2025/09/12 11:18:45 Requesting https://server4:443/hdoquhvxpc. 2025/09/12 11:18:45 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:45 Increased send buffer size to 14336 kiB 2025/09/12 11:18:45 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:45 Created qlog file: /logs/qlog/32c35e2e6f559239.sqlog 2025/09/12 11:18:45 client Starting new connection to server4 ([::]:48290 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 32c35e2e6f559239, version v1 2025/09/12 11:18:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:45 client -> Sending packet 0 (1280 bytes) for connection 32c35e2e6f559239, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: 32c35e2e6f559239, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:45 client -> Sending packet 1 (1280 bytes) for connection 32c35e2e6f559239, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: 32c35e2e6f559239, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:45 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4298d26008549ab, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/09/12 11:18:45 client Received first packet. Switching destination connection ID to: c4298d26008549ab 2025/09/12 11:18:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 24ms} 2025/09/12 11:18:45 client newly acked packets (1): [1] 2025/09/12 11:18:45 client updated RTT: 39.077719ms (σ: 19.538859ms) 2025/09/12 11:18:45 client setting loss timer for packet 0 (Initial) to 43.962433ms (in 2025-09-12 11:18:45.213240757 +0000 UTC m=+0.045384598) 2025/09/12 11:18:45 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:45.213240757 +0000 UTC m=+0.045384598 2025/09/12 11:18:45 client lost packet 0 (time threshold) 2025/09/12 11:18:45 client -> Sending packet 2 (1280 bytes) for connection 32c35e2e6f559239, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: c4298d26008549ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:45 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:45 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4298d26008549ab, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:45 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:45 client newly acked packets (1): [2] 2025/09/12 11:18:45 client updated RTT: 38.485ms (σ: 15.835ms) 2025/09/12 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:45 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:45 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c4298d26008549ab, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/09/12 11:18:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 32c35e2e6f559239, InitialSourceConnectionID: c4298d26008549ab, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb0bc39149a61d974271a2a9963072b8a, EnableResetStreamAt: false} 2025/09/12 11:18:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 32c35e2e6f559239 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: c4298d26008549ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: c4298d26008549ab, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:45 client Dropping Initial keys. 2025/09/12 11:18:45 client -> Sending packet 1 (86 bytes) for connection 32c35e2e6f559239, Handshake 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: c4298d26008549ab, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:45 client Short Header{DestConnectionID: c4298d26008549ab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:18:45 client -> Sending packet 2 (90 bytes) for connection 32c35e2e6f559239, Handshake 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: c4298d26008549ab, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:45 client -> Sending packet 3 (90 bytes) for connection 32c35e2e6f559239, Handshake 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: c4298d26008549ab, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:45 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 568 bytes. 2025/09/12 11:18:45 client <- Reading packet 1 (40 bytes) for connection (empty), Handshake 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c4298d26008549ab, PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:18:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:45 client Peer doesn't await address validation any longer. 2025/09/12 11:18:45 client newly acked packets (1): [3] 2025/09/12 11:18:45 client updated RTT: 37.792ms (σ: 13.262ms) 2025/09/12 11:18:45 client Canceling loss detection timer. 2025/09/12 11:18:45 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:45 client -> Sending packet 1 (32 bytes) for connection 32c35e2e6f559239, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:45 client Short Header{DestConnectionID: c4298d26008549ab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 209.971µs} 2025/09/12 11:18:45 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104ms} 2025/09/12 11:18:45 client newly acked packets (1): [0] 2025/09/12 11:18:45 client updated RTT: 46.974ms (σ: 28.31ms) 2025/09/12 11:18:45 client Dropping Handshake keys. 2025/09/12 11:18:45 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:45 client <- &wire.NewTokenFrame{Token: 0xb78fa1ed990df39727f96604be78c29f8d1c0c4dfce1520031b3e2e9bf414cbeef9fea36e8} 2025/09/12 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb47a56ef24ef2b5, StatelessResetToken: 0x6670b457730fe95ddb6ac8080be4ca92} 2025/09/12 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9507aa320b0aaa17, StatelessResetToken: 0x7fa5828a71e63c88c3868dbc937d2652} 2025/09/12 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f66a06006e5a7dd7, StatelessResetToken: 0xdeb614a2a805c993604b6940a092cc14} 2025/09/12 11:18:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:45 client -> Sending packet 2 (34 bytes) for connection 32c35e2e6f559239, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:45 client Short Header{DestConnectionID: cb47a56ef24ef2b5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 124.081µs} 2025/09/12 11:18:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:45 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:45 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:45 client -> Sending packet 3 (30 bytes) for connection 32c35e2e6f559239, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:45 client Short Header{DestConnectionID: cb47a56ef24ef2b5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:45 client Connection 32c35e2e6f559239 closed. 2025/09/12 11:18:45 Requesting https://server4:443/icltpewbhb. 2025/09/12 11:18:45 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:45 Increased send buffer size to 14336 kiB 2025/09/12 11:18:45 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:45 Created qlog file: /logs/qlog/7c34ad1542c1601e.sqlog 2025/09/12 11:18:45 client Starting new connection to server4 ([::]:41072 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7c34ad1542c1601e, version v1 2025/09/12 11:18:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:45 client -> Sending packet 0 (1280 bytes) for connection 7c34ad1542c1601e, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: 7c34ad1542c1601e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:45 client -> Sending packet 1 (1280 bytes) for connection 7c34ad1542c1601e, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: 7c34ad1542c1601e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/09/12 11:18:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:45 client -> Sending packet 2 (1280 bytes) for connection 7c34ad1542c1601e, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: 7c34ad1542c1601e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:45 client -> Sending packet 3 (1280 bytes) for connection 7c34ad1542c1601e, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: 7c34ad1542c1601e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:45 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5b43ffa6e2dda37, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:45 client Received first packet. Switching destination connection ID to: e5b43ffa6e2dda37 2025/09/12 11:18:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:45 client newly acked packets (1): [3] 2025/09/12 11:18:45 client updated RTT: 33.408545ms (σ: 16.704272ms) 2025/09/12 11:18:45 client setting loss timer for packet 2 (Initial) to 37.584613ms (in 2025-09-12 11:18:45.6263236 +0000 UTC m=+0.458466780) 2025/09/12 11:18:45 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:45.6263236 +0000 UTC m=+0.458466780 2025/09/12 11:18:45 client lost packet 2 (time threshold) 2025/09/12 11:18:45 client -> Sending packet 4 (1280 bytes) for connection 7c34ad1542c1601e, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: e5b43ffa6e2dda37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:45 client -> Sending packet 5 (1280 bytes) for connection 7c34ad1542c1601e, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: e5b43ffa6e2dda37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:45 client -> Sending packet 6 (1280 bytes) for connection 7c34ad1542c1601e, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: e5b43ffa6e2dda37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:45 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:18:45 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5b43ffa6e2dda37, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:18:45 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:18:45 client newly acked packets (1): [6] 2025/09/12 11:18:45 client updated RTT: 33.597ms (σ: 12.906ms) 2025/09/12 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:45 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:18:45 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5b43ffa6e2dda37, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 11:18:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7c34ad1542c1601e, InitialSourceConnectionID: e5b43ffa6e2dda37, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd1149aa42804345c277ca901c81da37a, EnableResetStreamAt: false} 2025/09/12 11:18:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7c34ad1542c1601e 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: e5b43ffa6e2dda37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: e5b43ffa6e2dda37, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:45 client Dropping Initial keys. 2025/09/12 11:18:45 client -> Sending packet 1 (86 bytes) for connection 7c34ad1542c1601e, Handshake 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: e5b43ffa6e2dda37, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:45 client Short Header{DestConnectionID: e5b43ffa6e2dda37, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:45 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:45 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5b43ffa6e2dda37, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:45 client Peer doesn't await address validation any longer. 2025/09/12 11:18:45 client newly acked packets (1): [0] 2025/09/12 11:18:45 client Canceling loss detection timer. 2025/09/12 11:18:45 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:45 client -> Sending packet 1 (32 bytes) for connection 7c34ad1542c1601e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:45 client Short Header{DestConnectionID: e5b43ffa6e2dda37, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 173.122µs} 2025/09/12 11:18:45 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/09/12 11:18:45 client newly acked packets (1): [0] 2025/09/12 11:18:45 client updated RTT: 33.792ms (σ: 10.069ms) 2025/09/12 11:18:45 client Dropping Handshake keys. 2025/09/12 11:18:45 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:45 client <- &wire.NewTokenFrame{Token: 0xb7687ff534f028edd726a86cf5db1ae916fc7fd0d810f15d11db6122205b2bfda06969dff3} 2025/09/12 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: efabdac5d248a6c2, StatelessResetToken: 0xa13e38d4b0d485215c8a5ddf920f9302} 2025/09/12 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3945a248fff57a09, StatelessResetToken: 0x93ed8fa179f7ceffbfaf5b7d28f26160} 2025/09/12 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7bfac898dfc2e14d, StatelessResetToken: 0x2323179e7509dacd46aa5b448afa85d1} 2025/09/12 11:18:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:45 client -> Sending packet 2 (34 bytes) for connection 7c34ad1542c1601e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:45 client Short Header{DestConnectionID: efabdac5d248a6c2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 145.29µs} 2025/09/12 11:18:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:45 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:45 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:45 client -> Sending packet 3 (30 bytes) for connection 7c34ad1542c1601e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:45 client Short Header{DestConnectionID: efabdac5d248a6c2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:45 client Connection 7c34ad1542c1601e closed. 2025/09/12 11:18:45 Requesting https://server4:443/nrhutzqanh. 2025/09/12 11:18:45 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:45 Increased send buffer size to 14336 kiB 2025/09/12 11:18:45 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:45 Created qlog file: /logs/qlog/b2051ef39857995efa82563642.sqlog 2025/09/12 11:18:45 client Starting new connection to server4 ([::]:36313 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b2051ef39857995efa82563642, version v1 2025/09/12 11:18:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:45 client -> Sending packet 0 (1280 bytes) for connection b2051ef39857995efa82563642, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: b2051ef39857995efa82563642, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:45 client -> Sending packet 1 (1280 bytes) for connection b2051ef39857995efa82563642, Initial 2025/09/12 11:18:45 client Long Header{Type: Initial, DestConnectionID: b2051ef39857995efa82563642, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:45 client -> &wire.CryptoFrame{Offset: 1235, Data length: 273, Offset + Data length: 1508} 2025/09/12 11:18:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:46 client -> Sending packet 2 (1280 bytes) for connection b2051ef39857995efa82563642, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: b2051ef39857995efa82563642, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:18:46 client -> Sending packet 3 (1280 bytes) for connection b2051ef39857995efa82563642, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: b2051ef39857995efa82563642, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 1235, Data length: 273, Offset + Data length: 1508} 2025/09/12 11:18:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:46 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: baa497fea0606b65, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:46 client Received first packet. Switching destination connection ID to: baa497fea0606b65 2025/09/12 11:18:46 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:46 client newly acked packets (1): [3] 2025/09/12 11:18:46 client updated RTT: 33.350607ms (σ: 16.675303ms) 2025/09/12 11:18:46 client setting loss timer for packet 2 (Initial) to 37.519432ms (in 2025-09-12 11:18:46.139246503 +0000 UTC m=+0.971389683) 2025/09/12 11:18:46 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:46.139246503 +0000 UTC m=+0.971389683 2025/09/12 11:18:46 client lost packet 2 (time threshold) 2025/09/12 11:18:46 client -> Sending packet 4 (1280 bytes) for connection b2051ef39857995efa82563642, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: baa497fea0606b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:18:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:46 client -> Sending packet 5 (1280 bytes) for connection b2051ef39857995efa82563642, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: baa497fea0606b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:18:46 client -> Sending packet 6 (1280 bytes) for connection b2051ef39857995efa82563642, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: baa497fea0606b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:46 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: baa497fea0606b65, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:46 client -> Sending packet 7 (1280 bytes) for connection b2051ef39857995efa82563642, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: baa497fea0606b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:18:46 client <- Reading packet 2 (774 bytes) for connection (empty), Handshake 2025/09/12 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: baa497fea0606b65, PacketNumber: 2, PacketNumberLen: 1, Length: 757, Version: v1} 2025/09/12 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 11:18:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b2051ef39857995efa82563642, InitialSourceConnectionID: baa497fea0606b65, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb9cfee299f754283ec7fb78d55a95a4c, EnableResetStreamAt: false} 2025/09/12 11:18:46 client -> Sending packet 0 (95 bytes) for connection b2051ef39857995efa82563642, Handshake 2025/09/12 11:18:46 client Long Header{Type: Handshake, DestConnectionID: baa497fea0606b65, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 78, Version: v1} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:46 client Dropping Initial keys. 2025/09/12 11:18:46 client <- Reading packet 3 (774 bytes) for connection (empty), Handshake 2025/09/12 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: baa497fea0606b65, PacketNumber: 3, PacketNumberLen: 1, Length: 757, Version: v1} 2025/09/12 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 11:18:46 client -> Sending packet 1 (86 bytes) for connection b2051ef39857995efa82563642, Handshake 2025/09/12 11:18:46 client Long Header{Type: Handshake, DestConnectionID: baa497fea0606b65, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:18:46 client Short Header{DestConnectionID: baa497fea0606b65, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:46 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:46 client <- Reading packet 4 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: baa497fea0606b65, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:46 client Peer doesn't await address validation any longer. 2025/09/12 11:18:46 client newly acked packets (1): [0] 2025/09/12 11:18:46 client updated RTT: 33.292ms (σ: 12.621ms) 2025/09/12 11:18:46 client Canceling loss detection timer. 2025/09/12 11:18:46 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:46 client -> Sending packet 1 (32 bytes) for connection b2051ef39857995efa82563642, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:46 client Short Header{DestConnectionID: baa497fea0606b65, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 156.281µs} 2025/09/12 11:18:46 client <- Reading packet 2 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:46 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:46 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:46 client Dropping Handshake keys. 2025/09/12 11:18:46 client <- &wire.NewTokenFrame{Token: 0xb7f13e5795a18d986d9fb3c115693539fca8a33db7f362a6715243e8a3d47ab2c75852689b} 2025/09/12 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 86bf26b655df94fc, StatelessResetToken: 0x8d5cc93eda5afcb50b9b0c2b4ccee741} 2025/09/12 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1bd6f1c25d79df71, StatelessResetToken: 0xd5d17be5bb257eb96fb29f8a27026f9b} 2025/09/12 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12a202afe09bece7, StatelessResetToken: 0x3b81e6887c5b83408845a37d68e021bc} 2025/09/12 11:18:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:18:46 client -> Sending packet 3 (55 bytes) for connection b2051ef39857995efa82563642, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:46 client Short Header{DestConnectionID: 86bf26b655df94fc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 169.415µs} 2025/09/12 11:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:46 client -> Sending packet 4 (48 bytes) for connection b2051ef39857995efa82563642, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:46 client Short Header{DestConnectionID: 86bf26b655df94fc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:46 client <- Reading packet 4 (51 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:46 client newly acked packets (1): [4] 2025/09/12 11:18:46 client updated RTT: 33.19ms (σ: 9.669ms) 2025/09/12 11:18:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:46 client Canceling loss detection timer. 2025/09/12 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dae7d8119d743dfb, StatelessResetToken: 0x53772d8a827aff35aeafb6121cf6b363} 2025/09/12 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:46 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 11:18:46 client -> Sending packet 5 (34 bytes) for connection b2051ef39857995efa82563642, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:46 client Short Header{DestConnectionID: 86bf26b655df94fc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 61.424µs} 2025/09/12 11:18:46 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:46 client -> Sending packet 6 (30 bytes) for connection b2051ef39857995efa82563642, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:46 client Short Header{DestConnectionID: 86bf26b655df94fc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:46 client Connection b2051ef39857995efa82563642 closed. 2025/09/12 11:18:46 Requesting https://server4:443/tqglzzhwpx. 2025/09/12 11:18:46 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:46 Increased send buffer size to 14336 kiB 2025/09/12 11:18:46 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:46 Created qlog file: /logs/qlog/670bfa8951dd45dea850ff9d59efcf1b.sqlog 2025/09/12 11:18:46 client Starting new connection to server4 ([::]:37236 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 670bfa8951dd45dea850ff9d59efcf1b, version v1 2025/09/12 11:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:46 client -> Sending packet 0 (1280 bytes) for connection 670bfa8951dd45dea850ff9d59efcf1b, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: 670bfa8951dd45dea850ff9d59efcf1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:46 client -> Sending packet 1 (1280 bytes) for connection 670bfa8951dd45dea850ff9d59efcf1b, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: 670bfa8951dd45dea850ff9d59efcf1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 1232, Data length: 282, Offset + Data length: 1514} 2025/09/12 11:18:46 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8c560d771dea68aa, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:46 client Received first packet. Switching destination connection ID to: 8c560d771dea68aa 2025/09/12 11:18:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:46 client newly acked packets (1): [1] 2025/09/12 11:18:46 client updated RTT: 33.389511ms (σ: 16.694755ms) 2025/09/12 11:18:46 client setting loss timer for packet 0 (Initial) to 37.563199ms (in 2025-09-12 11:18:46.765683939 +0000 UTC m=+1.597827120) 2025/09/12 11:18:46 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:46.765683939 +0000 UTC m=+1.597827120 2025/09/12 11:18:46 client lost packet 0 (time threshold) 2025/09/12 11:18:46 client -> Sending packet 2 (1280 bytes) for connection 670bfa8951dd45dea850ff9d59efcf1b, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: 8c560d771dea68aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:46 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:46 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8c560d771dea68aa, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:46 client newly acked packets (1): [2] 2025/09/12 11:18:46 client updated RTT: 33.478ms (σ: 12.699ms) 2025/09/12 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:46 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:46 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8c560d771dea68aa, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/09/12 11:18:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 670bfa8951dd45dea850ff9d59efcf1b, InitialSourceConnectionID: 8c560d771dea68aa, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xebe7faeee994b79b15f39276449e4aba, EnableResetStreamAt: false} 2025/09/12 11:18:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 670bfa8951dd45dea850ff9d59efcf1b 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: 8c560d771dea68aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 8c560d771dea68aa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:46 client Dropping Initial keys. 2025/09/12 11:18:46 client -> Sending packet 1 (86 bytes) for connection 670bfa8951dd45dea850ff9d59efcf1b, Handshake 2025/09/12 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 8c560d771dea68aa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:46 client Short Header{DestConnectionID: 8c560d771dea68aa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:46 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/09/12 11:18:46 client Peer doesn't await address validation any longer. 2025/09/12 11:18:46 client newly acked packets (1): [0] 2025/09/12 11:18:46 client updated RTT: 33.662ms (σ: 9.893ms) 2025/09/12 11:18:46 client Canceling loss detection timer. 2025/09/12 11:18:46 client Dropping Handshake keys. 2025/09/12 11:18:46 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:46 client <- &wire.NewTokenFrame{Token: 0xb79e9a775765924071298588f1ab1186309e43454b07dbebeac100337d928fb59a8a441f1b} 2025/09/12 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 922095669aa0782c, StatelessResetToken: 0x9c3d1605547cb19c3ada754d30eda3b2} 2025/09/12 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 96aa860c8e6c8574, StatelessResetToken: 0x076d8217187c6d08b103edcb80e096ea} 2025/09/12 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: defa5f77e1ff876b, StatelessResetToken: 0x90f6e9913d978e9d196345f9f1da088c} 2025/09/12 11:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:46 client -> Sending packet 1 (34 bytes) for connection 670bfa8951dd45dea850ff9d59efcf1b, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:46 client Short Header{DestConnectionID: 922095669aa0782c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 120.534µs} 2025/09/12 11:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:46 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:46 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:46 client -> Sending packet 2 (30 bytes) for connection 670bfa8951dd45dea850ff9d59efcf1b, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:46 client Short Header{DestConnectionID: 922095669aa0782c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:46 client Connection 670bfa8951dd45dea850ff9d59efcf1b closed. 2025/09/12 11:18:46 Requesting https://server4:443/wvrwuaouhs. 2025/09/12 11:18:46 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:46 Increased send buffer size to 14336 kiB 2025/09/12 11:18:46 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:46 Created qlog file: /logs/qlog/e356851941744a62397ac85ff79c95.sqlog 2025/09/12 11:18:46 client Starting new connection to server4 ([::]:45078 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e356851941744a62397ac85ff79c95, version v1 2025/09/12 11:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:46 client -> Sending packet 0 (1280 bytes) for connection e356851941744a62397ac85ff79c95, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: e356851941744a62397ac85ff79c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:46 client -> Sending packet 1 (1280 bytes) for connection e356851941744a62397ac85ff79c95, Initial 2025/09/12 11:18:46 client Long Header{Type: Initial, DestConnectionID: e356851941744a62397ac85ff79c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:46 client -> &wire.CryptoFrame{Offset: 1233, Data length: 278, Offset + Data length: 1511} 2025/09/12 11:18:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:47 client -> Sending packet 2 (1280 bytes) for connection e356851941744a62397ac85ff79c95, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: e356851941744a62397ac85ff79c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client -> Sending packet 3 (1280 bytes) for connection e356851941744a62397ac85ff79c95, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: e356851941744a62397ac85ff79c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 1233, Data length: 278, Offset + Data length: 1511} 2025/09/12 11:18:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:47 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2d271e27ba4b5570, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:47 client Received first packet. Switching destination connection ID to: 2d271e27ba4b5570 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [3] 2025/09/12 11:18:47 client updated RTT: 33.353318ms (σ: 16.676659ms) 2025/09/12 11:18:47 client setting loss timer for packet 2 (Initial) to 37.522482ms (in 2025-09-12 11:18:47.076214798 +0000 UTC m=+1.908357978) 2025/09/12 11:18:47 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:47.076214798 +0000 UTC m=+1.908357978 2025/09/12 11:18:47 client lost packet 2 (time threshold) 2025/09/12 11:18:47 client -> Sending packet 4 (1280 bytes) for connection e356851941744a62397ac85ff79c95, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: 2d271e27ba4b5570, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 11:18:47 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:47 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2d271e27ba4b5570, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [4] 2025/09/12 11:18:47 client updated RTT: 33.453ms (σ: 12.708ms) 2025/09/12 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:47 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:47 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:47 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:47 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d271e27ba4b5570, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/09/12 11:18:47 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:47 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e356851941744a62397ac85ff79c95, InitialSourceConnectionID: 2d271e27ba4b5570, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x853a616b37f48609ff60c55e34f9bb04, EnableResetStreamAt: false} 2025/09/12 11:18:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e356851941744a62397ac85ff79c95 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: 2d271e27ba4b5570, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:47 client Long Header{Type: Handshake, DestConnectionID: 2d271e27ba4b5570, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:47 client Dropping Initial keys. 2025/09/12 11:18:47 client -> Sending packet 1 (40 bytes) for connection e356851941744a62397ac85ff79c95, Handshake 2025/09/12 11:18:47 client Long Header{Type: Handshake, DestConnectionID: 2d271e27ba4b5570, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:47 client -> Sending packet 0 (46 bytes) for connection e356851941744a62397ac85ff79c95, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:47 client Short Header{DestConnectionID: 2d271e27ba4b5570, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:47 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:47 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d271e27ba4b5570, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:47 client Peer doesn't await address validation any longer. 2025/09/12 11:18:47 client newly acked packets (1): [0] 2025/09/12 11:18:47 client updated RTT: 33.497ms (σ: 9.619ms) 2025/09/12 11:18:47 client Canceling loss detection timer. 2025/09/12 11:18:47 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:47 client -> Sending packet 1 (32 bytes) for connection e356851941744a62397ac85ff79c95, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:47 client Short Header{DestConnectionID: 2d271e27ba4b5570, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 166.059µs} 2025/09/12 11:18:47 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:47 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:47 client Dropping Handshake keys. 2025/09/12 11:18:47 client <- &wire.NewTokenFrame{Token: 0xb772647eaf35c00edf96fcdb03ea83af61479851bcbbcd8b2f42f912bf1f479368eb34f042} 2025/09/12 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b09a4a235d0d5bb6, StatelessResetToken: 0x2d83f7e38a05950c41460bda050e8380} 2025/09/12 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a38fae539658125, StatelessResetToken: 0x93502994a1d2972382bdea252b71dab5} 2025/09/12 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f10ae2095b94a5fd, StatelessResetToken: 0x5b32eb279e90b9655209d605ea802d0e} 2025/09/12 11:18:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:47 client -> Sending packet 2 (34 bytes) for connection e356851941744a62397ac85ff79c95, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:47 client Short Header{DestConnectionID: b09a4a235d0d5bb6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 85.709µs} 2025/09/12 11:18:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:47 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [2] 2025/09/12 11:18:47 client updated RTT: 33.253ms (σ: 7.7ms) 2025/09/12 11:18:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:47 client lost packet 0 (time threshold) 2025/09/12 11:18:47 client Canceling loss detection timer. 2025/09/12 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0c1b9c5aa1d62ea5, StatelessResetToken: 0x83f5c8048d874f96d4a57fc7016466bf} 2025/09/12 11:18:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:47 client Ignoring all packets below 2. 2025/09/12 11:18:47 client -> Sending packet 3 (51 bytes) for connection e356851941744a62397ac85ff79c95, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:47 client Short Header{DestConnectionID: b09a4a235d0d5bb6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 104.695µs} 2025/09/12 11:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:18:47 client -> Sending packet 5 (46 bytes) for connection e356851941744a62397ac85ff79c95, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:47 client Short Header{DestConnectionID: b09a4a235d0d5bb6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:47 client -> Sending packet 6 (46 bytes) for connection e356851941744a62397ac85ff79c95, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:47 client Short Header{DestConnectionID: b09a4a235d0d5bb6, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:47 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [6] 2025/09/12 11:18:47 client updated RTT: 33.045ms (σ: 6.19ms) 2025/09/12 11:18:47 client Canceling loss detection timer. 2025/09/12 11:18:47 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:47 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:47 client -> Sending packet 7 (34 bytes) for connection e356851941744a62397ac85ff79c95, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:47 client Short Header{DestConnectionID: b09a4a235d0d5bb6, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 87.993µs} 2025/09/12 11:18:47 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:47 client -> Sending packet 8 (30 bytes) for connection e356851941744a62397ac85ff79c95, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:47 client Short Header{DestConnectionID: b09a4a235d0d5bb6, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:47 client Connection e356851941744a62397ac85ff79c95 closed. 2025/09/12 11:18:47 Requesting https://server4:443/cquittzufh. 2025/09/12 11:18:47 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:47 Increased send buffer size to 14336 kiB 2025/09/12 11:18:47 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:47 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:47 Created qlog file: /logs/qlog/a7e7a688eb2bbaff0afa63.sqlog 2025/09/12 11:18:47 client Starting new connection to server4 ([::]:49764 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a7e7a688eb2bbaff0afa63, version v1 2025/09/12 11:18:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:47 client -> Sending packet 0 (1280 bytes) for connection a7e7a688eb2bbaff0afa63, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: a7e7a688eb2bbaff0afa63, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:47 client -> Sending packet 1 (1280 bytes) for connection a7e7a688eb2bbaff0afa63, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: a7e7a688eb2bbaff0afa63, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 1237, Data length: 275, Offset + Data length: 1512} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:47 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2611c30cea4be093, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:47 client Received first packet. Switching destination connection ID to: 2611c30cea4be093 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [1] 2025/09/12 11:18:47 client updated RTT: 33.327629ms (σ: 16.663814ms) 2025/09/12 11:18:47 client setting loss timer for packet 0 (Initial) to 37.493582ms (in 2025-09-12 11:18:47.349028858 +0000 UTC m=+2.181172038) 2025/09/12 11:18:47 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:47.349028858 +0000 UTC m=+2.181172038 2025/09/12 11:18:47 client lost packet 0 (time threshold) 2025/09/12 11:18:47 client -> Sending packet 2 (1280 bytes) for connection a7e7a688eb2bbaff0afa63, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: 2611c30cea4be093, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:47 client -> Sending packet 3 (1280 bytes) for connection a7e7a688eb2bbaff0afa63, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: 2611c30cea4be093, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:47 client -> Sending packet 4 (1280 bytes) for connection a7e7a688eb2bbaff0afa63, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: 2611c30cea4be093, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2611c30cea4be093, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:47 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:47 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:47 client -> Sending packet 5 (1280 bytes) for connection a7e7a688eb2bbaff0afa63, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: 2611c30cea4be093, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:18:47 client Parsed a coalesced packet. Part 1: 39 bytes. Remaining: 771 bytes. 2025/09/12 11:18:47 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2611c30cea4be093, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:47 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 0 bytes. 2025/09/12 11:18:47 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/09/12 11:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2611c30cea4be093, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/09/12 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 11:18:47 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:47 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a7e7a688eb2bbaff0afa63, InitialSourceConnectionID: 2611c30cea4be093, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb22c53182c753e1ca2f3b64677853241, EnableResetStreamAt: false} 2025/09/12 11:18:47 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2611c30cea4be093, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [4] 2025/09/12 11:18:47 client updated RTT: 33.47ms (σ: 12.783ms) 2025/09/12 11:18:47 client -> Sending packet 0 (95 bytes) for connection a7e7a688eb2bbaff0afa63, Handshake 2025/09/12 11:18:47 client Long Header{Type: Handshake, DestConnectionID: 2611c30cea4be093, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 78, Version: v1} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:47 client Dropping Initial keys. 2025/09/12 11:18:47 client -> Sending packet 0 (46 bytes) for connection a7e7a688eb2bbaff0afa63, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:47 client Short Header{DestConnectionID: 2611c30cea4be093, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:47 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:47 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2611c30cea4be093, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:47 client Peer doesn't await address validation any longer. 2025/09/12 11:18:47 client newly acked packets (1): [0] 2025/09/12 11:18:47 client updated RTT: 33.471ms (σ: 9.591ms) 2025/09/12 11:18:47 client Canceling loss detection timer. 2025/09/12 11:18:47 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:47 client -> Sending packet 1 (32 bytes) for connection a7e7a688eb2bbaff0afa63, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:47 client Short Header{DestConnectionID: 2611c30cea4be093, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 166.65µs} 2025/09/12 11:18:47 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [0] 2025/09/12 11:18:47 client updated RTT: 33.537ms (σ: 7.326ms) 2025/09/12 11:18:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:47 client Dropping Handshake keys. 2025/09/12 11:18:47 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:47 client <- &wire.NewTokenFrame{Token: 0xb7c5318e08c4b62ac3e7539b3a346101844b275674fa1f8923e2723ac30389e0eba3f35bd1} 2025/09/12 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c2e4300cb4ce3e95, StatelessResetToken: 0xa6b873f69b7b094c29aa03fbeafd1765} 2025/09/12 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c923f299e120a1cb, StatelessResetToken: 0x601e63b1263c7905f12787b5f6d3a96b} 2025/09/12 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 89701d1a7b6de8a6, StatelessResetToken: 0x3433f9c5310681b90e3da0c822cdb91b} 2025/09/12 11:18:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:47 client -> Sending packet 2 (34 bytes) for connection a7e7a688eb2bbaff0afa63, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:47 client Short Header{DestConnectionID: c2e4300cb4ce3e95, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 133.408µs} 2025/09/12 11:18:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:47 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:47 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:47 client -> Sending packet 3 (30 bytes) for connection a7e7a688eb2bbaff0afa63, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:47 client Short Header{DestConnectionID: c2e4300cb4ce3e95, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:47 client Connection a7e7a688eb2bbaff0afa63 closed. 2025/09/12 11:18:47 Requesting https://server4:443/czjuacyfvp. 