2025/04/30 11:18:23 Requesting https://server4:443/owdlwygbqb. 2025/04/30 11:18:23 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:23 Increased send buffer size to 14336 kiB 2025/04/30 11:18:23 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:23 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:23 Created qlog file: /logs/qlog/3a2383a49e5ac11c65e85aa1fd0d5119.sqlog 2025/04/30 11:18:23 client Starting new connection to server4 ([::]:49466 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3a2383a49e5ac11c65e85aa1fd0d5119, version v1 2025/04/30 11:18:23 Adding connection ID (empty). 2025/04/30 11:18:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:23 client -> Sending packet 0 (1280 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119, Initial 2025/04/30 11:18:23 client Long Header{Type: Initial, DestConnectionID: 3a2383a49e5ac11c65e85aa1fd0d5119, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:23 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:23 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f64d50cf6d28c8af, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:23 client Received first packet. Switching destination connection ID to: f64d50cf6d28c8af 2025/04/30 11:18:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:23 client newly acked packets (1): [0] 2025/04/30 11:18:23 client updated RTT: 39.965831ms (σ: 19.982915ms) 2025/04/30 11:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:23 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:23 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:23 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:23 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f64d50cf6d28c8af, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 11:18:23 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:23 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3a2383a49e5ac11c65e85aa1fd0d5119, InitialSourceConnectionID: f64d50cf6d28c8af, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb14eef247d82e3db7cdb26e758adaf2b} 2025/04/30 11:18:23 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119 2025/04/30 11:18:23 client Long Header{Type: Initial, DestConnectionID: f64d50cf6d28c8af, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:23 client Long Header{Type: Handshake, DestConnectionID: f64d50cf6d28c8af, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:23 client Dropping Initial keys. 2025/04/30 11:18:23 client -> Sending packet 1 (86 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119, Handshake 2025/04/30 11:18:23 client Long Header{Type: Handshake, DestConnectionID: f64d50cf6d28c8af, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:23 client Short Header{DestConnectionID: f64d50cf6d28c8af, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:23 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:23 client -> Sending packet 2 (90 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119, Handshake 2025/04/30 11:18:23 client Long Header{Type: Handshake, DestConnectionID: f64d50cf6d28c8af, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:23 client -> Sending packet 3 (90 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119, Handshake 2025/04/30 11:18:23 client Long Header{Type: Handshake, DestConnectionID: f64d50cf6d28c8af, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:23 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 120ms} 2025/04/30 11:18:23 client Peer doesn't await address validation any longer. 2025/04/30 11:18:23 client newly acked packets (1): [0] 2025/04/30 11:18:23 client updated RTT: 51.065ms (σ: 37.188ms) 2025/04/30 11:18:23 client Canceling loss detection timer. 2025/04/30 11:18:23 client Dropping Handshake keys. 2025/04/30 11:18:23 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:23 client <- &wire.NewTokenFrame{Token: 0xb77a4c35b52f2b1c9ad37cae06c4f2378815fd476390cc87812a42d32e9ea7dd4b6df5efdb} 2025/04/30 11:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 62333d7ece56ef17, StatelessResetToken: 0x58d3dbb1c9a663341cb71917d045b105} 2025/04/30 11:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eea60c26675f8a1e, StatelessResetToken: 0x832be485420494593170ca8165d4356b} 2025/04/30 11:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e3f8219f5d887f10, StatelessResetToken: 0x1fd134d2a343559cf9bb56d803d6cec3} 2025/04/30 11:18:23 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:23 client -> Sending packet 1 (34 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:23 client Short Header{DestConnectionID: 62333d7ece56ef17, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:23 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 128.781µs} 2025/04/30 11:18:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:23 client <- Reading packet 3 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:23 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:23 client -> Sending packet 2 (34 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:23 client Short Header{DestConnectionID: 62333d7ece56ef17, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:23 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 95.529µs} 2025/04/30 11:18:23 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:23 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:23 client -> Sending packet 3 (36 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:23 client Short Header{DestConnectionID: 62333d7ece56ef17, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:23 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 105.137µs} 2025/04/30 11:18:23 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:23 client -> Sending packet 4 (30 bytes) for connection 3a2383a49e5ac11c65e85aa1fd0d5119, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:23 client Short Header{DestConnectionID: 62333d7ece56ef17, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:23 client Connection 3a2383a49e5ac11c65e85aa1fd0d5119 closed. 2025/04/30 11:18:23 Requesting https://server4:443/qcemfmelil. 2025/04/30 11:18:23 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:23 Increased send buffer size to 14336 kiB 2025/04/30 11:18:23 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:23 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:23 Created qlog file: /logs/qlog/9a622cd33260d0643993c848c2e8528cd690.sqlog 2025/04/30 11:18:23 client Starting new connection to server4 ([::]:47122 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9a622cd33260d0643993c848c2e8528cd690, version v1 2025/04/30 11:18:23 Adding connection ID (empty). 