2025/04/30 13:10:27 Requesting https://server4:443/vecemevsmt. 2025/04/30 13:10:27 Increased receive buffer size to 14336 kiB 2025/04/30 13:10:27 Increased send buffer size to 14336 kiB 2025/04/30 13:10:27 Setting DF for IPv4 and IPv6. 2025/04/30 13:10:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:10:27 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:10:27 Created qlog file: /logs/qlog/490c29cd01283fd28f45bb.sqlog 2025/04/30 13:10:27 client Starting new connection to server4 ([::]:49953 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 490c29cd01283fd28f45bb, version v1 2025/04/30 13:10:27 Adding connection ID (empty). 2025/04/30 13:10:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:10:27 client -> Sending packet 0 (1280 bytes) for connection 490c29cd01283fd28f45bb, Initial 2025/04/30 13:10:27 client Long Header{Type: Initial, DestConnectionID: 490c29cd01283fd28f45bb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:10:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:10:28 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 13:10:28 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 13:10:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 13:10:28 client Received first packet. Switching destination connection ID to: 530500828246e544 2025/04/30 13:10:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client newly acked packets (1): [0] 2025/04/30 13:10:28 client updated RTT: 38.338903ms (σ: 19.169451ms) 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:10:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:10:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:10:28 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 13:10:28 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 1028, Offset + Data length: 1028} 2025/04/30 13:10:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 490c29cd01283fd28f45bb, InitialSourceConnectionID: 530500828246e544, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 65536, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 13:10:28 client -> Sending packet 1 (1280 bytes) for connection 490c29cd01283fd28f45bb, Initial 2025/04/30 13:10:28 client Long Header{Type: Initial, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client -> Sending packet 0 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client Dropping Initial keys. 2025/04/30 13:10:28 client <- Reading packet 1 (1200 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 1028, Data length: 1161, Offset + Data length: 2189} 2025/04/30 13:10:28 client -> Sending packet 1 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client <- Reading packet 2 (1200 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 2189, Data length: 1161, Offset + Data length: 3350} 2025/04/30 13:10:28 client -> Sending packet 2 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client <- Reading packet 3 (240 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 3, PacketNumberLen: 1, Length: 223, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 3350, Data length: 201, Offset + Data length: 3551} 2025/04/30 13:10:28 client -> Sending packet 3 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client -> Sending packet 4 (37 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 13:10:28 client -> &wire.PingFrame{} 2025/04/30 13:10:28 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 13:10:28 client -> Sending packet 5 (37 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 13:10:28 client -> &wire.PingFrame{} 2025/04/30 13:10:28 client -> Sending packet 6 (37 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 13:10:28 client -> &wire.PingFrame{} 2025/04/30 13:10:28 client <- Reading packet 4 (1200 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 4, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 13:10:28 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/04/30 13:10:28 client Peer doesn't await address validation any longer. 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 3551, Data length: 1156, Offset + Data length: 4707} 2025/04/30 13:10:28 client -> Sending packet 7 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client <- Reading packet 5 (1200 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 5, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 4707, Data length: 1161, Offset + Data length: 5868} 2025/04/30 13:10:28 client -> Sending packet 8 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client <- Reading packet 6 (1200 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 6, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 5868, Data length: 1161, Offset + Data length: 7029} 2025/04/30 13:10:28 client -> Sending packet 9 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client <- Reading packet 7 (1200 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 7, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 7029, Data length: 1161, Offset + Data length: 8190} 2025/04/30 13:10:28 client -> Sending packet 10 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client <- Reading packet 8 (1200 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 8, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 8190, Data length: 1161, Offset + Data length: 9351} 2025/04/30 13:10:28 client -> Sending packet 11 (40 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 530500828246e544, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client Parsed a coalesced packet. Part 1: 604 bytes. Remaining: 102 bytes. 