Data length: 1518} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:19 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:19 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 478934d0c48eb1e9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:19 client Received first packet. Switching destination connection ID to: 478934d0c48eb1e9 2025/09/12 12:22:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 960µs} 2025/09/12 12:22:19 client newly acked packets (1): [1] 2025/09/12 12:22:19 client updated RTT: 34.818771ms (σ: 17.409385ms) 2025/09/12 12:22:19 client setting loss timer for packet 0 (Initial) to 39.171117ms (in 2025-09-12 12:22:19.90763906 +0000 UTC m=+37.115236989) 2025/09/12 12:22:19 client <- &wire.PingFrame{} 2025/09/12 12:22:19 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:19 client -> Sending packet 2 (1280 bytes) for connection 3c92f4cb141907dffe07, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 478934d0c48eb1e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:19 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 12:22:19.90763906 +0000 UTC m=+37.115236989 2025/09/12 12:22:19 client lost packet 0 (time threshold) 2025/09/12 12:22:19 client -> Sending packet 3 (1280 bytes) for connection 3c92f4cb141907dffe07, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 478934d0c48eb1e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:19 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 12:22:19 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 478934d0c48eb1e9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 12:22:19 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 1.28ms} 2025/09/12 12:22:19 client newly acked packets (1): [3] 2025/09/12 12:22:19 client updated RTT: 34.714ms (σ: 13.264ms) 2025/09/12 12:22:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:19 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 289 bytes. 2025/09/12 12:22:19 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 478934d0c48eb1e9, PacketNumber: 2, PacketNumberLen: 2, Length: 756, Version: v1} 2025/09/12 12:22:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 12:22:19 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3c92f4cb141907dffe07, InitialSourceConnectionID: 478934d0c48eb1e9, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x75d91708c719cbabd8a09b23b1d46db1, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:19 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3c92f4cb141907dffe07 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 478934d0c48eb1e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: 478934d0c48eb1e9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:19 client Dropping Initial keys. 2025/09/12 12:22:19 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:19 client -> Sending packet 1 (86 bytes) for connection 3c92f4cb141907dffe07, Handshake 2025/09/12 12:22:19 client Long Header{Type: Handshake, DestConnectionID: 478934d0c48eb1e9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:19 client Short Header{DestConnectionID: 478934d0c48eb1e9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:19 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:19 client Dropping Handshake keys. 2025/09/12 12:22:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d84ae56a6e0bb490, StatelessResetToken: 0x5b69767dbe8839e1855fbd689c66c6ad} 2025/09/12 12:22:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b032ce58043fbabe, StatelessResetToken: 0x44f0269fec4c6d6e8a29f66f46554348} 2025/09/12 12:22:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e0696c5b2e812cac, StatelessResetToken: 0x54a44ab2676a1d9ce8315ef9ee444b9d} 2025/09/12 12:22:19 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:19 client -> Sending packet 1 (34 bytes) for connection 3c92f4cb141907dffe07, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:19 client Short Header{DestConnectionID: d84ae56a6e0bb490, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 89.808µs} 2025/09/12 12:22:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:19 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:19 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:19 client -> Sending packet 2 (34 bytes) for connection 3c92f4cb141907dffe07, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:19 client Short Header{DestConnectionID: d84ae56a6e0bb490, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 75.281µs} 2025/09/12 12:22:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:19 client -> Sending packet 3 (30 bytes) for connection 3c92f4cb141907dffe07, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:19 client Short Header{DestConnectionID: d84ae56a6e0bb490, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:19 client Connection 3c92f4cb141907dffe07 closed. 2025/09/12 12:22:19 Requesting https://server4:443/vydynadean. 2025/09/12 12:22:19 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:19 Increased send buffer size to 14336 kiB 2025/09/12 12:22:19 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:19 Created qlog file: /logs/qlog/6572b60539bf9ade9146cd69b9fb93719a50.sqlog 2025/09/12 12:22:19 client Starting new connection to server4 ([::]:46898 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6572b60539bf9ade9146cd69b9fb93719a50, version v1 2025/09/12 12:22:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:19 client -> Sending packet 0 (1280 bytes) for connection 6572b60539bf9ade9146cd69b9fb93719a50, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 6572b60539bf9ade9146cd69b9fb93719a50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:19 client -> Sending packet 1 (1280 bytes) for connection 6572b60539bf9ade9146cd69b9fb93719a50, Initial 2025/09/12 12:22:19 client Long Header{Type: Initial, DestConnectionID: 6572b60539bf9ade9146cd69b9fb93719a50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 1230, Data length: 280, Offset + Data length: 1510} 2025/09/12 12:22:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:20 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:20 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d10aaf61d2b3bf0d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:20 client Received first packet. Switching destination connection ID to: d10aaf61d2b3bf0d 2025/09/12 12:22:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.2ms} 2025/09/12 12:22:20 client newly acked packets (2): [0 1] 2025/09/12 12:22:20 client updated RTT: 34.897597ms (σ: 17.448798ms) 2025/09/12 12:22:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:20 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 283 bytes. 2025/09/12 12:22:20 client <- Reading packet 2 (781 bytes) for connection (empty), Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d10aaf61d2b3bf0d, PacketNumber: 2, PacketNumberLen: 2, Length: 764, Version: v1} 2025/09/12 12:22:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 12:22:20 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6572b60539bf9ade9146cd69b9fb93719a50, InitialSourceConnectionID: d10aaf61d2b3bf0d, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x187e4cdedfba53b57fb7ec7cb626049b, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:20 client Dropping %!s(logging.PacketType=5) packet (283 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6572b60539bf9ade9146cd69b9fb93719a50 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: d10aaf61d2b3bf0d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: d10aaf61d2b3bf0d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client Dropping Initial keys. 2025/09/12 12:22:20 client -> Sending packet 1 (86 bytes) for connection 6572b60539bf9ade9146cd69b9fb93719a50, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: d10aaf61d2b3bf0d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:20 client Short Header{DestConnectionID: d10aaf61d2b3bf0d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:20 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:20 client Dropping Handshake keys. 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fa766ea9ca16884e, StatelessResetToken: 0xc9705909737b6ff8d3edba09d9cb8202} 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f253f4dc97d6d75a, StatelessResetToken: 0x70b9ba1d7dc037a61df9ddd1ff24cbda} 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dd65f7afae972a36, StatelessResetToken: 0xf24643fa84469114a728356ef2ad823b} 2025/09/12 12:22:20 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:20 client -> Sending packet 1 (34 bytes) for connection 6572b60539bf9ade9146cd69b9fb93719a50, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:20 client Short Header{DestConnectionID: fa766ea9ca16884e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 113.972µs} 2025/09/12 12:22:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:20 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.04ms} 2025/09/12 12:22:20 client newly acked packets (1): [0] 2025/09/12 12:22:20 client updated RTT: 34.723ms (σ: 13.433ms) 2025/09/12 12:22:20 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:20 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:20 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:20 client -> Sending packet 2 (30 bytes) for connection 6572b60539bf9ade9146cd69b9fb93719a50, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:20 client Short Header{DestConnectionID: fa766ea9ca16884e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:20 client Connection 6572b60539bf9ade9146cd69b9fb93719a50 closed. 2025/09/12 12:22:20 Requesting https://server4:443/oltotdttef. 2025/09/12 12:22:20 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:20 Increased send buffer size to 14336 kiB 2025/09/12 12:22:20 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:20 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:20 Created qlog file: /logs/qlog/263e8a0c0cdc22eb0f470a7d9f6d592c8a.sqlog 2025/09/12 12:22:20 client Starting new connection to server4 ([::]:56501 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 263e8a0c0cdc22eb0f470a7d9f6d592c8a, version v1 2025/09/12 12:22:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:20 client -> Sending packet 0 (1280 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: 263e8a0c0cdc22eb0f470a7d9f6d592c8a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:20 client -> Sending packet 1 (1280 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: 263e8a0c0cdc22eb0f470a7d9f6d592c8a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 286, Offset + Data length: 1517} 2025/09/12 12:22:20 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:20 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2ac983d31ea89b1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:20 client Received first packet. Switching destination connection ID to: b2ac983d31ea89b1 2025/09/12 12:22:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 896µs} 2025/09/12 12:22:20 client newly acked packets (1): [0] 2025/09/12 12:22:20 client updated RTT: 33.776103ms (σ: 16.888051ms) 2025/09/12 12:22:20 client <- &wire.PingFrame{} 2025/09/12 12:22:20 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:20 client -> Sending packet 2 (1280 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:20 client -> Sending packet 3 (1280 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 286, Offset + Data length: 1517} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:20 client -> Sending packet 4 (1280 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 286, Offset + Data length: 1517} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:20 client <- Reading packet 3 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2ac983d31ea89b1, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:20 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 184µs} 2025/09/12 12:22:20 client newly acked packets (1): [4] 2025/09/12 12:22:20 client updated RTT: 33.855ms (σ: 12.825ms) 2025/09/12 12:22:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:20 client -> Sending packet 5 (1280 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:20 client -> &wire.PingFrame{} 2025/09/12 12:22:20 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:22:20 client <- Reading packet 4 (130 bytes) for connection (empty), Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2ac983d31ea89b1, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:22:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:20 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Parsed a coalesced packet. Part 2: 782 bytes. Remaining: 288 bytes. 