2025/04/30 11:18:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:23 client -> Sending packet 0 (1280 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Initial 2025/04/30 11:18:23 client Long Header{Type: Initial, DestConnectionID: 9a622cd33260d0643993c848c2e8528cd690, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:24 client -> Sending packet 1 (1280 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Initial 2025/04/30 11:18:24 client Long Header{Type: Initial, DestConnectionID: 9a622cd33260d0643993c848c2e8528cd690, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:24 client -> Sending packet 2 (1280 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Initial 2025/04/30 11:18:24 client Long Header{Type: Initial, DestConnectionID: 9a622cd33260d0643993c848c2e8528cd690, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:24 client -> Sending packet 3 (1280 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Initial 2025/04/30 11:18:24 client Long Header{Type: Initial, DestConnectionID: 9a622cd33260d0643993c848c2e8528cd690, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:24 client -> Sending packet 4 (1280 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Initial 2025/04/30 11:18:24 client Long Header{Type: Initial, DestConnectionID: 9a622cd33260d0643993c848c2e8528cd690, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:24 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b01302cda590ef6b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:24 client Received first packet. Switching destination connection ID to: b01302cda590ef6b 2025/04/30 11:18:24 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:24 client newly acked packets (1): [4] 2025/04/30 11:18:24 client updated RTT: 33.110158ms (σ: 16.555079ms) 2025/04/30 11:18:25 client -> Sending packet 5 (1280 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: b01302cda590ef6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:25 client -> &wire.PingFrame{} 2025/04/30 11:18:25 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b01302cda590ef6b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:25 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:25 client newly acked packets (1): [5] 2025/04/30 11:18:25 client updated RTT: 33.028ms (σ: 12.58ms) 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:25 client <- Reading packet 4 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b01302cda590ef6b, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:25 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:25 client <- Reading packet 1 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b01302cda590ef6b, PacketNumber: 1, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/04/30 11:18:25 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9a622cd33260d0643993c848c2e8528cd690, InitialSourceConnectionID: b01302cda590ef6b, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x49fd688864f241e9d0cb5b50ee39f1f3} 2025/04/30 11:18:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: b01302cda590ef6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: b01302cda590ef6b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:25 client Dropping Initial keys. 2025/04/30 11:18:25 client -> Sending packet 1 (40 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: b01302cda590ef6b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:25 client -> Sending packet 0 (46 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: b01302cda590ef6b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:25 client -> Sending packet 2 (90 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: b01302cda590ef6b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:25 client -> Sending packet 3 (90 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: b01302cda590ef6b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:25 client <- Reading packet 3 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b01302cda590ef6b, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:25 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:25 client Peer doesn't await address validation any longer. 2025/04/30 11:18:25 client newly acked packets (1): [3] 2025/04/30 11:18:25 client updated RTT: 32.976ms (σ: 9.538ms) 2025/04/30 11:18:25 client Canceling loss detection timer. 2025/04/30 11:18:25 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:25 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:25 client -> Sending packet 1 (32 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: b01302cda590ef6b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 114.024µs} 2025/04/30 11:18:25 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:25 client Dropping Handshake keys. 2025/04/30 11:18:25 client <- &wire.NewTokenFrame{Token: 0xb7182148db903d7acd2f0cb2339e8fae7eb385185c7e9e17154b7e1ff543de482b2413843f} 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 93d37bcce7d1cb2e, StatelessResetToken: 0x2ec6c73289f371ee54f4fede0c7d819c} 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f31c4eff099a9992, StatelessResetToken: 0x59ec5306d377880b28a706939ce9bc19} 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d0e1593d3657abd2, StatelessResetToken: 0xa7c2fe26c1b5577ff4c46398e806f607} 2025/04/30 11:18:25 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:25 client -> Sending packet 3 (53 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: 93d37bcce7d1cb2e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 121.548µs} 2025/04/30 11:18:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client -> Sending packet 4 (48 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: 93d37bcce7d1cb2e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client <- Reading packet 2 (53 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:25 client newly acked packets (1): [4] 2025/04/30 11:18:25 client updated RTT: 32.798ms (σ: 7.508ms) 2025/04/30 11:18:25 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:25 client Canceling loss detection timer. 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: eab0f045c24e1c34, StatelessResetToken: 0x208d3270d18f4fad44b9e22b14b2a17c} 2025/04/30 11:18:25 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:25 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:25 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:25 client -> Sending packet 5 (32 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:25 client Short Header{DestConnectionID: 93d37bcce7d1cb2e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 77.084µs} 2025/04/30 11:18:25 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:25 client -> Sending packet 6 (30 bytes) for connection 9a622cd33260d0643993c848c2e8528cd690, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:25 client Short Header{DestConnectionID: 93d37bcce7d1cb2e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:25 client Connection 9a622cd33260d0643993c848c2e8528cd690 closed. 