2025/04/30 13:10:28 client <- Reading packet 9 (604 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 9, PacketNumberLen: 1, Length: 587, Version: v1} 2025/04/30 13:10:28 client <- &wire.CryptoFrame{Offset: 9351, Data length: 565, Offset + Data length: 9916} 2025/04/30 13:10:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:10:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:10:28 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 13:10:28 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:10:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1cd32a0b13d0ec0d, StatelessResetToken: 0x2675efd92b3f7fa220ccbf8d1275984c} 2025/04/30 13:10:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2004f0b11ca4d347, StatelessResetToken: 0xd3367c6bb491b64021e345e4835013f1} 2025/04/30 13:10:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a4cca2b2af2d6f2f, StatelessResetToken: 0xbf277ed4ff2d8c18ca9335eea1de0ca3} 2025/04/30 13:10:28 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:10:28 client <- Reading packet 10 (39 bytes) for connection (empty), Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 530500828246e544, PacketNumber: 10, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 13:10:28 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s} 2025/04/30 13:10:28 client newly acked packets (1): [6] 2025/04/30 13:10:28 client updated RTT: 38.105ms (σ: 14.842ms) 2025/04/30 13:10:28 client Canceling loss detection timer. 2025/04/30 13:10:28 client -> Sending packet 12 (108 bytes) for connection 490c29cd01283fd28f45bb, Handshake 2025/04/30 13:10:28 client Long Header{Type: Handshake, DestConnectionID: 1cd32a0b13d0ec0d, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:10:28 client Short Header{DestConnectionID: 1cd32a0b13d0ec0d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:10:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:10:28 client -> Sending packet 1 (33 bytes) for connection 490c29cd01283fd28f45bb, 1-RTT (ECN: ECT(0)) 2025/04/30 13:10:28 client Short Header{DestConnectionID: 1cd32a0b13d0ec0d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 564.59µs} 2025/04/30 13:10:28 client -> Sending packet 2 (46 bytes) for connection 490c29cd01283fd28f45bb, 1-RTT (ECN: ECT(0)) 2025/04/30 13:10:28 client Short Header{DestConnectionID: 1cd32a0b13d0ec0d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:10:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:10:28 client <- Reading packet 1 (52 bytes) for connection (empty), 1-RTT 2025/04/30 13:10:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:10:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:10:28 client newly acked packets (1): [0] 2025/04/30 13:10:28 client updated RTT: 37.193ms (σ: 12.953ms) 2025/04/30 13:10:28 client Dropping Handshake keys. 2025/04/30 13:10:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:10:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 9a73b07b452913f1, StatelessResetToken: 0x85f125ecd84dc8d926e9f1d276057e88} 2025/04/30 13:10:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:10:28 client <- Reading packet 2 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:10:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:10:28 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 13:10:28 client newly acked packets (1): [2] 2025/04/30 13:10:28 client updated RTT: 36.501ms (σ: 11.097ms) 2025/04/30 13:10:28 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 13:10:28 client Canceling loss detection timer. 2025/04/30 13:10:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1173, Offset + Data length: 1173} 2025/04/30 13:10:28 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:10:28 client -> Sending packet 3 (32 bytes) for connection 490c29cd01283fd28f45bb, 1-RTT (ECN: Not-ECT) 2025/04/30 13:10:28 client Short Header{DestConnectionID: 1cd32a0b13d0ec0d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 73.207µs} 2025/04/30 13:10:28 client <- Reading packet 3 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:10:28 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:10:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1173, Data length: 1176, Offset + Data length: 2349} 2025/04/30 13:10:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:10:28 client <- Reading packet 4 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:10:28 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:10:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2349, Data length: 1176, Offset + Data length: 3525} 2025/04/30 13:10:28 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:10:28 client -> Sending packet 4 (32 bytes) for connection 490c29cd01283fd28f45bb, 1-RTT (ECN: Not-ECT) 2025/04/30 13:10:28 client Short Header{DestConnectionID: 1cd32a0b13d0ec0d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 43.231µs} 2025/04/30 13:10:28 client <- Reading packet 5 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:10:28 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:10:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3525, Data length: 1176, Offset + Data length: 4701} 2025/04/30 13:10:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:10:28 client <- Reading packet 6 (443 bytes) for connection (empty), 1-RTT 2025/04/30 13:10:28 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:10:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 4701, Data length: 419, Offset + Data length: 5120} 2025/04/30 13:10:28 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:10:28 client -> Sending packet 5 (32 bytes) for connection 490c29cd01283fd28f45bb, 1-RTT (ECN: Not-ECT) 2025/04/30 13:10:28 client Short Header{DestConnectionID: 1cd32a0b13d0ec0d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:10:28 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 45.556µs} 2025/04/30 13:10:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:10:28 client -> Sending packet 6 (30 bytes) for connection 490c29cd01283fd28f45bb, 1-RTT (ECN: Not-ECT) 2025/04/30 13:10:28 client Short Header{DestConnectionID: 1cd32a0b13d0ec0d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:10:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:10:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:10:28 client Connection 490c29cd01283fd28f45bb closed.