2025/09/12 03:00:15 Requesting https://server4:443/bigmytvkog. 2025/09/12 03:00:15 Increased receive buffer size to 14336 kiB 2025/09/12 03:00:15 Increased send buffer size to 14336 kiB 2025/09/12 03:00:15 Setting DF for IPv4 and IPv6. 2025/09/12 03:00:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:00:15 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:00:15 Created qlog file: /logs/qlog/2ea483b63ed384003c279a248fdd0ec148d449.sqlog 2025/09/12 03:00:15 client Starting new connection to server4 ([::]:53474 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2ea483b63ed384003c279a248fdd0ec148d449, version v1 2025/09/12 03:00:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:00:15 client -> Sending packet 0 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:15 client Long Header{Type: Initial, DestConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:00:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:00:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:00:15 client -> Sending packet 1 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:15 client Long Header{Type: Initial, DestConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:00:15 client -> &wire.CryptoFrame{Offset: 1229, Data length: 276, Offset + Data length: 1505} 2025/09/12 03:00:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:00:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:00:15 client -> Sending packet 2 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:15 client Long Header{Type: Initial, DestConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:00:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:00:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:00:15 client -> Sending packet 3 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:15 client Long Header{Type: Initial, DestConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:00:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:00:15 client -> &wire.CryptoFrame{Offset: 1229, Data length: 276, Offset + Data length: 1505} 2025/09/12 03:00:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:00:16 client -> Sending packet 4 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:16 client Long Header{Type: Initial, DestConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:00:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:00:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:00:16 client -> Sending packet 5 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:16 client Long Header{Type: Initial, DestConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:00:16 client -> &wire.CryptoFrame{Offset: 1229, Data length: 276, Offset + Data length: 1505} 2025/09/12 03:00:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:00:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:00:17 client -> Sending packet 6 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:17 client Long Header{Type: Initial, DestConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:00:17 client -> Sending packet 7 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:17 client Long Header{Type: Initial, DestConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 1229, Data length: 276, Offset + Data length: 1505} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:00:17 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1157 bytes. 2025/09/12 03:00:17 client <- Reading packet 0 (43 bytes) for connection (empty), Initial 2025/09/12 03:00:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c80f66a10c3a9d9f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 03:00:17 client Received first packet. Switching destination connection ID to: c80f66a10c3a9d9f 2025/09/12 03:00:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.544ms} 2025/09/12 03:00:17 client <- &wire.PingFrame{} 2025/09/12 03:00:17 client Queueing packet (1157 bytes) for later decryption 2025/09/12 03:00:17 client -> Sending packet 8 (1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Initial 2025/09/12 03:00:17 client Long Header{Type: Initial, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:00:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:00:17 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 03:00:17 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 03:00:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c80f66a10c3a9d9f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 118, Version: v1} 2025/09/12 03:00:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 2.168ms} 2025/09/12 03:00:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:00:17 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:00:17 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:00:17 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 280 bytes. 2025/09/12 03:00:17 client <- Reading packet 2 (784 bytes) for connection (empty), Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c80f66a10c3a9d9f, PacketNumber: 2, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 03:00:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 03:00:17 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:00:17 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 03:00:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2ea483b63ed384003c279a248fdd0ec148d449, InitialSourceConnectionID: c80f66a10c3a9d9f, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4cb6edbe2a93ba7fe7db5646c8c5607b, MaxDatagramFrameSize: 65536, EnableResetStreamAt: false} 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=5) packet (280 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:00:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449 2025/09/12 03:00:17 client Long Header{Type: Initial, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 03:00:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:00:17 client Dropping Initial keys. 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=5) packet (1157 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:00:17 client -> Sending packet 1 (86 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 03:00:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 03:00:17 client Short Header{DestConnectionID: c80f66a10c3a9d9f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:00:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/09/12 03:00:17 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=0) packet (130 bytes) because we already dropped the keys. 2025/09/12 03:00:17 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 286 bytes. 