2025/09/12 12:22:20 client <- Reading packet 5 (782 bytes) for connection (empty), Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2ac983d31ea89b1, PacketNumber: 5, PacketNumberLen: 2, Length: 765, Version: v1} 2025/09/12 12:22:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/09/12 12:22:20 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 263e8a0c0cdc22eb0f470a7d9f6d592c8a, InitialSourceConnectionID: b2ac983d31ea89b1, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xe7d1df45d31c358a0b263ce93389f726, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:20 client Dropping %!s(logging.PacketType=5) packet (288 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client Dropping Initial keys. 2025/09/12 12:22:20 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:20 client -> Sending packet 1 (40 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 12:22:20 client -> Sending packet 0 (46 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:20 client Short Header{DestConnectionID: b2ac983d31ea89b1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:20 client Dropping %!s(logging.PacketType=0) packet (43 bytes) because we already dropped the keys. 2025/09/12 12:22:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:20 client -> Sending packet 2 (90 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client -> Sending packet 3 (90 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.PingFrame{} 2025/09/12 12:22:20 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:20 client -> Sending packet 1 (32 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:20 client Short Header{DestConnectionID: b2ac983d31ea89b1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 110.787µs} 2025/09/12 12:22:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:22:20 client -> Sending packet 4 (90 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client -> Sending packet 5 (90 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: b2ac983d31ea89b1, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client <- Reading packet 9 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:20 client Dropping Handshake keys. 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1b5d1e16cf42adcb, StatelessResetToken: 0x6aeefc2e43357a24a4c04f17b36d1c1d} 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d5471b99e730dd71, StatelessResetToken: 0xd9b3c435d92412d501e9baa51c313980} 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5404b045130e85c0, StatelessResetToken: 0x6590b10fd4bde1b610d20ac02cd0ad26} 2025/09/12 12:22:20 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:20 client -> Sending packet 3 (53 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:20 client Short Header{DestConnectionID: 1b5d1e16cf42adcb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 8, DelayTime: 112.259µs} 2025/09/12 12:22:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:20 client -> Sending packet 4 (48 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:20 client Short Header{DestConnectionID: 1b5d1e16cf42adcb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:20 client <- Reading packet 10 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f364e9c671298abc, StatelessResetToken: 0x36bcffc9662b3759be701affdc0ffa59} 2025/09/12 12:22:20 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:20 client <- Reading packet 11 (27 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 1.12ms} 2025/09/12 12:22:20 client newly acked packets (1): [4] 2025/09/12 12:22:20 client updated RTT: 33.604ms (σ: 10.12ms) 2025/09/12 12:22:20 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:20 client Canceling loss detection timer. 2025/09/12 12:22:20 client <- Reading packet 12 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:20 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:22:20 client -> Sending packet 5 (32 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:20 client Short Header{DestConnectionID: 1b5d1e16cf42adcb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 8, DelayTime: 65.692µs} 2025/09/12 12:22:20 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:20 client -> Sending packet 6 (30 bytes) for connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:20 client Short Header{DestConnectionID: 1b5d1e16cf42adcb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:20 client Connection 263e8a0c0cdc22eb0f470a7d9f6d592c8a closed. 2025/09/12 12:22:20 Requesting https://server4:443/gnmjwjgoiz. 2025/09/12 12:22:20 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:20 Increased send buffer size to 14336 kiB 2025/09/12 12:22:20 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:20 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:20 Created qlog file: /logs/qlog/6991ce9b75ff1c9e101934bb.sqlog 2025/09/12 12:22:20 client Starting new connection to server4 ([::]:46395 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6991ce9b75ff1c9e101934bb, version v1 2025/09/12 12:22:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:20 client -> Sending packet 0 (1280 bytes) for connection 6991ce9b75ff1c9e101934bb, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: 6991ce9b75ff1c9e101934bb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:22:20 client -> Sending packet 1 (1280 bytes) for connection 6991ce9b75ff1c9e101934bb, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: 6991ce9b75ff1c9e101934bb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 1236, Data length: 271, Offset + Data length: 1507} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:20 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:20 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e58fdc0665caf699, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:20 client Received first packet. Switching destination connection ID to: e58fdc0665caf699 2025/09/12 12:22:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680µs} 2025/09/12 12:22:20 client newly acked packets (1): [0] 2025/09/12 12:22:20 client updated RTT: 33.461418ms (σ: 16.730709ms) 2025/09/12 12:22:20 client <- &wire.PingFrame{} 2025/09/12 12:22:20 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:20 client -> Sending packet 2 (1280 bytes) for connection 6991ce9b75ff1c9e101934bb, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: e58fdc0665caf699, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:20 client -> Sending packet 3 (1280 bytes) for connection 6991ce9b75ff1c9e101934bb, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: e58fdc0665caf699, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 1236, Data length: 271, Offset + Data length: 1507} 2025/09/12 12:22:20 client -> Sending packet 4 (1280 bytes) for connection 6991ce9b75ff1c9e101934bb, Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: e58fdc0665caf699, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 1236, Data length: 271, Offset + Data length: 1507} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:20 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:22:20 client <- Reading packet 4 (130 bytes) for connection (empty), Initial 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e58fdc0665caf699, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:22:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:20 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 295 bytes. 2025/09/12 12:22:20 client <- Reading packet 5 (775 bytes) for connection (empty), Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e58fdc0665caf699, PacketNumber: 5, PacketNumberLen: 2, Length: 758, Version: v1} 2025/09/12 12:22:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 12:22:20 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6991ce9b75ff1c9e101934bb, InitialSourceConnectionID: e58fdc0665caf699, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x0fe8a161a398f77fad8c4a2f3eb03ef9, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:20 client Dropping %!s(logging.PacketType=5) packet (295 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6991ce9b75ff1c9e101934bb 2025/09/12 12:22:20 client Long Header{Type: Initial, DestConnectionID: e58fdc0665caf699, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: e58fdc0665caf699, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client Dropping Initial keys. 2025/09/12 12:22:20 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:20 client -> Sending packet 1 (86 bytes) for connection 6991ce9b75ff1c9e101934bb, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: e58fdc0665caf699, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 12:22:20 client Short Header{DestConnectionID: e58fdc0665caf699, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:20 client -> Sending packet 2 (90 bytes) for connection 6991ce9b75ff1c9e101934bb, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: e58fdc0665caf699, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client -> Sending packet 3 (90 bytes) for connection 6991ce9b75ff1c9e101934bb, Handshake 2025/09/12 12:22:20 client Long Header{Type: Handshake, DestConnectionID: e58fdc0665caf699, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:20 client <- Reading packet 6 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:20 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:20 client Dropping Handshake keys. 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ccc10d1f00ca4801, StatelessResetToken: 0x6fce011a57691e7fa65126e9f905e6f5} 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 51def2f740f0cf0f, StatelessResetToken: 0xddbbd18be940da35dafe5ba78455848f} 2025/09/12 12:22:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 910d52c9e1bac253, StatelessResetToken: 0x15387cb55bdbf1c10079ba5dab60afd6} 2025/09/12 12:22:20 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:20 client -> Sending packet 2 (53 bytes) for connection 6991ce9b75ff1c9e101934bb, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:20 client Short Header{DestConnectionID: ccc10d1f00ca4801, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 116.708µs} 2025/09/12 12:22:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:20 client -> Sending packet 3 (48 bytes) for connection 6991ce9b75ff1c9e101934bb, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:20 client Short Header{DestConnectionID: ccc10d1f00ca4801, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:21 client <- Reading packet 7 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:21 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7a6fec5a8f6a5834, StatelessResetToken: 0x14ba4da6d99739052431fd1cd03c22f3} 2025/09/12 12:22:21 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:21 client <- Reading packet 8 (24 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:21 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 440µs} 2025/09/12 12:22:21 client newly acked packets (1): [3] 2025/09/12 12:22:21 client updated RTT: 33.268ms (σ: 12.932ms) 2025/09/12 12:22:21 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:21 client Canceling loss detection timer. 