2025/09/12 11:18:47 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:47 Increased send buffer size to 14336 kiB 2025/09/12 11:18:47 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:47 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:47 Created qlog file: /logs/qlog/fc491225aa02974932.sqlog 2025/09/12 11:18:47 client Starting new connection to server4 ([::]:52475 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fc491225aa02974932, version v1 2025/09/12 11:18:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:47 client -> Sending packet 0 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: fc491225aa02974932, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client -> Sending packet 1 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: fc491225aa02974932, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 1239, Data length: 271, Offset + Data length: 1510} 2025/09/12 11:18:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:47 client -> Sending packet 2 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: fc491225aa02974932, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client -> Sending packet 3 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: fc491225aa02974932, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 1239, Data length: 271, Offset + Data length: 1510} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:47 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfe77eda6d03fcc4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:47 client Received first packet. Switching destination connection ID to: dfe77eda6d03fcc4 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [3] 2025/09/12 11:18:47 client updated RTT: 33.452004ms (σ: 16.726002ms) 2025/09/12 11:18:47 client setting loss timer for packet 2 (Initial) to 37.633504ms (in 2025-09-12 11:18:47.759254765 +0000 UTC m=+2.591397935) 2025/09/12 11:18:47 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:47.759254765 +0000 UTC m=+2.591397935 2025/09/12 11:18:47 client lost packet 2 (time threshold) 2025/09/12 11:18:47 client -> Sending packet 4 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:47 client -> Sending packet 5 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:47 client -> Sending packet 6 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:47 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfe77eda6d03fcc4, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:47 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:47 client newly acked packets (1): [6] 2025/09/12 11:18:47 client updated RTT: 33.554ms (σ: 12.75ms) 2025/09/12 11:18:48 client -> Sending packet 7 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:48 client Long Header{Type: Initial, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:48 client -> &wire.PingFrame{} 2025/09/12 11:18:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 11:18:49 client -> Sending packet 8 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:49 client -> &wire.PingFrame{} 2025/09/12 11:18:49 client -> Sending packet 9 (1280 bytes) for connection fc491225aa02974932, Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:49 client -> &wire.PingFrame{} 2025/09/12 11:18:49 client <- Reading packet 8 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfe77eda6d03fcc4, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:49 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:49 client <- Reading packet 9 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfe77eda6d03fcc4, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:49 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:49 client newly acked packets (1): [9] 2025/09/12 11:18:49 client updated RTT: 33.501ms (σ: 9.667ms) 2025/09/12 11:18:49 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:18:49 client <- Reading packet 10 (129 bytes) for connection (empty), Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfe77eda6d03fcc4, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:49 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:49 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:49 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:18:49 client <- Reading packet 4 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dfe77eda6d03fcc4, PacketNumber: 4, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 11:18:49 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:49 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fc491225aa02974932, InitialSourceConnectionID: dfe77eda6d03fcc4, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x984787bdd1198aadfc4baf1bdfc3a90a, EnableResetStreamAt: false} 2025/09/12 11:18:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fc491225aa02974932 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:49 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:18:49 client Long Header{Type: Handshake, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:49 client Dropping Initial keys. 2025/09/12 11:18:49 client -> Sending packet 1 (40 bytes) for connection fc491225aa02974932, Handshake 2025/09/12 11:18:49 client Long Header{Type: Handshake, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:49 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 11:18:49 client -> Sending packet 0 (46 bytes) for connection fc491225aa02974932, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:49 client Short Header{DestConnectionID: dfe77eda6d03fcc4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:49 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:18:49 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/09/12 11:18:49 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:18:49 client <- Reading packet 5 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dfe77eda6d03fcc4, PacketNumber: 5, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 11:18:49 client -> Sending packet 2 (40 bytes) for connection fc491225aa02974932, Handshake 2025/09/12 11:18:49 client Long Header{Type: Handshake, DestConnectionID: dfe77eda6d03fcc4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:49 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/09/12 11:18:49 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:49 client <- Reading packet 6 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dfe77eda6d03fcc4, PacketNumber: 6, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:49 client Peer doesn't await address validation any longer. 2025/09/12 11:18:49 client newly acked packets (1): [0] 2025/09/12 11:18:49 client updated RTT: 33.63ms (σ: 7.509ms) 2025/09/12 11:18:49 client Canceling loss detection timer. 2025/09/12 11:18:49 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:49 client -> Sending packet 1 (32 bytes) for connection fc491225aa02974932, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:49 client Short Header{DestConnectionID: dfe77eda6d03fcc4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 136.223µs} 2025/09/12 11:18:49 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:49 client newly acked packets (1): [0] 2025/09/12 11:18:49 client updated RTT: 33.818ms (σ: 6.008ms) 2025/09/12 11:18:49 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:49 client Dropping Handshake keys. 2025/09/12 11:18:49 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:49 client <- &wire.NewTokenFrame{Token: 0xb7a1eb1a8eb2ea0ed72185048db06b5f7149938f52efb37203ff589f9726880e95271a8378} 2025/09/12 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c899b316cbd60fe, StatelessResetToken: 0xcc7714878c979861eba5b252faaf2005} 2025/09/12 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a182584fb9de7d81, StatelessResetToken: 0x661f33d392289bbaa25ca83ce1ff6729} 2025/09/12 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cff6ed24bede0ae7, StatelessResetToken: 0xcf4c5171209baceb5b8975015d77ddad} 2025/09/12 11:18:49 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:49 client -> Sending packet 2 (34 bytes) for connection fc491225aa02974932, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:49 client Short Header{DestConnectionID: 9c899b316cbd60fe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 125.904µs} 2025/09/12 11:18:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:49 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:49 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:49 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:49 client -> Sending packet 3 (30 bytes) for connection fc491225aa02974932, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:49 client Short Header{DestConnectionID: 9c899b316cbd60fe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:49 client Connection fc491225aa02974932 closed. 2025/09/12 11:18:49 Requesting https://server4:443/inoqbwqiik. 2025/09/12 11:18:49 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:49 Increased send buffer size to 14336 kiB 2025/09/12 11:18:49 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:49 Created qlog file: /logs/qlog/0613707463a8db8b1ec6a0d554bf2bb6.sqlog 2025/09/12 11:18:49 client Starting new connection to server4 ([::]:36029 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0613707463a8db8b1ec6a0d554bf2bb6, version v1 2025/09/12 11:18:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:49 client -> Sending packet 0 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: 0613707463a8db8b1ec6a0d554bf2bb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:49 client -> Sending packet 1 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: 0613707463a8db8b1ec6a0d554bf2bb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 1232, Data length: 275, Offset + Data length: 1507} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:49 client -> Sending packet 2 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: 0613707463a8db8b1ec6a0d554bf2bb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:49 client -> Sending packet 3 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: 0613707463a8db8b1ec6a0d554bf2bb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 1232, Data length: 275, Offset + Data length: 1507} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:49 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8457ede42b1ede34, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:49 client Received first packet. Switching destination connection ID to: 8457ede42b1ede34 2025/09/12 11:18:49 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:49 client newly acked packets (1): [3] 2025/09/12 11:18:49 client updated RTT: 33.531442ms (σ: 16.765721ms) 2025/09/12 11:18:49 client setting loss timer for packet 2 (Initial) to 37.722872ms (in 2025-09-12 11:18:49.933929676 +0000 UTC m=+4.766072856) 2025/09/12 11:18:49 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:49.933929676 +0000 UTC m=+4.766072856 2025/09/12 11:18:49 client lost packet 2 (time threshold) 2025/09/12 11:18:49 client -> Sending packet 4 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:49 client Long Header{Type: Initial, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:50 client -> Sending packet 5 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:50 client Long Header{Type: Initial, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:50 client -> Sending packet 6 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:50 client Long Header{Type: Initial, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:50 client Parsed a coalesced packet. Part 1: 39 bytes. Remaining: 778 bytes. 2025/09/12 11:18:50 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8457ede42b1ede34, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:50 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:50 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 0 bytes. 2025/09/12 11:18:50 client Queueing packet (778 bytes) for later decryption 2025/09/12 11:18:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:18:50 client -> Sending packet 7 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:50 client Long Header{Type: Initial, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:50 client -> Sending packet 8 (1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Initial 2025/09/12 11:18:50 client Long Header{Type: Initial, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:50 client <- Reading packet 5 (41 bytes) for connection (empty), Initial 2025/09/12 11:18:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8457ede42b1ede34, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:18:50 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:18:50 client newly acked packets (1): [8] 2025/09/12 11:18:50 client updated RTT: 33.484ms (σ: 12.666ms) 2025/09/12 11:18:50 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:18:50 client <- Reading packet 6 (129 bytes) for connection (empty), Initial 2025/09/12 11:18:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8457ede42b1ede34, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:18:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:50 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:50 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:50 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:18:50 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:18:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8457ede42b1ede34, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:18:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 11:18:50 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:50 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0613707463a8db8b1ec6a0d554bf2bb6, InitialSourceConnectionID: 8457ede42b1ede34, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xbdf0993ec63a9bd2cdb55ed688267fc0, EnableResetStreamAt: false} 2025/09/12 11:18:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6 2025/09/12 11:18:50 client Long Header{Type: Initial, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:50 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:18:50 client Long Header{Type: Handshake, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:50 client Dropping Initial keys. 2025/09/12 11:18:50 client <- Reading packet 1 (778 bytes) for connection (empty), Handshake 2025/09/12 11:18:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8457ede42b1ede34, PacketNumber: 1, PacketNumberLen: 1, Length: 761, Version: v1} 2025/09/12 11:18:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 11:18:50 client -> Sending packet 1 (86 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Handshake 2025/09/12 11:18:50 client Long Header{Type: Handshake, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:50 client Short Header{DestConnectionID: 8457ede42b1ede34, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:18:51 client -> Sending packet 2 (90 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:51 client -> Sending packet 3 (90 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: 8457ede42b1ede34, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:51 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 85ms} 2025/09/12 11:18:51 client Peer doesn't await address validation any longer. 2025/09/12 11:18:51 client newly acked packets (1): [0] 2025/09/12 11:18:51 client updated RTT: 40.892ms (σ: 24.317ms) 2025/09/12 11:18:51 client Canceling loss detection timer. 2025/09/12 11:18:51 client Dropping Handshake keys. 2025/09/12 11:18:51 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:51 client <- &wire.NewTokenFrame{Token: 0xb781a721da76ff8978c696900e190842e65e297b4825bdd1e6066a0468662a20405a10a8a5} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 97b3ad6208269050, StatelessResetToken: 0x435f7c7d4045528a0675bb84808b21f4} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 101ec6f6a5694e75, StatelessResetToken: 0x81cc8c298c399f2c19592cc831708762} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7629167d43bb5f7c, StatelessResetToken: 0x79da4e5e4f650714fee219bd4d8ce343} 2025/09/12 11:18:51 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:51 client -> Sending packet 1 (34 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 97b3ad6208269050, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 182.519µs} 2025/09/12 11:18:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:51 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:51 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:51 client -> Sending packet 2 (30 bytes) for connection 0613707463a8db8b1ec6a0d554bf2bb6, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 97b3ad6208269050, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:51 client Connection 0613707463a8db8b1ec6a0d554bf2bb6 closed. 2025/09/12 11:18:51 Requesting https://server4:443/milevtpodi. 2025/09/12 11:18:51 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:51 Increased send buffer size to 14336 kiB 2025/09/12 11:18:51 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:51 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:51 Created qlog file: /logs/qlog/4683e7570fa14cea5a.sqlog 2025/09/12 11:18:51 client Starting new connection to server4 ([::]:48002 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4683e7570fa14cea5a, version v1 2025/09/12 11:18:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:51 client -> Sending packet 0 (1280 bytes) for connection 4683e7570fa14cea5a, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 4683e7570fa14cea5a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client -> Sending packet 1 (1280 bytes) for connection 4683e7570fa14cea5a, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 4683e7570fa14cea5a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 1239, Data length: 280, Offset + Data length: 1519} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:51 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7e1f3b6792449c41, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:51 client Received first packet. Switching destination connection ID to: 7e1f3b6792449c41 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:51 client newly acked packets (1): [1] 2025/09/12 11:18:51 client updated RTT: 33.094186ms (σ: 16.547093ms) 2025/09/12 11:18:51 client setting loss timer for packet 0 (Initial) to 37.230959ms (in 2025-09-12 11:18:51.12422431 +0000 UTC m=+5.956367490) 2025/09/12 11:18:51 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:51.12422431 +0000 UTC m=+5.956367490 2025/09/12 11:18:51 client lost packet 0 (time threshold) 2025/09/12 11:18:51 client -> Sending packet 2 (1280 bytes) for connection 4683e7570fa14cea5a, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 7e1f3b6792449c41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:51 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:51 client -> Sending packet 3 (1280 bytes) for connection 4683e7570fa14cea5a, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 7e1f3b6792449c41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:51 client -> Sending packet 4 (1280 bytes) for connection 4683e7570fa14cea5a, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 7e1f3b6792449c41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:18:51 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7e1f3b6792449c41, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:51 client newly acked packets (1): [4] 2025/09/12 11:18:51 client updated RTT: 33.388ms (σ: 12.998ms) 2025/09/12 11:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:51 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:18:51 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7e1f3b6792449c41, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 11:18:51 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4683e7570fa14cea5a, InitialSourceConnectionID: 7e1f3b6792449c41, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x762ea343f69dccb56fc7cecec317d699, EnableResetStreamAt: false} 2025/09/12 11:18:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4683e7570fa14cea5a 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 7e1f3b6792449c41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: 7e1f3b6792449c41, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:51 client Dropping Initial keys. 2025/09/12 11:18:51 client -> Sending packet 1 (86 bytes) for connection 4683e7570fa14cea5a, Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: 7e1f3b6792449c41, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client Short Header{DestConnectionID: 7e1f3b6792449c41, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:51 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:51 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7e1f3b6792449c41, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client Peer doesn't await address validation any longer. 2025/09/12 11:18:51 client newly acked packets (1): [0] 2025/09/12 11:18:51 client updated RTT: 33.44ms (σ: 9.853ms) 2025/09/12 11:18:51 client Canceling loss detection timer. 2025/09/12 11:18:51 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:51 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:51 client -> Sending packet 1 (32 bytes) for connection 4683e7570fa14cea5a, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 7e1f3b6792449c41, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 169.976µs} 2025/09/12 11:18:51 client <- Reading packet 2 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:51 client Dropping Handshake keys. 2025/09/12 11:18:51 client <- &wire.NewTokenFrame{Token: 0xb70e0c0765bd0df7a025f5e67f1471cccba529caa2cc1c2fab6d3162fef54f97df33b18fd6} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a421944dc3fbf0a8, StatelessResetToken: 0x568670f2b3fa5d18264cf367fd3d6487} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: feae9d85b9bb3ff8, StatelessResetToken: 0xf19d6c74237d562f93a8c890e1732e1e} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 379462c89c18f342, StatelessResetToken: 0x82bdcd349b55c6cc0016133f3dc35696} 2025/09/12 11:18:51 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:18:51 client -> Sending packet 3 (55 bytes) for connection 4683e7570fa14cea5a, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: a421944dc3fbf0a8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 155.389µs} 2025/09/12 11:18:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:51 client -> Sending packet 4 (48 bytes) for connection 4683e7570fa14cea5a, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: a421944dc3fbf0a8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:51 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:51 client <- &wire.NewTokenFrame{Token: 0xb70e0c0765bd0df7a025f5e67f1471cccba529caa2cc1c2fab6d3162fef54f97df33b18fd6} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a421944dc3fbf0a8, StatelessResetToken: 0x568670f2b3fa5d18264cf367fd3d6487} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: feae9d85b9bb3ff8, StatelessResetToken: 0xf19d6c74237d562f93a8c890e1732e1e} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 379462c89c18f342, StatelessResetToken: 0x82bdcd349b55c6cc0016133f3dc35696} 2025/09/12 11:18:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:51 client Sending ACK because the ACK timer expired. 2025/09/12 11:18:51 client -> Sending packet 5 (35 bytes) for connection 4683e7570fa14cea5a, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: a421944dc3fbf0a8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.287759ms} 2025/09/12 11:18:51 client <- Reading packet 4 (53 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:51 client newly acked packets (1): [4] 2025/09/12 11:18:51 client updated RTT: 33.305ms (σ: 7.657ms) 2025/09/12 11:18:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:51 client Canceling loss detection timer. 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3b2d9e0a1c4d2059, StatelessResetToken: 0x738f4247023e46898a38e17570dc4d25} 2025/09/12 11:18:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:51 client Sending ACK because the ACK timer expired. 2025/09/12 11:18:51 client -> Sending packet 6 (35 bytes) for connection 4683e7570fa14cea5a, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:51 client Short Header{DestConnectionID: a421944dc3fbf0a8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.364732ms} 2025/09/12 11:18:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:51 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:51 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:51 client -> Sending packet 7 (36 bytes) for connection 4683e7570fa14cea5a, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:51 client Short Header{DestConnectionID: a421944dc3fbf0a8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 108.814µs} 2025/09/12 11:18:51 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:51 client -> Sending packet 8 (30 bytes) for connection 4683e7570fa14cea5a, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:51 client Short Header{DestConnectionID: a421944dc3fbf0a8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:51 client Connection 4683e7570fa14cea5a closed. 2025/09/12 11:18:51 Requesting https://server4:443/yyrratuajv. 2025/09/12 11:18:51 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:51 Increased send buffer size to 14336 kiB 2025/09/12 11:18:51 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:51 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:51 Created qlog file: /logs/qlog/703aa35ce37537adedada0dd3b4c9fef.sqlog 2025/09/12 11:18:51 client Starting new connection to server4 ([::]:45276 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 703aa35ce37537adedada0dd3b4c9fef, version v1 2025/09/12 11:18:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:51 client -> Sending packet 0 (1280 bytes) for connection 703aa35ce37537adedada0dd3b4c9fef, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 703aa35ce37537adedada0dd3b4c9fef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client -> Sending packet 1 (1280 bytes) for connection 703aa35ce37537adedada0dd3b4c9fef, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 703aa35ce37537adedada0dd3b4c9fef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/09/12 11:18:51 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 830fabfe7d53946f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:51 client Received first packet. Switching destination connection ID to: 830fabfe7d53946f 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:51 client newly acked packets (1): [1] 2025/09/12 11:18:51 client updated RTT: 33.388952ms (σ: 16.694476ms) 2025/09/12 11:18:51 client setting loss timer for packet 0 (Initial) to 37.562571ms (in 2025-09-12 11:18:51.576926243 +0000 UTC m=+6.409069422) 2025/09/12 11:18:51 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:51.576926243 +0000 UTC m=+6.409069422 2025/09/12 11:18:51 client lost packet 0 (time threshold) 2025/09/12 11:18:51 client -> Sending packet 2 (1280 bytes) for connection 703aa35ce37537adedada0dd3b4c9fef, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 830fabfe7d53946f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:51 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 830fabfe7d53946f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:51 client newly acked packets (1): [2] 2025/09/12 11:18:51 client updated RTT: 33.477ms (σ: 12.7ms) 2025/09/12 11:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:51 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:51 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 830fabfe7d53946f, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 11:18:51 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 703aa35ce37537adedada0dd3b4c9fef, InitialSourceConnectionID: 830fabfe7d53946f, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xe3d2e2dc8584414dafc84babad70e1d4, EnableResetStreamAt: false} 2025/09/12 11:18:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 703aa35ce37537adedada0dd3b4c9fef 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 830fabfe7d53946f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: 830fabfe7d53946f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:51 client Dropping Initial keys. 2025/09/12 11:18:51 client -> Sending packet 1 (86 bytes) for connection 703aa35ce37537adedada0dd3b4c9fef, Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: 830fabfe7d53946f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client Short Header{DestConnectionID: 830fabfe7d53946f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:51 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client Peer doesn't await address validation any longer. 2025/09/12 11:18:51 client newly acked packets (1): [0] 2025/09/12 11:18:51 client updated RTT: 33.647ms (σ: 9.866ms) 2025/09/12 11:18:51 client Canceling loss detection timer. 2025/09/12 11:18:51 client Dropping Handshake keys. 2025/09/12 11:18:51 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:51 client <- &wire.NewTokenFrame{Token: 0xb7e6b5c83bcee34a72c8ed6250b0d8ed8704ea450b022a37580cd83a427b847e128c21aba3} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b704089bb0600fd6, StatelessResetToken: 0x160554b80535cae84a4d88d49f945448} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 176fae8a41697aa8, StatelessResetToken: 0x7dc8ab3389f5a99e92f83b857fcf2df6} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f89d6fd1b2fd0a91, StatelessResetToken: 0xd3f32b7642e83dbda790347774bea16b} 2025/09/12 11:18:51 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:51 client -> Sending packet 1 (34 bytes) for connection 703aa35ce37537adedada0dd3b4c9fef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: b704089bb0600fd6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 163.665µs} 2025/09/12 11:18:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:51 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:51 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:51 client -> Sending packet 2 (30 bytes) for connection 703aa35ce37537adedada0dd3b4c9fef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: b704089bb0600fd6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:51 client Connection 703aa35ce37537adedada0dd3b4c9fef closed. 2025/09/12 11:18:51 Requesting https://server4:443/fivifmdusy. 2025/09/12 11:18:51 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:51 Increased send buffer size to 14336 kiB 2025/09/12 11:18:51 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:51 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:51 Created qlog file: /logs/qlog/b8fb817921ff7ac3.sqlog 2025/09/12 11:18:51 client Starting new connection to server4 ([::]:53414 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b8fb817921ff7ac3, version v1 2025/09/12 11:18:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:51 client -> Sending packet 0 (1280 bytes) for connection b8fb817921ff7ac3, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: b8fb817921ff7ac3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client -> Sending packet 1 (1280 bytes) for connection b8fb817921ff7ac3, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: b8fb817921ff7ac3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 11:18:51 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98097e270761bb72, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:51 client Received first packet. Switching destination connection ID to: 98097e270761bb72 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:51 client newly acked packets (1): [1] 2025/09/12 11:18:51 client updated RTT: 33.134652ms (σ: 16.567326ms) 2025/09/12 11:18:51 client setting loss timer for packet 0 (Initial) to 37.276483ms (in 2025-09-12 11:18:51.686562692 +0000 UTC m=+6.518705862) 2025/09/12 11:18:51 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:51.686562692 +0000 UTC m=+6.518705862 2025/09/12 11:18:51 client lost packet 0 (time threshold) 2025/09/12 11:18:51 client -> Sending packet 2 (1280 bytes) for connection b8fb817921ff7ac3, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 98097e270761bb72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:51 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:51 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98097e270761bb72, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:51 client newly acked packets (1): [2] 2025/09/12 11:18:51 client updated RTT: 33.26ms (σ: 12.678ms) 2025/09/12 11:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:51 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:51 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98097e270761bb72, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 11:18:51 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b8fb817921ff7ac3, InitialSourceConnectionID: 98097e270761bb72, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x8922a931eed4aac9abdb747772681053, EnableResetStreamAt: false} 2025/09/12 11:18:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b8fb817921ff7ac3 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 98097e270761bb72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: 98097e270761bb72, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:51 client Dropping Initial keys. 2025/09/12 11:18:51 client -> Sending packet 1 (40 bytes) for connection b8fb817921ff7ac3, Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: 98097e270761bb72, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client -> Sending packet 0 (46 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 98097e270761bb72, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:51 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:51 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98097e270761bb72, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:51 client Peer doesn't await address validation any longer. 2025/09/12 11:18:51 client newly acked packets (1): [0] 2025/09/12 11:18:51 client updated RTT: 33.34ms (σ: 9.668ms) 2025/09/12 11:18:51 client Canceling loss detection timer. 2025/09/12 11:18:51 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:51 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:51 client -> Sending packet 1 (32 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 98097e270761bb72, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 176.909µs} 2025/09/12 11:18:51 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:51 client Dropping Handshake keys. 2025/09/12 11:18:51 client <- &wire.NewTokenFrame{Token: 0xb741483caa091da379c5aeb78f6f33b0d8e33e757ac37ffcf82b9518e5d71303cff6f1fd21} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0f8f2e02657ef562, StatelessResetToken: 0x27f6bae446979353cccec2e4942f1cdb} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b170d3027e5d293, StatelessResetToken: 0x72d1983810d73847d649b6740f87499c} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb8e6757b0ad8490, StatelessResetToken: 0xa4a3aa7f4f8a72ba0c510a63d3d1a35a} 2025/09/12 11:18:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:51 client -> Sending packet 2 (34 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 0f8f2e02657ef562, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 97.371µs} 2025/09/12 11:18:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:18:51 client -> Sending packet 4 (46 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 0f8f2e02657ef562, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:51 client Skipping packet number 3 2025/09/12 11:18:51 client -> Sending packet 5 (29 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 0f8f2e02657ef562, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:51 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f66462b4f878fbcd, StatelessResetToken: 0x21e6c66c4776960abdf2e1a0ff9d6baa} 2025/09/12 11:18:51 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:51 client -> Sending packet 6 (34 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 0f8f2e02657ef562, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 72.204µs} 2025/09/12 11:18:51 client <- Reading packet 4 (46 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f66462b4f878fbcd, StatelessResetToken: 0x21e6c66c4776960abdf2e1a0ff9d6baa} 2025/09/12 11:18:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:51 client Sending ACK because the ACK timer expired. 2025/09/12 11:18:51 client -> Sending packet 7 (35 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 0f8f2e02657ef562, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.223533ms} 2025/09/12 11:18:51 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:51 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:51 client -> Sending packet 8 (1366 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 0f8f2e02657ef562, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.PingFrame{} 2025/09/12 11:18:51 client -> Sending packet 9 (36 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 0f8f2e02657ef562, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 174.053µs} 2025/09/12 11:18:51 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:51 client -> Sending packet 10 (30 bytes) for connection b8fb817921ff7ac3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:51 client Short Header{DestConnectionID: 0f8f2e02657ef562, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:51 client Connection b8fb817921ff7ac3 closed. 2025/09/12 11:18:51 Requesting https://server4:443/dhemxrsixg. 2025/09/12 11:18:51 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:51 Increased send buffer size to 14336 kiB 2025/09/12 11:18:51 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:51 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:51 Created qlog file: /logs/qlog/66a2da6def45b752a1f645f461f06e21c9392ece.sqlog 2025/09/12 11:18:51 client Starting new connection to server4 ([::]:60108 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 66a2da6def45b752a1f645f461f06e21c9392ece, version v1 2025/09/12 11:18:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:51 client -> Sending packet 0 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 66a2da6def45b752a1f645f461f06e21c9392ece, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:18:51 client -> Sending packet 1 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:51 client Long Header{Type: Initial, DestConnectionID: 66a2da6def45b752a1f645f461f06e21c9392ece, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:51 client -> &wire.CryptoFrame{Offset: 1228, Data length: 279, Offset + Data length: 1507} 2025/09/12 11:18:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:52 client -> Sending packet 2 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: 66a2da6def45b752a1f645f461f06e21c9392ece, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:52 client -> Sending packet 3 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: 66a2da6def45b752a1f645f461f06e21c9392ece, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 1228, Data length: 279, Offset + Data length: 1507} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:52 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 43e65bf7aa908faa, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:52 client Received first packet. Switching destination connection ID to: 43e65bf7aa908faa 2025/09/12 11:18:52 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:52 client newly acked packets (1): [3] 2025/09/12 11:18:52 client updated RTT: 33.323394ms (σ: 16.661697ms) 2025/09/12 11:18:52 client setting loss timer for packet 2 (Initial) to 37.488818ms (in 2025-09-12 11:18:52.217354134 +0000 UTC m=+7.049497304) 2025/09/12 11:18:52 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:52.217354134 +0000 UTC m=+7.049497304 2025/09/12 11:18:52 client lost packet 2 (time threshold) 2025/09/12 11:18:52 client -> Sending packet 4 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:52 client -> Sending packet 5 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:52 client -> Sending packet 6 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:18:52 client -> Sending packet 7 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:52 client -> Sending packet 8 (1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:52 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:18:52 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 43e65bf7aa908faa, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:18:52 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:18:52 client newly acked packets (1): [8] 2025/09/12 11:18:52 client updated RTT: 33.533ms (σ: 12.916ms) 2025/09/12 11:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:52 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:52 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:52 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:18:52 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:18:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 43e65bf7aa908faa, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/09/12 11:18:52 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:52 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 66a2da6def45b752a1f645f461f06e21c9392ece, InitialSourceConnectionID: 43e65bf7aa908faa, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xdfd4b7f0856805c36b2a3ace6c2992f1, EnableResetStreamAt: false} 2025/09/12 11:18:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece 2025/09/12 11:18:52 client Long Header{Type: Initial, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:52 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:52 client Long Header{Type: Handshake, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:52 client Dropping Initial keys. 2025/09/12 11:18:52 client -> Sending packet 1 (40 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Handshake 2025/09/12 11:18:52 client Long Header{Type: Handshake, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:52 client -> Sending packet 0 (46 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:52 client Short Header{DestConnectionID: 43e65bf7aa908faa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:52 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:52 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 43e65bf7aa908faa, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:52 client Peer doesn't await address validation any longer. 2025/09/12 11:18:52 client newly acked packets (1): [0] 2025/09/12 11:18:52 client Canceling loss detection timer. 2025/09/12 11:18:52 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:52 client -> Sending packet 1 (32 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:52 client Short Header{DestConnectionID: 43e65bf7aa908faa, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 181.968µs} 2025/09/12 11:18:53 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:53 client -> Sending packet 2 (34 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 43e65bf7aa908faa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 119.211µs} 2025/09/12 11:18:53 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:53 client -> Sending packet 2 (69 bytes) for connection 66a2da6def45b752a1f645f461f06e21c9392ece, Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: 43e65bf7aa908faa, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 11:18:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:53 client Short Header{DestConnectionID: 43e65bf7aa908faa, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:53 client Connection 66a2da6def45b752a1f645f461f06e21c9392ece closed. 2025/09/12 11:18:53 Requesting https://server4:443/pfhedqjgmw. 2025/09/12 11:18:53 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:53 Increased send buffer size to 14336 kiB 2025/09/12 11:18:53 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:53 Created qlog file: /logs/qlog/6d831f644a7065f5.sqlog 2025/09/12 11:18:53 client Starting new connection to server4 ([::]:51614 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6d831f644a7065f5, version v1 2025/09/12 11:18:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:53 client -> Sending packet 0 (1280 bytes) for connection 6d831f644a7065f5, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 6d831f644a7065f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:53 client -> Sending packet 1 (1280 bytes) for connection 6d831f644a7065f5, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 6d831f644a7065f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 1240, Data length: 270, Offset + Data length: 1510} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:53 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 77239d5db6800327, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:53 client Received first packet. Switching destination connection ID to: 77239d5db6800327 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:53 client newly acked packets (1): [1] 2025/09/12 11:18:53 client updated RTT: 33.129907ms (σ: 16.564953ms) 2025/09/12 11:18:53 client setting loss timer for packet 0 (Initial) to 37.271145ms (in 2025-09-12 11:18:53.042745497 +0000 UTC m=+7.874888677) 2025/09/12 11:18:53 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:53.042745497 +0000 UTC m=+7.874888677 2025/09/12 11:18:53 client lost packet 0 (time threshold) 2025/09/12 11:18:53 client -> Sending packet 2 (1280 bytes) for connection 6d831f644a7065f5, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 77239d5db6800327, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:53 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:53 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 77239d5db6800327, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:53 client newly acked packets (1): [2] 2025/09/12 11:18:53 client updated RTT: 33.286ms (σ: 12.738ms) 2025/09/12 11:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:53 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:53 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 77239d5db6800327, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 11:18:53 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6d831f644a7065f5, InitialSourceConnectionID: 77239d5db6800327, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xfde93822f792a7450b6f03d303e1afea, EnableResetStreamAt: false} 2025/09/12 11:18:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d831f644a7065f5 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 77239d5db6800327, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: 77239d5db6800327, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:53 client Dropping Initial keys. 2025/09/12 11:18:53 client -> Sending packet 1 (86 bytes) for connection 6d831f644a7065f5, Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: 77239d5db6800327, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:53 client Short Header{DestConnectionID: 77239d5db6800327, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:53 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:53 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 77239d5db6800327, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:53 client Peer doesn't await address validation any longer. 