2025/04/30 11:18:25 Requesting https://server4:443/orojkfvtwv. 2025/04/30 11:18:25 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:25 Increased send buffer size to 14336 kiB 2025/04/30 11:18:25 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:25 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:25 Created qlog file: /logs/qlog/be865e23e81a3cbb040b16e8.sqlog 2025/04/30 11:18:25 client Starting new connection to server4 ([::]:49484 -> 193.167.100.100:443), source connection ID (empty), destination connection ID be865e23e81a3cbb040b16e8, version v1 2025/04/30 11:18:25 Adding connection ID (empty). 2025/04/30 11:18:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:25 client -> Sending packet 0 (1280 bytes) for connection be865e23e81a3cbb040b16e8, Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: be865e23e81a3cbb040b16e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:25 client -> Sending packet 1 (1280 bytes) for connection be865e23e81a3cbb040b16e8, Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: be865e23e81a3cbb040b16e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:25 client -> Sending packet 2 (1280 bytes) for connection be865e23e81a3cbb040b16e8, Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: be865e23e81a3cbb040b16e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:25 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b89f95f9046ad914, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:25 client Received first packet. Switching destination connection ID to: b89f95f9046ad914 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:25 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:25 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b89f95f9046ad914, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:25 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b89f95f9046ad914, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 11:18:25 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: be865e23e81a3cbb040b16e8, InitialSourceConnectionID: b89f95f9046ad914, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa9773f51890101ec0ad31e705fe76f60} 2025/04/30 11:18:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection be865e23e81a3cbb040b16e8 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: b89f95f9046ad914, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: b89f95f9046ad914, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:25 client Dropping Initial keys. 2025/04/30 11:18:25 client -> Sending packet 1 (40 bytes) for connection be865e23e81a3cbb040b16e8, Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: b89f95f9046ad914, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:25 client -> Sending packet 0 (46 bytes) for connection be865e23e81a3cbb040b16e8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: b89f95f9046ad914, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:25 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b89f95f9046ad914, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:25 client Peer doesn't await address validation any longer. 2025/04/30 11:18:25 client newly acked packets (1): [0] 2025/04/30 11:18:25 client Canceling loss detection timer. 2025/04/30 11:18:25 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:25 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:25 client -> Sending packet 1 (32 bytes) for connection be865e23e81a3cbb040b16e8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: b89f95f9046ad914, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 128.07µs} 2025/04/30 11:18:25 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:25 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:25 client -> Sending packet 2 (34 bytes) for connection be865e23e81a3cbb040b16e8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: b89f95f9046ad914, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 69.871µs} 2025/04/30 11:18:25 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:25 client -> Sending packet 2 (69 bytes) for connection be865e23e81a3cbb040b16e8, Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: b89f95f9046ad914, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:25 client Short Header{DestConnectionID: b89f95f9046ad914, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:25 client Connection be865e23e81a3cbb040b16e8 closed. 2025/04/30 11:18:25 Requesting https://server4:443/mniosekxbd. 2025/04/30 11:18:25 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:25 Increased send buffer size to 14336 kiB 2025/04/30 11:18:25 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:25 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:25 Created qlog file: /logs/qlog/e18203c47eb5ac2ea3b53e1b.sqlog 2025/04/30 11:18:25 client Starting new connection to server4 ([::]:46328 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e18203c47eb5ac2ea3b53e1b, version v1 2025/04/30 11:18:25 Adding connection ID (empty). 2025/04/30 11:18:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:25 client -> Sending packet 0 (1280 bytes) for connection e18203c47eb5ac2ea3b53e1b, Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: e18203c47eb5ac2ea3b53e1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:25 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ab63b4b500fada11, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:25 client Received first packet. Switching destination connection ID to: ab63b4b500fada11 2025/04/30 11:18:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:25 client newly acked packets (1): [0] 2025/04/30 11:18:25 client updated RTT: 34.388188ms (σ: 17.194094ms) 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:25 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:25 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ab63b4b500fada11, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:18:25 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e18203c47eb5ac2ea3b53e1b, InitialSourceConnectionID: ab63b4b500fada11, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x74f9d2e0fda8a436a02705b7b9037314} 2025/04/30 11:18:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e18203c47eb5ac2ea3b53e1b 2025/04/30 11:18:25 client Long Header{Type: Initial, DestConnectionID: ab63b4b500fada11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: ab63b4b500fada11, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:25 client Dropping Initial keys. 2025/04/30 11:18:25 client -> Sending packet 1 (86 bytes) for connection e18203c47eb5ac2ea3b53e1b, Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: ab63b4b500fada11, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:25 client Short Header{DestConnectionID: ab63b4b500fada11, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:25 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ab63b4b500fada11, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:25 client Peer doesn't await address validation any longer. 