2025/09/12 12:22:21 client <- Reading packet 9 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:21 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:21 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:22:21 client -> Sending packet 4 (32 bytes) for connection 6991ce9b75ff1c9e101934bb, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:21 client Short Header{DestConnectionID: ccc10d1f00ca4801, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, DelayTime: 54.381µs} 2025/09/12 12:22:21 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:21 client -> Sending packet 5 (30 bytes) for connection 6991ce9b75ff1c9e101934bb, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:21 client Short Header{DestConnectionID: ccc10d1f00ca4801, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:21 client Connection 6991ce9b75ff1c9e101934bb closed. 2025/09/12 12:22:21 Requesting https://server4:443/oehpxkmvuz. 2025/09/12 12:22:21 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:21 Increased send buffer size to 14336 kiB 2025/09/12 12:22:21 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:21 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:21 Created qlog file: /logs/qlog/e4b45a9d86bdfce0f7e1fac02ff52b.sqlog 2025/09/12 12:22:21 client Starting new connection to server4 ([::]:54324 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e4b45a9d86bdfce0f7e1fac02ff52b, version v1 2025/09/12 12:22:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:21 client -> Sending packet 0 (1280 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Initial 2025/09/12 12:22:21 client Long Header{Type: Initial, DestConnectionID: e4b45a9d86bdfce0f7e1fac02ff52b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:21 client -> Sending packet 1 (1280 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Initial 2025/09/12 12:22:21 client Long Header{Type: Initial, DestConnectionID: e4b45a9d86bdfce0f7e1fac02ff52b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 1233, Data length: 285, Offset + Data length: 1518} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:21 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:21 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d623c31835198f81, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:21 client Received first packet. Switching destination connection ID to: d623c31835198f81 2025/09/12 12:22:21 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.264ms} 2025/09/12 12:22:21 client newly acked packets (2): [0 1] 2025/09/12 12:22:21 client updated RTT: 34.99646ms (σ: 17.49823ms) 2025/09/12 12:22:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:21 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:21 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:21 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 285 bytes. 2025/09/12 12:22:21 client <- Reading packet 2 (779 bytes) for connection (empty), Handshake 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d623c31835198f81, PacketNumber: 2, PacketNumberLen: 2, Length: 762, Version: v1} 2025/09/12 12:22:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 12:22:21 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:21 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e4b45a9d86bdfce0f7e1fac02ff52b, InitialSourceConnectionID: d623c31835198f81, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x944b7ff36d4075ba7397db6d2ba7e358, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:21 client Dropping %!s(logging.PacketType=5) packet (285 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b 2025/09/12 12:22:21 client Long Header{Type: Initial, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:21 client Dropping Initial keys. 2025/09/12 12:22:21 client -> Sending packet 1 (86 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:21 client Short Header{DestConnectionID: d623c31835198f81, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:21 client -> Sending packet 2 (90 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:21 client -> Sending packet 3 (90 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:21 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:21 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client <- &wire.PingFrame{} 2025/09/12 12:22:21 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:21 client -> Sending packet 1 (32 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:21 client Short Header{DestConnectionID: d623c31835198f81, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 64.45µs} 2025/09/12 12:22:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:22:21 client -> Sending packet 4 (90 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:21 client -> Sending packet 5 (90 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:21 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:21 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client <- &wire.PingFrame{} 2025/09/12 12:22:21 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:21 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:21 client -> Sending packet 2 (33 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:21 client Short Header{DestConnectionID: d623c31835198f81, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 25.338665ms} 2025/09/12 12:22:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 12:22:21 client -> Sending packet 6 (90 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:21 client -> Sending packet 7 (90 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:21 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:21 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:21 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:21 client <- &wire.PingFrame{} 2025/09/12 12:22:21 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:22 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:22 client -> Sending packet 3 (33 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:22 client Short Header{DestConnectionID: d623c31835198f81, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:22 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 25.407472ms} 2025/09/12 12:22:22 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:22 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:22 client <- &wire.PingFrame{} 2025/09/12 12:22:22 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:22 client -> Sending packet 4 (34 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:22 client Short Header{DestConnectionID: d623c31835198f81, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:22 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 100.537µs} 2025/09/12 12:22:22 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:22 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:22 client <- &wire.PingFrame{} 2025/09/12 12:22:22 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:22 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:22 client -> Sending packet 5 (35 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:22 client Short Header{DestConnectionID: d623c31835198f81, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:22 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 25.339468ms} 2025/09/12 12:22:22 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/09/12 12:22:22 client -> Sending packet 8 (90 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:22 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:22 client -> Sending packet 9 (90 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, Handshake 2025/09/12 12:22:22 client Long Header{Type: Handshake, DestConnectionID: d623c31835198f81, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:22 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:22 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:22 client <- &wire.PingFrame{} 2025/09/12 12:22:22 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:23 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:23 client -> Sending packet 6 (35 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:23 client Short Header{DestConnectionID: d623c31835198f81, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 25.289716ms} 2025/09/12 12:22:23 client <- Reading packet 12 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:23 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client <- &wire.PingFrame{} 2025/09/12 12:22:23 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:23 client -> Sending packet 7 (36 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:23 client Short Header{DestConnectionID: d623c31835198f81, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 106.067µs} 2025/09/12 12:22:23 client <- Reading packet 13 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:23 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:23 client Dropping Handshake keys. 2025/09/12 12:22:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 35be1af1f9a48a5a, StatelessResetToken: 0xe56d8036bde63d93fa4e4c38986d2126} 2025/09/12 12:22:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a8cd5306f11d955, StatelessResetToken: 0xa304211718a4025a23f653d607082dcc} 2025/09/12 12:22:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 939440f5d0acf273, StatelessResetToken: 0x7b1b0183ef1c5ecffb1e47aed9929f47} 2025/09/12 12:22:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:23 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:23 client -> Sending packet 9 (57 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:23 client Short Header{DestConnectionID: 35be1af1f9a48a5a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 4, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 95.358µs} 2025/09/12 12:22:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:23 client -> Sending packet 10 (48 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:23 client Short Header{DestConnectionID: 35be1af1f9a48a5a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:23 client <- Reading packet 14 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:23 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ca25e46e204ed72c, StatelessResetToken: 0x39bfef7a981b7701fe2a6290a78c8b65} 2025/09/12 12:22:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:23 client <- Reading packet 15 (29 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:23 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 1.088ms} 2025/09/12 12:22:23 client newly acked packets (1): [10] 2025/09/12 12:22:23 client updated RTT: 34.589ms (σ: 13.937ms) 2025/09/12 12:22:23 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:23 client Canceling loss detection timer. 