2025/09/12 11:18:53 client newly acked packets (1): [0] 2025/09/12 11:18:53 client Canceling loss detection timer. 2025/09/12 11:18:53 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:53 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:53 client -> Sending packet 1 (32 bytes) for connection 6d831f644a7065f5, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 77239d5db6800327, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 224.026µs} 2025/09/12 11:18:53 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:53 client Dropping Handshake keys. 2025/09/12 11:18:53 client <- &wire.NewTokenFrame{Token: 0xb77ca53213f5247b9bfdcad79a2441c19d7b9085807df998279f85f630d385b64ee0512b47} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8353412ecdaef3bf, StatelessResetToken: 0x9e3f609b000baaf048e7856c7aca6196} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ed55f9c891a459a2, StatelessResetToken: 0x6cf3bb9e96221410893a5f5901c55d5f} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7283aa8f5eddee56, StatelessResetToken: 0x4e3e4631504c7b9d1e861ae39ac257c4} 2025/09/12 11:18:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:18:53 client -> Sending packet 3 (55 bytes) for connection 6d831f644a7065f5, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 8353412ecdaef3bf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 152.744µs} 2025/09/12 11:18:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:53 client -> Sending packet 4 (48 bytes) for connection 6d831f644a7065f5, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 8353412ecdaef3bf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:53 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:53 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:53 client -> Sending packet 5 (30 bytes) for connection 6d831f644a7065f5, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 8353412ecdaef3bf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:53 client Connection 6d831f644a7065f5 closed. 2025/09/12 11:18:53 Requesting https://server4:443/xwviropwig. 2025/09/12 11:18:53 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:53 Increased send buffer size to 14336 kiB 2025/09/12 11:18:53 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:53 Created qlog file: /logs/qlog/99e946692ff32b102f093767283cfc76.sqlog 2025/09/12 11:18:53 client Starting new connection to server4 ([::]:53774 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 99e946692ff32b102f093767283cfc76, version v1 2025/09/12 11:18:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:53 client -> Sending packet 0 (1280 bytes) for connection 99e946692ff32b102f093767283cfc76, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 99e946692ff32b102f093767283cfc76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:53 client -> Sending packet 1 (1280 bytes) for connection 99e946692ff32b102f093767283cfc76, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 99e946692ff32b102f093767283cfc76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 1232, Data length: 284, Offset + Data length: 1516} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:53 client -> Sending packet 2 (1280 bytes) for connection 99e946692ff32b102f093767283cfc76, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 99e946692ff32b102f093767283cfc76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:53 client -> Sending packet 3 (1280 bytes) for connection 99e946692ff32b102f093767283cfc76, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 99e946692ff32b102f093767283cfc76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 1232, Data length: 284, Offset + Data length: 1516} 2025/09/12 11:18:53 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:53 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 89291597cf1295dd, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:53 client Received first packet. Switching destination connection ID to: 89291597cf1295dd 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:53 client newly acked packets (2): [2 3] 2025/09/12 11:18:53 client updated RTT: 34.938891ms (σ: 17.469445ms) 2025/09/12 11:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:53 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:53 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 89291597cf1295dd, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 11:18:53 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 99e946692ff32b102f093767283cfc76, InitialSourceConnectionID: 89291597cf1295dd, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x418c8ed91c7a0ab4e77d41b448106316, EnableResetStreamAt: false} 2025/09/12 11:18:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 99e946692ff32b102f093767283cfc76 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 89291597cf1295dd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: 89291597cf1295dd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:53 client Dropping Initial keys. 2025/09/12 11:18:53 client -> Sending packet 1 (86 bytes) for connection 99e946692ff32b102f093767283cfc76, Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: 89291597cf1295dd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:53 client Short Header{DestConnectionID: 89291597cf1295dd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:18:53 client -> Sending packet 2 (90 bytes) for connection 99e946692ff32b102f093767283cfc76, Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: 89291597cf1295dd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:53 client -> Sending packet 3 (90 bytes) for connection 99e946692ff32b102f093767283cfc76, Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: 89291597cf1295dd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:53 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:53 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 89291597cf1295dd, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:53 client Peer doesn't await address validation any longer. 2025/09/12 11:18:53 client newly acked packets (1): [3] 2025/09/12 11:18:53 client updated RTT: 34.677ms (σ: 13.622ms) 2025/09/12 11:18:53 client Canceling loss detection timer. 2025/09/12 11:18:53 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:53 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:53 client -> Sending packet 1 (32 bytes) for connection 99e946692ff32b102f093767283cfc76, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 89291597cf1295dd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 204.07µs} 2025/09/12 11:18:53 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 107ms} 2025/09/12 11:18:53 client newly acked packets (1): [0] 2025/09/12 11:18:53 client updated RTT: 44.629ms (σ: 30.122ms) 2025/09/12 11:18:53 client Dropping Handshake keys. 2025/09/12 11:18:53 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:53 client <- &wire.NewTokenFrame{Token: 0xb7ec643a664491c2e61bfaf4e010f0da236a21880bb7009481b4c687ff1b160bc6b79b3cc7} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c1d6882b19cea8e, StatelessResetToken: 0x69cfd92da601c5906cdad5fafb81e220} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 539021ec87aff1e3, StatelessResetToken: 0x7c0fde2dc822a4f64dad746059a4df94} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 68df727cecf39526, StatelessResetToken: 0x04e8495b45c7b157efd54bc2ff8072df} 2025/09/12 11:18:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:53 client -> Sending packet 2 (34 bytes) for connection 99e946692ff32b102f093767283cfc76, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 9c1d6882b19cea8e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 137.636µs} 2025/09/12 11:18:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:53 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:53 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:53 client -> Sending packet 3 (30 bytes) for connection 99e946692ff32b102f093767283cfc76, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 9c1d6882b19cea8e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:53 client Connection 99e946692ff32b102f093767283cfc76 closed. 2025/09/12 11:18:53 Requesting https://server4:443/osttquiegk. 2025/09/12 11:18:53 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:53 Increased send buffer size to 14336 kiB 2025/09/12 11:18:53 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:53 Created qlog file: /logs/qlog/01c8f38230b5d284ee0deac0f2.sqlog 2025/09/12 11:18:53 client Starting new connection to server4 ([::]:58793 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 01c8f38230b5d284ee0deac0f2, version v1 2025/09/12 11:18:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:53 client -> Sending packet 0 (1280 bytes) for connection 01c8f38230b5d284ee0deac0f2, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 01c8f38230b5d284ee0deac0f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:53 client -> Sending packet 1 (1280 bytes) for connection 01c8f38230b5d284ee0deac0f2, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 01c8f38230b5d284ee0deac0f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 1235, Data length: 276, Offset + Data length: 1511} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:53 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e366933d0616161e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:53 client Received first packet. Switching destination connection ID to: e366933d0616161e 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:53 client newly acked packets (1): [1] 2025/09/12 11:18:53 client updated RTT: 33.142751ms (σ: 16.571375ms) 2025/09/12 11:18:53 client setting loss timer for packet 0 (Initial) to 37.285594ms (in 2025-09-12 11:18:53.638541662 +0000 UTC m=+8.470684852) 2025/09/12 11:18:53 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:53.638541662 +0000 UTC m=+8.470684852 2025/09/12 11:18:53 client lost packet 0 (time threshold) 2025/09/12 11:18:53 client -> Sending packet 2 (1280 bytes) for connection 01c8f38230b5d284ee0deac0f2, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: e366933d0616161e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:18:53 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:53 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e366933d0616161e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:53 client newly acked packets (1): [2] 2025/09/12 11:18:53 client updated RTT: 33.314ms (σ: 12.774ms) 2025/09/12 11:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:53 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:53 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e366933d0616161e, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 11:18:53 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 01c8f38230b5d284ee0deac0f2, InitialSourceConnectionID: e366933d0616161e, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf057d18aeb29cf9e9c14bb9a93b3565c, EnableResetStreamAt: false} 2025/09/12 11:18:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 01c8f38230b5d284ee0deac0f2 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: e366933d0616161e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: e366933d0616161e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:53 client Dropping Initial keys. 2025/09/12 11:18:53 client -> Sending packet 1 (86 bytes) for connection 01c8f38230b5d284ee0deac0f2, Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: e366933d0616161e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:53 client Short Header{DestConnectionID: e366933d0616161e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:18:53 client -> Sending packet 2 (90 bytes) for connection 01c8f38230b5d284ee0deac0f2, Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: e366933d0616161e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:53 client -> Sending packet 3 (90 bytes) for connection 01c8f38230b5d284ee0deac0f2, Handshake 2025/09/12 11:18:53 client Long Header{Type: Handshake, DestConnectionID: e366933d0616161e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:53 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 85ms} 2025/09/12 11:18:53 client Peer doesn't await address validation any longer. 2025/09/12 11:18:53 client newly acked packets (1): [0] 2025/09/12 11:18:53 client updated RTT: 40.858ms (σ: 24.668ms) 2025/09/12 11:18:53 client Canceling loss detection timer. 2025/09/12 11:18:53 client Dropping Handshake keys. 2025/09/12 11:18:53 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:53 client <- &wire.NewTokenFrame{Token: 0xb7f4df0813c3a83916f737f9d75d538481de9c5db756504945db5ee6bc91b930c15766446f} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bdbb4cd916ec36a, StatelessResetToken: 0x894969b755f364685b1f6a3680eff574} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 10e2ee042d043aab, StatelessResetToken: 0xe538e8cdb12b0ea92cdbbe6cb839037a} 2025/09/12 11:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7bcef8b6d91dc2f6, StatelessResetToken: 0xc6a94b5be54e7f5f98e8793e0a502357} 2025/09/12 11:18:53 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:53 client -> Sending packet 1 (34 bytes) for connection 01c8f38230b5d284ee0deac0f2, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 6bdbb4cd916ec36a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 218.265µs} 2025/09/12 11:18:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:53 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:53 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:53 client -> Sending packet 2 (30 bytes) for connection 01c8f38230b5d284ee0deac0f2, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:53 client Short Header{DestConnectionID: 6bdbb4cd916ec36a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:53 client Connection 01c8f38230b5d284ee0deac0f2 closed. 2025/09/12 11:18:53 Requesting https://server4:443/smorolpkkr. 2025/09/12 11:18:53 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:53 Increased send buffer size to 14336 kiB 2025/09/12 11:18:53 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:53 Created qlog file: /logs/qlog/20f2199b5263ff90e1c499389c1028ab1483.sqlog 2025/09/12 11:18:53 client Starting new connection to server4 ([::]:46355 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 20f2199b5263ff90e1c499389c1028ab1483, version v1 2025/09/12 11:18:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:53 client -> Sending packet 0 (1280 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 20f2199b5263ff90e1c499389c1028ab1483, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:53 client -> Sending packet 1 (1280 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 20f2199b5263ff90e1c499389c1028ab1483, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 1230, Data length: 280, Offset + Data length: 1510} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:53 client -> Sending packet 2 (1280 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 20f2199b5263ff90e1c499389c1028ab1483, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:53 client -> Sending packet 3 (1280 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, Initial 2025/09/12 11:18:53 client Long Header{Type: Initial, DestConnectionID: 20f2199b5263ff90e1c499389c1028ab1483, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 1230, Data length: 280, Offset + Data length: 1510} 2025/09/12 11:18:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:54 client <- Reading packet 1 (41 bytes) for connection (empty), Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 76cb7c44e8ffa679, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:18:54 client Received first packet. Switching destination connection ID to: 76cb7c44e8ffa679 2025/09/12 11:18:54 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:54 client newly acked packets (1): [3] 2025/09/12 11:18:54 client updated RTT: 33.430878ms (σ: 16.715439ms) 2025/09/12 11:18:54 client setting loss timer for packet 2 (Initial) to 37.609737ms (in 2025-09-12 11:18:54.033343485 +0000 UTC m=+8.865486665) 2025/09/12 11:18:54 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:54.033343485 +0000 UTC m=+8.865486665 2025/09/12 11:18:54 client lost packet 2 (time threshold) 2025/09/12 11:18:54 client -> Sending packet 4 (1280 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 76cb7c44e8ffa679, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:54 client -> Sending packet 5 (1280 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 76cb7c44e8ffa679, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:54 client -> Sending packet 6 (1280 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 76cb7c44e8ffa679, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:54 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1062 bytes. 2025/09/12 11:18:54 client <- Reading packet 2 (138 bytes) for connection (empty), Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 76cb7c44e8ffa679, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 120, Version: v1} 2025/09/12 11:18:54 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:54 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:54 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:54 client Parsed a coalesced packet. Part 2: 1062 bytes. Remaining: 0 bytes. 2025/09/12 11:18:54 client <- Reading packet 0 (1062 bytes) for connection (empty), Handshake 2025/09/12 11:18:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 76cb7c44e8ffa679, PacketNumber: 0, PacketNumberLen: 1, Length: 1045, Version: v1} 2025/09/12 11:18:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 11:18:54 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:54 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 20f2199b5263ff90e1c499389c1028ab1483, InitialSourceConnectionID: 76cb7c44e8ffa679, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7f9fceaf86ee097cb6391c891ba51c66, EnableResetStreamAt: false} 2025/09/12 11:18:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 76cb7c44e8ffa679, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:54 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:54 client Long Header{Type: Handshake, DestConnectionID: 76cb7c44e8ffa679, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:54 client Dropping Initial keys. 2025/09/12 11:18:54 client -> Sending packet 1 (40 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, Handshake 2025/09/12 11:18:54 client Long Header{Type: Handshake, DestConnectionID: 76cb7c44e8ffa679, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:54 client -> Sending packet 0 (46 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:54 client Short Header{DestConnectionID: 76cb7c44e8ffa679, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:54 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:54 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 76cb7c44e8ffa679, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:54 client Peer doesn't await address validation any longer. 2025/09/12 11:18:54 client newly acked packets (1): [0] 2025/09/12 11:18:54 client updated RTT: 33.484ms (σ: 12.644ms) 2025/09/12 11:18:54 client Canceling loss detection timer. 2025/09/12 11:18:54 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:54 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:54 client -> Sending packet 1 (32 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:54 client Short Header{DestConnectionID: 76cb7c44e8ffa679, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 156.892µs} 2025/09/12 11:18:54 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:54 client newly acked packets (1): [0] 2025/09/12 11:18:54 client updated RTT: 33.598ms (σ: 9.711ms) 2025/09/12 11:18:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:54 client Dropping Handshake keys. 2025/09/12 11:18:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:54 client <- &wire.NewTokenFrame{Token: 0xb767409ce370e972ddefca4ebd3d1c99dedd164ff03448916b390de28266536949d8be8bdb} 2025/09/12 11:18:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: afab54d1fa3d0255, StatelessResetToken: 0xc9a6fb4e86e2de570f846aef20d0d8cb} 2025/09/12 11:18:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bd3786a51ad05f4a, StatelessResetToken: 0x82f58ac859e864783ae55b31d60fcab6} 2025/09/12 11:18:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c629784e7e17432c, StatelessResetToken: 0xf1b9bc8492226cdc7aa8c2b8473dd51d} 2025/09/12 11:18:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:54 client -> Sending packet 2 (34 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:54 client Short Header{DestConnectionID: afab54d1fa3d0255, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 137.536µs} 2025/09/12 11:18:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:54 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:54 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:54 client -> Sending packet 3 (30 bytes) for connection 20f2199b5263ff90e1c499389c1028ab1483, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:54 client Short Header{DestConnectionID: afab54d1fa3d0255, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:54 client Connection 20f2199b5263ff90e1c499389c1028ab1483 closed. 2025/09/12 11:18:54 Requesting https://server4:443/vybmffurlm. 2025/09/12 11:18:54 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:54 Increased send buffer size to 14336 kiB 2025/09/12 11:18:54 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:54 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:54 Created qlog file: /logs/qlog/1d93b9e1fccebf1be55b7a.sqlog 2025/09/12 11:18:54 client Starting new connection to server4 ([::]:44977 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1d93b9e1fccebf1be55b7a, version v1 2025/09/12 11:18:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:54 client -> Sending packet 0 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 1d93b9e1fccebf1be55b7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:54 client -> Sending packet 1 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 1d93b9e1fccebf1be55b7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 1237, Data length: 268, Offset + Data length: 1505} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:54 client -> Sending packet 2 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 1d93b9e1fccebf1be55b7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:54 client -> Sending packet 3 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 1d93b9e1fccebf1be55b7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 1237, Data length: 268, Offset + Data length: 1505} 2025/09/12 11:18:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:54 client -> Sending packet 4 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 1d93b9e1fccebf1be55b7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:54 client -> Sending packet 5 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 1d93b9e1fccebf1be55b7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 1237, Data length: 268, Offset + Data length: 1505} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:54 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 85a418d952d3338b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:54 client Received first packet. Switching destination connection ID to: 85a418d952d3338b 2025/09/12 11:18:54 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/12 11:18:54 client newly acked packets (1): [5] 2025/09/12 11:18:54 client updated RTT: 33.331667ms (σ: 16.665833ms) 2025/09/12 11:18:54 client setting loss timer for packet 4 (Initial) to 37.498125ms (in 2025-09-12 11:18:54.945622025 +0000 UTC m=+9.777765195) 2025/09/12 11:18:54 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:54.945622025 +0000 UTC m=+9.777765195 2025/09/12 11:18:54 client lost packet 4 (time threshold) 2025/09/12 11:18:54 client -> Sending packet 6 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:54 client Long Header{Type: Initial, DestConnectionID: 85a418d952d3338b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:18:55 client -> Sending packet 7 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: 85a418d952d3338b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:55 client -> Sending packet 8 (1280 bytes) for connection 1d93b9e1fccebf1be55b7a, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: 85a418d952d3338b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:55 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:18:55 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 85a418d952d3338b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:18:55 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 0s} 2025/09/12 11:18:55 client newly acked packets (1): [8] 2025/09/12 11:18:55 client updated RTT: 33.528ms (σ: 12.892ms) 2025/09/12 11:18:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:55 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:55 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:55 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:18:55 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 85a418d952d3338b, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:18:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 11:18:55 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:55 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1d93b9e1fccebf1be55b7a, InitialSourceConnectionID: 85a418d952d3338b, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd8b9617b9f582dc114d09d273b51c3c7, EnableResetStreamAt: false} 2025/09/12 11:18:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1d93b9e1fccebf1be55b7a 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: 85a418d952d3338b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: 85a418d952d3338b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:55 client Dropping Initial keys. 2025/09/12 11:18:55 client -> Sending packet 1 (40 bytes) for connection 1d93b9e1fccebf1be55b7a, Handshake 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: 85a418d952d3338b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:55 client -> Sending packet 0 (46 bytes) for connection 1d93b9e1fccebf1be55b7a, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 85a418d952d3338b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:55 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:55 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/09/12 11:18:55 client Peer doesn't await address validation any longer. 2025/09/12 11:18:55 client newly acked packets (1): [0] 2025/09/12 11:18:55 client updated RTT: 33.652ms (σ: 9.917ms) 2025/09/12 11:18:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:55 client Canceling loss detection timer. 2025/09/12 11:18:55 client Dropping Handshake keys. 2025/09/12 11:18:55 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:55 client <- &wire.NewTokenFrame{Token: 0xb7de8c5863c931ca56c7b3cb752be63ad723c10ccbecc2bbb74ee07be2c074169f316dd091} 2025/09/12 11:18:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2aaf2e0c435d878f, StatelessResetToken: 0x7f0d222419e70670bba33d1792a6da42} 2025/09/12 11:18:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 20884a7799be8a76, StatelessResetToken: 0x587a8ab45ae3c1f73fdd390b080ddbef} 2025/09/12 11:18:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c89587a6bbf87d9e, StatelessResetToken: 0x73d42e450d462d1c16fa087536650f84} 2025/09/12 11:18:55 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:55 client -> Sending packet 1 (34 bytes) for connection 1d93b9e1fccebf1be55b7a, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 2aaf2e0c435d878f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 161.41µs} 2025/09/12 11:18:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:55 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:55 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:55 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:55 client newly acked packets (1): [1] 2025/09/12 11:18:55 client updated RTT: 33.375ms (σ: 7.99ms) 2025/09/12 11:18:55 client Canceling loss detection timer. 2025/09/12 11:18:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2a65e5d8bb7699ed, StatelessResetToken: 0x31ff92c0ad2edad9291719bb5b543eb7} 2025/09/12 11:18:55 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:55 client Ignoring all packets below 2. 2025/09/12 11:18:55 client -> Sending packet 2 (32 bytes) for connection 1d93b9e1fccebf1be55b7a, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 2aaf2e0c435d878f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 133.999µs} 2025/09/12 11:18:55 client <- Reading packet 4 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:55 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:55 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:55 client Sending ACK because the ACK timer expired. 2025/09/12 11:18:55 client -> Sending packet 3 (33 bytes) for connection 1d93b9e1fccebf1be55b7a, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 2aaf2e0c435d878f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.28192ms} 2025/09/12 11:18:55 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:55 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:55 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:55 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:55 client -> Sending packet 4 (30 bytes) for connection 1d93b9e1fccebf1be55b7a, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 2aaf2e0c435d878f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:55 client Connection 1d93b9e1fccebf1be55b7a closed. 2025/09/12 11:18:55 Requesting https://server4:443/hfblaosanj. 2025/09/12 11:18:55 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:55 Increased send buffer size to 14336 kiB 2025/09/12 11:18:55 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:55 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:55 Created qlog file: /logs/qlog/a6bc710734bb8c2533c4c13e78ba4b614f.sqlog 2025/09/12 11:18:55 client Starting new connection to server4 ([::]:38965 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a6bc710734bb8c2533c4c13e78ba4b614f, version v1 2025/09/12 11:18:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:55 client -> Sending packet 0 (1280 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: a6bc710734bb8c2533c4c13e78ba4b614f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:55 client -> Sending packet 1 (1280 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: a6bc710734bb8c2533c4c13e78ba4b614f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 1231, Data length: 286, Offset + Data length: 1517} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:55 client -> Sending packet 2 (1280 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: a6bc710734bb8c2533c4c13e78ba4b614f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:55 client -> Sending packet 3 (1280 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: a6bc710734bb8c2533c4c13e78ba4b614f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 1231, Data length: 286, Offset + Data length: 1517} 2025/09/12 11:18:55 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 711192bf329c2074, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:55 client Received first packet. Switching destination connection ID to: 711192bf329c2074 2025/09/12 11:18:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:55 client newly acked packets (1): [3] 2025/09/12 11:18:55 client updated RTT: 33.179932ms (σ: 16.589966ms) 2025/09/12 11:18:55 client setting loss timer for packet 2 (Initial) to 37.327423ms (in 2025-09-12 11:18:55.752782577 +0000 UTC m=+10.584925758) 2025/09/12 11:18:55 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:55.752782577 +0000 UTC m=+10.584925758 2025/09/12 11:18:55 client lost packet 2 (time threshold) 2025/09/12 11:18:55 client -> Sending packet 4 (1280 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: 711192bf329c2074, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 11:18:55 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:55 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 711192bf329c2074, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:55 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:55 client newly acked packets (1): [4] 2025/09/12 11:18:55 client updated RTT: 33.317ms (σ: 12.717ms) 2025/09/12 11:18:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:55 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:55 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:55 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:55 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 711192bf329c2074, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 11:18:55 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:55 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a6bc710734bb8c2533c4c13e78ba4b614f, InitialSourceConnectionID: 711192bf329c2074, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf92722c60d5f33b8315d3f1a8bf99f7b, EnableResetStreamAt: false} 2025/09/12 11:18:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: 711192bf329c2074, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: 711192bf329c2074, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:55 client Dropping Initial keys. 2025/09/12 11:18:55 client -> Sending packet 1 (40 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, Handshake 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: 711192bf329c2074, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:55 client -> Sending packet 0 (46 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 711192bf329c2074, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:18:55 client -> Sending packet 2 (90 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, Handshake 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: 711192bf329c2074, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:55 client -> Sending packet 3 (90 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, Handshake 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: 711192bf329c2074, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:55 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:55 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 711192bf329c2074, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:55 client Peer doesn't await address validation any longer. 2025/09/12 11:18:55 client newly acked packets (1): [3] 2025/09/12 11:18:55 client updated RTT: 33.272ms (σ: 9.625ms) 2025/09/12 11:18:55 client Canceling loss detection timer. 2025/09/12 11:18:55 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:55 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:55 client -> Sending packet 1 (32 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 711192bf329c2074, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 159.056µs} 2025/09/12 11:18:55 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:55 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 86ms} 2025/09/12 11:18:55 client newly acked packets (1): [0] 2025/09/12 11:18:55 client updated RTT: 40.731ms (σ: 22.138ms) 2025/09/12 11:18:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:55 client Dropping Handshake keys. 2025/09/12 11:18:55 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:55 client <- &wire.NewTokenFrame{Token: 0xb7a51a113bae15594685ddf74d859c04288e05e753500eec7e85b070411487e4db22cdeaa9} 2025/09/12 11:18:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d3fd35d3c1c2231, StatelessResetToken: 0x71abc28e12bf26036046c708d9c17f45} 2025/09/12 11:18:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 04171499aad26f6f, StatelessResetToken: 0x424762b4d251a59bd769bf30e4782bbe} 2025/09/12 11:18:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9c3b27a4254c2d03, StatelessResetToken: 0x9200ee2c7cf72d300516e0c5a8858a86} 2025/09/12 11:18:55 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:55 client -> Sending packet 2 (34 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 8d3fd35d3c1c2231, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 154.77µs} 2025/09/12 11:18:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:55 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:55 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:55 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:55 client -> Sending packet 3 (30 bytes) for connection a6bc710734bb8c2533c4c13e78ba4b614f, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:55 client Short Header{DestConnectionID: 8d3fd35d3c1c2231, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:55 client Connection a6bc710734bb8c2533c4c13e78ba4b614f closed. 2025/09/12 11:18:55 Requesting https://server4:443/jgdicdqaor. 2025/09/12 11:18:55 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:55 Increased send buffer size to 14336 kiB 2025/09/12 11:18:55 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:55 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:55 Created qlog file: /logs/qlog/498dbd8655359c71739313110ca2c1ad.sqlog 2025/09/12 11:18:55 client Starting new connection to server4 ([::]:34367 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 498dbd8655359c71739313110ca2c1ad, version v1 2025/09/12 11:18:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:55 client -> Sending packet 0 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: 498dbd8655359c71739313110ca2c1ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:55 client -> Sending packet 1 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:55 client Long Header{Type: Initial, DestConnectionID: 498dbd8655359c71739313110ca2c1ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 1232, Data length: 276, Offset + Data length: 1508} 2025/09/12 11:18:55 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:56 client -> Sending packet 2 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:56 client Long Header{Type: Initial, DestConnectionID: 498dbd8655359c71739313110ca2c1ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:56 client -> Sending packet 3 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:56 client Long Header{Type: Initial, DestConnectionID: 498dbd8655359c71739313110ca2c1ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 1232, Data length: 276, Offset + Data length: 1508} 2025/09/12 11:18:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:56 client -> Sending packet 4 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:56 client Long Header{Type: Initial, DestConnectionID: 498dbd8655359c71739313110ca2c1ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:56 client -> Sending packet 5 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:56 client Long Header{Type: Initial, DestConnectionID: 498dbd8655359c71739313110ca2c1ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 1232, Data length: 276, Offset + Data length: 1508} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:56 client <- Reading packet 2 (41 bytes) for connection (empty), Initial 2025/09/12 11:18:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c3be1ce9f88c01b1, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:18:56 client Received first packet. Switching destination connection ID to: c3be1ce9f88c01b1 2025/09/12 11:18:56 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:56 client newly acked packets (1): [5] 2025/09/12 11:18:56 client updated RTT: 33.201631ms (σ: 16.600815ms) 2025/09/12 11:18:56 client setting loss timer for packet 4 (Initial) to 37.351834ms (in 2025-09-12 11:18:56.547302536 +0000 UTC m=+11.379445706) 2025/09/12 11:18:56 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:56.547302536 +0000 UTC m=+11.379445706 2025/09/12 11:18:56 client lost packet 4 (time threshold) 2025/09/12 11:18:56 client -> Sending packet 6 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:56 client Long Header{Type: Initial, DestConnectionID: c3be1ce9f88c01b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:18:56 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 11:18:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c3be1ce9f88c01b1, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:18:56 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:56 client newly acked packets (1): [6] 2025/09/12 11:18:56 client updated RTT: 33.057ms (σ: 12.737ms) 2025/09/12 11:18:56 client -> Sending packet 7 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:56 client Long Header{Type: Initial, DestConnectionID: c3be1ce9f88c01b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:56 client -> &wire.PingFrame{} 2025/09/12 11:18:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 11:18:57 client -> Sending packet 8 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:57 client Long Header{Type: Initial, DestConnectionID: c3be1ce9f88c01b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:57 client -> &wire.PingFrame{} 2025/09/12 11:18:57 client -> Sending packet 9 (1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Initial 2025/09/12 11:18:57 client Long Header{Type: Initial, DestConnectionID: c3be1ce9f88c01b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:57 client -> &wire.PingFrame{} 2025/09/12 11:18:57 client <- Reading packet 6 (43 bytes) for connection (empty), Initial 2025/09/12 11:18:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c3be1ce9f88c01b1, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 26, Version: v1} 2025/09/12 11:18:57 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:57 client newly acked packets (1): [9] 2025/09/12 11:18:57 client updated RTT: 33.089ms (σ: 9.618ms) 2025/09/12 11:18:57 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:18:57 client <- Reading packet 7 (129 bytes) for connection (empty), Initial 2025/09/12 11:18:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c3be1ce9f88c01b1, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:18:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:57 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:57 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:57 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:18:57 client <- Reading packet 3 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:18:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c3be1ce9f88c01b1, PacketNumber: 3, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:18:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 11:18:57 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:57 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 498dbd8655359c71739313110ca2c1ad, InitialSourceConnectionID: c3be1ce9f88c01b1, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x01f9bdb7a49868fbcedbde0c751e73c7, EnableResetStreamAt: false} 2025/09/12 11:18:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 498dbd8655359c71739313110ca2c1ad 2025/09/12 11:18:57 client Long Header{Type: Initial, DestConnectionID: c3be1ce9f88c01b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:57 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/09/12 11:18:57 client Long Header{Type: Handshake, DestConnectionID: c3be1ce9f88c01b1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:57 client Dropping Initial keys. 2025/09/12 11:18:57 client -> Sending packet 1 (40 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Handshake 2025/09/12 11:18:57 client Long Header{Type: Handshake, DestConnectionID: c3be1ce9f88c01b1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:57 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:18:57 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/09/12 11:18:57 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:18:57 client <- Reading packet 4 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:18:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c3be1ce9f88c01b1, PacketNumber: 4, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:18:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 11:18:57 client -> Sending packet 2 (86 bytes) for connection 498dbd8655359c71739313110ca2c1ad, Handshake 2025/09/12 11:18:57 client Long Header{Type: Handshake, DestConnectionID: c3be1ce9f88c01b1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:18:57 client Short Header{DestConnectionID: c3be1ce9f88c01b1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:57 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:57 client <- Reading packet 5 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c3be1ce9f88c01b1, PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:57 client Peer doesn't await address validation any longer. 