2025/04/30 13:07:55 Requesting https://server4:443/fosttpezzz. 2025/04/30 13:07:55 Increased receive buffer size to 14336 kiB 2025/04/30 13:07:55 Increased send buffer size to 14336 kiB 2025/04/30 13:07:55 Setting DF for IPv4 and IPv6. 2025/04/30 13:07:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:07:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:07:55 Created qlog file: /logs/qlog/9224c70474dde80d19c8c814.sqlog 2025/04/30 13:07:55 client Starting new connection to server4 ([::]:42271 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9224c70474dde80d19c8c814, version v1 2025/04/30 13:07:55 Adding connection ID (empty). 2025/04/30 13:07:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:07:55 client -> Sending packet 0 (1280 bytes) for connection 9224c70474dde80d19c8c814, Initial 2025/04/30 13:07:55 client Long Header{Type: Initial, DestConnectionID: 9224c70474dde80d19c8c814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:07:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:07:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:07:55 client -> Sending packet 1 (1280 bytes) for connection 9224c70474dde80d19c8c814, Initial 2025/04/30 13:07:55 client Long Header{Type: Initial, DestConnectionID: 9224c70474dde80d19c8c814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:07:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:07:55 client -> Sending packet 2 (1280 bytes) for connection 9224c70474dde80d19c8c814, Initial 2025/04/30 13:07:55 client Long Header{Type: Initial, DestConnectionID: 9224c70474dde80d19c8c814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:07:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:07:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:07:56 client -> Sending packet 3 (1280 bytes) for connection 9224c70474dde80d19c8c814, Initial 2025/04/30 13:07:56 client Long Header{Type: Initial, DestConnectionID: 9224c70474dde80d19c8c814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:07:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:07:56 client -> Sending packet 4 (1280 bytes) for connection 9224c70474dde80d19c8c814, Initial 2025/04/30 13:07:56 client Long Header{Type: Initial, DestConnectionID: 9224c70474dde80d19c8c814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:07:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:07:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:07:57 client -> Sending packet 5 (1280 bytes) for connection 9224c70474dde80d19c8c814, Initial 2025/04/30 13:07:57 client Long Header{Type: Initial, DestConnectionID: 9224c70474dde80d19c8c814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:07:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:07:57 client -> Sending packet 6 (1280 bytes) for connection 9224c70474dde80d19c8c814, Initial 2025/04/30 13:07:57 client Long Header{Type: Initial, DestConnectionID: 9224c70474dde80d19c8c814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:07:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:07:57 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 13:07:57 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 13:07:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7402c4a51a1566c0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 13:07:57 client Received first packet. Switching destination connection ID to: 7402c4a51a1566c0 2025/04/30 13:07:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:07:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:07:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:07:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:07:57 client Parsed a coalesced packet. Part 2: 709 bytes. Remaining: 357 bytes. 2025/04/30 13:07:57 client <- Reading packet 0 (709 bytes) for connection (empty), Handshake 2025/04/30 13:07:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7402c4a51a1566c0, PacketNumber: 0, PacketNumberLen: 1, Length: 692, Version: v1} 2025/04/30 13:07:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 671, Offset + Data length: 671} 2025/04/30 13:07:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:07:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:07:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9224c70474dde80d19c8c814, InitialSourceConnectionID: 7402c4a51a1566c0, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 13:07:57 client <- Reading packet 0 (357 bytes) for connection (empty), 1-RTT 2025/04/30 13:07:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:07:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8b4344b751247e5f, StatelessResetToken: 0xf877c3390d83db5aadb0fac5afc6f6d2} 2025/04/30 13:07:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1268bca439cc8f9a, StatelessResetToken: 0x5dfd305ea8ab2965e3f6c270945b9d96} 2025/04/30 13:07:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bf4483dc72de9c69, StatelessResetToken: 0xf679ffb84069b621f1c01b28384fbf7f} 2025/04/30 13:07:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:07:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9224c70474dde80d19c8c814 2025/04/30 13:07:57 client Long Header{Type: Initial, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 13:07:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:07:57 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:07:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:07:57 client Short Header{DestConnectionID: 8b4344b751247e5f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:07:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:07:57 client Dropping Initial keys. 2025/04/30 13:07:57 client -> Sending packet 1 (86 