2025/09/12 12:22:23 client <- Reading packet 16 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:23 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:23 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:22:23 client -> Sending packet 11 (36 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:23 client Short Header{DestConnectionID: 35be1af1f9a48a5a, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 4, AckRanges: {{Largest: 16, Smallest: 12}, {Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 69.019µs} 2025/09/12 12:22:23 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:23 client -> Sending packet 12 (30 bytes) for connection e4b45a9d86bdfce0f7e1fac02ff52b, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:23 client Short Header{DestConnectionID: 35be1af1f9a48a5a, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:23 client Connection e4b45a9d86bdfce0f7e1fac02ff52b closed. 2025/09/12 12:22:23 Requesting https://server4:443/rxyhxnadep. 2025/09/12 12:22:23 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:23 Increased send buffer size to 14336 kiB 2025/09/12 12:22:23 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:23 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:23 Created qlog file: /logs/qlog/32bb1175d2eb9ec7c84ea291feb8c5e2d51c.sqlog 2025/09/12 12:22:23 client Starting new connection to server4 ([::]:59031 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, version v1 2025/09/12 12:22:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:23 client -> Sending packet 0 (1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 12:22:23 client -> Sending packet 1 (1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 1230, Data length: 278, Offset + Data length: 1508} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:23 client -> Sending packet 2 (1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:23 client -> Sending packet 3 (1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 1230, Data length: 278, Offset + Data length: 1508} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:23 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:23 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fa1b7182f4369460, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:23 client Received first packet. Switching destination connection ID to: fa1b7182f4369460 2025/09/12 12:22:23 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.04ms} 2025/09/12 12:22:23 client newly acked packets (1): [2] 2025/09/12 12:22:23 client updated RTT: 34.254916ms (σ: 17.127458ms) 2025/09/12 12:22:23 client <- &wire.PingFrame{} 2025/09/12 12:22:23 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:23 client -> Sending packet 4 (1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: fa1b7182f4369460, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 12:22:23 client -> Sending packet 5 (1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: fa1b7182f4369460, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 1230, Data length: 278, Offset + Data length: 1508} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:23 client -> Sending packet 6 (1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: fa1b7182f4369460, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 1230, Data length: 278, Offset + Data length: 1508} 2025/09/12 12:22:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:23 client <- Reading packet 5 (41 bytes) for connection (empty), Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fa1b7182f4369460, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:23 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 408µs} 2025/09/12 12:22:23 client <- Reading packet 6 (41 bytes) for connection (empty), Initial 2025/09/12 12:22:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fa1b7182f4369460, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:23 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 312µs} 2025/09/12 12:22:23 client newly acked packets (1): [6] 2025/09/12 12:22:23 client updated RTT: 34.111ms (σ: 13.13ms) 2025/09/12 12:22:24 client -> Sending packet 7 (1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: fa1b7182f4369460, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:24 client -> &wire.PingFrame{} 2025/09/12 12:22:24 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:22:24 client <- Reading packet 9 (130 bytes) for connection (empty), Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fa1b7182f4369460, Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:22:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:24 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:24 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:24 client Parsed a coalesced packet. Part 2: 782 bytes. Remaining: 288 bytes. 2025/09/12 12:22:24 client <- Reading packet 10 (782 bytes) for connection (empty), Handshake 2025/09/12 12:22:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fa1b7182f4369460, PacketNumber: 10, PacketNumberLen: 2, Length: 765, Version: v1} 2025/09/12 12:22:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/09/12 12:22:24 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:24 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, InitialSourceConnectionID: fa1b7182f4369460, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x799d0c15dfcbb5cdc4d7db04d1de0eeb, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:24 client Dropping %!s(logging.PacketType=5) packet (288 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: fa1b7182f4369460, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:24 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:22:24 client Long Header{Type: Handshake, DestConnectionID: fa1b7182f4369460, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:24 client Dropping Initial keys. 2025/09/12 12:22:24 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:24 client -> Sending packet 1 (86 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, Handshake 2025/09/12 12:22:24 client Long Header{Type: Handshake, DestConnectionID: fa1b7182f4369460, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:24 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 0s} 2025/09/12 12:22:24 client Short Header{DestConnectionID: fa1b7182f4369460, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:24 client <- Reading packet 12 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:24 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.072ms} 2025/09/12 12:22:24 client Peer doesn't await address validation any longer. 2025/09/12 12:22:24 client newly acked packets (1): [0] 2025/09/12 12:22:24 client updated RTT: 34.087ms (σ: 9.893ms) 2025/09/12 12:22:24 client Canceling loss detection timer. 2025/09/12 12:22:24 client Dropping Handshake keys. 2025/09/12 12:22:24 client <- Reading packet 15 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:24 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client <- &wire.PingFrame{} 2025/09/12 12:22:24 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:24 client -> Sending packet 1 (1366 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:24 client Short Header{DestConnectionID: fa1b7182f4369460, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client -> &wire.PingFrame{} 2025/09/12 12:22:24 client -> Sending packet 2 (34 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:24 client Short Header{DestConnectionID: fa1b7182f4369460, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 12, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}}, DelayTime: 174.345µs} 2025/09/12 12:22:24 client <- Reading packet 16 (1132 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:24 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b9108b1b733137ec, StatelessResetToken: 0xb60db2a0d0f5c5bb4022f4b680c98870} 2025/09/12 12:22:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2d104b0fb7ec2955, StatelessResetToken: 0x1977bcbd553fd9ad521fe6d55aacf591} 2025/09/12 12:22:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bdc7c7bb1c4ca2fc, StatelessResetToken: 0x8e9c0227b9924f76ea9d687b90e97bc3} 2025/09/12 12:22:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:24 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:24 client -> Sending packet 3 (36 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:24 client Short Header{DestConnectionID: b9108b1b733137ec, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 12, AckRanges: {{Largest: 16, Smallest: 15}, {Largest: 12, Smallest: 12}}, DelayTime: 118µs} 2025/09/12 12:22:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:24 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:24 client -> Sending packet 4 (30 bytes) for connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:24 client Short Header{DestConnectionID: b9108b1b733137ec, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:24 client Connection 32bb1175d2eb9ec7c84ea291feb8c5e2d51c closed. 2025/09/12 12:22:24 Requesting https://server4:443/ykqggkfsbk. 2025/09/12 12:22:24 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:24 Increased send buffer size to 14336 kiB 2025/09/12 12:22:24 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:24 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:24 Created qlog file: /logs/qlog/fe2ee9f2275a44cc7fd9ba.sqlog 2025/09/12 12:22:24 client Starting new connection to server4 ([::]:45032 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fe2ee9f2275a44cc7fd9ba, version v1 2025/09/12 12:22:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:24 client -> Sending packet 0 (1280 bytes) for connection fe2ee9f2275a44cc7fd9ba, Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: fe2ee9f2275a44cc7fd9ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:24 client -> Sending packet 1 (1280 bytes) for connection fe2ee9f2275a44cc7fd9ba, Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: fe2ee9f2275a44cc7fd9ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 1237, Data length: 269, Offset + Data length: 1506} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:24 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:24 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c922f30616268774, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:24 client Received first packet. Switching destination connection ID to: c922f30616268774 2025/09/12 12:22:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 720µs} 2025/09/12 12:22:24 client newly acked packets (1): [0] 2025/09/12 12:22:24 client updated RTT: 33.508244ms (σ: 16.754122ms) 2025/09/12 12:22:24 client <- &wire.PingFrame{} 2025/09/12 12:22:24 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:24 client -> Sending packet 2 (1280 bytes) for connection fe2ee9f2275a44cc7fd9ba, Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: c922f30616268774, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:24 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:24 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c922f30616268774, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:24 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.368ms} 2025/09/12 12:22:24 client newly acked packets (1): [1] 2025/09/12 12:22:24 client updated RTT: 33.703ms (σ: 12.955ms) 2025/09/12 12:22:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:24 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:24 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:24 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 289 bytes. 