2025/09/12 11:18:57 client newly acked packets (1): [0] 2025/09/12 11:18:57 client updated RTT: 33.259ms (σ: 7.554ms) 2025/09/12 11:18:57 client Canceling loss detection timer. 2025/09/12 11:18:57 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:57 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:57 client -> Sending packet 1 (32 bytes) for connection 498dbd8655359c71739313110ca2c1ad, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:57 client Short Header{DestConnectionID: c3be1ce9f88c01b1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 124.061µs} 2025/09/12 11:18:57 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:57 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:57 client Dropping Handshake keys. 2025/09/12 11:18:57 client <- &wire.NewTokenFrame{Token: 0xb737e0409adabc1a26071c6bd0879795b23ee51f4175cfee45e254e144fcd02388c05395bd} 2025/09/12 11:18:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 87a984f0dfe2d510, StatelessResetToken: 0x3e7edf2cca829e00d6012524a5a6ff58} 2025/09/12 11:18:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 874a033e1b78c15e, StatelessResetToken: 0x53b5b2cf3b228f93cab51871955c91b1} 2025/09/12 11:18:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 279488a769396e50, StatelessResetToken: 0x1bbb0b170810e132e730b81bebacd396} 2025/09/12 11:18:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:57 client -> Sending packet 2 (34 bytes) for connection 498dbd8655359c71739313110ca2c1ad, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:57 client Short Header{DestConnectionID: 87a984f0dfe2d510, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 78.846µs} 2025/09/12 11:18:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:18:57 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:57 client newly acked packets (1): [2] 2025/09/12 11:18:57 client updated RTT: 33.05ms (σ: 6.082ms) 2025/09/12 11:18:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:18:57 client lost packet 0 (time threshold) 2025/09/12 11:18:57 client Canceling loss detection timer. 2025/09/12 11:18:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a701d06018762745, StatelessResetToken: 0xa7bbe3a766f205fd981894ff96862094} 2025/09/12 11:18:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:57 client Ignoring all packets below 2. 2025/09/12 11:18:57 client -> Sending packet 3 (51 bytes) for connection 498dbd8655359c71739313110ca2c1ad, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:57 client Short Header{DestConnectionID: 87a984f0dfe2d510, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 200.364µs} 2025/09/12 11:18:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:57 client <- Reading packet 3 (1052 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 1ms} 2025/09/12 11:18:57 client newly acked packets (1): [3] 2025/09/12 11:18:57 client updated RTT: 32.925ms (σ: 4.81ms) 2025/09/12 11:18:57 client Canceling loss detection timer. 2025/09/12 11:18:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:57 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:57 client Ignoring all packets below 3. 2025/09/12 11:18:57 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:57 client -> Sending packet 4 (30 bytes) for connection 498dbd8655359c71739313110ca2c1ad, 1-RTT (ECN: Not-ECT) 2025/09/12 11:18:57 client Short Header{DestConnectionID: 87a984f0dfe2d510, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:57 client Connection 498dbd8655359c71739313110ca2c1ad closed. 2025/09/12 11:18:57 Requesting https://server4:443/zmtijzeixj. 2025/09/12 11:18:57 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:57 Increased send buffer size to 14336 kiB 2025/09/12 11:18:57 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:57 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:57 Created qlog file: /logs/qlog/1b148d5a750eb0ac9ceb58.sqlog 2025/09/12 11:18:57 client Starting new connection to server4 ([::]:56129 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1b148d5a750eb0ac9ceb58, version v1 2025/09/12 11:18:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:57 client -> Sending packet 0 (1280 bytes) for connection 1b148d5a750eb0ac9ceb58, Initial 2025/09/12 11:18:57 client Long Header{Type: Initial, DestConnectionID: 1b148d5a750eb0ac9ceb58, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:57 client -> Sending packet 1 (1280 bytes) for connection 1b148d5a750eb0ac9ceb58, Initial 2025/09/12 11:18:57 client Long Header{Type: Initial, DestConnectionID: 1b148d5a750eb0ac9ceb58, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:57 client -> &wire.CryptoFrame{Offset: 1237, Data length: 279, Offset + Data length: 1516} 2025/09/12 11:18:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:58 client -> Sending packet 2 (1280 bytes) for connection 1b148d5a750eb0ac9ceb58, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 1b148d5a750eb0ac9ceb58, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:58 client -> Sending packet 3 (1280 bytes) for connection 1b148d5a750eb0ac9ceb58, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 1b148d5a750eb0ac9ceb58, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 1237, Data length: 279, Offset + Data length: 1516} 2025/09/12 11:18:58 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:18:58 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b02e627343fdf7cf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:18:58 client Received first packet. Switching destination connection ID to: b02e627343fdf7cf 2025/09/12 11:18:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:58 client newly acked packets (1): [2] 2025/09/12 11:18:58 client updated RTT: 34.837195ms (σ: 17.418597ms) 2025/09/12 11:18:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:58 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:58 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:58 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:18:58 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:18:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b02e627343fdf7cf, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:18:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 11:18:58 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:58 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1b148d5a750eb0ac9ceb58, InitialSourceConnectionID: b02e627343fdf7cf, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7e2afab147e398bb377381cbd8a840ab, EnableResetStreamAt: false} 2025/09/12 11:18:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1b148d5a750eb0ac9ceb58 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: b02e627343fdf7cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:58 client Long Header{Type: Handshake, DestConnectionID: b02e627343fdf7cf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:58 client Dropping Initial keys. 2025/09/12 11:18:58 client -> Sending packet 1 (86 bytes) for connection 1b148d5a750eb0ac9ceb58, Handshake 2025/09/12 11:18:58 client Long Header{Type: Handshake, DestConnectionID: b02e627343fdf7cf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:58 client Short Header{DestConnectionID: b02e627343fdf7cf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:58 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:58 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:58 client -> Sending packet 1 (32 bytes) for connection 1b148d5a750eb0ac9ceb58, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:58 client Short Header{DestConnectionID: b02e627343fdf7cf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 72.174µs} 2025/09/12 11:18:58 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:58 client -> Sending packet 2 (69 bytes) for connection 1b148d5a750eb0ac9ceb58, Handshake 2025/09/12 11:18:58 client Long Header{Type: Handshake, DestConnectionID: b02e627343fdf7cf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 11:18:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:58 client Short Header{DestConnectionID: b02e627343fdf7cf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:58 client Connection 1b148d5a750eb0ac9ceb58 closed. 2025/09/12 11:18:58 Requesting https://server4:443/fqejbrekxh. 2025/09/12 11:18:58 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:58 Increased send buffer size to 14336 kiB 2025/09/12 11:18:58 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:58 Created qlog file: /logs/qlog/36ab4caa080e9c7383.sqlog 2025/09/12 11:18:58 client Starting new connection to server4 ([::]:41032 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 36ab4caa080e9c7383, version v1 2025/09/12 11:18:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:58 client -> Sending packet 0 (1280 bytes) for connection 36ab4caa080e9c7383, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 36ab4caa080e9c7383, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:58 client -> Sending packet 1 (1280 bytes) for connection 36ab4caa080e9c7383, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 36ab4caa080e9c7383, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 1239, Data length: 271, Offset + Data length: 1510} 2025/09/12 11:18:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:58 client -> Sending packet 2 (1280 bytes) for connection 36ab4caa080e9c7383, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 36ab4caa080e9c7383, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:58 client -> Sending packet 3 (1280 bytes) for connection 36ab4caa080e9c7383, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 36ab4caa080e9c7383, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 1239, Data length: 271, Offset + Data length: 1510} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:18:58 client -> Sending packet 4 (1280 bytes) for connection 36ab4caa080e9c7383, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 36ab4caa080e9c7383, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:58 client -> Sending packet 5 (1280 bytes) for connection 36ab4caa080e9c7383, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 36ab4caa080e9c7383, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 1239, Data length: 271, Offset + Data length: 1510} 2025/09/12 11:18:58 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fbd4b2079947211d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 11:18:58 client Received first packet. Switching destination connection ID to: fbd4b2079947211d 2025/09/12 11:18:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:58 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:58 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:58 client -> Sending packet 6 (1280 bytes) for connection 36ab4caa080e9c7383, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: fbd4b2079947211d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:18:58 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 771 bytes. 2025/09/12 11:18:58 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fbd4b2079947211d, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:18:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:18:58 client newly acked packets (1): [4] 2025/09/12 11:18:58 client updated RTT: 34.41586ms (σ: 17.20793ms) 2025/09/12 11:18:58 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 0 bytes. 2025/09/12 11:18:58 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/09/12 11:18:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fbd4b2079947211d, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/09/12 11:18:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 11:18:58 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:58 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 36ab4caa080e9c7383, InitialSourceConnectionID: fbd4b2079947211d, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa199471f2294a318ce31ea57b7e1d9f3, EnableResetStreamAt: false} 2025/09/12 11:18:58 client -> Sending packet 0 (95 bytes) for connection 36ab4caa080e9c7383, Handshake 2025/09/12 11:18:58 client Long Header{Type: Handshake, DestConnectionID: fbd4b2079947211d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 78, Version: v1} 2025/09/12 11:18:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:58 client Dropping Initial keys. 2025/09/12 11:18:58 client -> Sending packet 0 (46 bytes) for connection 36ab4caa080e9c7383, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:58 client Short Header{DestConnectionID: fbd4b2079947211d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:58 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:58 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fbd4b2079947211d, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:58 client Peer doesn't await address validation any longer. 2025/09/12 11:18:58 client newly acked packets (1): [0] 2025/09/12 11:18:58 client updated RTT: 34.365ms (σ: 13.004ms) 2025/09/12 11:18:58 client Canceling loss detection timer. 2025/09/12 11:18:58 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:58 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:58 client -> Sending packet 1 (32 bytes) for connection 36ab4caa080e9c7383, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:58 client Short Header{DestConnectionID: fbd4b2079947211d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 233.303µs} 2025/09/12 11:18:58 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:18:58 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:18:58 client -> Sending packet 2 (34 bytes) for connection 36ab4caa080e9c7383, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:58 client Short Header{DestConnectionID: fbd4b2079947211d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 87.613µs} 2025/09/12 11:18:58 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:18:58 client -> Sending packet 1 (69 bytes) for connection 36ab4caa080e9c7383, Handshake 2025/09/12 11:18:58 client Long Header{Type: Handshake, DestConnectionID: fbd4b2079947211d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 11:18:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:58 client Short Header{DestConnectionID: fbd4b2079947211d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:18:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:18:58 client Connection 36ab4caa080e9c7383 closed. 2025/09/12 11:18:58 Requesting https://server4:443/buxfxpyofw. 2025/09/12 11:18:58 Increased receive buffer size to 14336 kiB 2025/09/12 11:18:58 Increased send buffer size to 14336 kiB 2025/09/12 11:18:58 Setting DF for IPv4 and IPv6. 2025/09/12 11:18:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:18:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:18:58 Created qlog file: /logs/qlog/3ce20fc547e1845c2758a81510f83919bd16.sqlog 2025/09/12 11:18:58 client Starting new connection to server4 ([::]:47409 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3ce20fc547e1845c2758a81510f83919bd16, version v1 2025/09/12 11:18:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:18:58 client -> Sending packet 0 (1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 3ce20fc547e1845c2758a81510f83919bd16, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:58 client -> Sending packet 1 (1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 3ce20fc547e1845c2758a81510f83919bd16, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 1230, Data length: 274, Offset + Data length: 1504} 2025/09/12 11:18:58 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1916a0af5c9613f2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:58 client Received first packet. Switching destination connection ID to: 1916a0af5c9613f2 2025/09/12 11:18:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:58 client newly acked packets (1): [1] 2025/09/12 11:18:58 client updated RTT: 33.156168ms (σ: 16.578084ms) 2025/09/12 11:18:58 client setting loss timer for packet 0 (Initial) to 37.300689ms (in 2025-09-12 11:18:58.891906463 +0000 UTC m=+13.724049643) 2025/09/12 11:18:58 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:18:58.891906463 +0000 UTC m=+13.724049643 2025/09/12 11:18:58 client lost packet 0 (time threshold) 2025/09/12 11:18:58 client -> Sending packet 2 (1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:18:58 client -> Sending packet 3 (1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:58 client -> Sending packet 4 (1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Initial 2025/09/12 11:18:58 client Long Header{Type: Initial, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 11:18:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:18:59 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/09/12 11:18:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1916a0af5c9613f2, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:59 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:18:59 client newly acked packets (1): [4] 2025/09/12 11:18:59 client updated RTT: 33.3ms (σ: 12.723ms) 2025/09/12 11:18:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:18:59 client -> Sending packet 5 (1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Initial 2025/09/12 11:18:59 client Long Header{Type: Initial, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:59 client -> &wire.PingFrame{} 2025/09/12 11:18:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:18:59 client -> Sending packet 6 (1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Initial 2025/09/12 11:18:59 client Long Header{Type: Initial, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:59 client -> &wire.PingFrame{} 2025/09/12 11:18:59 client -> Sending packet 7 (1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Initial 2025/09/12 11:18:59 client Long Header{Type: Initial, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:18:59 client -> &wire.PingFrame{} 2025/09/12 11:18:59 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:18:59 client <- Reading packet 5 (129 bytes) for connection (empty), Initial 2025/09/12 11:18:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1916a0af5c9613f2, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:18:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:18:59 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:59 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:59 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:18:59 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:18:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1916a0af5c9613f2, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:18:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 11:18:59 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:59 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:18:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3ce20fc547e1845c2758a81510f83919bd16, InitialSourceConnectionID: 1916a0af5c9613f2, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x704d047e76269336801d658cc016a857, EnableResetStreamAt: false} 2025/09/12 11:18:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16 2025/09/12 11:18:59 client Long Header{Type: Initial, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:18:59 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:18:59 client Long Header{Type: Handshake, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:18:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:18:59 client Dropping Initial keys. 2025/09/12 11:18:59 client -> Sending packet 1 (86 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, Handshake 2025/09/12 11:18:59 client Long Header{Type: Handshake, DestConnectionID: 1916a0af5c9613f2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:18:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:18:59 client Short Header{DestConnectionID: 1916a0af5c9613f2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:18:59 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:18:59 client <- Reading packet 4 (38 bytes) for connection (empty), Handshake 2025/09/12 11:18:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1916a0af5c9613f2, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:18:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:18:59 client Peer doesn't await address validation any longer. 2025/09/12 11:18:59 client newly acked packets (1): [0] 2025/09/12 11:18:59 client Canceling loss detection timer. 2025/09/12 11:18:59 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:18:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:18:59 client -> Sending packet 1 (32 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:59 client Short Header{DestConnectionID: 1916a0af5c9613f2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 199.06µs} 2025/09/12 11:18:59 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:18:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:18:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/09/12 11:18:59 client newly acked packets (1): [0] 2025/09/12 11:18:59 client updated RTT: 33.285ms (σ: 9.57ms) 2025/09/12 11:18:59 client Dropping Handshake keys. 2025/09/12 11:18:59 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:18:59 client <- &wire.NewTokenFrame{Token: 0xb713108e37af2c46dd7709f45e163d234241db09167373fddab3413e4d3307dfc205553f95} 2025/09/12 11:18:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7c3ab1db789e308, StatelessResetToken: 0xcc8da1c88445647971f443e3eae532c3} 2025/09/12 11:18:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 09d3cd0a64deee7e, StatelessResetToken: 0xe6990ac96cb91755abf71ac4dca0494e} 2025/09/12 11:18:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a5176bdc444f416f, StatelessResetToken: 0x16ac5d8ac6675526a56b0249eb404f25} 2025/09/12 11:18:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:18:59 client -> Sending packet 2 (34 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, 1-RTT (ECN: ECT(0)) 2025/09/12 11:18:59 client Short Header{DestConnectionID: e7c3ab1db789e308, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:18:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 129.601µs} 2025/09/12 11:18:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:00 client -> Sending packet 4 (29 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: e7c3ab1db789e308, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:00 client -> Sending packet 5 (29 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: e7c3ab1db789e308, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:00 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: efb62f44173c30fd, StatelessResetToken: 0x46e6308e09332caf6f9560b8200b22b2} 2025/09/12 11:19:00 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:00 client -> Sending packet 6 (34 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: e7c3ab1db789e308, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 87.021µs} 2025/09/12 11:19:00 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:00 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:00 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:00 client -> Sending packet 7 (1366 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: e7c3ab1db789e308, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.PingFrame{} 2025/09/12 11:19:00 client -> Sending packet 8 (36 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: e7c3ab1db789e308, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 163.454µs} 2025/09/12 11:19:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:00 client -> Sending packet 9 (30 bytes) for connection 3ce20fc547e1845c2758a81510f83919bd16, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: e7c3ab1db789e308, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:00 client Connection 3ce20fc547e1845c2758a81510f83919bd16 closed. 2025/09/12 11:19:00 Requesting https://server4:443/xlrnjgcpfr. 2025/09/12 11:19:00 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:00 Increased send buffer size to 14336 kiB 2025/09/12 11:19:00 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:00 Created qlog file: /logs/qlog/85d3b385ab822f9b03d91e9b1ea4a353.sqlog 2025/09/12 11:19:00 client Starting new connection to server4 ([::]:44826 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 85d3b385ab822f9b03d91e9b1ea4a353, version v1 2025/09/12 11:19:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:00 client -> Sending packet 0 (1280 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 85d3b385ab822f9b03d91e9b1ea4a353, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:19:00 client -> Sending packet 1 (1280 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 85d3b385ab822f9b03d91e9b1ea4a353, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/09/12 11:19:00 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5efbfd8f56c1190e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:00 client Received first packet. Switching destination connection ID to: 5efbfd8f56c1190e 2025/09/12 11:19:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:00 client newly acked packets (1): [1] 2025/09/12 11:19:00 client updated RTT: 33.515269ms (σ: 16.757634ms) 2025/09/12 11:19:00 client setting loss timer for packet 0 (Initial) to 37.704677ms (in 2025-09-12 11:19:00.209494761 +0000 UTC m=+15.041637940) 2025/09/12 11:19:00 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:00.209494761 +0000 UTC m=+15.041637940 2025/09/12 11:19:00 client lost packet 0 (time threshold) 2025/09/12 11:19:00 client -> Sending packet 2 (1280 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 5efbfd8f56c1190e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:19:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:00 client -> Sending packet 3 (1280 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 5efbfd8f56c1190e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> Sending packet 4 (1280 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 5efbfd8f56c1190e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:00 client -> Sending packet 5 (1280 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 5efbfd8f56c1190e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> Sending packet 6 (1280 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 5efbfd8f56c1190e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:19:00 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5efbfd8f56c1190e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 11:19:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:00 client -> Sending packet 7 (1280 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 5efbfd8f56c1190e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:00 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 777 bytes. 2025/09/12 11:19:00 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5efbfd8f56c1190e, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:00 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:00 client Parsed a coalesced packet. Part 2: 777 bytes. Remaining: 0 bytes. 2025/09/12 11:19:00 client <- Reading packet 1 (777 bytes) for connection (empty), Handshake 2025/09/12 11:19:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5efbfd8f56c1190e, PacketNumber: 1, PacketNumberLen: 1, Length: 760, Version: v1} 2025/09/12 11:19:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 11:19:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 85d3b385ab822f9b03d91e9b1ea4a353, InitialSourceConnectionID: 5efbfd8f56c1190e, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x76e8f035a462363104835a53536c75a5, EnableResetStreamAt: false} 2025/09/12 11:19:00 client -> Sending packet 0 (95 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, Handshake 2025/09/12 11:19:00 client Long Header{Type: Handshake, DestConnectionID: 5efbfd8f56c1190e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 78, Version: v1} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:00 client Dropping Initial keys. 2025/09/12 11:19:00 client -> Sending packet 0 (46 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: 5efbfd8f56c1190e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:00 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:00 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5efbfd8f56c1190e, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:00 client Peer doesn't await address validation any longer. 2025/09/12 11:19:00 client newly acked packets (1): [0] 2025/09/12 11:19:00 client updated RTT: 33.587ms (σ: 12.713ms) 2025/09/12 11:19:00 client Canceling loss detection timer. 2025/09/12 11:19:00 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:00 client -> Sending packet 1 (32 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: 5efbfd8f56c1190e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 171.969µs} 2025/09/12 11:19:00 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/09/12 11:19:00 client newly acked packets (1): [0] 2025/09/12 11:19:00 client updated RTT: 33.745ms (σ: 9.852ms) 2025/09/12 11:19:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:00 client Dropping Handshake keys. 2025/09/12 11:19:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:00 client <- &wire.NewTokenFrame{Token: 0xb795dc6130d36103a83021ec57d8ba16fd03a59d3a3801f2178769cfa00dfe83d15f8ab825} 2025/09/12 11:19:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 512052fb637f2aa5, StatelessResetToken: 0x883af6423db4894c404f005aa3f2321a} 2025/09/12 11:19:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e3ad446b3fb6150, StatelessResetToken: 0xd93d31da859e995a2ec6ab74a445e29f} 2025/09/12 11:19:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b14c32537a7914ed, StatelessResetToken: 0xb1cb6b7c37ecd8cc44ae70c5ce8da7a7} 2025/09/12 11:19:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:00 client -> Sending packet 2 (34 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:00 client Short Header{DestConnectionID: 512052fb637f2aa5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 199.442µs} 2025/09/12 11:19:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:00 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:00 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:00 client -> Sending packet 3 (30 bytes) for connection 85d3b385ab822f9b03d91e9b1ea4a353, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:00 client Short Header{DestConnectionID: 512052fb637f2aa5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:00 client Connection 85d3b385ab822f9b03d91e9b1ea4a353 closed. 2025/09/12 11:19:00 Requesting https://server4:443/dcvcyoxbur. 2025/09/12 11:19:00 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:00 Increased send buffer size to 14336 kiB 2025/09/12 11:19:00 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:00 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:00 Created qlog file: /logs/qlog/0aaab9f2dc8848963b5090ef.sqlog 2025/09/12 11:19:00 client Starting new connection to server4 ([::]:47599 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0aaab9f2dc8848963b5090ef, version v1 2025/09/12 11:19:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:00 client -> Sending packet 0 (1280 bytes) for connection 0aaab9f2dc8848963b5090ef, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 0aaab9f2dc8848963b5090ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:00 client -> Sending packet 1 (1280 bytes) for connection 0aaab9f2dc8848963b5090ef, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 0aaab9f2dc8848963b5090ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 11:19:00 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d7f011cdff049c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:00 client Received first packet. Switching destination connection ID to: 83d7f011cdff049c 2025/09/12 11:19:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:00 client newly acked packets (1): [1] 2025/09/12 11:19:00 client updated RTT: 33.466999ms (σ: 16.733499ms) 2025/09/12 11:19:00 client setting loss timer for packet 0 (Initial) to 37.650373ms (in 2025-09-12 11:19:00.622934847 +0000 UTC m=+15.455078027) 2025/09/12 11:19:00 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:00.622934847 +0000 UTC m=+15.455078027 2025/09/12 11:19:00 client lost packet 0 (time threshold) 2025/09/12 11:19:00 client -> Sending packet 2 (1280 bytes) for connection 0aaab9f2dc8848963b5090ef, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 83d7f011cdff049c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:00 client -> Sending packet 3 (1280 bytes) for connection 0aaab9f2dc8848963b5090ef, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 83d7f011cdff049c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:00 client -> Sending packet 4 (1280 bytes) for connection 0aaab9f2dc8848963b5090ef, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 83d7f011cdff049c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:00 client -> Sending packet 5 (1280 bytes) for connection 0aaab9f2dc8848963b5090ef, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 83d7f011cdff049c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client -> Sending packet 6 (1280 bytes) for connection 0aaab9f2dc8848963b5090ef, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 83d7f011cdff049c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:00 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d7f011cdff049c, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 11:19:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:00 client -> Sending packet 7 (1280 bytes) for connection 0aaab9f2dc8848963b5090ef, Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: 83d7f011cdff049c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:00 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 773 bytes. 2025/09/12 11:19:00 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d7f011cdff049c, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:00 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:00 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 0 bytes. 2025/09/12 11:19:00 client <- Reading packet 1 (773 bytes) for connection (empty), Handshake 2025/09/12 11:19:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83d7f011cdff049c, PacketNumber: 1, PacketNumberLen: 1, Length: 756, Version: v1} 2025/09/12 11:19:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 11:19:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0aaab9f2dc8848963b5090ef, InitialSourceConnectionID: 83d7f011cdff049c, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x092b934089667ae5b17e686929febe1d, EnableResetStreamAt: false} 2025/09/12 11:19:00 client -> Sending packet 0 (95 bytes) for connection 0aaab9f2dc8848963b5090ef, Handshake 2025/09/12 11:19:00 client Long Header{Type: Handshake, DestConnectionID: 83d7f011cdff049c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 78, Version: v1} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:00 client Dropping Initial keys. 2025/09/12 11:19:00 client -> Sending packet 0 (46 bytes) for connection 0aaab9f2dc8848963b5090ef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: 83d7f011cdff049c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:00 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:00 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83d7f011cdff049c, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:00 client Peer doesn't await address validation any longer. 2025/09/12 11:19:00 client newly acked packets (1): [0] 2025/09/12 11:19:00 client updated RTT: 33.43ms (σ: 12.62ms) 2025/09/12 11:19:00 client Canceling loss detection timer. 2025/09/12 11:19:00 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:00 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:00 client -> Sending packet 1 (32 bytes) for connection 0aaab9f2dc8848963b5090ef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:00 client Short Header{DestConnectionID: 83d7f011cdff049c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.996µs} 2025/09/12 11:19:00 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/09/12 11:19:00 client newly acked packets (1): [0] 2025/09/12 11:19:00 client updated RTT: 33.493ms (σ: 9.592ms) 2025/09/12 11:19:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:00 client Dropping Handshake keys. 2025/09/12 11:19:00 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:00 client <- &wire.NewTokenFrame{Token: 0xb7a0bbd47df241a152307ee08338190604eb11c9a5a97af911a320f4638a386bf72233cbc9} 2025/09/12 11:19:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dbc0734ca4cb8c12, StatelessResetToken: 0x99064d04a8792f0553cd69b6f6f0530c} 2025/09/12 11:19:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be8acf9be48b9aca, StatelessResetToken: 0x3af160636f70e53de64095ae5df30a40} 2025/09/12 11:19:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b5f62d97c32dc9d1, StatelessResetToken: 0x66f53b1b574f7bbaac555f0c74b90057} 2025/09/12 11:19:00 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:00 client -> Sending packet 2 (34 bytes) for connection 0aaab9f2dc8848963b5090ef, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:00 client Short Header{DestConnectionID: dbc0734ca4cb8c12, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 144.018µs} 2025/09/12 11:19:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:01 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:01 client newly acked packets (1): [2] 2025/09/12 11:19:01 client updated RTT: 33.225ms (σ: 7.729ms) 2025/09/12 11:19:01 client Canceling loss detection timer. 2025/09/12 11:19:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1cf147bc060a8433, StatelessResetToken: 0x07aa766ac4d1d305f8f8caecebb0bf34} 2025/09/12 11:19:01 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:01 client Ignoring all packets below 2. 2025/09/12 11:19:01 client -> Sending packet 3 (32 bytes) for connection 0aaab9f2dc8848963b5090ef, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:01 client Short Header{DestConnectionID: dbc0734ca4cb8c12, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 116.486µs} 2025/09/12 11:19:01 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:01 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:01 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:01 client -> Sending packet 4 (30 bytes) for connection 0aaab9f2dc8848963b5090ef, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:01 client Short Header{DestConnectionID: dbc0734ca4cb8c12, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:01 client Connection 0aaab9f2dc8848963b5090ef closed. 2025/09/12 11:19:01 Requesting https://server4:443/upbhokyoqa. 2025/09/12 11:19:01 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:01 Increased send buffer size to 14336 kiB 2025/09/12 11:19:01 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:01 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:01 Created qlog file: /logs/qlog/9cef1698b4bdc1633f16efba.sqlog 2025/09/12 11:19:01 client Starting new connection to server4 ([::]:35048 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9cef1698b4bdc1633f16efba, version v1 2025/09/12 11:19:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:01 client -> Sending packet 0 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9cef1698b4bdc1633f16efba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:01 client -> Sending packet 1 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9cef1698b4bdc1633f16efba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 1236, Data length: 271, Offset + Data length: 1507} 2025/09/12 11:19:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:01 client -> Sending packet 2 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9cef1698b4bdc1633f16efba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:01 client -> Sending packet 3 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9cef1698b4bdc1633f16efba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 1236, Data length: 271, Offset + Data length: 1507} 2025/09/12 11:19:01 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9621b55f1eb375c1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:01 client Received first packet. Switching destination connection ID to: 9621b55f1eb375c1 2025/09/12 11:19:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:01 client newly acked packets (1): [3] 2025/09/12 11:19:01 client updated RTT: 33.208806ms (σ: 16.604403ms) 2025/09/12 11:19:01 client setting loss timer for packet 2 (Initial) to 37.359906ms (in 2025-09-12 11:19:01.29775229 +0000 UTC m=+16.129895470) 2025/09/12 11:19:01 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:01.29775229 +0000 UTC m=+16.129895470 2025/09/12 11:19:01 client lost packet 2 (time threshold) 2025/09/12 11:19:01 client -> Sending packet 4 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:01 client -> Sending packet 5 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:01 client -> Sending packet 6 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:19:01 client -> Sending packet 7 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:01 client -> Sending packet 8 (1280 bytes) for connection 9cef1698b4bdc1633f16efba, Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:01 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 773 bytes. 2025/09/12 11:19:01 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9621b55f1eb375c1, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:01 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:19:01 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 0 bytes. 2025/09/12 11:19:01 client Queueing packet (773 bytes) for later decryption 2025/09/12 11:19:02 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:19:02 client <- Reading packet 4 (129 bytes) for connection (empty), Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9621b55f1eb375c1, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:19:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:02 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:19:02 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:19:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9621b55f1eb375c1, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:19:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 11:19:02 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:02 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9cef1698b4bdc1633f16efba, InitialSourceConnectionID: 9621b55f1eb375c1, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x048b2dc7b1a533f5b96553c71f3fb646, EnableResetStreamAt: false} 2025/09/12 11:19:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9cef1698b4bdc1633f16efba 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:02 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:02 client Long Header{Type: Handshake, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:02 client Dropping Initial keys. 2025/09/12 11:19:02 client <- Reading packet 1 (773 bytes) for connection (empty), Handshake 2025/09/12 11:19:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9621b55f1eb375c1, PacketNumber: 1, PacketNumberLen: 1, Length: 756, Version: v1} 2025/09/12 11:19:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 11:19:02 client -> Sending packet 1 (86 bytes) for connection 9cef1698b4bdc1633f16efba, Handshake 2025/09/12 11:19:02 client Long Header{Type: Handshake, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:02 client Short Header{DestConnectionID: 9621b55f1eb375c1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:19:02 client -> Sending packet 2 (90 bytes) for connection 9cef1698b4bdc1633f16efba, Handshake 2025/09/12 11:19:02 client Long Header{Type: Handshake, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:02 client -> Sending packet 3 (90 bytes) for connection 9cef1698b4bdc1633f16efba, Handshake 2025/09/12 11:19:02 client Long Header{Type: Handshake, DestConnectionID: 9621b55f1eb375c1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:02 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 101ms} 2025/09/12 11:19:02 client Peer doesn't await address validation any longer. 2025/09/12 11:19:02 client newly acked packets (1): [0] 2025/09/12 11:19:02 client updated RTT: 42.633ms (σ: 31.302ms) 2025/09/12 11:19:02 client Canceling loss detection timer. 