bytes) for connection 9224c70474dde80d19c8c814, Handshake 2025/04/30 13:07:57 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:07:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:07:57 client Short Header{DestConnectionID: 8b4344b751247e5f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:07:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:07:57 client -> Sending packet 2 (33 bytes) for connection 9224c70474dde80d19c8c814, 1-RTT (ECN: ECT(0)) 2025/04/30 13:07:57 client Short Header{DestConnectionID: 8b4344b751247e5f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:07:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 918.785µs} 2025/04/30 13:07:57 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 13:07:57 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 13:07:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:07:57 client -> Sending packet 2 (74 bytes) for connection 9224c70474dde80d19c8c814, Handshake 2025/04/30 13:07:57 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:07:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:07:57 client -> Sending packet 3 (74 bytes) for connection 9224c70474dde80d19c8c814, Handshake 2025/04/30 13:07:57 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:07:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:07:57 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 13:07:57 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 13:07:57 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 13:07:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 13:07:57 client -> Sending packet 4 (74 bytes) for connection 9224c70474dde80d19c8c814, Handshake 2025/04/30 13:07:57 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:07:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:07:57 client -> Sending packet 5 (74 bytes) for connection 9224c70474dde80d19c8c814, Handshake 2025/04/30 13:07:57 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:07:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:07:58 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 13:07:58 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/04/30 13:07:58 client Parsed a coalesced packet. Part 2: 709 bytes. Remaining: 362 bytes. 2025/04/30 13:07:58 client <- Reading packet 1 (709 bytes) for connection (empty), Handshake 2025/04/30 13:07:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7402c4a51a1566c0, PacketNumber: 1, PacketNumberLen: 1, Length: 692, Version: v1} 2025/04/30 13:07:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 671, Offset + Data length: 671} 2025/04/30 13:07:58 client Dropping %!s(logging.PacketType=5) packet (362 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 13:07:58 client -> Sending packet 6 (40 bytes) for connection 9224c70474dde80d19c8c814, Handshake 2025/04/30 13:07:58 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:07:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:07:58 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 13:07:58 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 13:07:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 13:07:58 client -> Sending packet 7 (74 bytes) for connection 9224c70474dde80d19c8c814, Handshake 2025/04/30 13:07:58 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:07:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:07:58 client -> Sending packet 8 (74 bytes) for connection 9224c70474dde80d19c8c814, Handshake 2025/04/30 13:07:58 client Long Header{Type: Handshake, DestConnectionID: 8b4344b751247e5f, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:07:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:07:58 client <- Reading packet 1 (52 bytes) for connection (empty), 1-RTT 2025/04/30 13:07:58 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:07:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 13:07:58 client Peer doesn't await address validation any longer. 2025/04/30 13:07:58 client newly acked packets (1): [0] 2025/04/30 13:07:58 client updated RTT: 1.5023809s (σ: 751.19045ms) 2025/04/30 13:07:58 client Dropping Handshake keys. 2025/04/30 13:07:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:07:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b449a8babd80e7f1, StatelessResetToken: 0x69ca2e69977a23feae29c1ed101b1a95} 2025/04/30 13:07:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:07:58 client <- Reading packet 2 (1051 bytes) for connection (empty), 1-RTT 2025/04/30 13:07:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:07:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 184µs} 2025/04/30 13:07:58 client newly acked packets (1): [1] 2025/04/30 13:07:58 client Canceling loss detection timer. 2025/04/30 13:07:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:07:58 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:07:58 client -> Sending packet 3 (32 bytes) for connection 9224c70474dde80d19c8c814, 1-RTT (ECN: ECT(0)) 2025/04/30 13:07:58 client Short Header{DestConnectionID: 8b4344b751247e5f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:07:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 78.428µs} 2025/04/30 13:07:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:07:58 client -> Sending packet 4 (30 bytes) for connection 9224c70474dde80d19c8c814, 1-RTT (ECN: ECT(0)) 2025/04/30 13:07:58 client Short Header{DestConnectionID: 8b4344b751247e5f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:07:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:07:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:07:58 client Connection 9224c70474dde80d19c8c814 closed.