2025/09/12 12:22:24 client <- Reading packet 2 (775 bytes) for connection (empty), Handshake 2025/09/12 12:22:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c922f30616268774, PacketNumber: 2, PacketNumberLen: 2, Length: 758, Version: v1} 2025/09/12 12:22:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 12:22:24 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:24 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fe2ee9f2275a44cc7fd9ba, InitialSourceConnectionID: c922f30616268774, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x85c3a2be444aad209b03cfa9c4057369, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:24 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fe2ee9f2275a44cc7fd9ba 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: c922f30616268774, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:24 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:24 client Long Header{Type: Handshake, DestConnectionID: c922f30616268774, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:24 client Dropping Initial keys. 2025/09/12 12:22:24 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:24 client -> Sending packet 1 (86 bytes) for connection fe2ee9f2275a44cc7fd9ba, Handshake 2025/09/12 12:22:24 client Long Header{Type: Handshake, DestConnectionID: c922f30616268774, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:24 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:24 client Short Header{DestConnectionID: c922f30616268774, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:24 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:24 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 12:22:24 client Peer doesn't await address validation any longer. 2025/09/12 12:22:24 client newly acked packets (1): [0] 2025/09/12 12:22:24 client updated RTT: 33.693ms (σ: 9.736ms) 2025/09/12 12:22:24 client Canceling loss detection timer. 2025/09/12 12:22:24 client Dropping Handshake keys. 2025/09/12 12:22:24 client <- Reading packet 5 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:24 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:24 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:24 client -> Sending packet 1 (32 bytes) for connection fe2ee9f2275a44cc7fd9ba, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:24 client Short Header{DestConnectionID: c922f30616268774, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 51.887µs} 2025/09/12 12:22:24 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:24 client -> Sending packet 2 (30 bytes) for connection fe2ee9f2275a44cc7fd9ba, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:24 client Short Header{DestConnectionID: c922f30616268774, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:24 client Connection fe2ee9f2275a44cc7fd9ba closed. 2025/09/12 12:22:24 Requesting https://server4:443/bncmnlvoft. 2025/09/12 12:22:24 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:24 Increased send buffer size to 14336 kiB 2025/09/12 12:22:24 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:24 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:24 Created qlog file: /logs/qlog/ae47c41e14c94a5b2b92dfc78900afaeca9187aa.sqlog 2025/09/12 12:22:24 client Starting new connection to server4 ([::]:39852 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ae47c41e14c94a5b2b92dfc78900afaeca9187aa, version v1 2025/09/12 12:22:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:24 client -> Sending packet 0 (1280 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: ae47c41e14c94a5b2b92dfc78900afaeca9187aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:22:24 client -> Sending packet 1 (1280 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Initial 2025/09/12 12:22:24 client Long Header{Type: Initial, DestConnectionID: ae47c41e14c94a5b2b92dfc78900afaeca9187aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 12:22:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:25 client -> Sending packet 2 (1280 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Initial 2025/09/12 12:22:25 client Long Header{Type: Initial, DestConnectionID: ae47c41e14c94a5b2b92dfc78900afaeca9187aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:25 client -> Sending packet 3 (1280 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Initial 2025/09/12 12:22:25 client Long Header{Type: Initial, DestConnectionID: ae47c41e14c94a5b2b92dfc78900afaeca9187aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 12:22:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:25 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:25 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c49b7611cd3eb798, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:25 client Received first packet. Switching destination connection ID to: c49b7611cd3eb798 2025/09/12 12:22:25 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.24ms} 2025/09/12 12:22:25 client newly acked packets (2): [2 3] 2025/09/12 12:22:25 client updated RTT: 35.43058ms (σ: 17.71529ms) 2025/09/12 12:22:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:25 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:25 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:25 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 280 bytes. 2025/09/12 12:22:25 client <- Reading packet 2 (784 bytes) for connection (empty), Handshake 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c49b7611cd3eb798, PacketNumber: 2, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 12:22:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 12:22:25 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:25 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ae47c41e14c94a5b2b92dfc78900afaeca9187aa, InitialSourceConnectionID: c49b7611cd3eb798, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xdba5a8484be2535c0344218e421aef9e, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:25 client Dropping %!s(logging.PacketType=5) packet (280 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa 2025/09/12 12:22:25 client Long Header{Type: Initial, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:25 client Dropping Initial keys. 2025/09/12 12:22:25 client -> Sending packet 1 (40 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:25 client -> Sending packet 0 (46 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:25 client Short Header{DestConnectionID: c49b7611cd3eb798, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:25 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:25 client -> Sending packet 2 (90 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:25 client -> Sending packet 3 (90 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:25 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:22:25 client -> Sending packet 4 (90 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:25 client -> Sending packet 5 (90 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:25 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 12:22:25 client -> Sending packet 6 (90 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:25 client -> Sending packet 7 (90 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:25 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/09/12 12:22:26 client -> Sending packet 8 (90 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:26 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:26 client -> Sending packet 9 (90 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, Handshake 2025/09/12 12:22:26 client Long Header{Type: Handshake, DestConnectionID: c49b7611cd3eb798, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:27 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:27 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client <- &wire.PingFrame{} 2025/09/12 12:22:27 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:27 client -> Sending packet 1 (32 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:27 client Short Header{DestConnectionID: c49b7611cd3eb798, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 129.822µs} 2025/09/12 12:22:27 client <- Reading packet 8 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:27 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:27 client Dropping Handshake keys. 2025/09/12 12:22:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05d8bd678431c3e4, StatelessResetToken: 0x70436ecbe468b745c930b18af2ca085a} 2025/09/12 12:22:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d3be8333502c870f, StatelessResetToken: 0xa597098371ac6d88057d83917b2978af} 2025/09/12 12:22:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8985df32abd1e668, StatelessResetToken: 0x9cc8cddaf9ff7448b8b6793cf1a934e4} 2025/09/12 12:22:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:27 client -> Sending packet 3 (53 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:27 client Short Header{DestConnectionID: 05d8bd678431c3e4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 145.211µs} 2025/09/12 12:22:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:27 client -> Sending packet 4 (48 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:27 client Short Header{DestConnectionID: 05d8bd678431c3e4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:27 client <- Reading packet 9 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:27 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cf9884249aaf1f1b, StatelessResetToken: 0x3bf7efa8511aa978c4b7bbdca2181214} 2025/09/12 12:22:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:27 client <- Reading packet 10 (26 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:27 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 336µs} 2025/09/12 12:22:27 client newly acked packets (1): [4] 2025/09/12 12:22:27 client updated RTT: 34.981ms (σ: 14.183ms) 2025/09/12 12:22:27 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:27 client Canceling loss detection timer. 2025/09/12 12:22:27 client <- Reading packet 11 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:27 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:22:27 client -> Sending packet 5 (32 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:27 client Short Header{DestConnectionID: 05d8bd678431c3e4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 7, DelayTime: 58.789µs} 2025/09/12 12:22:27 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:27 client -> Sending packet 6 (30 bytes) for connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:27 client Short Header{DestConnectionID: 05d8bd678431c3e4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:27 client Connection ae47c41e14c94a5b2b92dfc78900afaeca9187aa closed. 2025/09/12 12:22:27 Requesting https://server4:443/qwkjpdfrfl. 