2025/09/12 11:19:02 client Dropping Handshake keys. 2025/09/12 11:19:02 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:02 client <- &wire.NewTokenFrame{Token: 0xb7dba0378510327febdd6b2fda5e2a8c280498437f08f002ebaf18bcd6863d2def63ec204c} 2025/09/12 11:19:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23af46662c18daf3, StatelessResetToken: 0xe9eaac7aae2e12c79dd8e07c315c18b6} 2025/09/12 11:19:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d21c247c2e59081e, StatelessResetToken: 0xd421621307e1b820c69cdaa667b3bb88} 2025/09/12 11:19:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a925d992dbdd5ce6, StatelessResetToken: 0xb3dbf10f74d80e833d21b2022e185d1f} 2025/09/12 11:19:02 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:02 client -> Sending packet 1 (34 bytes) for connection 9cef1698b4bdc1633f16efba, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:02 client Short Header{DestConnectionID: 23af46662c18daf3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 140.792µs} 2025/09/12 11:19:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:02 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:02 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:02 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:02 client -> Sending packet 2 (30 bytes) for connection 9cef1698b4bdc1633f16efba, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:02 client Short Header{DestConnectionID: 23af46662c18daf3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:02 client Connection 9cef1698b4bdc1633f16efba closed. 2025/09/12 11:19:02 Requesting https://server4:443/loertrzmcz. 2025/09/12 11:19:02 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:02 Increased send buffer size to 14336 kiB 2025/09/12 11:19:02 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:02 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:02 Created qlog file: /logs/qlog/b36ef4013043e6985fedb4d7b825.sqlog 2025/09/12 11:19:02 client Starting new connection to server4 ([::]:55143 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b36ef4013043e6985fedb4d7b825, version v1 2025/09/12 11:19:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:02 client -> Sending packet 0 (1280 bytes) for connection b36ef4013043e6985fedb4d7b825, Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: b36ef4013043e6985fedb4d7b825, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:02 client -> Sending packet 1 (1280 bytes) for connection b36ef4013043e6985fedb4d7b825, Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: b36ef4013043e6985fedb4d7b825, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 1234, Data length: 283, Offset + Data length: 1517} 2025/09/12 11:19:02 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8024c2757abec66c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:02 client Received first packet. Switching destination connection ID to: 8024c2757abec66c 2025/09/12 11:19:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:02 client newly acked packets (1): [1] 2025/09/12 11:19:02 client updated RTT: 33.094726ms (σ: 16.547363ms) 2025/09/12 11:19:02 client setting loss timer for packet 0 (Initial) to 37.231566ms (in 2025-09-12 11:19:02.705481346 +0000 UTC m=+17.537624516) 2025/09/12 11:19:02 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:02.705481346 +0000 UTC m=+17.537624516 2025/09/12 11:19:02 client lost packet 0 (time threshold) 2025/09/12 11:19:02 client -> Sending packet 2 (1280 bytes) for connection b36ef4013043e6985fedb4d7b825, Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:02 client -> Sending packet 3 (1280 bytes) for connection b36ef4013043e6985fedb4d7b825, Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:02 client -> Sending packet 4 (1280 bytes) for connection b36ef4013043e6985fedb4d7b825, Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:02 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8024c2757abec66c, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 11:19:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:02 client -> Sending packet 5 (1280 bytes) for connection b36ef4013043e6985fedb4d7b825, Initial 2025/09/12 11:19:02 client Long Header{Type: Initial, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:03 client -> Sending packet 6 (1280 bytes) for connection b36ef4013043e6985fedb4d7b825, Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:03 client -> Sending packet 7 (1280 bytes) for connection b36ef4013043e6985fedb4d7b825, Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:03 client <- Reading packet 5 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8024c2757abec66c, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:03 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/12 11:19:03 client newly acked packets (1): [7] 2025/09/12 11:19:03 client updated RTT: 33.095ms (σ: 12.412ms) 2025/09/12 11:19:03 client <- Reading packet 2 (775 bytes) for connection (empty), Handshake 2025/09/12 11:19:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8024c2757abec66c, PacketNumber: 2, PacketNumberLen: 1, Length: 758, Version: v1} 2025/09/12 11:19:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 11:19:03 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:03 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b36ef4013043e6985fedb4d7b825, InitialSourceConnectionID: 8024c2757abec66c, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4f4de3f8b4871c10b785ec543b8bc6a4, EnableResetStreamAt: false} 2025/09/12 11:19:03 client -> Sending packet 0 (95 bytes) for connection b36ef4013043e6985fedb4d7b825, Handshake 2025/09/12 11:19:03 client Long Header{Type: Handshake, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 78, Version: v1} 2025/09/12 11:19:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:03 client Dropping Initial keys. 2025/09/12 11:19:03 client <- Reading packet 3 (775 bytes) for connection (empty), Handshake 2025/09/12 11:19:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8024c2757abec66c, PacketNumber: 3, PacketNumberLen: 1, Length: 758, Version: v1} 2025/09/12 11:19:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 11:19:03 client -> Sending packet 1 (86 bytes) for connection b36ef4013043e6985fedb4d7b825, Handshake 2025/09/12 11:19:03 client Long Header{Type: Handshake, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:03 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:19:03 client Short Header{DestConnectionID: 8024c2757abec66c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:19:03 client -> Sending packet 2 (90 bytes) for connection b36ef4013043e6985fedb4d7b825, Handshake 2025/09/12 11:19:03 client Long Header{Type: Handshake, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:03 client -> Sending packet 3 (90 bytes) for connection b36ef4013043e6985fedb4d7b825, Handshake 2025/09/12 11:19:03 client Long Header{Type: Handshake, DestConnectionID: 8024c2757abec66c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:03 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:03 client <- Reading packet 4 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8024c2757abec66c, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:03 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:19:03 client Peer doesn't await address validation any longer. 2025/09/12 11:19:03 client newly acked packets (1): [3] 2025/09/12 11:19:03 client updated RTT: 33.069ms (σ: 9.36ms) 2025/09/12 11:19:03 client Canceling loss detection timer. 2025/09/12 11:19:03 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:03 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:03 client -> Sending packet 1 (32 bytes) for connection b36ef4013043e6985fedb4d7b825, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:03 client Short Header{DestConnectionID: 8024c2757abec66c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 181.798µs} 2025/09/12 11:19:03 client <- Reading packet 2 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:03 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:03 client Dropping Handshake keys. 2025/09/12 11:19:03 client <- &wire.NewTokenFrame{Token: 0xb787977cdd842038f30f31f4f7020505f896d7f8993c5a4918480c46fc339a0ad27439aaf7} 2025/09/12 11:19:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: deedacc1f35dbf8d, StatelessResetToken: 0xe17cd0cd6411f880a1d061779eb33c0d} 2025/09/12 11:19:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 164d271f7f633b0e, StatelessResetToken: 0x74ac1389b3c764c10fb4fece2378100b} 2025/09/12 11:19:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 715c8b43e643841e, StatelessResetToken: 0x533bf44aaad6de22a8f88116a1d0b6e3} 2025/09/12 11:19:03 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:03 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:03 client -> Sending packet 3 (55 bytes) for connection b36ef4013043e6985fedb4d7b825, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:03 client Short Header{DestConnectionID: deedacc1f35dbf8d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 211.363µs} 2025/09/12 11:19:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:03 client -> Sending packet 4 (48 bytes) for connection b36ef4013043e6985fedb4d7b825, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:03 client Short Header{DestConnectionID: deedacc1f35dbf8d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:03 client <- Reading packet 4 (53 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:03 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e5e75e7eec60691b, StatelessResetToken: 0x1bc874b31f5bb7699a37e2068b68abbf} 2025/09/12 11:19:03 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:03 client -> Sending packet 5 (36 bytes) for connection b36ef4013043e6985fedb4d7b825, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:03 client Short Header{DestConnectionID: deedacc1f35dbf8d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:03 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 83.055µs} 2025/09/12 11:19:03 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:03 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:03 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:03 client -> Sending packet 6 (30 bytes) for connection b36ef4013043e6985fedb4d7b825, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:03 client Short Header{DestConnectionID: deedacc1f35dbf8d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:03 client Connection b36ef4013043e6985fedb4d7b825 closed. 2025/09/12 11:19:03 Requesting https://server4:443/rmqbcohsve. 2025/09/12 11:19:03 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:03 Increased send buffer size to 14336 kiB 2025/09/12 11:19:03 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:03 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:03 Created qlog file: /logs/qlog/09cc8f882f43994151.sqlog 2025/09/12 11:19:03 client Starting new connection to server4 ([::]:53005 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 09cc8f882f43994151, version v1 2025/09/12 11:19:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:03 client -> Sending packet 0 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: 09cc8f882f43994151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:03 client -> Sending packet 1 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: 09cc8f882f43994151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 11:19:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:03 client -> Sending packet 2 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: 09cc8f882f43994151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:03 client -> Sending packet 3 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: 09cc8f882f43994151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 11:19:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:03 client -> Sending packet 4 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: 09cc8f882f43994151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:03 client -> Sending packet 5 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:03 client Long Header{Type: Initial, DestConnectionID: 09cc8f882f43994151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 11:19:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:19:04 client -> Sending packet 6 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:04 client Long Header{Type: Initial, DestConnectionID: 09cc8f882f43994151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:04 client -> Sending packet 7 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:04 client Long Header{Type: Initial, DestConnectionID: 09cc8f882f43994151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 11:19:04 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 49ffc15884346807, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:04 client Received first packet. Switching destination connection ID to: 49ffc15884346807 2025/09/12 11:19:04 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s} 2025/09/12 11:19:04 client newly acked packets (1): [7] 2025/09/12 11:19:04 client updated RTT: 33.529042ms (σ: 16.764521ms) 2025/09/12 11:19:04 client setting loss timer for packet 6 (Initial) to 37.720172ms (in 2025-09-12 11:19:04.834163613 +0000 UTC m=+19.666306793) 2025/09/12 11:19:04 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:04.834163613 +0000 UTC m=+19.666306793 2025/09/12 11:19:04 client lost packet 6 (time threshold) 2025/09/12 11:19:04 client -> Sending packet 8 (1280 bytes) for connection 09cc8f882f43994151, Initial 2025/09/12 11:19:04 client Long Header{Type: Initial, DestConnectionID: 49ffc15884346807, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:04 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:04 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 49ffc15884346807, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:04 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 0s} 2025/09/12 11:19:04 client newly acked packets (1): [8] 2025/09/12 11:19:04 client updated RTT: 33.626ms (σ: 12.767ms) 2025/09/12 11:19:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:04 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:04 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:04 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:04 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 49ffc15884346807, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 11:19:04 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:04 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 09cc8f882f43994151, InitialSourceConnectionID: 49ffc15884346807, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x527804487f9d9e909799551a88a84be0, EnableResetStreamAt: false} 2025/09/12 11:19:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 09cc8f882f43994151 2025/09/12 11:19:04 client Long Header{Type: Initial, DestConnectionID: 49ffc15884346807, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:04 client Long Header{Type: Handshake, DestConnectionID: 49ffc15884346807, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:04 client Dropping Initial keys. 2025/09/12 11:19:04 client -> Sending packet 1 (86 bytes) for connection 09cc8f882f43994151, Handshake 2025/09/12 11:19:04 client Long Header{Type: Handshake, DestConnectionID: 49ffc15884346807, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:04 client Short Header{DestConnectionID: 49ffc15884346807, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:04 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:04 client Peer doesn't await address validation any longer. 2025/09/12 11:19:04 client newly acked packets (1): [0] 2025/09/12 11:19:04 client updated RTT: 33.768ms (σ: 9.859ms) 2025/09/12 11:19:04 client Canceling loss detection timer. 2025/09/12 11:19:04 client Dropping Handshake keys. 2025/09/12 11:19:04 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:04 client <- &wire.NewTokenFrame{Token: 0xb71de3a915057534ad0d3c9e9d9b0896e3675768abb2f00974d3ddefb54a51fb6cf0d8ca4a} 2025/09/12 11:19:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6b5dc1c930089fe1, StatelessResetToken: 0xaf000489c390965d52de12839b391a39} 2025/09/12 11:19:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a58c6ea9649fe91, StatelessResetToken: 0xd6622cd160b39109ac4b815fa9bf4a6a} 2025/09/12 11:19:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 43efadd78e4eb2f5, StatelessResetToken: 0xa5e998a418370b7b99ba9b7eeddb96fc} 2025/09/12 11:19:04 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:04 client -> Sending packet 1 (34 bytes) for connection 09cc8f882f43994151, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:04 client Short Header{DestConnectionID: 6b5dc1c930089fe1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 302.652µs} 2025/09/12 11:19:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:04 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:04 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:04 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:04 client -> Sending packet 2 (30 bytes) for connection 09cc8f882f43994151, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:04 client Short Header{DestConnectionID: 6b5dc1c930089fe1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:04 client Connection 09cc8f882f43994151 closed. 2025/09/12 11:19:04 Requesting https://server4:443/xtqohcskjd. 2025/09/12 11:19:04 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:04 Increased send buffer size to 14336 kiB 2025/09/12 11:19:04 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:04 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:04 Created qlog file: /logs/qlog/a7e3a4dca819f72f95b7705d948ff028a2e9dca6.sqlog 2025/09/12 11:19:04 client Starting new connection to server4 ([::]:33643 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a7e3a4dca819f72f95b7705d948ff028a2e9dca6, version v1 2025/09/12 11:19:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:04 client -> Sending packet 0 (1280 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, Initial 2025/09/12 11:19:04 client Long Header{Type: Initial, DestConnectionID: a7e3a4dca819f72f95b7705d948ff028a2e9dca6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:04 client -> Sending packet 1 (1280 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, Initial 2025/09/12 11:19:04 client Long Header{Type: Initial, DestConnectionID: a7e3a4dca819f72f95b7705d948ff028a2e9dca6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 1228, Data length: 285, Offset + Data length: 1513} 2025/09/12 11:19:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:05 client -> Sending packet 2 (1280 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: a7e3a4dca819f72f95b7705d948ff028a2e9dca6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:05 client -> Sending packet 3 (1280 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: a7e3a4dca819f72f95b7705d948ff028a2e9dca6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 1228, Data length: 285, Offset + Data length: 1513} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:05 client <- Reading packet 1 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0a1a2637ad762491, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:05 client Received first packet. Switching destination connection ID to: 0a1a2637ad762491 2025/09/12 11:19:05 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:05 client newly acked packets (1): [3] 2025/09/12 11:19:05 client updated RTT: 33.440991ms (σ: 16.720495ms) 2025/09/12 11:19:05 client setting loss timer for packet 2 (Initial) to 37.621114ms (in 2025-09-12 11:19:05.144928248 +0000 UTC m=+19.977071428) 2025/09/12 11:19:05 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:05.144928248 +0000 UTC m=+19.977071428 2025/09/12 11:19:05 client lost packet 2 (time threshold) 2025/09/12 11:19:05 client -> Sending packet 4 (1280 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: 0a1a2637ad762491, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:05 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:19:05 client <- Reading packet 2 (136 bytes) for connection (empty), Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0a1a2637ad762491, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:19:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:05 client newly acked packets (1): [4] 2025/09/12 11:19:05 client updated RTT: 33.556ms (σ: 12.772ms) 2025/09/12 11:19:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:05 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:05 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:05 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:19:05 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:19:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a1a2637ad762491, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:19:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/09/12 11:19:05 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:05 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a7e3a4dca819f72f95b7705d948ff028a2e9dca6, InitialSourceConnectionID: 0a1a2637ad762491, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xfea6ae8ee7282a2484d81794d6c584fc, EnableResetStreamAt: false} 2025/09/12 11:19:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: 0a1a2637ad762491, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:05 client Long Header{Type: Handshake, DestConnectionID: 0a1a2637ad762491, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:05 client Dropping Initial keys. 2025/09/12 11:19:05 client -> Sending packet 1 (86 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, Handshake 2025/09/12 11:19:05 client Long Header{Type: Handshake, DestConnectionID: 0a1a2637ad762491, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:05 client Short Header{DestConnectionID: 0a1a2637ad762491, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:05 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:05 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a1a2637ad762491, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:05 client Peer doesn't await address validation any longer. 2025/09/12 11:19:05 client newly acked packets (1): [0] 2025/09/12 11:19:05 client updated RTT: 33.611ms (σ: 9.689ms) 2025/09/12 11:19:05 client Canceling loss detection timer. 2025/09/12 11:19:05 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:05 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:05 client -> Sending packet 1 (32 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:05 client Short Header{DestConnectionID: 0a1a2637ad762491, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 180.095µs} 2025/09/12 11:19:05 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:05 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:05 client Dropping Handshake keys. 2025/09/12 11:19:05 client <- &wire.NewTokenFrame{Token: 0xb7d54258e7b671bba5004e81802b5fcdc76a0f62b301bd2ffaf24e79b4196d07ee5239e830} 2025/09/12 11:19:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8ea7f1f7f8fc86c, StatelessResetToken: 0x01a59683bdb60b42f855f1c417f94cee} 2025/09/12 11:19:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d6ad5c4b1523fe21, StatelessResetToken: 0x99d5c2ebf78602ca7d9c1b207b569837} 2025/09/12 11:19:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1db55cefa8445d0d, StatelessResetToken: 0x41f5cb34cd9aea92d14726e79f6923f0} 2025/09/12 11:19:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:05 client -> Sending packet 2 (34 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:05 client Short Header{DestConnectionID: c8ea7f1f7f8fc86c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 84.117µs} 2025/09/12 11:19:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:05 client -> Sending packet 4 (46 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:05 client Short Header{DestConnectionID: c8ea7f1f7f8fc86c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:05 client Skipping packet number 3 2025/09/12 11:19:05 client -> Sending packet 5 (29 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:05 client Short Header{DestConnectionID: c8ea7f1f7f8fc86c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:05 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:05 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:05 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:05 client <- &wire.NewTokenFrame{Token: 0xb7d54258e7b671bba5004e81802b5fcdc76a0f62b301bd2ffaf24e79b4196d07ee5239e830} 2025/09/12 11:19:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8ea7f1f7f8fc86c, StatelessResetToken: 0x01a59683bdb60b42f855f1c417f94cee} 2025/09/12 11:19:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d6ad5c4b1523fe21, StatelessResetToken: 0x99d5c2ebf78602ca7d9c1b207b569837} 2025/09/12 11:19:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1db55cefa8445d0d, StatelessResetToken: 0x41f5cb34cd9aea92d14726e79f6923f0} 2025/09/12 11:19:05 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:05 client -> Sending packet 6 (34 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:05 client Short Header{DestConnectionID: c8ea7f1f7f8fc86c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 113.361µs} 2025/09/12 11:19:05 client <- Reading packet 4 (51 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:05 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/09/12 11:19:05 client newly acked packets (2): [4 5] 2025/09/12 11:19:05 client updated RTT: 33.381ms (σ: 7.726ms) 2025/09/12 11:19:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:05 client Canceling loss detection timer. 2025/09/12 11:19:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9ef92300de8fb875, StatelessResetToken: 0x2365123b14d61b48f7ff9cb916f8d710} 2025/09/12 11:19:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:05 client Sending ACK because the ACK timer expired. 2025/09/12 11:19:05 client -> Sending packet 7 (35 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:05 client Short Header{DestConnectionID: c8ea7f1f7f8fc86c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.297351ms} 2025/09/12 11:19:05 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:05 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:05 client -> Sending packet 8 (1366 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:05 client Short Header{DestConnectionID: c8ea7f1f7f8fc86c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.PingFrame{} 2025/09/12 11:19:05 client -> Sending packet 9 (36 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:05 client Short Header{DestConnectionID: c8ea7f1f7f8fc86c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 174.224µs} 2025/09/12 11:19:05 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:05 client -> Sending packet 10 (30 bytes) for connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:05 client Short Header{DestConnectionID: c8ea7f1f7f8fc86c, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:05 client Connection a7e3a4dca819f72f95b7705d948ff028a2e9dca6 closed. 2025/09/12 11:19:05 Requesting https://server4:443/pvzsxxqurn. 2025/09/12 11:19:05 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:05 Increased send buffer size to 14336 kiB 2025/09/12 11:19:05 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:05 Created qlog file: /logs/qlog/780f1a26edc32dcfcb.sqlog 2025/09/12 11:19:05 client Starting new connection to server4 ([::]:45463 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 780f1a26edc32dcfcb, version v1 2025/09/12 11:19:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:05 client -> Sending packet 0 (1280 bytes) for connection 780f1a26edc32dcfcb, Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: 780f1a26edc32dcfcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:05 client -> Sending packet 1 (1280 bytes) for connection 780f1a26edc32dcfcb, Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: 780f1a26edc32dcfcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 280, Offset + Data length: 1519} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:05 client -> Sending packet 2 (1280 bytes) for connection 780f1a26edc32dcfcb, Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: 780f1a26edc32dcfcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:05 client -> Sending packet 3 (1280 bytes) for connection 780f1a26edc32dcfcb, Initial 2025/09/12 11:19:05 client Long Header{Type: Initial, DestConnectionID: 780f1a26edc32dcfcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 280, Offset + Data length: 1519} 2025/09/12 11:19:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:06 client -> Sending packet 4 (1280 bytes) for connection 780f1a26edc32dcfcb, Initial 2025/09/12 11:19:06 client Long Header{Type: Initial, DestConnectionID: 780f1a26edc32dcfcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:06 client -> Sending packet 5 (1280 bytes) for connection 780f1a26edc32dcfcb, Initial 2025/09/12 11:19:06 client Long Header{Type: Initial, DestConnectionID: 780f1a26edc32dcfcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 1239, Data length: 280, Offset + Data length: 1519} 2025/09/12 11:19:06 client <- Reading packet 1 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9770e1441e9ba807, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:06 client Received first packet. Switching destination connection ID to: 9770e1441e9ba807 2025/09/12 11:19:06 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:19:06 client newly acked packets (1): [5] 2025/09/12 11:19:06 client updated RTT: 33.39334ms (σ: 16.69667ms) 2025/09/12 11:19:06 client setting loss timer for packet 4 (Initial) to 37.567507ms (in 2025-09-12 11:19:06.118442637 +0000 UTC m=+20.950585817) 2025/09/12 11:19:06 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:06.118442637 +0000 UTC m=+20.950585817 2025/09/12 11:19:06 client lost packet 4 (time threshold) 2025/09/12 11:19:06 client -> Sending packet 6 (1280 bytes) for connection 780f1a26edc32dcfcb, Initial 2025/09/12 11:19:06 client Long Header{Type: Initial, DestConnectionID: 9770e1441e9ba807, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:06 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:19:06 client <- Reading packet 2 (136 bytes) for connection (empty), Initial 2025/09/12 11:19:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9770e1441e9ba807, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:19:06 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:19:06 client newly acked packets (1): [6] 2025/09/12 11:19:06 client updated RTT: 33.518ms (σ: 12.772ms) 2025/09/12 11:19:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:06 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:06 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:06 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:19:06 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:19:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9770e1441e9ba807, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:19:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 11:19:06 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:06 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 780f1a26edc32dcfcb, InitialSourceConnectionID: 9770e1441e9ba807, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4a7d32e29b955c5753ce3cc8d8830f76, EnableResetStreamAt: false} 2025/09/12 11:19:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 780f1a26edc32dcfcb 2025/09/12 11:19:06 client Long Header{Type: Initial, DestConnectionID: 9770e1441e9ba807, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:06 client Long Header{Type: Handshake, DestConnectionID: 9770e1441e9ba807, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:06 client Dropping Initial keys. 2025/09/12 11:19:06 client -> Sending packet 1 (86 bytes) for connection 780f1a26edc32dcfcb, Handshake 2025/09/12 11:19:06 client Long Header{Type: Handshake, DestConnectionID: 9770e1441e9ba807, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:06 client Short Header{DestConnectionID: 9770e1441e9ba807, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:19:06 client -> Sending packet 2 (90 bytes) for connection 780f1a26edc32dcfcb, Handshake 2025/09/12 11:19:06 client Long Header{Type: Handshake, DestConnectionID: 9770e1441e9ba807, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:06 client -> Sending packet 3 (90 bytes) for connection 780f1a26edc32dcfcb, Handshake 2025/09/12 11:19:06 client Long Header{Type: Handshake, DestConnectionID: 9770e1441e9ba807, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:06 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:06 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9770e1441e9ba807, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:06 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:19:06 client Peer doesn't await address validation any longer. 2025/09/12 11:19:06 client newly acked packets (1): [3] 2025/09/12 11:19:06 client updated RTT: 33.454ms (σ: 9.705ms) 2025/09/12 11:19:06 client Canceling loss detection timer. 2025/09/12 11:19:06 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:06 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:06 client -> Sending packet 1 (32 bytes) for connection 780f1a26edc32dcfcb, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:06 client Short Header{DestConnectionID: 9770e1441e9ba807, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 172.451µs} 2025/09/12 11:19:07 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:07 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:07 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:07 client Dropping Handshake keys. 2025/09/12 11:19:07 client <- &wire.NewTokenFrame{Token: 0xb7fd6dbca960e94e6d9111c83cbab9897430f58d2d04976c5e468f9ef91b181d7c82bc60a7} 2025/09/12 11:19:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 593da37dd825483e, StatelessResetToken: 0x221dff020b2d77d5d0dabf0a907821ab} 2025/09/12 11:19:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d8065cbae9050b13, StatelessResetToken: 0xa36b1c16e288c60208f8431cabc28bb7} 2025/09/12 11:19:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5d23a9caa9d6743a, StatelessResetToken: 0xc71a28dea674f1b0d08cf93819ec2f4e} 2025/09/12 11:19:07 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:07 client -> Sending packet 3 (55 bytes) for connection 780f1a26edc32dcfcb, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:07 client Short Header{DestConnectionID: 593da37dd825483e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 159.617µs} 2025/09/12 11:19:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:07 client -> Sending packet 4 (48 bytes) for connection 780f1a26edc32dcfcb, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:07 client Short Header{DestConnectionID: 593da37dd825483e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:07 client <- Reading packet 4 (53 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:07 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:07 client newly acked packets (1): [4] 2025/09/12 11:19:07 client updated RTT: 33.314ms (σ: 7.557ms) 2025/09/12 11:19:07 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:07 client Canceling loss detection timer. 2025/09/12 11:19:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 37af3fe940b2f63a, StatelessResetToken: 0x92a1675eeffd5adf73be143c52fa0b00} 2025/09/12 11:19:07 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:07 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:07 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:07 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 11:19:07 client -> Sending packet 5 (34 bytes) for connection 780f1a26edc32dcfcb, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:07 client Short Header{DestConnectionID: 593da37dd825483e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:07 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 64.33µs} 2025/09/12 11:19:07 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:07 client -> Sending packet 6 (30 bytes) for connection 780f1a26edc32dcfcb, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:07 client Short Header{DestConnectionID: 593da37dd825483e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:07 client Connection 780f1a26edc32dcfcb closed. 2025/09/12 11:19:07 Requesting https://server4:443/vuknsjdjyg. 2025/09/12 11:19:07 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:07 Increased send buffer size to 14336 kiB 2025/09/12 11:19:07 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:07 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:07 Created qlog file: /logs/qlog/6640e758c3b30927d8.sqlog 2025/09/12 11:19:07 client Starting new connection to server4 ([::]:40215 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6640e758c3b30927d8, version v1 2025/09/12 11:19:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:07 client -> Sending packet 0 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:07 client Long Header{Type: Initial, DestConnectionID: 6640e758c3b30927d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:07 client -> Sending packet 1 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:07 client Long Header{Type: Initial, DestConnectionID: 6640e758c3b30927d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/12 11:19:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:07 client -> Sending packet 2 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:07 client Long Header{Type: Initial, DestConnectionID: 6640e758c3b30927d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:07 client -> Sending packet 3 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:07 client Long Header{Type: Initial, DestConnectionID: 6640e758c3b30927d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/12 11:19:07 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8138c556225726c9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:07 client Received first packet. Switching destination connection ID to: 8138c556225726c9 2025/09/12 11:19:07 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:07 client newly acked packets (1): [3] 2025/09/12 11:19:07 client updated RTT: 33.393087ms (σ: 16.696543ms) 2025/09/12 11:19:07 client setting loss timer for packet 2 (Initial) to 37.567222ms (in 2025-09-12 11:19:07.569672598 +0000 UTC m=+22.401815778) 2025/09/12 11:19:07 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:07.569672598 +0000 UTC m=+22.401815778 2025/09/12 11:19:07 client lost packet 2 (time threshold) 2025/09/12 11:19:07 client -> Sending packet 4 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:07 client Long Header{Type: Initial, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:07 client -> Sending packet 5 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:07 client Long Header{Type: Initial, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:07 client -> Sending packet 6 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:07 client Long Header{Type: Initial, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:19:08 client -> Sending packet 7 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:08 client Long Header{Type: Initial, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:08 client -> Sending packet 8 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:08 client Long Header{Type: Initial, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 11:19:08 client -> Sending packet 9 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:08 client Long Header{Type: Initial, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:08 client -> Sending packet 10 (1280 bytes) for connection 6640e758c3b30927d8, Initial 2025/09/12 11:19:08 client Long Header{Type: Initial, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:09 client <- Reading packet 2 (43 bytes) for connection (empty), Initial 2025/09/12 11:19:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8138c556225726c9, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 26, Version: v1} 2025/09/12 11:19:09 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:19:09 client newly acked packets (1): [10] 2025/09/12 11:19:09 client updated RTT: 33.383ms (σ: 12.54ms) 2025/09/12 11:19:09 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:19:09 client <- Reading packet 5 (129 bytes) for connection (empty), Initial 2025/09/12 11:19:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8138c556225726c9, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:19:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:09 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:09 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:09 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:19:09 client <- Reading packet 3 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:19:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8138c556225726c9, PacketNumber: 3, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:19:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 11:19:09 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:09 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6640e758c3b30927d8, InitialSourceConnectionID: 8138c556225726c9, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x14bb5ba38d6e153acf7b6e563a81935f, EnableResetStreamAt: false} 2025/09/12 11:19:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6640e758c3b30927d8 2025/09/12 11:19:09 client Long Header{Type: Initial, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:09 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:09 client Long Header{Type: Handshake, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:09 client Dropping Initial keys. 2025/09/12 11:19:09 client -> Sending packet 1 (86 bytes) for connection 6640e758c3b30927d8, Handshake 2025/09/12 11:19:09 client Long Header{Type: Handshake, DestConnectionID: 8138c556225726c9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:09 client Short Header{DestConnectionID: 8138c556225726c9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:09 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:09 client <- Reading packet 5 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8138c556225726c9, PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:09 client Peer doesn't await address validation any longer. 2025/09/12 11:19:09 client newly acked packets (1): [0] 2025/09/12 11:19:09 client Canceling loss detection timer. 2025/09/12 11:19:09 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:09 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:09 client -> Sending packet 1 (32 bytes) for connection 6640e758c3b30927d8, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:09 client Short Header{DestConnectionID: 8138c556225726c9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 114.794µs} 2025/09/12 11:19:09 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/09/12 11:19:09 client newly acked packets (1): [0] 2025/09/12 11:19:09 client updated RTT: 33.687ms (σ: 10.013ms) 2025/09/12 11:19:09 client Dropping Handshake keys. 2025/09/12 11:19:09 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:09 client <- &wire.NewTokenFrame{Token: 0xb72212d48151629ccae186643134a670e594e403854a02cc2fe4acf50dfc69c8db8dbba23a} 2025/09/12 11:19:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f557f2b587e4139a, StatelessResetToken: 0x0474f4c8ead329ed03adca1f44ddf9a7} 2025/09/12 11:19:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 04fd65aa753b5f1e, StatelessResetToken: 0x0c8e4aafcecf05c96fe0edae4938aecd} 2025/09/12 11:19:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e9bb5a36a90a5ccd, StatelessResetToken: 0xd1d90fd6292f23dbd533f197b2532a2a} 2025/09/12 11:19:09 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:09 client -> Sending packet 2 (34 bytes) for connection 6640e758c3b30927d8, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:09 client Short Header{DestConnectionID: f557f2b587e4139a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 119.953µs} 2025/09/12 11:19:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:10 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:10 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:10 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:10 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0ea67785c67f0cd6, StatelessResetToken: 0xce7b051ba3e41b0a9e4ff5079f1a0a5b} 2025/09/12 11:19:10 client -> Sending packet 3 (34 bytes) for connection 6640e758c3b30927d8, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:10 client Short Header{DestConnectionID: f557f2b587e4139a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:10 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 119.813µs} 2025/09/12 11:19:10 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:10 client -> Sending packet 4 (30 bytes) for connection 6640e758c3b30927d8, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:10 client Short Header{DestConnectionID: f557f2b587e4139a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:10 client Connection 6640e758c3b30927d8 closed. 2025/09/12 11:19:10 Requesting https://server4:443/fqzczqzamh. 