2025/04/30 11:18:25 client newly acked packets (1): [0] 2025/04/30 11:18:25 client updated RTT: 34.322ms (σ: 13.027ms) 2025/04/30 11:18:25 client Canceling loss detection timer. 2025/04/30 11:18:25 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:25 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:25 client -> Sending packet 1 (32 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: ab63b4b500fada11, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 132.508µs} 2025/04/30 11:18:25 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:25 client Dropping Handshake keys. 2025/04/30 11:18:25 client <- &wire.NewTokenFrame{Token: 0xb775cd56327b988bfaba231d24b36702f7b1ac2e155444c75d203685ff449837cf3033adfe} 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: acceb68e2e35f512, StatelessResetToken: 0x91ba9387ec91008deb20372a8d48436e} 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 84b877a9022d705d, StatelessResetToken: 0x6f29bd30b6116f9efb189b3291c20e97} 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2d12bae903af5c91, StatelessResetToken: 0xf2a9ca90911b26300bf8e4cf1a713f48} 2025/04/30 11:18:25 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:25 client -> Sending packet 2 (34 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 161.623µs} 2025/04/30 11:18:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:25 client -> Sending packet 4 (46 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client Skipping packet number 3 2025/04/30 11:18:25 client -> Sending packet 5 (29 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:25 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d244fedb239899e7, StatelessResetToken: 0xd1a7f0f4f4a90f20616a88c8d059fad4} 2025/04/30 11:18:25 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:25 client -> Sending packet 6 (34 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 56.045µs} 2025/04/30 11:18:25 client <- Reading packet 4 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d244fedb239899e7, StatelessResetToken: 0xd1a7f0f4f4a90f20616a88c8d059fad4} 2025/04/30 11:18:25 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:25 client Sending ACK because the ACK timer expired. 2025/04/30 11:18:25 client -> Sending packet 7 (35 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.240235ms} 2025/04/30 11:18:25 client <- Reading packet 5 (26 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:25 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:25 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 4ms} 2025/04/30 11:18:25 client newly acked packets (1): [5] 2025/04/30 11:18:25 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:25 client lost packet 4 (time threshold) 2025/04/30 11:18:25 client Canceling loss detection timer. 2025/04/30 11:18:25 client -> Sending packet 8 (46 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:25 client -> Sending packet 10 (46 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client -> Sending packet 11 (46 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:25 client -> Sending packet 12 (1366 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:25 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:25 client -> &wire.PingFrame{} 2025/04/30 11:18:26 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:26 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:26 client newly acked packets (1): [11] 2025/04/30 11:18:26 client updated RTT: 34.031ms (σ: 10.352ms) 2025/04/30 11:18:26 client Canceling loss detection timer. 2025/04/30 11:18:26 client <- Reading packet 7 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:26 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 1, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 2ms} 2025/04/30 11:18:26 client newly acked packets (1): [12] 2025/04/30 11:18:26 client updated RTT: 33.794ms (σ: 8.236ms) 2025/04/30 11:18:26 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:26 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:26 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:26 client -> Sending packet 13 (30 bytes) for connection e18203c47eb5ac2ea3b53e1b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:26 client Short Header{DestConnectionID: acceb68e2e35f512, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:26 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:26 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:26 client Connection e18203c47eb5ac2ea3b53e1b closed. 2025/04/30 11:18:26 Requesting https://server4:443/dakvxcejqb. 2025/04/30 11:18:26 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:26 Increased send buffer size to 14336 kiB 2025/04/30 11:18:26 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:26 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:26 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:26 Created qlog file: /logs/qlog/87f66b6402d305e01db3.sqlog 2025/04/30 11:18:26 client Starting new connection to server4 ([::]:44868 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 87f66b6402d305e01db3, version v1 2025/04/30 11:18:26 Adding connection ID (empty). 2025/04/30 11:18:26 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:26 client -> Sending packet 0 (1280 bytes) for connection 87f66b6402d305e01db3, Initial 2025/04/30 11:18:26 client Long Header{Type: Initial, DestConnectionID: 87f66b6402d305e01db3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:26 client -> Sending packet 1 (1280 bytes) for connection 87f66b6402d305e01db3, Initial 2025/04/30 11:18:26 client Long Header{Type: Initial, DestConnectionID: 87f66b6402d305e01db3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:26 client -> Sending packet 2 (1280 bytes) for connection 87f66b6402d305e01db3, Initial 2025/04/30 11:18:26 client Long Header{Type: Initial, DestConnectionID: 87f66b6402d305e01db3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:26 client -> Sending packet 3 (1280 bytes) for connection 87f66b6402d305e01db3, Initial 2025/04/30 11:18:26 client Long Header{Type: Initial, DestConnectionID: 87f66b6402d305e01db3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:26 client -> Sending packet 4 (1280 bytes) for connection 87f66b6402d305e01db3, Initial 2025/04/30 11:18:26 client Long Header{Type: Initial, DestConnectionID: 