2025/09/12 12:22:27 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:27 Increased send buffer size to 14336 kiB 2025/09/12 12:22:27 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:27 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:27 Created qlog file: /logs/qlog/61738f2bfe275974acf31121.sqlog 2025/09/12 12:22:27 client Starting new connection to server4 ([::]:46389 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 61738f2bfe275974acf31121, version v1 2025/09/12 12:22:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:27 client -> Sending packet 0 (1280 bytes) for connection 61738f2bfe275974acf31121, Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: 61738f2bfe275974acf31121, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:22:27 client -> Sending packet 1 (1280 bytes) for connection 61738f2bfe275974acf31121, Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: 61738f2bfe275974acf31121, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 1236, Data length: 278, Offset + Data length: 1514} 2025/09/12 12:22:27 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:27 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6e55c64c28dc6171, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:27 client Received first packet. Switching destination connection ID to: 6e55c64c28dc6171 2025/09/12 12:22:27 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 752µs} 2025/09/12 12:22:27 client newly acked packets (1): [0] 2025/09/12 12:22:27 client updated RTT: 33.628531ms (σ: 16.814265ms) 2025/09/12 12:22:27 client <- &wire.PingFrame{} 2025/09/12 12:22:27 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:27 client -> Sending packet 2 (1280 bytes) for connection 61738f2bfe275974acf31121, Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:27 client -> Sending packet 3 (1280 bytes) for connection 61738f2bfe275974acf31121, Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 1236, Data length: 278, Offset + Data length: 1514} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:27 client -> Sending packet 4 (1280 bytes) for connection 61738f2bfe275974acf31121, Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 1236, Data length: 278, Offset + Data length: 1514} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 12:22:27 client -> Sending packet 5 (1280 bytes) for connection 61738f2bfe275974acf31121, Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 1236, Data length: 278, Offset + Data length: 1514} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:27 client -> Sending packet 6 (1280 bytes) for connection 61738f2bfe275974acf31121, Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 1236, Data length: 278, Offset + Data length: 1514} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:27 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 12:22:27 client <- Reading packet 3 (130 bytes) for connection (empty), Initial 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6e55c64c28dc6171, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 112, Version: v1} 2025/09/12 12:22:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:27 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:27 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:27 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 294 bytes. 2025/09/12 12:22:27 client <- Reading packet 4 (776 bytes) for connection (empty), Handshake 2025/09/12 12:22:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6e55c64c28dc6171, PacketNumber: 4, PacketNumberLen: 2, Length: 759, Version: v1} 2025/09/12 12:22:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 12:22:27 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:27 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 61738f2bfe275974acf31121, InitialSourceConnectionID: 6e55c64c28dc6171, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xac1dbffc41f47306f592384c3fdead31, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:27 client Dropping %!s(logging.PacketType=5) packet (294 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 61738f2bfe275974acf31121 2025/09/12 12:22:27 client Long Header{Type: Initial, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:27 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 12:22:27 client Long Header{Type: Handshake, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:27 client Dropping Initial keys. 2025/09/12 12:22:27 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:27 client -> Sending packet 1 (86 bytes) for connection 61738f2bfe275974acf31121, Handshake 2025/09/12 12:22:27 client Long Header{Type: Handshake, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:27 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 12:22:27 client Short Header{DestConnectionID: 6e55c64c28dc6171, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:27 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:27 client -> Sending packet 2 (90 bytes) for connection 61738f2bfe275974acf31121, Handshake 2025/09/12 12:22:27 client Long Header{Type: Handshake, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:27 client -> Sending packet 3 (90 bytes) for connection 61738f2bfe275974acf31121, Handshake 2025/09/12 12:22:27 client Long Header{Type: Handshake, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:27 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:22:27 client -> Sending packet 4 (90 bytes) for connection 61738f2bfe275974acf31121, Handshake 2025/09/12 12:22:27 client Long Header{Type: Handshake, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:27 client -> Sending packet 5 (90 bytes) for connection 61738f2bfe275974acf31121, Handshake 2025/09/12 12:22:27 client Long Header{Type: Handshake, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:28 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:28 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client <- &wire.PingFrame{} 2025/09/12 12:22:28 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:28 client -> Sending packet 1 (32 bytes) for connection 61738f2bfe275974acf31121, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:28 client Short Header{DestConnectionID: 6e55c64c28dc6171, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 109.905µs} 2025/09/12 12:22:28 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 12:22:28 client -> Sending packet 6 (90 bytes) for connection 61738f2bfe275974acf31121, Handshake 2025/09/12 12:22:28 client Long Header{Type: Handshake, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:28 client -> Sending packet 7 (90 bytes) for connection 61738f2bfe275974acf31121, Handshake 2025/09/12 12:22:28 client Long Header{Type: Handshake, DestConnectionID: 6e55c64c28dc6171, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:28 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:28 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client <- &wire.PingFrame{} 2025/09/12 12:22:28 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:28 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:28 client -> Sending packet 2 (33 bytes) for connection 61738f2bfe275974acf31121, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:28 client Short Header{DestConnectionID: 6e55c64c28dc6171, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 25.342282ms} 2025/09/12 12:22:28 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:28 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client <- &wire.PingFrame{} 2025/09/12 12:22:28 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:28 client -> Sending packet 3 (34 bytes) for connection 61738f2bfe275974acf31121, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:28 client Short Header{DestConnectionID: 6e55c64c28dc6171, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}}, DelayTime: 97.552µs} 2025/09/12 12:22:28 client <- Reading packet 11 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:28 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:28 client Dropping Handshake keys. 2025/09/12 12:22:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 18edfec719c26fd9, StatelessResetToken: 0xc97dd2fa41f88341df249219f70c202e} 2025/09/12 12:22:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1b1ac179eef1e840, StatelessResetToken: 0xa9f718c38d1222774b8f5fb64997138b} 2025/09/12 12:22:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c44de45ae5330f2, StatelessResetToken: 0x548a200d3f5417c25141f888fb876550} 2025/09/12 12:22:28 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:28 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:28 client -> Sending packet 5 (55 bytes) for connection 61738f2bfe275974acf31121, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:28 client Short Header{DestConnectionID: 18edfec719c26fd9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 7, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 7}}, DelayTime: 113.832µs} 2025/09/12 12:22:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:28 client -> Sending packet 6 (48 bytes) for connection 61738f2bfe275974acf31121, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:28 client Short Header{DestConnectionID: 18edfec719c26fd9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:28 client <- Reading packet 13 (26 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:28 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 88µs} 2025/09/12 12:22:28 client newly acked packets (1): [6] 2025/09/12 12:22:28 client updated RTT: 33.396ms (σ: 13.074ms) 2025/09/12 12:22:28 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:28 client Canceling loss detection timer. 2025/09/12 12:22:28 client <- Reading packet 14 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:28 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:28 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:28 client -> Sending packet 7 (36 bytes) for connection 61738f2bfe275974acf31121, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:28 client Short Header{DestConnectionID: 18edfec719c26fd9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 7, AckRanges: {{Largest: 14, Smallest: 13}, {Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 7}}, DelayTime: 58.689µs} 2025/09/12 12:22:28 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:28 client -> Sending packet 8 (30 bytes) for connection 61738f2bfe275974acf31121, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:28 client Short Header{DestConnectionID: 18edfec719c26fd9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:28 client Connection 61738f2bfe275974acf31121 closed. 2025/09/12 12:22:28 Requesting https://server4:443/qtggxusxdr. 2025/09/12 12:22:28 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:28 Increased send buffer size to 14336 kiB 2025/09/12 12:22:28 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:28 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:28 Created qlog file: /logs/qlog/0dd9ed32aab04b42514de76e.sqlog 2025/09/12 12:22:28 client Starting new connection to server4 ([::]:54564 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0dd9ed32aab04b42514de76e, version v1 2025/09/12 12:22:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:28 client -> Sending packet 0 (1280 bytes) for connection 0dd9ed32aab04b42514de76e, Initial 2025/09/12 12:22:28 client Long Header{Type: Initial, DestConnectionID: 0dd9ed32aab04b42514de76e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:28 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 12:22:28 client -> Sending packet 1 (1280 bytes) for connection 0dd9ed32aab04b42514de76e, Initial 2025/09/12 12:22:28 client Long Header{Type: Initial, DestConnectionID: 0dd9ed32aab04b42514de76e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 12:22:28 client -> &wire.CryptoFrame{Offset: 1236, Data length: 276, Offset + Data length: 1512} 2025/09/12 12:22:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:28 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:28 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4984b7ff3f966603, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:28 client Received first packet. Switching destination connection ID to: 4984b7ff3f966603 2025/09/12 12:22:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.408ms} 2025/09/12 12:22:28 client newly acked packets (1): [0] 2025/09/12 12:22:28 client updated RTT: 35.313503ms (σ: 17.656751ms) 2025/09/12 12:22:28 client <- &wire.PingFrame{} 2025/09/12 12:22:28 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:28 client -> Sending packet 2 (1280 bytes) for connection 0dd9ed32aab04b42514de76e, Initial 2025/09/12 12:22:28 client Long Header{Type: Initial, DestConnectionID: 4984b7ff3f966603, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:28 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:28 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4984b7ff3f966603, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.224ms} 2025/09/12 12:22:28 client newly acked packets (1): [1] 2025/09/12 12:22:28 client updated RTT: 35.474ms (σ: 13.564ms) 2025/09/12 12:22:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:28 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:28 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:28 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 289 bytes. 