2025/09/12 11:19:10 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:10 Increased send buffer size to 14336 kiB 2025/09/12 11:19:10 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:10 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:10 Created qlog file: /logs/qlog/33a19d6e58309422c6a2c2741f6d0c1bda5209f2.sqlog 2025/09/12 11:19:10 client Starting new connection to server4 ([::]:58522 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, version v1 2025/09/12 11:19:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:10 client -> Sending packet 0 (1280 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:10 client -> Sending packet 1 (1280 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 1228, Data length: 276, Offset + Data length: 1504} 2025/09/12 11:19:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:10 client -> Sending packet 2 (1280 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:10 client -> Sending packet 3 (1280 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 1228, Data length: 276, Offset + Data length: 1504} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:10 client -> Sending packet 4 (1280 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:10 client -> Sending packet 5 (1280 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 1228, Data length: 276, Offset + Data length: 1504} 2025/09/12 11:19:10 client <- Reading packet 1 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 470bb7d78dda40e8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:10 client Received first packet. Switching destination connection ID to: 470bb7d78dda40e8 2025/09/12 11:19:10 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:10 client newly acked packets (1): [5] 2025/09/12 11:19:10 client updated RTT: 33.314761ms (σ: 16.65738ms) 2025/09/12 11:19:10 client setting loss timer for packet 4 (Initial) to 37.479106ms (in 2025-09-12 11:19:10.643575373 +0000 UTC m=+25.475718573) 2025/09/12 11:19:10 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:10.643575373 +0000 UTC m=+25.475718573 2025/09/12 11:19:10 client lost packet 4 (time threshold) 2025/09/12 11:19:10 client -> Sending packet 6 (1280 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: 470bb7d78dda40e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:10 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:19:10 client <- Reading packet 2 (136 bytes) for connection (empty), Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 470bb7d78dda40e8, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:19:10 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:10 client newly acked packets (1): [6] 2025/09/12 11:19:10 client updated RTT: 33.449ms (σ: 12.764ms) 2025/09/12 11:19:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:10 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:10 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:10 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:19:10 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:19:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 470bb7d78dda40e8, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:19:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 11:19:10 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:10 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, InitialSourceConnectionID: 470bb7d78dda40e8, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd60a5c8419f5576192f13ad165d22ef7, EnableResetStreamAt: false} 2025/09/12 11:19:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: 470bb7d78dda40e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:10 client Long Header{Type: Handshake, DestConnectionID: 470bb7d78dda40e8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:10 client Dropping Initial keys. 2025/09/12 11:19:10 client -> Sending packet 1 (40 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, Handshake 2025/09/12 11:19:10 client Long Header{Type: Handshake, DestConnectionID: 470bb7d78dda40e8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:10 client -> Sending packet 0 (46 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:10 client Short Header{DestConnectionID: 470bb7d78dda40e8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:10 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:10 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 470bb7d78dda40e8, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:10 client Peer doesn't await address validation any longer. 2025/09/12 11:19:10 client newly acked packets (1): [0] 2025/09/12 11:19:10 client Canceling loss detection timer. 2025/09/12 11:19:10 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:10 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:10 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:10 client -> Sending packet 1 (32 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:10 client Short Header{DestConnectionID: 470bb7d78dda40e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 138.928µs} 2025/09/12 11:19:10 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:10 client newly acked packets (1): [0] 2025/09/12 11:19:10 client updated RTT: 33.598ms (σ: 9.871ms) 2025/09/12 11:19:10 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:10 client Dropping Handshake keys. 2025/09/12 11:19:10 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:10 client <- &wire.NewTokenFrame{Token: 0xb769ac7c7b626ab115c2e41edbbe729d1da2dbcf299f14b8dc7d4f74539a58523ebac289a7} 2025/09/12 11:19:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9da53316dec028b3, StatelessResetToken: 0x4f68717f6b39b4879640449bc95eca22} 2025/09/12 11:19:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c795be3711921d90, StatelessResetToken: 0xa3d515dc343cdc05d952066d8790f014} 2025/09/12 11:19:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 24d1fabfe07e1fa4, StatelessResetToken: 0x61f4a25494467ef10dd4388f86779bf4} 2025/09/12 11:19:10 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:10 client -> Sending packet 2 (34 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:10 client Short Header{DestConnectionID: 9da53316dec028b3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:10 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 113.782µs} 2025/09/12 11:19:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:10 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:10 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:10 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:10 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:10 client -> Sending packet 3 (30 bytes) for connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:10 client Short Header{DestConnectionID: 9da53316dec028b3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:10 client Connection 33a19d6e58309422c6a2c2741f6d0c1bda5209f2 closed. 2025/09/12 11:19:10 Requesting https://server4:443/rrqillmkba. 2025/09/12 11:19:10 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:10 Increased send buffer size to 14336 kiB 2025/09/12 11:19:10 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:10 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:10 Created qlog file: /logs/qlog/f0242c4fb6de18aa.sqlog 2025/09/12 11:19:10 client Starting new connection to server4 ([::]:47298 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f0242c4fb6de18aa, version v1 2025/09/12 11:19:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:10 client -> Sending packet 0 (1280 bytes) for connection f0242c4fb6de18aa, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: f0242c4fb6de18aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:10 client -> Sending packet 1 (1280 bytes) for connection f0242c4fb6de18aa, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: f0242c4fb6de18aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/09/12 11:19:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:10 client -> Sending packet 2 (1280 bytes) for connection f0242c4fb6de18aa, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: f0242c4fb6de18aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:10 client -> Sending packet 3 (1280 bytes) for connection f0242c4fb6de18aa, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: f0242c4fb6de18aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:10 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b296785bae89870c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:10 client Received first packet. Switching destination connection ID to: b296785bae89870c 2025/09/12 11:19:10 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:10 client newly acked packets (1): [3] 2025/09/12 11:19:10 client updated RTT: 33.253583ms (σ: 16.626791ms) 2025/09/12 11:19:10 client setting loss timer for packet 2 (Initial) to 37.41028ms (in 2025-09-12 11:19:10.954076555 +0000 UTC m=+25.786219736) 2025/09/12 11:19:10 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:10.954076555 +0000 UTC m=+25.786219736 2025/09/12 11:19:10 client lost packet 2 (time threshold) 2025/09/12 11:19:10 client -> Sending packet 4 (1280 bytes) for connection f0242c4fb6de18aa, Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: b296785bae89870c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:10 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:10 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b296785bae89870c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:10 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:10 client newly acked packets (1): [4] 2025/09/12 11:19:10 client updated RTT: 33.357ms (σ: 12.678ms) 2025/09/12 11:19:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:10 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:10 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:10 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:10 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b296785bae89870c, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/09/12 11:19:10 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:10 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f0242c4fb6de18aa, InitialSourceConnectionID: b296785bae89870c, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb2fc54687b5115a26b10fdbc21eec20f, EnableResetStreamAt: false} 2025/09/12 11:19:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f0242c4fb6de18aa 2025/09/12 11:19:10 client Long Header{Type: Initial, DestConnectionID: b296785bae89870c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:10 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:10 client Long Header{Type: Handshake, DestConnectionID: b296785bae89870c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:10 client Dropping Initial keys. 2025/09/12 11:19:10 client -> Sending packet 1 (40 bytes) for connection f0242c4fb6de18aa, Handshake 2025/09/12 11:19:10 client Long Header{Type: Handshake, DestConnectionID: b296785bae89870c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:10 client -> Sending packet 0 (46 bytes) for connection f0242c4fb6de18aa, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:10 client Short Header{DestConnectionID: b296785bae89870c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:11 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/09/12 11:19:11 client Peer doesn't await address validation any longer. 2025/09/12 11:19:11 client newly acked packets (1): [0] 2025/09/12 11:19:11 client updated RTT: 33.528ms (σ: 9.851ms) 2025/09/12 11:19:11 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:11 client Canceling loss detection timer. 2025/09/12 11:19:11 client Dropping Handshake keys. 2025/09/12 11:19:11 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:11 client <- &wire.NewTokenFrame{Token: 0xb74e67598632cdacf5ffb71a0601b54265553b20d0ccd8cf07da7d1be6f8586e1d26099598} 2025/09/12 11:19:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4b791f397fd6819c, StatelessResetToken: 0xfdaf074d68a8f74b0c4cc8a7856528df} 2025/09/12 11:19:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 09367d2ad794995b, StatelessResetToken: 0xdf1a16c631e8934c0a293fbb93b1cc2c} 2025/09/12 11:19:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3def0f01fb5a6f1a, StatelessResetToken: 0x7eabcdf768341e7f4dfae83f718814c8} 2025/09/12 11:19:11 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:11 client -> Sending packet 1 (34 bytes) for connection f0242c4fb6de18aa, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:11 client Short Header{DestConnectionID: 4b791f397fd6819c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 143.767µs} 2025/09/12 11:19:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:11 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:11 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:11 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:11 client -> Sending packet 2 (30 bytes) for connection f0242c4fb6de18aa, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:11 client Short Header{DestConnectionID: 4b791f397fd6819c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:11 client Connection f0242c4fb6de18aa closed. 2025/09/12 11:19:11 Requesting https://server4:443/vqosqzqoot. 2025/09/12 11:19:11 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:11 Increased send buffer size to 14336 kiB 2025/09/12 11:19:11 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:11 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:11 Created qlog file: /logs/qlog/f52c39720381bd98046e.sqlog 2025/09/12 11:19:11 client Starting new connection to server4 ([::]:36501 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f52c39720381bd98046e, version v1 2025/09/12 11:19:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:11 client -> Sending packet 0 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: f52c39720381bd98046e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:11 client -> Sending packet 1 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: f52c39720381bd98046e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 1238, Data length: 279, Offset + Data length: 1517} 2025/09/12 11:19:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:11 client -> Sending packet 2 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: f52c39720381bd98046e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 11:19:11 client -> Sending packet 3 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: f52c39720381bd98046e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 1238, Data length: 279, Offset + Data length: 1517} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:11 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27b46f9bf248eb76, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:11 client Received first packet. Switching destination connection ID to: 27b46f9bf248eb76 2025/09/12 11:19:11 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:11 client newly acked packets (1): [3] 2025/09/12 11:19:11 client updated RTT: 33.648021ms (σ: 16.82401ms) 2025/09/12 11:19:11 client setting loss timer for packet 2 (Initial) to 37.854023ms (in 2025-09-12 11:19:11.26469752 +0000 UTC m=+26.096840700) 2025/09/12 11:19:11 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:11.26469752 +0000 UTC m=+26.096840700 2025/09/12 11:19:11 client lost packet 2 (time threshold) 2025/09/12 11:19:11 client -> Sending packet 4 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:11 client -> Sending packet 5 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 11:19:11 client -> Sending packet 6 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 11:19:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:19:11 client -> Sending packet 7 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 11:19:11 client -> Sending packet 8 (1280 bytes) for connection f52c39720381bd98046e, Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 11:19:11 client <- Reading packet 2 (43 bytes) for connection (empty), Initial 2025/09/12 11:19:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27b46f9bf248eb76, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 26, Version: v1} 2025/09/12 11:19:11 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:19:11 client newly acked packets (1): [8] 2025/09/12 11:19:11 client updated RTT: 33.592ms (σ: 12.728ms) 2025/09/12 11:19:12 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:19:12 client <- Reading packet 4 (129 bytes) for connection (empty), Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27b46f9bf248eb76, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:19:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:12 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:12 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:12 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:19:12 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 27b46f9bf248eb76, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:19:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 11:19:12 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:12 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f52c39720381bd98046e, InitialSourceConnectionID: 27b46f9bf248eb76, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa8dd5822b83dae91ac853b6ae8e2932c, EnableResetStreamAt: false} 2025/09/12 11:19:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f52c39720381bd98046e 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:12 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:12 client Dropping Initial keys. 2025/09/12 11:19:12 client -> Sending packet 1 (86 bytes) for connection f52c39720381bd98046e, Handshake 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:19:12 client Short Header{DestConnectionID: 27b46f9bf248eb76, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:12 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:12 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:12 client -> Sending packet 1 (32 bytes) for connection f52c39720381bd98046e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:12 client Short Header{DestConnectionID: 27b46f9bf248eb76, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 84.978µs} 2025/09/12 11:19:12 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:12 client -> Sending packet 2 (69 bytes) for connection f52c39720381bd98046e, Handshake 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: 27b46f9bf248eb76, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 11:19:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:12 client Short Header{DestConnectionID: 27b46f9bf248eb76, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:12 client Connection f52c39720381bd98046e closed. 2025/09/12 11:19:12 Requesting https://server4:443/drkghvobph. 2025/09/12 11:19:12 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:12 Increased send buffer size to 14336 kiB 2025/09/12 11:19:12 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:12 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:12 Created qlog file: /logs/qlog/a2a863d0cfbcab00.sqlog 2025/09/12 11:19:12 client Starting new connection to server4 ([::]:33395 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a2a863d0cfbcab00, version v1 2025/09/12 11:19:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:12 client -> Sending packet 0 (1280 bytes) for connection a2a863d0cfbcab00, Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: a2a863d0cfbcab00, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:12 client -> Sending packet 1 (1280 bytes) for connection a2a863d0cfbcab00, Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: a2a863d0cfbcab00, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 1240, Data length: 264, Offset + Data length: 1504} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:12 client -> Sending packet 2 (1280 bytes) for connection a2a863d0cfbcab00, Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: a2a863d0cfbcab00, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:12 client -> Sending packet 3 (1280 bytes) for connection a2a863d0cfbcab00, Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: a2a863d0cfbcab00, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 1240, Data length: 264, Offset + Data length: 1504} 2025/09/12 11:19:12 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e9f75b7024b39e4a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:12 client Received first packet. Switching destination connection ID to: e9f75b7024b39e4a 2025/09/12 11:19:12 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:12 client newly acked packets (1): [3] 2025/09/12 11:19:12 client updated RTT: 33.387441ms (σ: 16.69372ms) 2025/09/12 11:19:12 client setting loss timer for packet 2 (Initial) to 37.560871ms (in 2025-09-12 11:19:12.778282639 +0000 UTC m=+27.610425829) 2025/09/12 11:19:12 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:12.778282639 +0000 UTC m=+27.610425829 2025/09/12 11:19:12 client lost packet 2 (time threshold) 2025/09/12 11:19:12 client -> Sending packet 4 (1280 bytes) for connection a2a863d0cfbcab00, Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: e9f75b7024b39e4a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:12 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:12 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e9f75b7024b39e4a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:12 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:12 client newly acked packets (1): [4] 2025/09/12 11:19:12 client updated RTT: 33.492ms (σ: 12.729ms) 2025/09/12 11:19:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:12 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:12 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:12 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:12 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e9f75b7024b39e4a, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 11:19:12 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:12 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a2a863d0cfbcab00, InitialSourceConnectionID: e9f75b7024b39e4a, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xe2878fc5a71558fa8ee422be50b74eff, EnableResetStreamAt: false} 2025/09/12 11:19:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a2a863d0cfbcab00 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: e9f75b7024b39e4a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:12 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: e9f75b7024b39e4a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:12 client Dropping Initial keys. 2025/09/12 11:19:12 client -> Sending packet 1 (86 bytes) for connection a2a863d0cfbcab00, Handshake 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: e9f75b7024b39e4a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:12 client Short Header{DestConnectionID: e9f75b7024b39e4a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:19:12 client -> Sending packet 2 (90 bytes) for connection a2a863d0cfbcab00, Handshake 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: e9f75b7024b39e4a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:12 client -> Sending packet 3 (90 bytes) for connection a2a863d0cfbcab00, Handshake 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: e9f75b7024b39e4a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:12 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:12 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e9f75b7024b39e4a, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:12 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:19:12 client Peer doesn't await address validation any longer. 2025/09/12 11:19:12 client newly acked packets (1): [3] 2025/09/12 11:19:12 client updated RTT: 33.381ms (σ: 9.766ms) 2025/09/12 11:19:12 client Canceling loss detection timer. 2025/09/12 11:19:12 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:12 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:12 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:12 client -> Sending packet 1 (32 bytes) for connection a2a863d0cfbcab00, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:12 client Short Header{DestConnectionID: e9f75b7024b39e4a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 178.392µs} 2025/09/12 11:19:12 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:12 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:12 client Dropping Handshake keys. 2025/09/12 11:19:12 client <- &wire.NewTokenFrame{Token: 0xb70666b742214fd89c757dc76998c2b46e3c0136d699d79fab2bb3ec3b893b55f31a59f4fa} 2025/09/12 11:19:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a0df0167876e5f45, StatelessResetToken: 0xa31c61e4902063f2fca031cef8bd9291} 2025/09/12 11:19:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f055a1954d40155c, StatelessResetToken: 0x2dd91cc4b8778445cc232d241ae1f289} 2025/09/12 11:19:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 33c342b91d27e813, StatelessResetToken: 0x390c48a75b1b29bec778852cc1356830} 2025/09/12 11:19:12 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:12 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:12 client -> Sending packet 3 (53 bytes) for connection a2a863d0cfbcab00, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:12 client Short Header{DestConnectionID: a0df0167876e5f45, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 116.617µs} 2025/09/12 11:19:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:12 client -> Sending packet 4 (48 bytes) for connection a2a863d0cfbcab00, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:12 client Short Header{DestConnectionID: a0df0167876e5f45, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:12 client <- Reading packet 2 (53 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:12 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:12 client newly acked packets (1): [4] 2025/09/12 11:19:12 client updated RTT: 33.158ms (σ: 7.768ms) 2025/09/12 11:19:12 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:12 client Canceling loss detection timer. 2025/09/12 11:19:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c9bec869882d0886, StatelessResetToken: 0x738059308c6fe4b9a1a6a683102eba72} 2025/09/12 11:19:12 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:12 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:12 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 11:19:12 client -> Sending packet 5 (32 bytes) for connection a2a863d0cfbcab00, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:12 client Short Header{DestConnectionID: a0df0167876e5f45, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 61.314µs} 2025/09/12 11:19:12 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:12 client -> Sending packet 6 (30 bytes) for connection a2a863d0cfbcab00, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:12 client Short Header{DestConnectionID: a0df0167876e5f45, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:12 client Connection a2a863d0cfbcab00 closed. 2025/09/12 11:19:12 Requesting https://server4:443/ctvppodimp. 2025/09/12 11:19:12 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:12 Increased send buffer size to 14336 kiB 2025/09/12 11:19:12 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:12 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:12 Created qlog file: /logs/qlog/ad34198abcbb03e8c79d51c5317107b83af600c3.sqlog 2025/09/12 11:19:12 client Starting new connection to server4 ([::]:52546 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ad34198abcbb03e8c79d51c5317107b83af600c3, version v1 2025/09/12 11:19:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:12 client -> Sending packet 0 (1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: ad34198abcbb03e8c79d51c5317107b83af600c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:12 client -> Sending packet 1 (1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Initial 2025/09/12 11:19:12 client Long Header{Type: Initial, DestConnectionID: ad34198abcbb03e8c79d51c5317107b83af600c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 1228, Data length: 281, Offset + Data length: 1509} 2025/09/12 11:19:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:13 client -> Sending packet 2 (1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: ad34198abcbb03e8c79d51c5317107b83af600c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:13 client -> Sending packet 3 (1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: ad34198abcbb03e8c79d51c5317107b83af600c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 1228, Data length: 281, Offset + Data length: 1509} 2025/09/12 11:19:13 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fe330092188a660, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:13 client Received first packet. Switching destination connection ID to: 6fe330092188a660 2025/09/12 11:19:13 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:13 client newly acked packets (1): [3] 2025/09/12 11:19:13 client updated RTT: 33.329024ms (σ: 16.664512ms) 2025/09/12 11:19:13 client setting loss timer for packet 2 (Initial) to 37.495152ms (in 2025-09-12 11:19:13.204066936 +0000 UTC m=+28.036210106) 2025/09/12 11:19:13 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:13.204066936 +0000 UTC m=+28.036210106 2025/09/12 11:19:13 client lost packet 2 (time threshold) 2025/09/12 11:19:13 client -> Sending packet 4 (1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:13 client -> Sending packet 5 (1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:13 client -> Sending packet 6 (1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:13 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fe330092188a660, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:13 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:13 client newly acked packets (1): [6] 2025/09/12 11:19:13 client updated RTT: 33.481ms (σ: 12.802ms) 2025/09/12 11:19:13 client -> Sending packet 7 (1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:13 client -> &wire.PingFrame{} 2025/09/12 11:19:13 client <- Reading packet 5 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fe330092188a660, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:13 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:13 client newly acked packets (1): [7] 2025/09/12 11:19:13 client updated RTT: 33.348ms (σ: 9.866ms) 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:19:14 client <- Reading packet 7 (129 bytes) for connection (empty), Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fe330092188a660, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:14 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:19:14 client <- Reading packet 3 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fe330092188a660, PacketNumber: 3, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/09/12 11:19:14 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ad34198abcbb03e8c79d51c5317107b83af600c3, InitialSourceConnectionID: 6fe330092188a660, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7c8bb48728e45c64989d17f7dfb7dde2, EnableResetStreamAt: false} 2025/09/12 11:19:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:14 client Dropping Initial keys. 2025/09/12 11:19:14 client -> Sending packet 1 (40 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:14 client -> Sending packet 0 (46 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 6fe330092188a660, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:14 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:19:14 client -> Sending packet 2 (90 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:14 client -> Sending packet 3 (90 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:14 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 11:19:14 client -> Sending packet 4 (90 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:14 client -> Sending packet 5 (90 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 6fe330092188a660, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 568 bytes. 2025/09/12 11:19:14 client <- Reading packet 4 (40 bytes) for connection (empty), Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fe330092188a660, PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:14 client Peer doesn't await address validation any longer. 2025/09/12 11:19:14 client newly acked packets (1): [5] 2025/09/12 11:19:14 client updated RTT: 33.29ms (σ: 7.514ms) 2025/09/12 11:19:14 client Canceling loss detection timer. 2025/09/12 11:19:14 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:14 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:14 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:14 client -> Sending packet 1 (32 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 6fe330092188a660, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 210.842µs} 2025/09/12 11:19:14 client <- Reading packet 1 (150 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 221ms} 2025/09/12 11:19:14 client newly acked packets (1): [0] 2025/09/12 11:19:14 client updated RTT: 57.712ms (σ: 54.479ms) 2025/09/12 11:19:14 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:14 client Dropping Handshake keys. 2025/09/12 11:19:14 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:14 client <- &wire.NewTokenFrame{Token: 0xb7ed583fe167a6962af9bbef20a65de50eec4140bcd0cb45e84e13707c3be59f1dc0805b6d} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 753cd4b990f7cb88, StatelessResetToken: 0x374b12c012e1b36336a1a88570abee8d} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 264ff441c5b2d0c1, StatelessResetToken: 0xacf4e0d1f961bdc4cbd1cec69141e83b} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eb1f33ae391c50e0, StatelessResetToken: 0x36af84b9bf7afa4818bc43d57970a3da} 2025/09/12 11:19:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:14 client -> Sending packet 2 (34 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 753cd4b990f7cb88, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 123.449µs} 2025/09/12 11:19:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:14 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:14 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:14 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:14 client -> Sending packet 3 (30 bytes) for connection ad34198abcbb03e8c79d51c5317107b83af600c3, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 753cd4b990f7cb88, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:14 client Connection ad34198abcbb03e8c79d51c5317107b83af600c3 closed. 2025/09/12 11:19:14 Requesting https://server4:443/svuhcbktjn. 2025/09/12 11:19:14 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:14 Increased send buffer size to 14336 kiB 2025/09/12 11:19:14 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:14 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:14 Created qlog file: /logs/qlog/147d85ae7a6da6d9a69d1e0be6541dbe9882c1.sqlog 2025/09/12 11:19:14 client Starting new connection to server4 ([::]:55779 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, version v1 2025/09/12 11:19:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:14 client -> Sending packet 0 (1280 bytes) for connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:14 client -> Sending packet 1 (1280 bytes) for connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:14 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 127103a1ad6883b8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:14 client Received first packet. Switching destination connection ID to: 127103a1ad6883b8 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:14 client newly acked packets (1): [1] 2025/09/12 11:19:14 client updated RTT: 33.098221ms (σ: 16.54911ms) 2025/09/12 11:19:14 client setting loss timer for packet 0 (Initial) to 37.235498ms (in 2025-09-12 11:19:14.531779828 +0000 UTC m=+29.363922998) 2025/09/12 11:19:14 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:14.531779828 +0000 UTC m=+29.363922998 2025/09/12 11:19:14 client lost packet 0 (time threshold) 2025/09/12 11:19:14 client -> Sending packet 2 (1280 bytes) for connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 127103a1ad6883b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:14 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 127103a1ad6883b8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:14 client newly acked packets (1): [2] 2025/09/12 11:19:14 client updated RTT: 33.225ms (σ: 12.666ms) 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:14 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:14 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 127103a1ad6883b8, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 11:19:14 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, InitialSourceConnectionID: 127103a1ad6883b8, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xae10e233fde9777889cf1355a86dd5ee, EnableResetStreamAt: false} 2025/09/12 11:19:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 127103a1ad6883b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 127103a1ad6883b8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:14 client Dropping Initial keys. 2025/09/12 11:19:14 client -> Sending packet 1 (86 bytes) for connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 127103a1ad6883b8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:14 client Short Header{DestConnectionID: 127103a1ad6883b8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:14 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 127103a1ad6883b8, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:14 client Peer doesn't await address validation any longer. 2025/09/12 11:19:14 client newly acked packets (1): [0] 2025/09/12 11:19:14 client Canceling loss detection timer. 2025/09/12 11:19:14 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:14 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:14 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:14 client -> Sending packet 1 (32 bytes) for connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 127103a1ad6883b8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 139.228µs} 2025/09/12 11:19:14 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/09/12 11:19:14 client newly acked packets (1): [0] 2025/09/12 11:19:14 client updated RTT: 33.443ms (σ: 9.937ms) 2025/09/12 11:19:14 client Dropping Handshake keys. 2025/09/12 11:19:14 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:14 client <- &wire.NewTokenFrame{Token: 0xb7ef4447616b0df411192a80182d87ce238f2353413e6c2d4dca665186976c20b37ec1ab58} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 16bf0653eeffe5e3, StatelessResetToken: 0x36b040f252bda82435aba6db01e7f105} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 85e4293fd04e44c5, StatelessResetToken: 0xad430b6146312b96e8dfb2e3aeabed7e} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fc260eeec3d6bcc3, StatelessResetToken: 0xf65b0666f87bf5d06e6135a8e43e9ee2} 2025/09/12 11:19:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:14 client -> Sending packet 2 (34 bytes) for connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 16bf0653eeffe5e3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 122.808µs} 2025/09/12 11:19:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:14 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:14 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:14 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:14 client -> Sending packet 3 (30 bytes) for connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 16bf0653eeffe5e3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:14 client Connection 147d85ae7a6da6d9a69d1e0be6541dbe9882c1 closed. 2025/09/12 11:19:14 Requesting https://server4:443/tpnustvcub. 2025/09/12 11:19:14 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:14 Increased send buffer size to 14336 kiB 2025/09/12 11:19:14 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:14 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:14 Created qlog file: /logs/qlog/0fdd8c9c86f4859691.sqlog 2025/09/12 11:19:14 client Starting new connection to server4 ([::]:45804 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0fdd8c9c86f4859691, version v1 2025/09/12 11:19:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:14 client -> Sending packet 0 (1280 bytes) for connection 0fdd8c9c86f4859691, Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 0fdd8c9c86f4859691, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:14 client -> Sending packet 1 (1280 bytes) for connection 0fdd8c9c86f4859691, Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 0fdd8c9c86f4859691, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 11:19:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:14 client -> Sending packet 2 (1280 bytes) for connection 0fdd8c9c86f4859691, Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 0fdd8c9c86f4859691, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:14 client -> Sending packet 3 (1280 bytes) for connection 0fdd8c9c86f4859691, Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 0fdd8c9c86f4859691, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:14 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bfcd0c58384e177, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:14 client Received first packet. Switching destination connection ID to: 8bfcd0c58384e177 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:14 client newly acked packets (1): [3] 2025/09/12 11:19:14 client updated RTT: 33.519251ms (σ: 16.759625ms) 2025/09/12 11:19:14 client setting loss timer for packet 2 (Initial) to 37.709157ms (in 2025-09-12 11:19:14.842736161 +0000 UTC m=+29.674879341) 2025/09/12 11:19:14 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:14.842736161 +0000 UTC m=+29.674879341 2025/09/12 11:19:14 client lost packet 2 (time threshold) 2025/09/12 11:19:14 client -> Sending packet 4 (1280 bytes) for connection 0fdd8c9c86f4859691, Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 8bfcd0c58384e177, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:14 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bfcd0c58384e177, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:14 client newly acked packets (1): [4] 2025/09/12 11:19:14 client updated RTT: 33.6ms (σ: 12.733ms) 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:14 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:14 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8bfcd0c58384e177, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 11:19:14 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0fdd8c9c86f4859691, InitialSourceConnectionID: 8bfcd0c58384e177, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf4e8b6de101bf53b549370660f7f2dc0, EnableResetStreamAt: false} 2025/09/12 11:19:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0fdd8c9c86f4859691 2025/09/12 11:19:14 client Long Header{Type: Initial, DestConnectionID: 8bfcd0c58384e177, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 8bfcd0c58384e177, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:14 client Dropping Initial keys. 2025/09/12 11:19:14 client -> Sending packet 1 (40 bytes) for connection 0fdd8c9c86f4859691, Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: 8bfcd0c58384e177, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:14 client -> Sending packet 0 (46 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 8bfcd0c58384e177, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:14 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:14 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8bfcd0c58384e177, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:14 client Peer doesn't await address validation any longer. 2025/09/12 11:19:14 client newly acked packets (1): [0] 2025/09/12 11:19:14 client Canceling loss detection timer. 