2025/09/12 03:00:17 client <- Reading packet 6 (784 bytes) for connection (empty), Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c80f66a10c3a9d9f, PacketNumber: 6, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 03:00:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:00:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:00:17 client -> Sending packet 2 (97 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 80, Version: v1} 2025/09/12 03:00:17 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:00:17 client -> Sending packet 3 (90 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/09/12 03:00:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:00:17 client -> Sending packet 4 (90 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:00:17 client -> Sending packet 5 (90 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:00:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:00:17 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=0) packet (130 bytes) because we already dropped the keys. 2025/09/12 03:00:17 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 286 bytes. 2025/09/12 03:00:17 client <- Reading packet 10 (784 bytes) for connection (empty), Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c80f66a10c3a9d9f, PacketNumber: 10, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 03:00:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 03:00:17 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:00:17 client -> Sending packet 6 (44 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:17 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 03:00:17 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/12 03:00:18 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/09/12 03:00:18 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/09/12 03:00:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 03:00:18 client -> Sending packet 7 (90 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:18 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:00:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:00:18 client -> Sending packet 8 (90 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:18 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 03:00:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 03:00:18 client Parsed a coalesced packet. Part 1: 130 bytes. Remaining: 1070 bytes. 2025/09/12 03:00:18 client Dropping %!s(logging.PacketType=0) packet (130 bytes) because we already dropped the keys. 2025/09/12 03:00:18 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 286 bytes. 2025/09/12 03:00:18 client <- Reading packet 14 (784 bytes) for connection (empty), Handshake 2025/09/12 03:00:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c80f66a10c3a9d9f, PacketNumber: 14, PacketNumberLen: 2, Length: 767, Version: v1} 2025/09/12 03:00:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 745, Offset + Data length: 745} 2025/09/12 03:00:18 client Dropping %!s(logging.PacketType=5) packet (286 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/09/12 03:00:18 client -> Sending packet 9 (46 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, Handshake 2025/09/12 03:00:18 client Long Header{Type: Handshake, DestConnectionID: c80f66a10c3a9d9f, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:00:18 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 2, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/12 03:00:18 client <- Reading packet 15 (104 bytes) for connection (empty), 1-RTT 2025/09/12 03:00:18 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:00:18 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:00:18 client Dropping Handshake keys. 2025/09/12 03:00:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a693a0ce86433fbb, StatelessResetToken: 0x2e8d5d81e944a5992c2cf5ffd8df7243} 2025/09/12 03:00:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c56d8c9b63ed739d, StatelessResetToken: 0x37c114ac5566cfa02cf3ade135ce9a52} 2025/09/12 03:00:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e7b1dc996de27b7b, StatelessResetToken: 0xbcdfb5c186c18b444502a726203e6bda} 2025/09/12 03:00:18 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:00:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:00:18 client -> Sending packet 2 (53 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, 1-RTT (ECN: ECT(0)) 2025/09/12 03:00:18 client Short Header{DestConnectionID: a693a0ce86433fbb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:00:18 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 15, DelayTime: 146.273µs} 2025/09/12 03:00:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:00:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:00:18 client -> Sending packet 3 (48 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, 1-RTT (ECN: ECT(0)) 2025/09/12 03:00:18 client Short Header{DestConnectionID: a693a0ce86433fbb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:00:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:00:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:00:18 client -> Sending packet 4 (1366 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, 1-RTT (ECN: ECT(0)) 2025/09/12 03:00:18 client Short Header{DestConnectionID: a693a0ce86433fbb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:00:18 client -> &wire.PingFrame{} 2025/09/12 03:00:18 client <- Reading packet 16 (25 bytes) for connection (empty), 1-RTT 2025/09/12 03:00:18 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:00:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3.472ms} 2025/09/12 03:00:18 client <- Reading packet 17 (1047 bytes) for connection (empty), 1-RTT 2025/09/12 03:00:18 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:00:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:00:18 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:00:18 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:00:18 client -> Sending packet 5 (30 bytes) for connection 2ea483b63ed384003c279a248fdd0ec148d449, 1-RTT (ECN: ECT(0)) 2025/09/12 03:00:18 client Short Header{DestConnectionID: a693a0ce86433fbb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:00:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:00:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:00:18 client Connection 2ea483b63ed384003c279a248fdd0ec148d449 closed.