87f66b6402d305e01db3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:27 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:27 client <- Reading packet 3 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 53b6290441f46b77, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:27 client Received first packet. Switching destination connection ID to: 53b6290441f46b77 2025/04/30 11:18:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:27 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:27 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:27 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:27 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 53b6290441f46b77, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 11:18:27 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:27 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 87f66b6402d305e01db3, InitialSourceConnectionID: 53b6290441f46b77, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x9aa1c0404c0aaefa833b50139387ce21} 2025/04/30 11:18:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 87f66b6402d305e01db3 2025/04/30 11:18:27 client Long Header{Type: Initial, DestConnectionID: 53b6290441f46b77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:27 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:18:27 client Long Header{Type: Handshake, DestConnectionID: 53b6290441f46b77, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:27 client Dropping Initial keys. 2025/04/30 11:18:27 client -> Sending packet 1 (40 bytes) for connection 87f66b6402d305e01db3, Handshake 2025/04/30 11:18:27 client Long Header{Type: Handshake, DestConnectionID: 53b6290441f46b77, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:27 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:27 client -> Sending packet 0 (46 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:27 client Short Header{DestConnectionID: 53b6290441f46b77, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:27 client <- Reading packet 2 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:27 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:27 client -> Sending packet 1 (32 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:27 client Short Header{DestConnectionID: 53b6290441f46b77, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:27 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 82.164µs} 2025/04/30 11:18:27 client <- Reading packet 4 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:27 client Dropping Handshake keys. 2025/04/30 11:18:27 client <- &wire.NewTokenFrame{Token: 0xb70cdf2f7fc26d6db5ab0b527cd5300eec451ef5b874b29a086ce9e5fb18b7e8f01c952bdc} 2025/04/30 11:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3c6fb39dce14f17b, StatelessResetToken: 0x918e72b5e0cf9d4f19f4a496337554ed} 2025/04/30 11:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 79a9567621a3f625, StatelessResetToken: 0x2de99be92b5450e6b0b05a2c7c25aa27} 2025/04/30 11:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7628fbe5a102b4e2, StatelessResetToken: 0xa6ed675350284f16798074af4f49c096} 2025/04/30 11:18:27 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:27 client -> Sending packet 2 (1366 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:27 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:27 client -> &wire.PingFrame{} 2025/04/30 11:18:27 client -> Sending packet 3 (36 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:27 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:27 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 173.345µs} 2025/04/30 11:18:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:27 client <- Reading packet 6 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:27 client <- &wire.NewTokenFrame{Token: 0xb70cdf2f7fc26d6db5ab0b527cd5300eec451ef5b874b29a086ce9e5fb18b7e8f01c952bdc} 2025/04/30 11:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3c6fb39dce14f17b, StatelessResetToken: 0x918e72b5e0cf9d4f19f4a496337554ed} 2025/04/30 11:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 79a9567621a3f625, StatelessResetToken: 0x2de99be92b5450e6b0b05a2c7c25aa27} 2025/04/30 11:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7628fbe5a102b4e2, StatelessResetToken: 0xa6ed675350284f16798074af4f49c096} 2025/04/30 11:18:27 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:27 client -> Sending packet 4 (36 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:27 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:27 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 102.372µs} 2025/04/30 11:18:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:27 client -> Sending packet 6 (46 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:27 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:27 client Skipping packet number 5 2025/04/30 11:18:27 client -> Sending packet 7 (29 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:27 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:28 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 11:18:28 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:18:28 client -> Sending packet 9 (46 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client Skipping packet number 8 2025/04/30 11:18:28 client -> Sending packet 10 (29 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:28 client <- Reading packet 8 (55 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:28 client newly acked packets (2): [2 10] 2025/04/30 11:18:28 client updated RTT: 31.603397ms (σ: 15.801698ms) 2025/04/30 11:18:28 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:28 client setting loss timer for packet 9 (1-RTT) to 35.553821ms (in 2025-04-30 11:18:28.085598382 +0000 UTC m=+4.469190891) 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4daf37626e109425, StatelessResetToken: 0x586f1bfe4ad1be706a0321057df11295} 2025/04/30 11:18:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:28 client -> Sending packet 11 (1409 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.PingFrame{} 2025/04/30 11:18:28 client -> Sending packet 12 (38 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 186.52µs} 2025/04/30 11:18:28 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:18:28.085598382 +0000 UTC m=+4.469190891 2025/04/30 11:18:28 client lost packet 9 (time threshold) 2025/04/30 11:18:28 client Canceling loss detection timer. 