2025/09/12 11:19:14 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:14 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:14 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:14 client -> Sending packet 1 (32 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:14 client Short Header{DestConnectionID: 8bfcd0c58384e177, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 168.405µs} 2025/09/12 11:19:14 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:14 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:14 client Dropping Handshake keys. 2025/09/12 11:19:14 client <- &wire.NewTokenFrame{Token: 0xb7ab96fd98549c5a99c6acfbfafcaaa5b1dcb05089f247a4a1f7e22eef73303f13dab2bea2} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d861ed6140ca1d42, StatelessResetToken: 0x8b99f1234fed10aefd0248f1135f185a} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e635315ececd1a46, StatelessResetToken: 0x5549066cc77425db2be449a3f504deed} 2025/09/12 11:19:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5780f746c668ed99, StatelessResetToken: 0x5723c65592d8985c1730fb136f149ec9} 2025/09/12 11:19:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:14 client -> Sending packet 2 (34 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:14 client Short Header{DestConnectionID: d861ed6140ca1d42, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:14 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 168.143µs} 2025/09/12 11:19:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:15 client -> Sending packet 4 (46 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:15 client Short Header{DestConnectionID: d861ed6140ca1d42, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:15 client Skipping packet number 3 2025/09/12 11:19:15 client -> Sending packet 5 (29 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:15 client Short Header{DestConnectionID: d861ed6140ca1d42, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:15 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:15 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d33f1c674fbb0008, StatelessResetToken: 0xd7a1cdb8bdd5f16f698945bb81a2d827} 2025/09/12 11:19:15 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:15 client -> Sending packet 6 (34 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:15 client Short Header{DestConnectionID: d861ed6140ca1d42, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 82.603µs} 2025/09/12 11:19:15 client <- Reading packet 5 (26 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:15 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:15 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 12ms} 2025/09/12 11:19:15 client newly acked packets (1): [5] 2025/09/12 11:19:15 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:15 client lost packet 4 (time threshold) 2025/09/12 11:19:15 client Canceling loss detection timer. 2025/09/12 11:19:15 client -> Sending packet 7 (46 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:15 client Short Header{DestConnectionID: d861ed6140ca1d42, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:15 client <- Reading packet 6 (1054 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:15 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:15 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 2ms} 2025/09/12 11:19:15 client newly acked packets (1): [7] 2025/09/12 11:19:15 client updated RTT: 33.532ms (σ: 9.685ms) 2025/09/12 11:19:15 client Canceling loss detection timer. 2025/09/12 11:19:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:15 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:15 client -> Sending packet 8 (1366 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:15 client Short Header{DestConnectionID: d861ed6140ca1d42, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.PingFrame{} 2025/09/12 11:19:15 client -> Sending packet 9 (36 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:15 client Short Header{DestConnectionID: d861ed6140ca1d42, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 159.126µs} 2025/09/12 11:19:15 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:15 client -> Sending packet 10 (30 bytes) for connection 0fdd8c9c86f4859691, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:15 client Short Header{DestConnectionID: d861ed6140ca1d42, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:15 client Connection 0fdd8c9c86f4859691 closed. 2025/09/12 11:19:15 Requesting https://server4:443/opstanrmue. 2025/09/12 11:19:15 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:15 Increased send buffer size to 14336 kiB 2025/09/12 11:19:15 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:15 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:15 Created qlog file: /logs/qlog/a5ba27b55bb93ecffa1c2bb3.sqlog 2025/09/12 11:19:15 client Starting new connection to server4 ([::]:45243 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a5ba27b55bb93ecffa1c2bb3, version v1 2025/09/12 11:19:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:15 client -> Sending packet 0 (1280 bytes) for connection a5ba27b55bb93ecffa1c2bb3, Initial 2025/09/12 11:19:15 client Long Header{Type: Initial, DestConnectionID: a5ba27b55bb93ecffa1c2bb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:15 client -> Sending packet 1 (1280 bytes) for connection a5ba27b55bb93ecffa1c2bb3, Initial 2025/09/12 11:19:15 client Long Header{Type: Initial, DestConnectionID: a5ba27b55bb93ecffa1c2bb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:15 client -> Sending packet 2 (1280 bytes) for connection a5ba27b55bb93ecffa1c2bb3, Initial 2025/09/12 11:19:15 client Long Header{Type: Initial, DestConnectionID: a5ba27b55bb93ecffa1c2bb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:15 client -> Sending packet 3 (1280 bytes) for connection a5ba27b55bb93ecffa1c2bb3, Initial 2025/09/12 11:19:15 client Long Header{Type: Initial, DestConnectionID: a5ba27b55bb93ecffa1c2bb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 11:19:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:15 client -> Sending packet 4 (1280 bytes) for connection a5ba27b55bb93ecffa1c2bb3, Initial 2025/09/12 11:19:15 client Long Header{Type: Initial, DestConnectionID: a5ba27b55bb93ecffa1c2bb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:15 client -> Sending packet 5 (1280 bytes) for connection a5ba27b55bb93ecffa1c2bb3, Initial 2025/09/12 11:19:15 client Long Header{Type: Initial, DestConnectionID: a5ba27b55bb93ecffa1c2bb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:15 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:15 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75fc51be9ebcf6c5, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:15 client Received first packet. Switching destination connection ID to: 75fc51be9ebcf6c5 2025/09/12 11:19:15 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:15 client newly acked packets (2): [4 5] 2025/09/12 11:19:15 client updated RTT: 35.106419ms (σ: 17.553209ms) 2025/09/12 11:19:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:15 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:15 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:15 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:15 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 75fc51be9ebcf6c5, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 11:19:15 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:15 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a5ba27b55bb93ecffa1c2bb3, InitialSourceConnectionID: 75fc51be9ebcf6c5, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x314139fb13a930bd30da13ca803dfc04, EnableResetStreamAt: false} 2025/09/12 11:19:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a5ba27b55bb93ecffa1c2bb3 2025/09/12 11:19:15 client Long Header{Type: Initial, DestConnectionID: 75fc51be9ebcf6c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:15 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:15 client Long Header{Type: Handshake, DestConnectionID: 75fc51be9ebcf6c5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:15 client Dropping Initial keys. 2025/09/12 11:19:15 client -> Sending packet 1 (86 bytes) for connection a5ba27b55bb93ecffa1c2bb3, Handshake 2025/09/12 11:19:15 client Long Header{Type: Handshake, DestConnectionID: 75fc51be9ebcf6c5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:15 client Short Header{DestConnectionID: 75fc51be9ebcf6c5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:15 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:15 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 75fc51be9ebcf6c5, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:15 client Peer doesn't await address validation any longer. 2025/09/12 11:19:15 client newly acked packets (1): [0] 2025/09/12 11:19:15 client updated RTT: 34.926ms (σ: 13.523ms) 2025/09/12 11:19:15 client Canceling loss detection timer. 2025/09/12 11:19:15 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:15 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:15 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:15 client -> Sending packet 1 (32 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:15 client Short Header{DestConnectionID: 75fc51be9ebcf6c5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 164.957µs} 2025/09/12 11:19:15 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:15 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:15 client Dropping Handshake keys. 2025/09/12 11:19:15 client <- &wire.NewTokenFrame{Token: 0xb7f263a8cff0eb99a1211eff0e5d5f73665d81148b3d69cf6fdfadc0116e83fe0fe6c493ea} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f5e00cbc208de9c7, StatelessResetToken: 0x4270cd44a5d6ba3fcf7381b506b5f4a0} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb6b08e0e08981f0, StatelessResetToken: 0x13cee45f5db7df5c4e2633cad9f1ae55} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1836782f13e8fe7d, StatelessResetToken: 0x14737ddf8d6363a409a7cb1c29dfb180} 2025/09/12 11:19:15 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:15 client -> Sending packet 2 (34 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:15 client Short Header{DestConnectionID: f5e00cbc208de9c7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 110.686µs} 2025/09/12 11:19:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:15 client -> Sending packet 4 (46 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:15 client Short Header{DestConnectionID: f5e00cbc208de9c7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:15 client Skipping packet number 3 2025/09/12 11:19:15 client -> Sending packet 5 (29 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:15 client Short Header{DestConnectionID: f5e00cbc208de9c7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:15 client <- Reading packet 2 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:15 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:15 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:15 client <- &wire.NewTokenFrame{Token: 0xb7f263a8cff0eb99a1211eff0e5d5f73665d81148b3d69cf6fdfadc0116e83fe0fe6c493ea} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f5e00cbc208de9c7, StatelessResetToken: 0x4270cd44a5d6ba3fcf7381b506b5f4a0} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb6b08e0e08981f0, StatelessResetToken: 0x13cee45f5db7df5c4e2633cad9f1ae55} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1836782f13e8fe7d, StatelessResetToken: 0x14737ddf8d6363a409a7cb1c29dfb180} 2025/09/12 11:19:15 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:15 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:15 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:15 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:15 client <- &wire.NewTokenFrame{Token: 0xb7f263a8cff0eb99a1211eff0e5d5f73665d81148b3d69cf6fdfadc0116e83fe0fe6c493ea} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f5e00cbc208de9c7, StatelessResetToken: 0x4270cd44a5d6ba3fcf7381b506b5f4a0} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb6b08e0e08981f0, StatelessResetToken: 0x13cee45f5db7df5c4e2633cad9f1ae55} 2025/09/12 11:19:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1836782f13e8fe7d, StatelessResetToken: 0x14737ddf8d6363a409a7cb1c29dfb180} 2025/09/12 11:19:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 11:19:15 client -> Sending packet 6 (32 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:15 client Short Header{DestConnectionID: f5e00cbc208de9c7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:15 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 90.489µs} 2025/09/12 11:19:16 client <- Reading packet 5 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:16 client <- &wire.NewTokenFrame{Token: 0xb7f263a8cff0eb99a1211eff0e5d5f73665d81148b3d69cf6fdfadc0116e83fe0fe6c493ea} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f5e00cbc208de9c7, StatelessResetToken: 0x4270cd44a5d6ba3fcf7381b506b5f4a0} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb6b08e0e08981f0, StatelessResetToken: 0x13cee45f5db7df5c4e2633cad9f1ae55} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1836782f13e8fe7d, StatelessResetToken: 0x14737ddf8d6363a409a7cb1c29dfb180} 2025/09/12 11:19:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:16 client -> Sending packet 7 (1366 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: f5e00cbc208de9c7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.PingFrame{} 2025/09/12 11:19:16 client -> Sending packet 8 (34 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: f5e00cbc208de9c7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 213.658µs} 2025/09/12 11:19:16 client <- Reading packet 9 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:16 client -> Sending packet 9 (36 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: f5e00cbc208de9c7, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 86.691µs} 2025/09/12 11:19:16 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:16 client -> Sending packet 10 (30 bytes) for connection a5ba27b55bb93ecffa1c2bb3, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: f5e00cbc208de9c7, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:16 client Connection a5ba27b55bb93ecffa1c2bb3 closed. 2025/09/12 11:19:16 Requesting https://server4:443/bectfqimpd. 2025/09/12 11:19:16 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:16 Increased send buffer size to 14336 kiB 2025/09/12 11:19:16 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:16 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:16 Created qlog file: /logs/qlog/5ae2cd9e34749802b1cc92dd387015c0d97a180f.sqlog 2025/09/12 11:19:16 client Starting new connection to server4 ([::]:50275 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5ae2cd9e34749802b1cc92dd387015c0d97a180f, version v1 2025/09/12 11:19:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:16 client -> Sending packet 0 (1280 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: 5ae2cd9e34749802b1cc92dd387015c0d97a180f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 client -> Sending packet 1 (1280 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: 5ae2cd9e34749802b1cc92dd387015c0d97a180f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 1228, Data length: 284, Offset + Data length: 1512} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:16 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb058f47472e922d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:16 client Received first packet. Switching destination connection ID to: eb058f47472e922d 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:16 client newly acked packets (1): [1] 2025/09/12 11:19:16 client updated RTT: 33.578663ms (σ: 16.789331ms) 2025/09/12 11:19:16 client setting loss timer for packet 0 (Initial) to 37.775995ms (in 2025-09-12 11:19:16.271967473 +0000 UTC m=+31.104110643) 2025/09/12 11:19:16 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:16.271967473 +0000 UTC m=+31.104110643 2025/09/12 11:19:16 client lost packet 0 (time threshold) 2025/09/12 11:19:16 client -> Sending packet 2 (1280 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: eb058f47472e922d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:16 client -> Sending packet 3 (1280 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: eb058f47472e922d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 client -> Sending packet 4 (1280 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: eb058f47472e922d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb058f47472e922d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:16 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client -> Sending packet 5 (1280 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: eb058f47472e922d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 781 bytes. 2025/09/12 11:19:16 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb058f47472e922d, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:16 client newly acked packets (1): [4] 2025/09/12 11:19:16 client updated RTT: 33.78ms (σ: 12.996ms) 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 0 bytes. 2025/09/12 11:19:16 client <- Reading packet 1 (781 bytes) for connection (empty), Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb058f47472e922d, PacketNumber: 1, PacketNumberLen: 1, Length: 764, Version: v1} 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/09/12 11:19:16 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5ae2cd9e34749802b1cc92dd387015c0d97a180f, InitialSourceConnectionID: eb058f47472e922d, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x191464be0e320e4d7a8a6469575b0c20, EnableResetStreamAt: false} 2025/09/12 11:19:16 client -> Sending packet 0 (95 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: eb058f47472e922d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 78, Version: v1} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:16 client Dropping Initial keys. 2025/09/12 11:19:16 client -> Sending packet 0 (46 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: eb058f47472e922d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:16 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb058f47472e922d, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:16 client Peer doesn't await address validation any longer. 2025/09/12 11:19:16 client newly acked packets (1): [0] 2025/09/12 11:19:16 client updated RTT: 33.771ms (σ: 9.764ms) 2025/09/12 11:19:16 client Canceling loss detection timer. 2025/09/12 11:19:16 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:16 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:16 client -> Sending packet 1 (32 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: eb058f47472e922d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 178.943µs} 2025/09/12 11:19:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:16 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:16 client Dropping Handshake keys. 2025/09/12 11:19:16 client <- &wire.NewTokenFrame{Token: 0xb7d1c5f8ef6ea403b09edf4122939a3a1b204cc53e8c65cbda60afc93fee3e39f0019c0016} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d503808e28e3993d, StatelessResetToken: 0x64beb41b386dbbb2a4386dcc5f0dfb0b} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 05ce53200906b153, StatelessResetToken: 0x8b1437c0f1351089d7cb3530a77320a8} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 854c416f57f44ba7, StatelessResetToken: 0xe24f5d844d3dfbc2fbce5b7b9e849e42} 2025/09/12 11:19:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:16 client -> Sending packet 3 (55 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: d503808e28e3993d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 146.943µs} 2025/09/12 11:19:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:16 client -> Sending packet 4 (48 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: d503808e28e3993d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:16 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:16 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:16 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:16 client -> Sending packet 5 (30 bytes) for connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: d503808e28e3993d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:16 client Connection 5ae2cd9e34749802b1cc92dd387015c0d97a180f closed. 2025/09/12 11:19:16 Requesting https://server4:443/jqmcuvgfey. 2025/09/12 11:19:16 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:16 Increased send buffer size to 14336 kiB 2025/09/12 11:19:16 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:16 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:16 Created qlog file: /logs/qlog/95de182c43b75aca18baaf2a73b262.sqlog 2025/09/12 11:19:16 client Starting new connection to server4 ([::]:50788 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 95de182c43b75aca18baaf2a73b262, version v1 2025/09/12 11:19:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:16 client -> Sending packet 0 (1280 bytes) for connection 95de182c43b75aca18baaf2a73b262, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: 95de182c43b75aca18baaf2a73b262, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 11:19:16 client -> Sending packet 1 (1280 bytes) for connection 95de182c43b75aca18baaf2a73b262, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: 95de182c43b75aca18baaf2a73b262, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/12 11:19:16 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b833940f4c8bc2c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:16 client Received first packet. Switching destination connection ID to: 5b833940f4c8bc2c 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:16 client newly acked packets (1): [1] 2025/09/12 11:19:16 client updated RTT: 33.442701ms (σ: 16.72135ms) 2025/09/12 11:19:16 client setting loss timer for packet 0 (Initial) to 37.623038ms (in 2025-09-12 11:19:16.588383145 +0000 UTC m=+31.420526315) 2025/09/12 11:19:16 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:16.588383145 +0000 UTC m=+31.420526315 2025/09/12 11:19:16 client lost packet 0 (time threshold) 2025/09/12 11:19:16 client -> Sending packet 2 (1280 bytes) for connection 95de182c43b75aca18baaf2a73b262, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: 5b833940f4c8bc2c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:16 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b833940f4c8bc2c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:16 client newly acked packets (1): [2] 2025/09/12 11:19:16 client updated RTT: 33.55ms (σ: 12.758ms) 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:16 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:16 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5b833940f4c8bc2c, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/09/12 11:19:16 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 95de182c43b75aca18baaf2a73b262, InitialSourceConnectionID: 5b833940f4c8bc2c, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf73528d688c1517c4e27fef6ef49b7f2, EnableResetStreamAt: false} 2025/09/12 11:19:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 95de182c43b75aca18baaf2a73b262 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: 5b833940f4c8bc2c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: 5b833940f4c8bc2c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:16 client Dropping Initial keys. 2025/09/12 11:19:16 client -> Sending packet 1 (40 bytes) for connection 95de182c43b75aca18baaf2a73b262, Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: 5b833940f4c8bc2c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:16 client -> Sending packet 0 (46 bytes) for connection 95de182c43b75aca18baaf2a73b262, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: 5b833940f4c8bc2c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:16 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5b833940f4c8bc2c, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:16 client Peer doesn't await address validation any longer. 2025/09/12 11:19:16 client newly acked packets (1): [0] 2025/09/12 11:19:16 client Canceling loss detection timer. 2025/09/12 11:19:16 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:16 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:16 client -> Sending packet 1 (32 bytes) for connection 95de182c43b75aca18baaf2a73b262, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: 5b833940f4c8bc2c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 116.437µs} 2025/09/12 11:19:16 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/09/12 11:19:16 client newly acked packets (1): [0] 2025/09/12 11:19:16 client updated RTT: 33.704ms (σ: 9.878ms) 2025/09/12 11:19:16 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:16 client Dropping Handshake keys. 2025/09/12 11:19:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:16 client <- &wire.NewTokenFrame{Token: 0xb701721e55d4bc4d4c4bfbbef5ecbfb1e59aa2547aa7d524382a205fc450140c85dde6193d} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d007017b50af52d, StatelessResetToken: 0xab2e82938d6ed542f43d53d8556b10d9} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c49a1d370247404f, StatelessResetToken: 0x794f3c4b8dd701ca1a4d26323a01811c} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c3ebbf7c00c05f8c, StatelessResetToken: 0x743c68a52960c047c136194530794fd8} 2025/09/12 11:19:16 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:16 client -> Sending packet 2 (34 bytes) for connection 95de182c43b75aca18baaf2a73b262, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:16 client Short Header{DestConnectionID: 8d007017b50af52d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 113µs} 2025/09/12 11:19:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:16 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:16 client newly acked packets (1): [2] 2025/09/12 11:19:16 client updated RTT: 33.422ms (σ: 7.972ms) 2025/09/12 11:19:16 client Canceling loss detection timer. 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9511373c323c395b, StatelessResetToken: 0x23ce8f6d4bd4656cfeced5d25a43bfd6} 2025/09/12 11:19:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:16 client Ignoring all packets below 2. 2025/09/12 11:19:16 client -> Sending packet 3 (32 bytes) for connection 95de182c43b75aca18baaf2a73b262, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:16 client Short Header{DestConnectionID: 8d007017b50af52d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 109.012µs} 2025/09/12 11:19:16 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:16 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:16 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:16 client -> Sending packet 4 (30 bytes) for connection 95de182c43b75aca18baaf2a73b262, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:16 client Short Header{DestConnectionID: 8d007017b50af52d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:16 client Connection 95de182c43b75aca18baaf2a73b262 closed. 2025/09/12 11:19:16 Requesting https://server4:443/sajwevjesz. 2025/09/12 11:19:16 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:16 Increased send buffer size to 14336 kiB 2025/09/12 11:19:16 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:16 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:16 Created qlog file: /logs/qlog/b8ca0008a46ab1241757877d222c633e.sqlog 2025/09/12 11:19:16 client Starting new connection to server4 ([::]:46297 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b8ca0008a46ab1241757877d222c633e, version v1 2025/09/12 11:19:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:16 client -> Sending packet 0 (1280 bytes) for connection b8ca0008a46ab1241757877d222c633e, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: b8ca0008a46ab1241757877d222c633e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 client -> Sending packet 1 (1280 bytes) for connection b8ca0008a46ab1241757877d222c633e, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: b8ca0008a46ab1241757877d222c633e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 1232, Data length: 274, Offset + Data length: 1506} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:16 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 26c902957d082930, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:16 client Received first packet. Switching destination connection ID to: 26c902957d082930 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:16 client newly acked packets (1): [1] 2025/09/12 11:19:16 client updated RTT: 33.114801ms (σ: 16.5574ms) 2025/09/12 11:19:16 client setting loss timer for packet 0 (Initial) to 37.254151ms (in 2025-09-12 11:19:16.760222694 +0000 UTC m=+31.592365874) 2025/09/12 11:19:16 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:16.760222694 +0000 UTC m=+31.592365874 2025/09/12 11:19:16 client lost packet 0 (time threshold) 2025/09/12 11:19:16 client -> Sending packet 2 (1280 bytes) for connection b8ca0008a46ab1241757877d222c633e, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: 26c902957d082930, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:16 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 26c902957d082930, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:16 client newly acked packets (1): [2] 2025/09/12 11:19:16 client updated RTT: 33.24ms (σ: 12.67ms) 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:16 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:16 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 26c902957d082930, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/09/12 11:19:16 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b8ca0008a46ab1241757877d222c633e, InitialSourceConnectionID: 26c902957d082930, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xccbcdfc04e90d8989c40549de4eb39df, EnableResetStreamAt: false} 2025/09/12 11:19:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b8ca0008a46ab1241757877d222c633e 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: 26c902957d082930, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: 26c902957d082930, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:16 client Dropping Initial keys. 2025/09/12 11:19:16 client -> Sending packet 1 (40 bytes) for connection b8ca0008a46ab1241757877d222c633e, Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: 26c902957d082930, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:16 client -> Sending packet 0 (46 bytes) for connection b8ca0008a46ab1241757877d222c633e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: 26c902957d082930, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:16 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:16 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 26c902957d082930, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:16 client Peer doesn't await address validation any longer. 2025/09/12 11:19:16 client newly acked packets (1): [0] 2025/09/12 11:19:16 client Canceling loss detection timer. 2025/09/12 11:19:16 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:16 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:16 client -> Sending packet 1 (32 bytes) for connection b8ca0008a46ab1241757877d222c633e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:16 client Short Header{DestConnectionID: 26c902957d082930, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 157.553µs} 2025/09/12 11:19:16 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/09/12 11:19:16 client newly acked packets (1): [0] 2025/09/12 11:19:16 client updated RTT: 33.415ms (σ: 9.853ms) 2025/09/12 11:19:16 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:16 client Dropping Handshake keys. 2025/09/12 11:19:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:16 client <- &wire.NewTokenFrame{Token: 0xb705798d8011c06e0ddad57817184b68786ed9c86ed8e7d8acc21e6563c3b7e43ebc8c4da5} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: daece9b8b0c47df9, StatelessResetToken: 0x731605ea874574c388ca7c2c50b0b89c} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 53f20c267debca57, StatelessResetToken: 0x8f4f93ecb6dfd28d73ba65f7e6f9b222} 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a98db1f38baa152a, StatelessResetToken: 0x1cda96bb2275b7e24d9c31e7df9bd6df} 2025/09/12 11:19:16 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:16 client -> Sending packet 2 (34 bytes) for connection b8ca0008a46ab1241757877d222c633e, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:16 client Short Header{DestConnectionID: daece9b8b0c47df9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 119.752µs} 2025/09/12 11:19:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:16 client <- Reading packet 3 (53 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:16 client newly acked packets (1): [2] 2025/09/12 11:19:16 client updated RTT: 33.192ms (σ: 7.835ms) 2025/09/12 11:19:16 client Canceling loss detection timer. 2025/09/12 11:19:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 625587bd4f4d1e2a, StatelessResetToken: 0xb7719777894809a95b35357220c4206a} 2025/09/12 11:19:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:16 client Ignoring all packets below 2. 2025/09/12 11:19:16 client -> Sending packet 3 (32 bytes) for connection b8ca0008a46ab1241757877d222c633e, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:16 client Short Header{DestConnectionID: daece9b8b0c47df9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 141.844µs} 2025/09/12 11:19:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:16 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:16 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:16 client -> Sending packet 4 (34 bytes) for connection b8ca0008a46ab1241757877d222c633e, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:16 client Short Header{DestConnectionID: daece9b8b0c47df9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 102.05µs} 2025/09/12 11:19:16 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:16 client -> Sending packet 5 (30 bytes) for connection b8ca0008a46ab1241757877d222c633e, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:16 client Short Header{DestConnectionID: daece9b8b0c47df9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:16 client Connection b8ca0008a46ab1241757877d222c633e closed. 2025/09/12 11:19:16 Requesting https://server4:443/upcekuerdv. 2025/09/12 11:19:16 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:16 Increased send buffer size to 14336 kiB 2025/09/12 11:19:16 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:16 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:16 Created qlog file: /logs/qlog/ec963058a9a33a3af1bb6999e489.sqlog 2025/09/12 11:19:16 client Starting new connection to server4 ([::]:53317 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ec963058a9a33a3af1bb6999e489, version v1 2025/09/12 11:19:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:16 client -> Sending packet 0 (1280 bytes) for connection ec963058a9a33a3af1bb6999e489, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: ec963058a9a33a3af1bb6999e489, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:16 client -> Sending packet 1 (1280 bytes) for connection ec963058a9a33a3af1bb6999e489, Initial 2025/09/12 11:19:16 client Long Header{Type: Initial, DestConnectionID: ec963058a9a33a3af1bb6999e489, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:16 client -> &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/09/12 11:19:17 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d2d54aabbceb5ba, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:17 client Received first packet. Switching destination connection ID to: 3d2d54aabbceb5ba 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [1] 2025/09/12 11:19:17 client updated RTT: 33.108291ms (σ: 16.554145ms) 2025/09/12 11:19:17 client setting loss timer for packet 0 (Initial) to 37.246827ms (in 2025-09-12 11:19:17.019136403 +0000 UTC m=+31.851279573) 2025/09/12 11:19:17 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:17.019136403 +0000 UTC m=+31.851279573 2025/09/12 11:19:17 client lost packet 0 (time threshold) 2025/09/12 11:19:17 client -> Sending packet 2 (1280 bytes) for connection ec963058a9a33a3af1bb6999e489, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 3d2d54aabbceb5ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:17 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d2d54aabbceb5ba, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [2] 2025/09/12 11:19:17 client updated RTT: 33.226ms (σ: 12.651ms) 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:17 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:17 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3d2d54aabbceb5ba, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 11:19:17 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ec963058a9a33a3af1bb6999e489, InitialSourceConnectionID: 3d2d54aabbceb5ba, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x79be424f3e28b90d141b1e9e298fa567, EnableResetStreamAt: false} 2025/09/12 11:19:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ec963058a9a33a3af1bb6999e489 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 3d2d54aabbceb5ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: 3d2d54aabbceb5ba, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:17 client Dropping Initial keys. 2025/09/12 11:19:17 client -> Sending packet 1 (86 bytes) for connection ec963058a9a33a3af1bb6999e489, Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: 3d2d54aabbceb5ba, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Short Header{DestConnectionID: 3d2d54aabbceb5ba, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:17 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Peer doesn't await address validation any longer. 2025/09/12 11:19:17 client newly acked packets (1): [0] 2025/09/12 11:19:17 client updated RTT: 33.427ms (σ: 9.89ms) 2025/09/12 11:19:17 client Canceling loss detection timer. 2025/09/12 11:19:17 client Dropping Handshake keys. 2025/09/12 11:19:17 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:17 client <- &wire.NewTokenFrame{Token: 0xb74291f2db7d188aee3606ee55928d712b4893831f5cd6d372855d75e10d23aaa45b0437ae} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 649e0877d3fd6e35, StatelessResetToken: 0x6af6855095586e3b9346250e272a1b1c} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c8c39d68c597d0c4, StatelessResetToken: 0xa0ce4f25b96602738f62a9f1aae798d9} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0ffdeadceaa166a8, StatelessResetToken: 0x88f38c0c7f2ab5be13a0ebb11cdf50a7} 2025/09/12 11:19:17 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:17 client -> Sending packet 1 (34 bytes) for connection ec963058a9a33a3af1bb6999e489, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 649e0877d3fd6e35, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 159.817µs} 2025/09/12 11:19:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:17 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:17 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:17 client -> Sending packet 2 (30 bytes) for connection ec963058a9a33a3af1bb6999e489, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 649e0877d3fd6e35, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:17 client Connection ec963058a9a33a3af1bb6999e489 closed. 2025/09/12 11:19:17 Requesting https://server4:443/lpfnaoqtkz. 2025/09/12 11:19:17 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:17 Increased send buffer size to 14336 kiB 2025/09/12 11:19:17 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:17 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:17 Created qlog file: /logs/qlog/20771162910d03c119.sqlog 2025/09/12 11:19:17 client Starting new connection to server4 ([::]:50392 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 20771162910d03c119, version v1 2025/09/12 11:19:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:17 client -> Sending packet 0 (1280 bytes) for connection 20771162910d03c119, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 20771162910d03c119, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client -> Sending packet 1 (1280 bytes) for connection 20771162910d03c119, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 20771162910d03c119, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 1239, Data length: 273, Offset + Data length: 1512} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:17 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 994d868b9620f98b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:17 client Received first packet. Switching destination connection ID to: 994d868b9620f98b 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [1] 2025/09/12 11:19:17 client updated RTT: 33.105363ms (σ: 16.552681ms) 2025/09/12 11:19:17 client setting loss timer for packet 0 (Initial) to 37.243533ms (in 2025-09-12 11:19:17.128678542 +0000 UTC m=+31.960821722) 2025/09/12 11:19:17 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:17.128678542 +0000 UTC m=+31.960821722 2025/09/12 11:19:17 client lost packet 0 (time threshold) 2025/09/12 11:19:17 client -> Sending packet 2 (1280 bytes) for connection 20771162910d03c119, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 994d868b9620f98b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:17 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 994d868b9620f98b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [2] 2025/09/12 11:19:17 client updated RTT: 33.203ms (σ: 12.61ms) 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:17 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:17 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 994d868b9620f98b, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 11:19:17 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 20771162910d03c119, InitialSourceConnectionID: 994d868b9620f98b, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xcb2427556bc10f9f44340152cfbce7cf, EnableResetStreamAt: false} 2025/09/12 11:19:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 20771162910d03c119 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 994d868b9620f98b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: 994d868b9620f98b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:17 client Dropping Initial keys. 2025/09/12 11:19:17 client -> Sending packet 1 (86 bytes) for connection 20771162910d03c119, Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: 994d868b9620f98b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Short Header{DestConnectionID: 994d868b9620f98b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:17 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 994d868b9620f98b, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Peer doesn't await address validation any longer. 2025/09/12 11:19:17 client newly acked packets (1): [0] 2025/09/12 11:19:17 client Canceling loss detection timer. 2025/09/12 11:19:17 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:17 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:17 client -> Sending packet 1 (32 bytes) for connection 20771162910d03c119, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 994d868b9620f98b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 130.191µs} 2025/09/12 11:19:17 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/09/12 11:19:17 client newly acked packets (1): [0] 2025/09/12 11:19:17 client updated RTT: 33.418ms (σ: 9.888ms) 2025/09/12 11:19:17 client Dropping Handshake keys. 2025/09/12 11:19:17 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:17 client <- &wire.NewTokenFrame{Token: 0xb7a94a88c9e05912a40566c5856fde8d2ecbfc26d0dd3b6a9f876724c9ce1519ebb9d40a5a} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 29a49098983a0f93, StatelessResetToken: 0x1feea3d013432bc679452dcfd0b242c7} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 98e8cb6cdf9b4e39, StatelessResetToken: 0xb52a448e4a0dd211cbdb20c6b624ec4d} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22a446402533bfec, StatelessResetToken: 0x39bc664c544177bf37989532140e7229} 2025/09/12 11:19:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:17 client -> Sending packet 2 (34 bytes) for connection 20771162910d03c119, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 29a49098983a0f93, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 128.78µs} 2025/09/12 11:19:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:17 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:17 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:17 client -> Sending packet 3 (30 bytes) for connection 20771162910d03c119, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 29a49098983a0f93, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:17 client Connection 20771162910d03c119 closed. 2025/09/12 11:19:17 Requesting https://server4:443/wchdsnxxzr. 