2025/09/12 07:07:00 Requesting https://server4:443/hqwxunysre. 2025/09/12 07:07:00 Increased receive buffer size to 14336 kiB 2025/09/12 07:07:00 Increased send buffer size to 14336 kiB 2025/09/12 07:07:00 Setting DF for IPv4 and IPv6. 2025/09/12 07:07:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 07:07:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 07:07:00 Created qlog file: /logs/qlog/d53628df79e39e54.sqlog 2025/09/12 07:07:00 client Starting new connection to server4 ([::]:46907 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d53628df79e39e54, version v1 2025/09/12 07:07:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 07:07:00 client -> Sending packet 0 (1280 bytes) for connection d53628df79e39e54, Initial 2025/09/12 07:07:00 client Long Header{Type: Initial, DestConnectionID: d53628df79e39e54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 07:07:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 07:07:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 07:07:00 client -> Sending packet 1 (1280 bytes) for connection d53628df79e39e54, Initial 2025/09/12 07:07:00 client Long Header{Type: Initial, DestConnectionID: d53628df79e39e54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 07:07:00 client -> &wire.CryptoFrame{Offset: 1240, Data length: 276, Offset + Data length: 1516} 2025/09/12 07:07:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 07:07:00 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 07:07:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12b0da1ac4c26b57, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 07:07:00 client Received first packet. Switching destination connection ID to: 12b0da1ac4c26b57 2025/09/12 07:07:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 07:07:00 client newly acked packets (1): [0] 2025/09/12 07:07:00 client updated RTT: 36.881083ms (σ: 18.440541ms) 2025/09/12 07:07:00 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 07:07:00 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 07:07:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12b0da1ac4c26b57, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 07:07:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 07:07:00 client newly acked packets (1): [1] 2025/09/12 07:07:00 client updated RTT: 37.045ms (σ: 14.158ms) 2025/09/12 07:07:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 07:07:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 07:07:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 07:07:00 client Parsed a coalesced packet. Part 2: 705 bytes. Remaining: 361 bytes. 2025/09/12 07:07:00 client <- Reading packet 0 (705 bytes) for connection (empty), Handshake 2025/09/12 07:07:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12b0da1ac4c26b57, PacketNumber: 0, PacketNumberLen: 1, Length: 688, Version: v1} 2025/09/12 07:07:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 667, Offset + Data length: 667} 2025/09/12 07:07:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 07:07:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 07:07:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d53628df79e39e54, InitialSourceConnectionID: 12b0da1ac4c26b57, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, EnableResetStreamAt: false} 2025/09/12 07:07:00 client <- Reading packet 0 (361 bytes) for connection (empty), 1-RTT 2025/09/12 07:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 07:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d40ccf061c0bb0ad, StatelessResetToken: 0x7484bc27de0a2b8d67345346d481716d} 2025/09/12 07:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 540ab4f95e9ad90e, StatelessResetToken: 0x8e743ddd9b4010cef68114fa58793282} 2025/09/12 07:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a01cd11eba6d7479, StatelessResetToken: 0xe077dd87276b8208c0cef9c85e2c98d1} 2025/09/12 07:07:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 07:07:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d53628df79e39e54 2025/09/12 07:07:00 client Long Header{Type: Initial, DestConnectionID: d40ccf061c0bb0ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 07:07:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 07:07:00 client Long Header{Type: Handshake, DestConnectionID: d40ccf061c0bb0ad, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 07:07:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 07:07:00 client Short Header{DestConnectionID: d40ccf061c0bb0ad, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 07:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 07:07:00 client Dropping Initial keys. 2025/09/12 07:07:00 client -> Sending packet 1 (86 bytes) for connection d53628df79e39e54, Handshake 2025/09/12 07:07:00 client Long Header{Type: Handshake, DestConnectionID: d40ccf061c0bb0ad, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 07:07:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 07:07:00 client Short Header{DestConnectionID: d40ccf061c0bb0ad, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 07:07:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 07:07:00 client -> Sending packet 2 (33 bytes) for connection d53628df79e39e54, 1-RTT (ECN: ECT(0)) 2025/09/12 07:07:00 client Short Header{DestConnectionID: d40ccf061c0bb0ad, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 07:07:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 876.5µs} 2025/09/12 07:07:00 client <- Reading packet 1 (52 bytes) for connection (empty), 1-RTT 2025/09/12 07:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 07:07:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 07:07:00 client Peer doesn't await address validation any longer. 2025/09/12 07:07:00 client newly acked packets (1): [0] 2025/09/12 07:07:00 client updated RTT: 36.388ms (σ: 11.931ms) 2025/09/12 07:07:00 client Dropping Handshake keys. 2025/09/12 07:07:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 07:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 3b492102e1d6a690, StatelessResetToken: 0x9acb882e679c6a019de909ec66f629af} 2025/09/12 07:07:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 07:07:00 client <- Reading packet 2 (1051 bytes) for connection (empty), 1-RTT 2025/09/12 07:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 07:07:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 64µs} 2025/09/12 07:07:00 client newly acked packets (1): [1] 2025/09/12 07:07:00 client Canceling loss detection timer. 2025/09/12 07:07:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 07:07:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 07:07:00 client -> Sending packet 3 (32 bytes) for connection d53628df79e39e54, 1-RTT (ECN: ECT(0)) 2025/09/12 07:07:00 client Short Header{DestConnectionID: d40ccf061c0bb0ad, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 07:07:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 79.427µs} 2025/09/12 07:07:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 07:07:00 client -> Sending packet 4 (30 bytes) for connection d53628df79e39e54, 1-RTT (ECN: ECT(0)) 2025/09/12 07:07:00 client Short Header{DestConnectionID: d40ccf061c0bb0ad, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 07:07:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 07:07:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 07:07:00 client Connection d53628df79e39e54 closed.