2025/04/30 11:18:28 client -> Sending packet 13 (46 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:28 client -> Sending packet 15 (46 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client -> Sending packet 16 (46 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client <- Reading packet 12 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:28 client -> Sending packet 17 (40 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 70.092µs} 2025/04/30 11:18:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:28 client -> Sending packet 18 (30 bytes) for connection 87f66b6402d305e01db3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 3c6fb39dce14f17b, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:28 client Connection 87f66b6402d305e01db3 closed. 2025/04/30 11:18:28 Requesting https://server4:443/dxmokiydha. 2025/04/30 11:18:28 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:28 Increased send buffer size to 14336 kiB 2025/04/30 11:18:28 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:28 Created qlog file: /logs/qlog/da9e8bb3e28d051a1625b22d4c.sqlog 2025/04/30 11:18:28 client Starting new connection to server4 ([::]:38390 -> 193.167.100.100:443), source connection ID (empty), destination connection ID da9e8bb3e28d051a1625b22d4c, version v1 2025/04/30 11:18:28 Adding connection ID (empty). 2025/04/30 11:18:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:28 client -> Sending packet 0 (1280 bytes) for connection da9e8bb3e28d051a1625b22d4c, Initial 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: da9e8bb3e28d051a1625b22d4c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:18:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:28 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:28 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1aaeda94ba2f04eb, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:28 client Received first packet. Switching destination connection ID to: 1aaeda94ba2f04eb 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:28 client newly acked packets (1): [0] 2025/04/30 11:18:28 client updated RTT: 34.580269ms (σ: 17.290134ms) 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:28 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:28 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1aaeda94ba2f04eb, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 11:18:28 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: da9e8bb3e28d051a1625b22d4c, InitialSourceConnectionID: 1aaeda94ba2f04eb, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x837c69c1a40feeb88c2d41d813c4146a} 2025/04/30 11:18:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection da9e8bb3e28d051a1625b22d4c 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: 1aaeda94ba2f04eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: 1aaeda94ba2f04eb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:28 client Dropping Initial keys. 2025/04/30 11:18:28 client -> Sending packet 1 (40 bytes) for connection da9e8bb3e28d051a1625b22d4c, Handshake 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: 1aaeda94ba2f04eb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:28 client -> Sending packet 0 (46 bytes) for connection da9e8bb3e28d051a1625b22d4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 1aaeda94ba2f04eb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:28 client Dropping Handshake keys. 2025/04/30 11:18:28 client <- &wire.NewTokenFrame{Token: 0xb7df0f56844dc8fc47397c2993b017a0df839e2db93f86d977a5d40be565efd3427296e685} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7f5434ab76d558a0, StatelessResetToken: 0x3b091ac76d89204d024cc1c8e7105c4f} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0b9aaa09f7b4e7b1, StatelessResetToken: 0x00fffdb1f1e057fcd586905ff23164ba} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f2be8f8be8a6a3bd, StatelessResetToken: 0x28d287cd79d463d8c6207f0ab96672a8} 2025/04/30 11:18:28 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:28 client -> Sending packet 1 (34 bytes) for connection da9e8bb3e28d051a1625b22d4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 7f5434ab76d558a0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 95.068µs} 2025/04/30 11:18:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:28 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:28 client newly acked packets (1): [1] 2025/04/30 11:18:28 client updated RTT: 34.184ms (σ: 13.757ms) 2025/04/30 11:18:28 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:28 client lost packet 0 (time threshold) 2025/04/30 11:18:28 client Canceling loss detection timer. 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3c59a1f4136f04d6, StatelessResetToken: 0x5506142a64b38635cb2acfe5c04c63cc} 2025/04/30 11:18:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:28 client Ignoring all packets below 2. 2025/04/30 11:18:28 client -> Sending packet 2 (51 bytes) for connection da9e8bb3e28d051a1625b22d4c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 7f5434ab76d558a0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 120.225µs} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client <- Reading packet 3 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:28 client Sending ACK because the ACK timer expired. 2025/04/30 11:18:28 client -> Sending packet 3 (33 bytes) for connection da9e8bb3e28d051a1625b22d4c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 7f5434ab76d558a0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.257824ms} 2025/04/30 11:18:28 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:28 client -> Sending packet 5 (46 bytes) for connection da9e8bb3e28d051a1625b22d4c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 7f5434ab76d558a0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client -> Sending packet 6 (46 bytes) for connection da9e8bb3e28d051a1625b22d4c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 7f5434ab76d558a0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client <- Reading packet 4 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 1ms} 2025/04/30 11:18:28 client newly acked packets (1): [6] 2025/04/30 11:18:28 client updated RTT: 33.951ms (σ: 10.783ms) 2025/04/30 11:18:28 client Canceling loss detection timer. 2025/04/30 11:18:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:28 client -> Sending packet 7 (1366 bytes) for connection da9e8bb3e28d051a1625b22d4c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 7f5434ab76d558a0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.PingFrame{} 2025/04/30 11:18:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:28 client -> Sending packet 8 (30 bytes) for connection da9e8bb3e28d051a1625b22d4c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 7f5434ab76d558a0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:28 client Connection da9e8bb3e28d051a1625b22d4c closed. 2025/04/30 11:18:28 Requesting https://server4:443/jebifnezpw. 