2025/09/12 11:19:17 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:17 Increased send buffer size to 14336 kiB 2025/09/12 11:19:17 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:17 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:17 Created qlog file: /logs/qlog/d556974854bf63f59a11f57456.sqlog 2025/09/12 11:19:17 client Starting new connection to server4 ([::]:54431 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d556974854bf63f59a11f57456, version v1 2025/09/12 11:19:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:17 client -> Sending packet 0 (1280 bytes) for connection d556974854bf63f59a11f57456, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: d556974854bf63f59a11f57456, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:19:17 client -> Sending packet 1 (1280 bytes) for connection d556974854bf63f59a11f57456, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: d556974854bf63f59a11f57456, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 11:19:17 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1302db3d32fcf2f7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:17 client Received first packet. Switching destination connection ID to: 1302db3d32fcf2f7 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [1] 2025/09/12 11:19:17 client updated RTT: 33.218964ms (σ: 16.609482ms) 2025/09/12 11:19:17 client setting loss timer for packet 0 (Initial) to 37.371334ms (in 2025-09-12 11:19:17.238291363 +0000 UTC m=+32.070434543) 2025/09/12 11:19:17 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:17.238291363 +0000 UTC m=+32.070434543 2025/09/12 11:19:17 client lost packet 0 (time threshold) 2025/09/12 11:19:17 client -> Sending packet 2 (1280 bytes) for connection d556974854bf63f59a11f57456, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 1302db3d32fcf2f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:17 client -> Sending packet 3 (1280 bytes) for connection d556974854bf63f59a11f57456, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 1302db3d32fcf2f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client -> Sending packet 4 (1280 bytes) for connection d556974854bf63f59a11f57456, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 1302db3d32fcf2f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:19:17 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1302db3d32fcf2f7, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [4] 2025/09/12 11:19:17 client updated RTT: 33.501ms (σ: 13.024ms) 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:17 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:19:17 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1302db3d32fcf2f7, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 11:19:17 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d556974854bf63f59a11f57456, InitialSourceConnectionID: 1302db3d32fcf2f7, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x524978ec065bdf0cd679989494396f67, EnableResetStreamAt: false} 2025/09/12 11:19:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d556974854bf63f59a11f57456 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 1302db3d32fcf2f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: 1302db3d32fcf2f7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:17 client Dropping Initial keys. 2025/09/12 11:19:17 client -> Sending packet 1 (40 bytes) for connection d556974854bf63f59a11f57456, Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: 1302db3d32fcf2f7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client -> Sending packet 0 (46 bytes) for connection d556974854bf63f59a11f57456, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 1302db3d32fcf2f7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:17 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/09/12 11:19:17 client Peer doesn't await address validation any longer. 2025/09/12 11:19:17 client newly acked packets (1): [0] 2025/09/12 11:19:17 client updated RTT: 33.629ms (σ: 10.025ms) 2025/09/12 11:19:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:17 client Canceling loss detection timer. 2025/09/12 11:19:17 client Dropping Handshake keys. 2025/09/12 11:19:17 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:17 client <- &wire.NewTokenFrame{Token: 0xb7fc67b241ae5f4fd867b8ea98e66d76bb9d5ac77e9523e197e7622cdeb083c1664d0a0cdf} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65fa6947abeab104, StatelessResetToken: 0xf8034fe3565bae6556d00912f52c6860} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ce3e60f0b69c5bc6, StatelessResetToken: 0x1e0380de8b8d3c80ea4629e82addc0eb} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4cb7cd20437f54d0, StatelessResetToken: 0x9de645ab3e5f0cc45fb490b4f2bfd40e} 2025/09/12 11:19:17 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:17 client -> Sending packet 1 (34 bytes) for connection d556974854bf63f59a11f57456, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 65fa6947abeab104, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 146.533µs} 2025/09/12 11:19:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:17 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:17 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:17 client -> Sending packet 2 (30 bytes) for connection d556974854bf63f59a11f57456, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 65fa6947abeab104, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:17 client Connection d556974854bf63f59a11f57456 closed. 2025/09/12 11:19:17 Requesting https://server4:443/hgkboaygcy. 2025/09/12 11:19:17 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:17 Increased send buffer size to 14336 kiB 2025/09/12 11:19:17 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:17 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:17 Created qlog file: /logs/qlog/97aabb77ff2fdfb29c12a744.sqlog 2025/09/12 11:19:17 client Starting new connection to server4 ([::]:37244 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 97aabb77ff2fdfb29c12a744, version v1 2025/09/12 11:19:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:17 client -> Sending packet 0 (1280 bytes) for connection 97aabb77ff2fdfb29c12a744, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 97aabb77ff2fdfb29c12a744, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client -> Sending packet 1 (1280 bytes) for connection 97aabb77ff2fdfb29c12a744, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 97aabb77ff2fdfb29c12a744, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 1236, Data length: 276, Offset + Data length: 1512} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:17 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4272c3588d6dc3fc, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:17 client Received first packet. Switching destination connection ID to: 4272c3588d6dc3fc 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [1] 2025/09/12 11:19:17 client updated RTT: 33.106562ms (σ: 16.553281ms) 2025/09/12 11:19:17 client setting loss timer for packet 0 (Initial) to 37.244882ms (in 2025-09-12 11:19:17.449471858 +0000 UTC m=+32.281615038) 2025/09/12 11:19:17 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:17.449471858 +0000 UTC m=+32.281615038 2025/09/12 11:19:17 client lost packet 0 (time threshold) 2025/09/12 11:19:17 client -> Sending packet 2 (1280 bytes) for connection 97aabb77ff2fdfb29c12a744, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 4272c3588d6dc3fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:17 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4272c3588d6dc3fc, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [2] 2025/09/12 11:19:17 client updated RTT: 33.233ms (σ: 12.669ms) 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:17 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:17 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4272c3588d6dc3fc, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 11:19:17 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 97aabb77ff2fdfb29c12a744, InitialSourceConnectionID: 4272c3588d6dc3fc, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa8ae7fad825dfbf1757072b29e3eb279, EnableResetStreamAt: false} 2025/09/12 11:19:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 97aabb77ff2fdfb29c12a744 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 4272c3588d6dc3fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: 4272c3588d6dc3fc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:17 client Dropping Initial keys. 2025/09/12 11:19:17 client -> Sending packet 1 (86 bytes) for connection 97aabb77ff2fdfb29c12a744, Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: 4272c3588d6dc3fc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Short Header{DestConnectionID: 4272c3588d6dc3fc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:17 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:17 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4272c3588d6dc3fc, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:17 client Peer doesn't await address validation any longer. 2025/09/12 11:19:17 client newly acked packets (1): [0] 2025/09/12 11:19:17 client Canceling loss detection timer. 2025/09/12 11:19:17 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:17 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:17 client -> Sending packet 1 (32 bytes) for connection 97aabb77ff2fdfb29c12a744, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:17 client Short Header{DestConnectionID: 4272c3588d6dc3fc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 133.778µs} 2025/09/12 11:19:17 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/09/12 11:19:17 client newly acked packets (1): [0] 2025/09/12 11:19:17 client updated RTT: 33.43ms (σ: 9.895ms) 2025/09/12 11:19:17 client Dropping Handshake keys. 2025/09/12 11:19:17 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:17 client <- &wire.NewTokenFrame{Token: 0xb77667e53f6a077a302c6fe05ad342dbb41900057b72bbf58f403482baf59bdcbccf22c931} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b6feafa3ce650f38, StatelessResetToken: 0x8e58c4889e37047bb62a2c89313fa4a7} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5fc3c1a1386d574d, StatelessResetToken: 0x58063028d18031e21daf33fa90bf8641} 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c631efc3e42743c2, StatelessResetToken: 0x1c063a78d05c5d02f57e7c910fa1234b} 2025/09/12 11:19:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:17 client -> Sending packet 2 (34 bytes) for connection 97aabb77ff2fdfb29c12a744, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:17 client Short Header{DestConnectionID: b6feafa3ce650f38, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 110.726µs} 2025/09/12 11:19:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:17 client <- Reading packet 3 (53 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [2] 2025/09/12 11:19:17 client updated RTT: 33.184ms (σ: 7.912ms) 2025/09/12 11:19:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:17 client Canceling loss detection timer. 2025/09/12 11:19:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8a741fd53e9ad638, StatelessResetToken: 0x739f52c79ab13f845318978f92372804} 2025/09/12 11:19:17 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:17 client Ignoring all packets below 2. 2025/09/12 11:19:17 client -> Sending packet 3 (32 bytes) for connection 97aabb77ff2fdfb29c12a744, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:17 client Short Header{DestConnectionID: b6feafa3ce650f38, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 109.434µs} 2025/09/12 11:19:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:17 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:17 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:17 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:17 client -> Sending packet 4 (34 bytes) for connection 97aabb77ff2fdfb29c12a744, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:17 client Short Header{DestConnectionID: b6feafa3ce650f38, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 104.034µs} 2025/09/12 11:19:17 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:17 client -> Sending packet 5 (30 bytes) for connection 97aabb77ff2fdfb29c12a744, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:17 client Short Header{DestConnectionID: b6feafa3ce650f38, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:17 client Connection 97aabb77ff2fdfb29c12a744 closed. 2025/09/12 11:19:17 Requesting https://server4:443/ugpilhwmbq. 2025/09/12 11:19:17 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:17 Increased send buffer size to 14336 kiB 2025/09/12 11:19:17 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:17 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:17 Created qlog file: /logs/qlog/2863ead597eb41ac46f6c41ac088c1d753de65.sqlog 2025/09/12 11:19:17 client Starting new connection to server4 ([::]:50672 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2863ead597eb41ac46f6c41ac088c1d753de65, version v1 2025/09/12 11:19:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:17 client -> Sending packet 0 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 2863ead597eb41ac46f6c41ac088c1d753de65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:17 client -> Sending packet 1 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 2863ead597eb41ac46f6c41ac088c1d753de65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 1229, Data length: 277, Offset + Data length: 1506} 2025/09/12 11:19:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:17 client -> Sending packet 2 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 2863ead597eb41ac46f6c41ac088c1d753de65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:17 client -> Sending packet 3 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: 2863ead597eb41ac46f6c41ac088c1d753de65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 1229, Data length: 277, Offset + Data length: 1506} 2025/09/12 11:19:17 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dded15e59a047a6d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:17 client Received first packet. Switching destination connection ID to: dded15e59a047a6d 2025/09/12 11:19:17 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 11:19:17 client newly acked packets (1): [3] 2025/09/12 11:19:17 client updated RTT: 33.329812ms (σ: 16.664906ms) 2025/09/12 11:19:17 client setting loss timer for packet 2 (Initial) to 37.496038ms (in 2025-09-12 11:19:17.914110449 +0000 UTC m=+32.746253639) 2025/09/12 11:19:17 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:17.914110449 +0000 UTC m=+32.746253639 2025/09/12 11:19:17 client lost packet 2 (time threshold) 2025/09/12 11:19:17 client -> Sending packet 4 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:17 client Long Header{Type: Initial, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 11:19:18 client -> Sending packet 5 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:18 client Long Header{Type: Initial, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:18 client -> Sending packet 6 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:18 client Long Header{Type: Initial, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 11:19:18 client -> Sending packet 7 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:18 client Long Header{Type: Initial, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:18 client -> Sending packet 8 (1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Initial 2025/09/12 11:19:18 client Long Header{Type: Initial, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 11:19:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:18 client <- Reading packet 2 (41 bytes) for connection (empty), Initial 2025/09/12 11:19:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dded15e59a047a6d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 11:19:18 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/09/12 11:19:19 client <- Reading packet 5 (129 bytes) for connection (empty), Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dded15e59a047a6d, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:19 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/09/12 11:19:19 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dded15e59a047a6d, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/09/12 11:19:19 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2863ead597eb41ac46f6c41ac088c1d753de65, InitialSourceConnectionID: dded15e59a047a6d, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2aa1f7bafebb309195ac9d05219e7148, EnableResetStreamAt: false} 2025/09/12 11:19:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:19 client Dropping Initial keys. 2025/09/12 11:19:19 client -> Sending packet 1 (86 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 11:19:19 client Short Header{DestConnectionID: dded15e59a047a6d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 11:19:19 client -> Sending packet 2 (90 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:19 client -> Sending packet 3 (90 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: dded15e59a047a6d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:19 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 101ms} 2025/09/12 11:19:19 client Peer doesn't await address validation any longer. 2025/09/12 11:19:19 client newly acked packets (1): [0] 2025/09/12 11:19:19 client updated RTT: 42.765ms (σ: 31.37ms) 2025/09/12 11:19:19 client Canceling loss detection timer. 2025/09/12 11:19:19 client Dropping Handshake keys. 2025/09/12 11:19:19 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:19 client <- &wire.NewTokenFrame{Token: 0xb7fb3b52bc664a8e7841949fb4a42307de7a8c287083a236198d9f5b7d6bb8060189a620ff} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e0786eafafe53616, StatelessResetToken: 0x50e8bf3d35ff3fdeabc1ee7a54f0454e} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec4bf37fc04e2834, StatelessResetToken: 0xd160eb0a2a194489f0c4413bfd0f9f3f} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 61dde6e47cb2eaef, StatelessResetToken: 0x787597301861a1fdba5c436133b857a6} 2025/09/12 11:19:19 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:19 client -> Sending packet 1 (34 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: e0786eafafe53616, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 177.63µs} 2025/09/12 11:19:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:19 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:19 client -> Sending packet 2 (30 bytes) for connection 2863ead597eb41ac46f6c41ac088c1d753de65, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: e0786eafafe53616, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:19 client Connection 2863ead597eb41ac46f6c41ac088c1d753de65 closed. 2025/09/12 11:19:19 Requesting https://server4:443/etevveeezy. 2025/09/12 11:19:19 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:19 Increased send buffer size to 14336 kiB 2025/09/12 11:19:19 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:19 Created qlog file: /logs/qlog/c29a35dc8838ace277cacfe47139.sqlog 2025/09/12 11:19:19 client Starting new connection to server4 ([::]:57196 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c29a35dc8838ace277cacfe47139, version v1 2025/09/12 11:19:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:19 client -> Sending packet 0 (1280 bytes) for connection c29a35dc8838ace277cacfe47139, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: c29a35dc8838ace277cacfe47139, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 client -> Sending packet 1 (1280 bytes) for connection c29a35dc8838ace277cacfe47139, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: c29a35dc8838ace277cacfe47139, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 1234, Data length: 270, Offset + Data length: 1504} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:19 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b0fd38b24987695c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:19 client Received first packet. Switching destination connection ID to: b0fd38b24987695c 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (1): [1] 2025/09/12 11:19:19 client updated RTT: 33.213936ms (σ: 16.606968ms) 2025/09/12 11:19:19 client setting loss timer for packet 0 (Initial) to 37.365678ms (in 2025-09-12 11:19:19.323090436 +0000 UTC m=+34.155233616) 2025/09/12 11:19:19 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:19.323090436 +0000 UTC m=+34.155233616 2025/09/12 11:19:19 client lost packet 0 (time threshold) 2025/09/12 11:19:19 client -> Sending packet 2 (1280 bytes) for connection c29a35dc8838ace277cacfe47139, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: b0fd38b24987695c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:19 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b0fd38b24987695c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (1): [2] 2025/09/12 11:19:19 client updated RTT: 33.339ms (σ: 12.707ms) 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:19 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:19 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b0fd38b24987695c, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 11:19:19 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c29a35dc8838ace277cacfe47139, InitialSourceConnectionID: b0fd38b24987695c, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x5f8af20a59ecb6d7b20153f26e77dd29, EnableResetStreamAt: false} 2025/09/12 11:19:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c29a35dc8838ace277cacfe47139 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: b0fd38b24987695c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: b0fd38b24987695c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:19 client Dropping Initial keys. 2025/09/12 11:19:19 client -> Sending packet 1 (40 bytes) for connection c29a35dc8838ace277cacfe47139, Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: b0fd38b24987695c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client -> Sending packet 0 (46 bytes) for connection c29a35dc8838ace277cacfe47139, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: b0fd38b24987695c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:19 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b0fd38b24987695c, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client Peer doesn't await address validation any longer. 2025/09/12 11:19:19 client newly acked packets (1): [0] 2025/09/12 11:19:19 client updated RTT: 33.429ms (σ: 9.711ms) 2025/09/12 11:19:19 client Canceling loss detection timer. 2025/09/12 11:19:19 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:19 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:19 client -> Sending packet 1 (32 bytes) for connection c29a35dc8838ace277cacfe47139, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: b0fd38b24987695c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 172.972µs} 2025/09/12 11:19:19 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (1): [0] 2025/09/12 11:19:19 client updated RTT: 33.571ms (σ: 7.568ms) 2025/09/12 11:19:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:19 client Dropping Handshake keys. 2025/09/12 11:19:19 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:19 client <- &wire.NewTokenFrame{Token: 0xb75abcaca30a9eb26d6cb4f8c1cffc5cc6616792f81d15ad339656e01f649edd8154d0e5a5} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05f17576584777db, StatelessResetToken: 0xb06c6a0ce1316b612ceac6514c0832e7} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99058f989f391be4, StatelessResetToken: 0x830e166923cd885004a122bf20e1a7ff} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 71391e762ceaf434, StatelessResetToken: 0x0668b10ec2dee4901001e23194c24e9b} 2025/09/12 11:19:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:19 client -> Sending packet 2 (34 bytes) for connection c29a35dc8838ace277cacfe47139, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:19 client Short Header{DestConnectionID: 05f17576584777db, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 130.783µs} 2025/09/12 11:19:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:19 client -> Sending packet 4 (29 bytes) for connection c29a35dc8838ace277cacfe47139, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:19 client Short Header{DestConnectionID: 05f17576584777db, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:19 client -> Sending packet 5 (29 bytes) for connection c29a35dc8838ace277cacfe47139, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:19 client Short Header{DestConnectionID: 05f17576584777db, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:19 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:19 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:19 client -> Sending packet 6 (34 bytes) for connection c29a35dc8838ace277cacfe47139, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:19 client Short Header{DestConnectionID: 05f17576584777db, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 84.126µs} 2025/09/12 11:19:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:19 client -> Sending packet 7 (30 bytes) for connection c29a35dc8838ace277cacfe47139, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:19 client Short Header{DestConnectionID: 05f17576584777db, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:19 client Connection c29a35dc8838ace277cacfe47139 closed. 2025/09/12 11:19:19 Requesting https://server4:443/bfxwwqlqlp. 2025/09/12 11:19:19 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:19 Increased send buffer size to 14336 kiB 2025/09/12 11:19:19 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:19 Created qlog file: /logs/qlog/ee9023720e0ad803d2d635cc4c1069ff43.sqlog 2025/09/12 11:19:19 client Starting new connection to server4 ([::]:59466 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ee9023720e0ad803d2d635cc4c1069ff43, version v1 2025/09/12 11:19:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:19 client -> Sending packet 0 (1280 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: ee9023720e0ad803d2d635cc4c1069ff43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 11:19:19 client -> Sending packet 1 (1280 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: ee9023720e0ad803d2d635cc4c1069ff43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 1231, Data length: 283, Offset + Data length: 1514} 2025/09/12 11:19:19 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f7f47d53f3e67df8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:19 client Received first packet. Switching destination connection ID to: f7f47d53f3e67df8 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (1): [1] 2025/09/12 11:19:19 client updated RTT: 33.072961ms (σ: 16.53648ms) 2025/09/12 11:19:19 client setting loss timer for packet 0 (Initial) to 37.207081ms (in 2025-09-12 11:19:19.56015716 +0000 UTC m=+34.392300340) 2025/09/12 11:19:19 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:19.56015716 +0000 UTC m=+34.392300340 2025/09/12 11:19:19 client lost packet 0 (time threshold) 2025/09/12 11:19:19 client -> Sending packet 2 (1280 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: f7f47d53f3e67df8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 11:19:19 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f7f47d53f3e67df8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (1): [2] 2025/09/12 11:19:19 client updated RTT: 33.2ms (σ: 12.659ms) 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:19 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 11:19:19 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7f47d53f3e67df8, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/09/12 11:19:19 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ee9023720e0ad803d2d635cc4c1069ff43, InitialSourceConnectionID: f7f47d53f3e67df8, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7ec1a3082152753aea3acc203280a1c6, EnableResetStreamAt: false} 2025/09/12 11:19:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: f7f47d53f3e67df8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: f7f47d53f3e67df8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:19 client Dropping Initial keys. 2025/09/12 11:19:19 client -> Sending packet 1 (40 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43, Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: f7f47d53f3e67df8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client -> Sending packet 0 (46 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: f7f47d53f3e67df8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/09/12 11:19:19 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7f47d53f3e67df8, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client Peer doesn't await address validation any longer. 2025/09/12 11:19:19 client newly acked packets (1): [0] 2025/09/12 11:19:19 client Canceling loss detection timer. 2025/09/12 11:19:19 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:19 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:19 client -> Sending packet 1 (32 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: f7f47d53f3e67df8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 120.484µs} 2025/09/12 11:19:19 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (1): [0] 2025/09/12 11:19:19 client updated RTT: 33.397ms (σ: 9.889ms) 2025/09/12 11:19:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:19 client Dropping Handshake keys. 2025/09/12 11:19:19 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:19 client <- &wire.NewTokenFrame{Token: 0xb7f35f2b59e6615dde3a7d88c7668e57d9e447103edba8873b0b9b9f0e8e4e4ba06e3afeb8} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c746fc88d4ccd21, StatelessResetToken: 0xe1903cd2164e1b8a0f7f77c35c22f732} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3e6ab042a3d53a9b, StatelessResetToken: 0xea6df34930ebaac1f045a180b67fdc18} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99a3e3afe7df0024, StatelessResetToken: 0xa0eb2e29d26eade07d623cfcf40eed29} 2025/09/12 11:19:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:19 client -> Sending packet 2 (34 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:19 client Short Header{DestConnectionID: 4c746fc88d4ccd21, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 124.562µs} 2025/09/12 11:19:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:19 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:19 client -> Sending packet 3 (30 bytes) for connection ee9023720e0ad803d2d635cc4c1069ff43, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:19 client Short Header{DestConnectionID: 4c746fc88d4ccd21, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:19 client Connection ee9023720e0ad803d2d635cc4c1069ff43 closed. 2025/09/12 11:19:19 Requesting https://server4:443/sktwplgpst. 2025/09/12 11:19:19 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:19 Increased send buffer size to 14336 kiB 2025/09/12 11:19:19 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:19 Created qlog file: /logs/qlog/c382076c510f7a3e.sqlog 2025/09/12 11:19:19 client Starting new connection to server4 ([::]:53834 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c382076c510f7a3e, version v1 2025/09/12 11:19:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:19 client -> Sending packet 0 (1280 bytes) for connection c382076c510f7a3e, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: c382076c510f7a3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:19 client -> Sending packet 1 (1280 bytes) for connection c382076c510f7a3e, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: c382076c510f7a3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:19 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b21f871398e0a060, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:19 client Received first packet. Switching destination connection ID to: b21f871398e0a060 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (1): [1] 2025/09/12 11:19:19 client updated RTT: 33.028511ms (σ: 16.514255ms) 2025/09/12 11:19:19 client setting loss timer for packet 0 (Initial) to 37.157074ms (in 2025-09-12 11:19:19.669732388 +0000 UTC m=+34.501875568) 2025/09/12 11:19:19 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:19.669732388 +0000 UTC m=+34.501875568 2025/09/12 11:19:19 client lost packet 0 (time threshold) 2025/09/12 11:19:19 client -> Sending packet 2 (1280 bytes) for connection c382076c510f7a3e, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: b21f871398e0a060, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:19 client -> Sending packet 3 (1280 bytes) for connection c382076c510f7a3e, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: b21f871398e0a060, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 client -> Sending packet 4 (1280 bytes) for connection c382076c510f7a3e, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: b21f871398e0a060, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:19:19 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b21f871398e0a060, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (1): [4] 2025/09/12 11:19:19 client updated RTT: 33.31ms (σ: 12.949ms) 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:19 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:19:19 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b21f871398e0a060, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/09/12 11:19:19 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c382076c510f7a3e, InitialSourceConnectionID: b21f871398e0a060, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa4c3009dbd43cbd63f5011e8ef624648, EnableResetStreamAt: false} 2025/09/12 11:19:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c382076c510f7a3e 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: b21f871398e0a060, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: b21f871398e0a060, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:19 client Dropping Initial keys. 2025/09/12 11:19:19 client -> Sending packet 1 (86 bytes) for connection c382076c510f7a3e, Handshake 2025/09/12 11:19:19 client Long Header{Type: Handshake, DestConnectionID: b21f871398e0a060, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:19 client Short Header{DestConnectionID: b21f871398e0a060, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:19 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:19 client Dropping Handshake keys. 2025/09/12 11:19:19 client <- &wire.NewTokenFrame{Token: 0xb70eb5dd02d6eb1fb6072017844923ea4af6a0847891ea89f48fa08eba37d3db260adcdaa4} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dfc1fb6a358a0e1a, StatelessResetToken: 0xfe1c9860a5a49667ab460a676959319f} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee5bd69b8543f4e4, StatelessResetToken: 0x3eb5f616635f6d7a1ffe22839d76f69f} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: aade4459f17ca472, StatelessResetToken: 0x87fd3aaa9ad9d8e947b58c0579714738} 2025/09/12 11:19:19 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:19 client -> Sending packet 1 (34 bytes) for connection c382076c510f7a3e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: dfc1fb6a358a0e1a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 114.753µs} 2025/09/12 11:19:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:19 client <- Reading packet 3 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:19 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:19 client -> Sending packet 2 (34 bytes) for connection c382076c510f7a3e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: dfc1fb6a358a0e1a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 118.291µs} 2025/09/12 11:19:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:19 client -> Sending packet 4 (46 bytes) for connection c382076c510f7a3e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: dfc1fb6a358a0e1a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:19 client Skipping packet number 3 2025/09/12 11:19:19 client -> Sending packet 5 (29 bytes) for connection c382076c510f7a3e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: dfc1fb6a358a0e1a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:19 client <- Reading packet 4 (46 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10ac24e92550d2cf, StatelessResetToken: 0x55b563db4dae807a762cf524ae9a7113} 2025/09/12 11:19:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:19 client <- Reading packet 5 (568 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/09/12 11:19:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 11:19:19 client -> Sending packet 6 (34 bytes) for connection c382076c510f7a3e, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:19 client Short Header{DestConnectionID: dfc1fb6a358a0e1a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 60.523µs} 2025/09/12 11:19:19 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:19 client newly acked packets (2): [4 5] 2025/09/12 11:19:19 client updated RTT: 33.199ms (σ: 9.931ms) 2025/09/12 11:19:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 11:19:19 client Canceling loss detection timer. 2025/09/12 11:19:19 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:19 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 11:19:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:19 client -> Sending packet 7 (30 bytes) for connection c382076c510f7a3e, 1-RTT (ECN: Not-ECT) 2025/09/12 11:19:19 client Short Header{DestConnectionID: dfc1fb6a358a0e1a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:19 client Connection c382076c510f7a3e closed. 2025/09/12 11:19:19 Requesting https://server4:443/kbijmtqvta. 2025/09/12 11:19:19 Increased receive buffer size to 14336 kiB 2025/09/12 11:19:19 Increased send buffer size to 14336 kiB 2025/09/12 11:19:19 Setting DF for IPv4 and IPv6. 2025/09/12 11:19:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 11:19:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 11:19:19 Created qlog file: /logs/qlog/fc62ec4f74b58b25ef.sqlog 2025/09/12 11:19:19 client Starting new connection to server4 ([::]:42340 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fc62ec4f74b58b25ef, version v1 2025/09/12 11:19:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 11:19:19 client -> Sending packet 0 (1280 bytes) for connection fc62ec4f74b58b25ef, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: fc62ec4f74b58b25ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:19 client -> Sending packet 1 (1280 bytes) for connection fc62ec4f74b58b25ef, Initial 2025/09/12 11:19:19 client Long Header{Type: Initial, DestConnectionID: fc62ec4f74b58b25ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 11:19:19 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 11:19:20 client <- Reading packet 0 (39 bytes) for connection (empty), Initial 2025/09/12 11:19:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 090ed10e619b8826, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 11:19:20 client Received first packet. Switching destination connection ID to: 090ed10e619b8826 2025/09/12 11:19:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 11:19:20 client newly acked packets (1): [1] 2025/09/12 11:19:20 client updated RTT: 33.082538ms (σ: 16.541269ms) 2025/09/12 11:19:20 client setting loss timer for packet 0 (Initial) to 37.217855ms (in 2025-09-12 11:19:20.022015838 +0000 UTC m=+34.854159018) 2025/09/12 11:19:20 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 11:19:20.022015838 +0000 UTC m=+34.854159018 2025/09/12 11:19:20 client lost packet 0 (time threshold) 2025/09/12 11:19:20 client -> Sending packet 2 (1280 bytes) for connection fc62ec4f74b58b25ef, Initial 2025/09/12 11:19:20 client Long Header{Type: Initial, DestConnectionID: 090ed10e619b8826, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 11:19:20 client -> Sending packet 3 (1280 bytes) for connection fc62ec4f74b58b25ef, Initial 2025/09/12 11:19:20 client Long Header{Type: Initial, DestConnectionID: 090ed10e619b8826, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:20 client -> Sending packet 4 (1280 bytes) for connection fc62ec4f74b58b25ef, Initial 2025/09/12 11:19:20 client Long Header{Type: Initial, DestConnectionID: 090ed10e619b8826, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 11:19:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 11:19:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 11:19:20 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 11:19:20 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 11:19:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 090ed10e619b8826, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 11:19:20 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 11:19:20 client newly acked packets (1): [4] 2025/09/12 11:19:20 client updated RTT: 33.307ms (σ: 12.856ms) 2025/09/12 11:19:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 11:19:20 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:20 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:20 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 11:19:20 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 11:19:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 090ed10e619b8826, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 11:19:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 11:19:20 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:20 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/09/12 11:19:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fc62ec4f74b58b25ef, InitialSourceConnectionID: 090ed10e619b8826, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xdda02b79e830058ae0889f6f5eaa4166, EnableResetStreamAt: false} 2025/09/12 11:19:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fc62ec4f74b58b25ef 2025/09/12 11:19:20 client Long Header{Type: Initial, DestConnectionID: 090ed10e619b8826, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 11:19:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:20 client Long Header{Type: Handshake, DestConnectionID: 090ed10e619b8826, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/09/12 11:19:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/09/12 11:19:20 client Dropping Initial keys. 2025/09/12 11:19:20 client -> Sending packet 1 (86 bytes) for connection fc62ec4f74b58b25ef, Handshake 2025/09/12 11:19:20 client Long Header{Type: Handshake, DestConnectionID: 090ed10e619b8826, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 11:19:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 11:19:20 client Short Header{DestConnectionID: 090ed10e619b8826, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:20 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:20 client <- &wire.HandshakeDoneFrame{} 2025/09/12 11:19:20 client Dropping Handshake keys. 2025/09/12 11:19:20 client <- &wire.NewTokenFrame{Token: 0xb709bb9fbeb058029d7121b0f41c8bcd9351920c2b99bbb78c9560056004ce441c372ef9e8} 2025/09/12 11:19:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ffabbcb9c89c158b, StatelessResetToken: 0xf1aa3db09faa14cded3a88231becf419} 2025/09/12 11:19:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0566081863b62cd7, StatelessResetToken: 0x94a1bb1b4bc14aa1937f04c01b854ffb} 2025/09/12 11:19:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2446603b7bd607e9, StatelessResetToken: 0xced8635934e3ad7730ddbd2974f2a948} 2025/09/12 11:19:20 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 11:19:20 client -> Sending packet 1 (34 bytes) for connection fc62ec4f74b58b25ef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:20 client Short Header{DestConnectionID: ffabbcb9c89c158b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 96.931µs} 2025/09/12 11:19:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 11:19:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 11:19:20 client -> Sending packet 3 (46 bytes) for connection fc62ec4f74b58b25ef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:20 client Short Header{DestConnectionID: ffabbcb9c89c158b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 11:19:20 client Skipping packet number 2 2025/09/12 11:19:20 client -> Sending packet 4 (29 bytes) for connection fc62ec4f74b58b25ef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:20 client Short Header{DestConnectionID: ffabbcb9c89c158b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 11:19:20 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 11:19:20 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 11:19:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 11:19:20 client Queuing ACK because there's a new missing packet to report. 2025/09/12 11:19:20 client -> Sending packet 5 (34 bytes) for connection fc62ec4f74b58b25ef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:20 client Short Header{DestConnectionID: ffabbcb9c89c158b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:20 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 100.867µs} 2025/09/12 11:19:20 client Closing connection with error: Application error 0x0 (local) 2025/09/12 11:19:20 client -> Sending packet 6 (30 bytes) for connection fc62ec4f74b58b25ef, 1-RTT (ECN: ECT(0)) 2025/09/12 11:19:20 client Short Header{DestConnectionID: ffabbcb9c89c158b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 11:19:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 11:19:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 11:19:20 client Connection fc62ec4f74b58b25ef closed.