2025-04-30 09:28:56,319 Generated random file: bouqqdppnl of size: 10240 2025-04-30 09:28:56,319 Requests: https://server4:443/bouqqdppnl 2025-04-30 09:28:56,376 2025-04-30 09:28:56,376 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_otg3sh2g/ TESTCASE_SERVER=retry TESTCASE_CLIENT=retry WWW=/tmp/www_mt1fako3/ DOWNLOADS=/tmp/download_0vu2p9p6/ SERVER_LOGS=/tmp/logs_server_ax50a6gc CLIENT_LOGS=/tmp/logs_client_9mhe_57j SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=haproxytech/haproxy-qns:latest REQUESTS="https://server4:443/bouqqdppnl" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-04-30 09:29:11,061 Container sim Created Container server Recreate Container client Recreate Container client Recreated Container server Recreated Attaching to client, server, sim sim | waiting 10s for server:443 server | Setting up routes... server | Actual changes: server | tx-checksum-ip-generic: off server | tx-tcp-segmentation: off [not requested] server | tx-tcp-ecn-segmentation: off [not requested] server | tx-tcp-mangleid-segmentation: off [not requested] server | tx-tcp6-segmentation: off [not requested] server | tx-udp-segmentation: off [not requested] server | tx-checksum-sctp: off server | Endpoint's IPv4 address is 193.167.100.100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 client | Setting up routes... client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off server | starting lighttpd server client | Endpoint's IPv4 address is 193.167.0.100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 server | haproxy version HAProxy version 0f9b3daf98a80004f90e9540b0385d419f0e4e16 2025/04/25 - https://haproxy.org/ server | Status: development branch - not safe for use in production. server | Known bugs: https://github.com/haproxy/haproxy/issues?q=is:issue+is:open server | Running on: Linux 6.11.0-1012-azure #12~24.04.1-Ubuntu SMP Mon Mar 10 19:00:39 UTC 2025 x86_64 server | starting haproxy... client | Certificate was added to keystore client | wait-for-it.sh: waiting 30 seconds for sim:57832 sim | server:443 is available after 1.009334694s sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | tcpdump: listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes sim | tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 28:59.272 Creating connection with server4:443 with v1 client | 28:59.348 Original destination connection id: 83e02854e881235d (scid: a7d30c58287748b0) client | >- CryptoStream[I|ClientHello] client | 28:59.462 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) client | 28:59.500 <- (1) Packet I|-|R|85| Retry Token (46): 9c65233a5849862fe6af7a4e77ad115f4b6cf79e93aadeb71466c618e8c824fa27c2360d3e9c0d3b259acc2bbaca client | 28:59.523 -> Packet I|1|L|1200|2 Token=9c65233a5849862fe6af7a4e77ad115f4b6cf79e93aadeb71466c618e8c824fa27c2360d3e9c0d3b259acc2bbaca CryptoFrame[0,257] Padding(850) client | 28:59.558 <- (2) Packet I|0|L|176|2 Token=[] AckFrame[1|?1] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 28:59.585 -> Packet I|2|L|1201|2 Token=9c65233a5849862fe6af7a4e77ad115f4b6cf79e93aadeb71466c618e8c824fa27c2360d3e9c0d3b259acc2bbaca AckFrame[0|?0] Padding(1107) client | 28:59.558 <- (2) Packet H|0|L|1024|2 CryptoFrame[0,740] Padding(238) client | >- CryptoStream[H|Finished] client | 28:59.617 -> Packet H|0|L|80|1 CryptoFrame[0,36] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 28:59.620 -> Packet H|1|L|46|1 AckFrame[0|?0] client | 28:59.626 -> Packet A|0|S0|4a0099670aaaedcc|47|1 StreamFrame[0(CIB),0,17,fin] client | 28:59.651 <- (3) Packet H|1|L|46|1 AckFrame[0|?0] client | 28:59.651 <- (3) Packet A|0|S0|a7d30c58287748b0|544|1 CryptoFrame[0,514] client | -< CryptoStream[A|NewSessionTicket,NewSessionTicket] client | 28:59.653 <- (4) Packet A|1|S0|a7d30c58287748b0|94|3 HandshakeDoneFrame[] NewTokenFrame[b776d5976ebfef5032e2d645466675454be4f0112ecb141806145f66fb599846d79645e4e7] NewConnectionIdFrame[1,<0|25d2cfd7113e509e|f642c877b6eac2334c932b11934ac8f2] client | 28:59.660 <- (5) Packet A|2|S0|a7d30c58287748b0|1252|2 AckFrame[0|?2] StreamFrame[0(CIB),0,1216] client | 28:59.661 <- (6) Packet A|3|S0|a7d30c58287748b0|1252|1 StreamFrame[0(CIB),1216,1220] client | 28:59.662 -> Packet A|1|S0|4a0099670aaaedcc|32|1 AckFrame[1-0|?6] client | 28:59.665 -> Packet A|2|S0|4a0099670aaaedcc|32|1 AckFrame[3-0|?2] client | 28:59.667 <- (7) Packet A|4|S0|a7d30c58287748b0|1252|1 StreamFrame[0(CIB),2436,1220] client | 28:59.668 <- (8) Packet A|5|S0|a7d30c58287748b0|1252|1 StreamFrame[0(CIB),3656,1220] client | 28:59.670 -> Packet A|3|S0|4a0099670aaaedcc|32|1 AckFrame[5-0|?1] client | 28:59.675 <- (9) Packet A|6|S0|a7d30c58287748b0|1252|1 StreamFrame[0(CIB),4876,1220] client | 28:59.676 <- (10) Packet A|7|S0|a7d30c58287748b0|1252|1 StreamFrame[0(CIB),6096,1220] client | 28:59.678 -> Packet A|4|S0|4a0099670aaaedcc|32|1 AckFrame[7-0|?1] client | 28:59.682 <- (11) Packet A|8|S0|a7d30c58287748b0|1252|1 StreamFrame[0(CIB),7316,1220] client | 28:59.683 <- (12) Packet A|9|S0|a7d30c58287748b0|1252|1 StreamFrame[0(CIB),8536,1220] client | 28:59.685 -> Packet A|5|S0|4a0099670aaaedcc|32|1 AckFrame[9-0|?1] client | 28:59.689 <- (13) Packet A|10|S0|a7d30c58287748b0|516|1 StreamFrame[0(CIB),9756,484,fin] client | Get requested finished in 0.35 sec (0.03 MB/s) : tech.kwik.h09.client.HttpResponseImpl@2ddc8ecb client | 28:59.704 Closing ClientConnection[83e02854e881235d/a7d30c58287748b0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 28:59.707 -> Packet A|6|S0|4a0099670aaaedcc|36|2 ConnectionCloseFrame[0|0|] AckFrame[10-0|?17] client | 28:59.739 <- (14) Packet A|11|S0|a7d30c58287748b0|30|1 ConnectionCloseFrame[0|1|] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container server Stopping Container client Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-04-30 09:29:11,152 Using the server's key log file. 2025-04-30 09:29:11,161 2025-04-30 09:29:11,162 Using the server's key log file. 2025-04-30 09:29:11,162 Using the server's key log file. 2025-04-30 09:29:11,170 2025-04-30 09:29:11,170 Using the server's key log file. 2025-04-30 09:29:11,720 Check of downloaded files succeeded. 2025-04-30 09:29:12,278 Check of Retry succeeded. Token used: 9c65233a5849862fe6af7a4e77ad115f4b6cf79e93aadeb71466c618e8c824fa27c2360d3e9c0d3b259acc2bbaca