2025/04/30 11:18:28 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:28 Increased send buffer size to 14336 kiB 2025/04/30 11:18:28 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:28 Created qlog file: /logs/qlog/26ade16d2d068f6d.sqlog 2025/04/30 11:18:28 client Starting new connection to server4 ([::]:45824 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 26ade16d2d068f6d, version v1 2025/04/30 11:18:28 Adding connection ID (empty). 2025/04/30 11:18:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:28 client -> Sending packet 0 (1280 bytes) for connection 26ade16d2d068f6d, Initial 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: 26ade16d2d068f6d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:18:28 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:28 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 99cfb692da2e06a5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:28 client Received first packet. Switching destination connection ID to: 99cfb692da2e06a5 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:28 client newly acked packets (1): [0] 2025/04/30 11:18:28 client updated RTT: 34.749185ms (σ: 17.374592ms) 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:28 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:28 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 99cfb692da2e06a5, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 11:18:28 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 26ade16d2d068f6d, InitialSourceConnectionID: 99cfb692da2e06a5, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x0912f69e58519c5982b965849d860cec} 2025/04/30 11:18:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 26ade16d2d068f6d 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: 99cfb692da2e06a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: 99cfb692da2e06a5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:28 client Dropping Initial keys. 2025/04/30 11:18:28 client -> Sending packet 1 (40 bytes) for connection 26ade16d2d068f6d, Handshake 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: 99cfb692da2e06a5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:28 client -> Sending packet 0 (46 bytes) for connection 26ade16d2d068f6d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 99cfb692da2e06a5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:28 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 99cfb692da2e06a5, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:28 client Peer doesn't await address validation any longer. 2025/04/30 11:18:28 client newly acked packets (1): [0] 2025/04/30 11:18:28 client updated RTT: 34.626ms (σ: 13.276ms) 2025/04/30 11:18:28 client Canceling loss detection timer. 2025/04/30 11:18:28 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:28 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:28 client -> Sending packet 1 (32 bytes) for connection 26ade16d2d068f6d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 99cfb692da2e06a5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 157.345µs} 2025/04/30 11:18:28 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 11:18:28 client newly acked packets (1): [0] 2025/04/30 11:18:28 client updated RTT: 34.595ms (σ: 10.017ms) 2025/04/30 11:18:28 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:28 client Dropping Handshake keys. 2025/04/30 11:18:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:28 client <- &wire.NewTokenFrame{Token: 0xb7218c0bedd9cd6d5c7cb7e7a2ee90e8f59569431cf3c17ef1cb35dc37d5a189b581fad026} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 053d783e0925be4b, StatelessResetToken: 0xa1f5ec6ab8e9a079acd5628b038d7b07} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99eea8c8bb8ebf34, StatelessResetToken: 0x658c17757d68b042506a61939d3b311e} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cc7e50d23406e9fd, StatelessResetToken: 0x6b63dadd72866209a31fd22cc4c8abc4} 2025/04/30 11:18:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:28 client -> Sending packet 2 (34 bytes) for connection 26ade16d2d068f6d, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 053d783e0925be4b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 145.824µs} 2025/04/30 11:18:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:28 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:28 client newly acked packets (1): [2] 2025/04/30 11:18:28 client updated RTT: 34.197ms (σ: 8.307ms) 2025/04/30 11:18:28 client Canceling loss detection timer. 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bc0296c4941ff817, StatelessResetToken: 0x74d8e15ca6b655d01a257a6fc8078656} 2025/04/30 11:18:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:28 client Ignoring all packets below 2. 2025/04/30 11:18:28 client -> Sending packet 3 (32 bytes) for connection 26ade16d2d068f6d, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 053d783e0925be4b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 104.346µs} 2025/04/30 11:18:28 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:28 client -> Sending packet 4 (34 bytes) for connection 26ade16d2d068f6d, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 053d783e0925be4b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 77.635µs} 2025/04/30 11:18:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:28 client -> Sending packet 5 (30 bytes) for connection 26ade16d2d068f6d, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 053d783e0925be4b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:28 client Connection 26ade16d2d068f6d closed. 2025/04/30 11:18:28 Requesting https://server4:443/agxswyhmzl. 2025/04/30 11:18:28 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:28 Increased send buffer size to 14336 kiB 2025/04/30 11:18:28 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:28 Created qlog file: /logs/qlog/43054a76063bf3b1153b.sqlog 2025/04/30 11:18:28 client Starting new connection to server4 ([::]:49185 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 43054a76063bf3b1153b, version v1 2025/04/30 11:18:28 Adding connection ID (empty). 