2025/09/12 12:22:28 client <- Reading packet 2 (775 bytes) for connection (empty), Handshake 2025/09/12 12:22:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4984b7ff3f966603, PacketNumber: 2, PacketNumberLen: 2, Length: 758, Version: v1} 2025/09/12 12:22:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 12:22:28 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:28 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0dd9ed32aab04b42514de76e, InitialSourceConnectionID: 4984b7ff3f966603, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x579e0df70bab6b0a3547d89b307a7648, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:28 client Dropping %!s(logging.PacketType=5) packet (289 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0dd9ed32aab04b42514de76e 2025/09/12 12:22:28 client Long Header{Type: Initial, DestConnectionID: 4984b7ff3f966603, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:28 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:28 client Long Header{Type: Handshake, DestConnectionID: 4984b7ff3f966603, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:28 client Dropping Initial keys. 2025/09/12 12:22:28 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:28 client -> Sending packet 1 (86 bytes) for connection 0dd9ed32aab04b42514de76e, Handshake 2025/09/12 12:22:28 client Long Header{Type: Handshake, DestConnectionID: 4984b7ff3f966603, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:28 client Short Header{DestConnectionID: 4984b7ff3f966603, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:29 client -> Sending packet 2 (90 bytes) for connection 0dd9ed32aab04b42514de76e, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 4984b7ff3f966603, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client -> Sending packet 3 (90 bytes) for connection 0dd9ed32aab04b42514de76e, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 4984b7ff3f966603, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:29 client Dropping Handshake keys. 2025/09/12 12:22:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: aa236c04d3b3110b, StatelessResetToken: 0x1b2804a19ec3f98e1f31d47c6680e000} 2025/09/12 12:22:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eaefbafa19e0db11, StatelessResetToken: 0x62712f8227017799dabfa3b4d7728b60} 2025/09/12 12:22:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9fef09bc41f3e7b9, StatelessResetToken: 0xfa04aeb20dacda1f4823ae5b2e895687} 2025/09/12 12:22:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:29 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:29 client -> Sending packet 2 (53 bytes) for connection 0dd9ed32aab04b42514de76e, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: aa236c04d3b3110b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 128.429µs} 2025/09/12 12:22:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client -> Sending packet 3 (48 bytes) for connection 0dd9ed32aab04b42514de76e, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: aa236c04d3b3110b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client <- Reading packet 4 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ed68b959f5a73258, StatelessResetToken: 0xa983fda9b39a0eae713789701055e17d} 2025/09/12 12:22:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:29 client <- Reading packet 5 (24 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 120µs} 2025/09/12 12:22:29 client newly acked packets (1): [3] 2025/09/12 12:22:29 client updated RTT: 35.021ms (σ: 11.077ms) 2025/09/12 12:22:29 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:29 client Canceling loss detection timer. 2025/09/12 12:22:29 client <- Reading packet 6 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:29 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:22:29 client -> Sending packet 4 (32 bytes) for connection 0dd9ed32aab04b42514de76e, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:29 client Short Header{DestConnectionID: aa236c04d3b3110b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 104.543µs} 2025/09/12 12:22:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:29 client -> Sending packet 5 (30 bytes) for connection 0dd9ed32aab04b42514de76e, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:29 client Short Header{DestConnectionID: aa236c04d3b3110b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:29 client Connection 0dd9ed32aab04b42514de76e closed. 2025/09/12 12:22:29 Requesting https://server4:443/frasebqlmb. 2025/09/12 12:22:29 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:29 Increased send buffer size to 14336 kiB 2025/09/12 12:22:29 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:29 Created qlog file: /logs/qlog/4967bf43bc30c6453c7b75247974dd.sqlog 2025/09/12 12:22:29 client Starting new connection to server4 ([::]:39769 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4967bf43bc30c6453c7b75247974dd, version v1 2025/09/12 12:22:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:29 client -> Sending packet 0 (1280 bytes) for connection 4967bf43bc30c6453c7b75247974dd, Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: 4967bf43bc30c6453c7b75247974dd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 12:22:29 client -> Sending packet 1 (1280 bytes) for connection 4967bf43bc30c6453c7b75247974dd, Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: 4967bf43bc30c6453c7b75247974dd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:29 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:29 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c4593235b9834c1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:29 client Received first packet. Switching destination connection ID to: 1c4593235b9834c1 2025/09/12 12:22:29 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 808µs} 2025/09/12 12:22:29 client newly acked packets (1): [0] 2025/09/12 12:22:29 client updated RTT: 33.694345ms (σ: 16.847172ms) 2025/09/12 12:22:29 client <- &wire.PingFrame{} 2025/09/12 12:22:29 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:29 client -> Sending packet 2 (1280 bytes) for connection 4967bf43bc30c6453c7b75247974dd, Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: 1c4593235b9834c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 12:22:29 client -> Sending packet 3 (1280 bytes) for connection 4967bf43bc30c6453c7b75247974dd, Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: 1c4593235b9834c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/12 12:22:29 client -> Sending packet 4 (1280 bytes) for connection 4967bf43bc30c6453c7b75247974dd, Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: 1c4593235b9834c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/12 12:22:29 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 12:22:29 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c4593235b9834c1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 120, Version: v1} 2025/09/12 12:22:29 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 1.264ms} 2025/09/12 12:22:29 client newly acked packets (1): [4] 2025/09/12 12:22:29 client updated RTT: 33.856ms (σ: 12.961ms) 2025/09/12 12:22:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:29 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:29 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:29 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 284 bytes. 2025/09/12 12:22:29 client <- Reading packet 2 (778 bytes) for connection (empty), Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1c4593235b9834c1, PacketNumber: 2, PacketNumberLen: 2, Length: 761, Version: v1} 2025/09/12 12:22:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 12:22:29 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:29 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4967bf43bc30c6453c7b75247974dd, InitialSourceConnectionID: 1c4593235b9834c1, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xc83a872fa34e1972889c3e02357a9d03, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:29 client Dropping %!s(logging.PacketType=5) packet (284 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:29 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4967bf43bc30c6453c7b75247974dd 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: 1c4593235b9834c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 1c4593235b9834c1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client Dropping Initial keys. 2025/09/12 12:22:29 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:29 client -> Sending packet 1 (86 bytes) for connection 4967bf43bc30c6453c7b75247974dd, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 1c4593235b9834c1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:29 client Short Header{DestConnectionID: 1c4593235b9834c1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:29 client -> Sending packet 2 (90 bytes) for connection 4967bf43bc30c6453c7b75247974dd, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 1c4593235b9834c1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client -> Sending packet 3 (90 bytes) for connection 4967bf43bc30c6453c7b75247974dd, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 1c4593235b9834c1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:29 client <- Reading packet 3 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:29 client Dropping Handshake keys. 2025/09/12 12:22:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 10079afc40a60f01, StatelessResetToken: 0x62ca8df17cc913df345f5da20bc91f4e} 2025/09/12 12:22:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d51f43deb63011a4, StatelessResetToken: 0x1d6fe252a11fd96b9b90302df4500323} 2025/09/12 12:22:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9a65b12bb2f5fd87, StatelessResetToken: 0x0bdb8b2b969ce4fafc322bd7b35672f9} 2025/09/12 12:22:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:29 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:29 client -> Sending packet 2 (53 bytes) for connection 4967bf43bc30c6453c7b75247974dd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 10079afc40a60f01, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 103.162µs} 2025/09/12 12:22:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client -> Sending packet 3 (48 bytes) for connection 4967bf43bc30c6453c7b75247974dd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 10079afc40a60f01, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.PingFrame{} 2025/09/12 12:22:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:29 client Sending ACK because the ACK timer expired. 