2025-04-30 09:33:50,543 Generated random file: ykrifxtfme of size: 1024 2025-04-30 09:33:50,543 Requests: https://server4:443/ykrifxtfme 2025-04-30 09:33:50,603 2025-04-30 09:33:50,603 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_z888xhz1/ TESTCASE_SERVER=v2 TESTCASE_CLIENT=v2 WWW=/tmp/www_cdm8vrwc/ DOWNLOADS=/tmp/download_1_j5edcm/ SERVER_LOGS=/tmp/logs_server_me4whdq9 CLIENT_LOGS=/tmp/logs_client_5lwhvqmy SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=haproxytech/haproxy-qns:latest REQUESTS="https://server4:443/ykrifxtfme" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-04-30 09:34:04,557 Container sim Created Container server Recreate Container client Recreate Container client Recreated Container server Recreated Attaching to client, server, sim sim | waiting 10s for server:443 server | Setting up routes... server | Actual changes: server | tx-checksum-ip-generic: off server | tx-tcp-segmentation: off [not requested] server | tx-tcp-ecn-segmentation: off [not requested] server | tx-tcp-mangleid-segmentation: off [not requested] server | tx-tcp6-segmentation: off [not requested] server | tx-udp-segmentation: off [not requested] server | tx-checksum-sctp: off server | Endpoint's IPv4 address is 193.167.100.100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 server | starting lighttpd server client | Setting up routes... client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off client | Endpoint's IPv4 address is 193.167.0.100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 server | haproxy version HAProxy version 0f9b3daf98a80004f90e9540b0385d419f0e4e16 2025/04/25 - https://haproxy.org/ server | Status: development branch - not safe for use in production. server | Known bugs: https://github.com/haproxy/haproxy/issues?q=is:issue+is:open server | Running on: Linux 6.11.0-1012-azure #12~24.04.1-Ubuntu SMP Mon Mar 10 19:00:39 UTC 2025 x86_64 server | starting haproxy... client | Certificate was added to keystore client | wait-for-it.sh: waiting 30 seconds for sim:57832 sim | server:443 is available after 1.033685108s sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | tcpdump: listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes sim | tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 33:52.763 Creating connection with server4:443 with v1 client | 33:52.850 Original destination connection id: 0ba6ab04cbdc2a65 (scid: c383c063d4c8f41b) client | >- CryptoStream[I|ClientHello] client | 33:53.004 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,271] Padding(882) client | 33:53.056 Receiving packet with version v2, while connection version is v1 client | 33:53.047 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|?1] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 33:53.103 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|?0] Padding(1153) client | 33:53.047 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,729] Padding(249) client | 33:53.113 Version negotiation resulted in changing version from v1 to v2 client | >- CryptoStream[H|Finished] client | 33:53.138 -> Packet H|0|L|80|1 CryptoFrame[0,36] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 33:53.143 -> Packet H|1|L|46|1 AckFrame[0|?0] client | 33:53.151 -> Packet A|0|S0|1eeb3f123689b348|47|1 StreamFrame[0(CIB),0,17,fin] client | 33:53.173 <- (2) Packet H|1|L|46|1 AckFrame[0|?0] client | 33:53.173 <- (2) Packet A|0|S0|c383c063d4c8f41b|544|1 CryptoFrame[0,514] client | -< CryptoStream[A|NewSessionTicket,NewSessionTicket] client | 33:53.174 <- (3) Packet A|1|S0|c383c063d4c8f41b|94|3 HandshakeDoneFrame[] NewTokenFrame[b7fb584183cb5b528e4910aa24cd39e7d6070a38080fbaab3d8f4ea35d1608106eb2fb9d72] NewConnectionIdFrame[1,<0|19441feda1bf309d|51f41a91d8e0e1831b6f71f134443603] client | 33:53.184 -> Packet A|1|S0|1eeb3f123689b348|32|1 AckFrame[1-0|?6] client | 33:53.187 <- (4) Packet A|2|S0|c383c063d4c8f41b|1060|2 AckFrame[0|?4] StreamFrame[0(CIB),0,1024,fin] client | Get requested finished in 0.34 sec (0.00 MB/s) : tech.kwik.h09.client.HttpResponseImpl@7a4ccb53 client | 33:53.202 Closing ClientConnection[0ba6ab04cbdc2a65/c383c063d4c8f41b(V2) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 33:53.205 -> Packet A|2|S0|1eeb3f123689b348|36|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|?15] client | 33:53.236 <- (5) Packet A|3|S0|c383c063d4c8f41b|30|1 ConnectionCloseFrame[0|1|] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container server Stopping Container client Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-04-30 09:34:04,654 Using the client's key log file. 2025-04-30 09:34:04,665 2025-04-30 09:34:04,665 Using the client's key log file. 2025-04-30 09:34:04,665 Using the client's key log file. 2025-04-30 09:34:04,675 2025-04-30 09:34:04,676 Using the client's key log file. 2025-04-30 09:34:05,794 Check of downloaded files succeeded.