2025/09/12 12:22:29 client -> Sending packet 4 (33 bytes) for connection 4967bf43bc30c6453c7b75247974dd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 10079afc40a60f01, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.319053ms} 2025/09/12 12:22:29 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 12:22:29 client -> Sending packet 6 (48 bytes) for connection 4967bf43bc30c6453c7b75247974dd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 10079afc40a60f01, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client -> Sending packet 7 (48 bytes) for connection 4967bf43bc30c6453c7b75247974dd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 10079afc40a60f01, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client -> Sending packet 8 (1366 bytes) for connection 4967bf43bc30c6453c7b75247974dd, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 10079afc40a60f01, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.PingFrame{} 2025/09/12 12:22:29 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 46b954c0ac13aef8, StatelessResetToken: 0x34eb73cee0474d09fa720522e3b19f99} 2025/09/12 12:22:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:29 client <- Reading packet 6 (26 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 152µs} 2025/09/12 12:22:29 client newly acked packets (1): [8] 2025/09/12 12:22:29 client updated RTT: 33.63ms (σ: 10.172ms) 2025/09/12 12:22:29 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 12:22:29 client setting loss timer for packet 7 (1-RTT) to 37.83375ms (in 2025-09-12 12:22:29.618739094 +0000 UTC m=+46.826337023) 2025/09/12 12:22:29 client <- Reading packet 7 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:29 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:22:29 client -> Sending packet 9 (32 bytes) for connection 4967bf43bc30c6453c7b75247974dd, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 10079afc40a60f01, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 68.859µs} 2025/09/12 12:22:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:29 client -> Sending packet 10 (30 bytes) for connection 4967bf43bc30c6453c7b75247974dd, 1-RTT (ECN: Not-ECT) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 10079afc40a60f01, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:29 client Connection 4967bf43bc30c6453c7b75247974dd closed. 2025/09/12 12:22:29 Requesting https://server4:443/lnektgrbxa. 2025/09/12 12:22:29 Increased receive buffer size to 14336 kiB 2025/09/12 12:22:29 Increased send buffer size to 14336 kiB 2025/09/12 12:22:29 Setting DF for IPv4 and IPv6. 2025/09/12 12:22:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 12:22:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 12:22:29 Created qlog file: /logs/qlog/fc606b666ba895e2.sqlog 2025/09/12 12:22:29 client Starting new connection to server4 ([::]:42547 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fc606b666ba895e2, version v1 2025/09/12 12:22:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 12:22:29 client -> Sending packet 0 (1280 bytes) for connection fc606b666ba895e2, Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: fc606b666ba895e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 12:22:29 client -> Sending packet 1 (1280 bytes) for connection fc606b666ba895e2, Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: fc606b666ba895e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 1240, Data length: 279, Offset + Data length: 1519} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 12:22:29 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 12:22:29 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7bdd7790d6f62186, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 12:22:29 client Received first packet. Switching destination connection ID to: 7bdd7790d6f62186 2025/09/12 12:22:29 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 656µs} 2025/09/12 12:22:29 client newly acked packets (1): [0] 2025/09/12 12:22:29 client updated RTT: 33.548662ms (σ: 16.774331ms) 2025/09/12 12:22:29 client <- &wire.PingFrame{} 2025/09/12 12:22:29 client Queueing packet (1157 bytes) for later decryption 2025/09/12 12:22:29 client -> Sending packet 2 (1280 bytes) for connection fc606b666ba895e2, Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: 7bdd7790d6f62186, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:29 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 12:22:29 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7bdd7790d6f62186, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 12:22:29 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.272ms} 2025/09/12 12:22:29 client newly acked packets (1): [1] 2025/09/12 12:22:29 client updated RTT: 33.719ms (σ: 12.922ms) 2025/09/12 12:22:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 12:22:29 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:29 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:29 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 293 bytes. 2025/09/12 12:22:29 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7bdd7790d6f62186, PacketNumber: 2, PacketNumberLen: 2, Length: 754, Version: v1} 2025/09/12 12:22:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 12:22:29 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:29 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 12:22:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fc606b666ba895e2, InitialSourceConnectionID: 7bdd7790d6f62186, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4eee095344631e56849e7342b5c9659e, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 12:22:29 client Dropping %!s(logging.PacketType=5) packet (293 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:29 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fc606b666ba895e2 2025/09/12 12:22:29 client Long Header{Type: Initial, DestConnectionID: 7bdd7790d6f62186, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 7bdd7790d6f62186, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client Dropping Initial keys. 2025/09/12 12:22:29 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 12:22:29 client -> Sending packet 1 (86 bytes) for connection fc606b666ba895e2, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 7bdd7790d6f62186, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 12:22:29 client Short Header{DestConnectionID: 7bdd7790d6f62186, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:29 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 12:22:29 client -> Sending packet 2 (90 bytes) for connection fc606b666ba895e2, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 7bdd7790d6f62186, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client -> Sending packet 3 (90 bytes) for connection fc606b666ba895e2, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 7bdd7790d6f62186, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.PingFrame{} 2025/09/12 12:22:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 12:22:29 client -> Sending packet 1 (32 bytes) for connection fc606b666ba895e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 7bdd7790d6f62186, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 100.107µs} 2025/09/12 12:22:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 12:22:29 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 12:22:29 client -> Sending packet 4 (90 bytes) for connection fc606b666ba895e2, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 7bdd7790d6f62186, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client -> Sending packet 5 (90 bytes) for connection fc606b666ba895e2, Handshake 2025/09/12 12:22:29 client Long Header{Type: Handshake, DestConnectionID: 7bdd7790d6f62186, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 12:22:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 12:22:29 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:29 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client <- &wire.PingFrame{} 2025/09/12 12:22:29 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:29 client -> Sending packet 2 (34 bytes) for connection fc606b666ba895e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:29 client Short Header{DestConnectionID: 7bdd7790d6f62186, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:29 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 53.92µs} 2025/09/12 12:22:30 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:30 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client <- &wire.PingFrame{} 2025/09/12 12:22:30 client Queuing ACK because there's a new missing packet to report. 2025/09/12 12:22:30 client -> Sending packet 3 (36 bytes) for connection fc606b666ba895e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:30 client Short Header{DestConnectionID: 7bdd7790d6f62186, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 109.414µs} 2025/09/12 12:22:30 client <- Reading packet 9 (104 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:30 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 12:22:30 client Dropping Handshake keys. 2025/09/12 12:22:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c102722a2f7179a0, StatelessResetToken: 0xd56c50bcd9e6ec244e6453af1aa7d0c4} 2025/09/12 12:22:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 657ef43a4842b3dd, StatelessResetToken: 0x08f5fcf6260e5953551117f1fcf0b502} 2025/09/12 12:22:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 69bb994d565a8782, StatelessResetToken: 0x5f6c5b2943a2cb17d445a03213c44d79} 2025/09/12 12:22:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:30 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 12:22:30 client -> Sending packet 5 (57 bytes) for connection fc606b666ba895e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:30 client Short Header{DestConnectionID: c102722a2f7179a0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 137.226µs} 2025/09/12 12:22:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:30 client -> Sending packet 6 (48 bytes) for connection fc606b666ba895e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:30 client Short Header{DestConnectionID: c102722a2f7179a0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 12:22:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 12:22:30 client <- Reading packet 10 (47 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:30 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1a9bce47df7005a0, StatelessResetToken: 0xf9e55a268e35cfd778936cd57528bc61} 2025/09/12 12:22:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 12:22:30 client <- Reading packet 12 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 12:22:30 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 12:22:30 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 12:22:30 client -> Sending packet 7 (38 bytes) for connection fc606b666ba895e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:30 client Short Header{DestConnectionID: c102722a2f7179a0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 57.457µs} 2025/09/12 12:22:30 client Closing connection with error: Application error 0x0 (local) 2025/09/12 12:22:30 client -> Sending packet 8 (30 bytes) for connection fc606b666ba895e2, 1-RTT (ECN: ECT(0)) 2025/09/12 12:22:30 client Short Header{DestConnectionID: c102722a2f7179a0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 12:22:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 12:22:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 12:22:30 client Connection fc606b666ba895e2 closed.