2025/04/30 11:18:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:28 client -> Sending packet 0 (1280 bytes) for connection 43054a76063bf3b1153b, Initial 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: 43054a76063bf3b1153b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:28 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:28 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83952b8502ed08b2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:28 client Received first packet. Switching destination connection ID to: 83952b8502ed08b2 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:28 client newly acked packets (1): [0] 2025/04/30 11:18:28 client updated RTT: 34.501967ms (σ: 17.250983ms) 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:28 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:28 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83952b8502ed08b2, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 11:18:28 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 43054a76063bf3b1153b, InitialSourceConnectionID: 83952b8502ed08b2, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7a4cae932a731b1f2b144671504e61e0} 2025/04/30 11:18:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 43054a76063bf3b1153b 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: 83952b8502ed08b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: 83952b8502ed08b2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:28 client Dropping Initial keys. 2025/04/30 11:18:28 client -> Sending packet 1 (40 bytes) for connection 43054a76063bf3b1153b, Handshake 2025/04/30 11:18:28 client Long Header{Type: Handshake, DestConnectionID: 83952b8502ed08b2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:28 client -> Sending packet 0 (46 bytes) for connection 43054a76063bf3b1153b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 83952b8502ed08b2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:28 client Dropping Handshake keys. 2025/04/30 11:18:28 client <- &wire.NewTokenFrame{Token: 0xb7184c77301bf66d0e3d26395ee854c8b3a48d9b22f491c9bfaacf819b732f4fecf53cc307} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2083cc27c37f6001, StatelessResetToken: 0xc1a0aeb7bef27d4e6c0bf9dc00a81e9b} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 78f3320efa5c6c7d, StatelessResetToken: 0x699a681b806aa944101b65aacbfd03b8} 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bc08ed9cd907115c, StatelessResetToken: 0xd1dc6999c628acefd190afa0074e80f0} 2025/04/30 11:18:28 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:28 client -> Sending packet 1 (34 bytes) for connection 43054a76063bf3b1153b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 2083cc27c37f6001, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 133.511µs} 2025/04/30 11:18:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:28 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:28 client newly acked packets (1): [1] 2025/04/30 11:18:28 client updated RTT: 34.133ms (σ: 13.672ms) 2025/04/30 11:18:28 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:28 client lost packet 0 (time threshold) 2025/04/30 11:18:28 client Canceling loss detection timer. 2025/04/30 11:18:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 43b80b9e8b2ee4c8, StatelessResetToken: 0xf21e72132d63161403643f2fdc0161a6} 2025/04/30 11:18:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:28 client Ignoring all packets below 2. 2025/04/30 11:18:28 client -> Sending packet 2 (51 bytes) for connection 43054a76063bf3b1153b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 2083cc27c37f6001, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 133.24µs} 2025/04/30 11:18:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:28 client <- Reading packet 5 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:28 client -> Sending packet 3 (34 bytes) for connection 43054a76063bf3b1153b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 2083cc27c37f6001, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 104.326µs} 2025/04/30 11:18:28 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:28 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:28 client -> Sending packet 4 (30 bytes) for connection 43054a76063bf3b1153b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:28 client Short Header{DestConnectionID: 2083cc27c37f6001, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:28 client Connection 43054a76063bf3b1153b closed. 2025/04/30 11:18:28 Requesting https://server4:443/cqhevbwlap. 2025/04/30 11:18:28 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:28 Increased send buffer size to 14336 kiB 2025/04/30 11:18:28 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:28 Created qlog file: /logs/qlog/df1b72f3d17c8d602d98969727340b45.sqlog 2025/04/30 11:18:28 client Starting new connection to server4 ([::]:37902 -> 193.167.100.100:443), source connection ID (empty), destination connection ID df1b72f3d17c8d602d98969727340b45, version v1 2025/04/30 11:18:28 Adding connection ID (empty). 2025/04/30 11:18:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:28 client -> Sending packet 0 (1280 bytes) for connection df1b72f3d17c8d602d98969727340b45, Initial 2025/04/30 11:18:28 client Long Header{Type: Initial, DestConnectionID: df1b72f3d17c8d602d98969727340b45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:18:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:28 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:29 client -> Sending packet 1 (1280 bytes) for connection df1b72f3d17c8d602d98969727340b45, Initial 2025/04/30 11:18:29 client Long Header{Type: Initial, DestConnectionID: df1b72f3d17c8d602d98969727340b45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:18:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:29 client -> Sending packet 2 (1280 bytes) for connection df1b72f3d17c8d602d98969727340b45, Initial 2025/04/30 11:18:29 client Long Header{Type: Initial, DestConnectionID: df1b72f3d17c8d602d98969727340b45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:18:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:29 client -> Sending packet 3 (1280 bytes) for connection df1b72f3d17c8d602d98969727340b45, Initial 2025/04/30 11:18:29 client Long Header{Type: Initial, DestConnectionID: df1b72f3d17c8d602d98969727340b45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:18:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:29 client -> Sending packet 4 (1280 bytes) for connection df1b72f3d17c8d602d98969727340b45, Initial 2025/04/30 11:18:29 client Long Header{Type: Initial, DestConnectionID: df1b72f3d17c8d602d98969727340b45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:18:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:30 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:30 client <- Reading packet 2 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1d3d1664a2e65e2f, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:30 client Received first packet. Switching destination connection ID to: 1d3d1664a2e65e2f 2025/04/30 11:18:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:30 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:30 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:30 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:30 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1d3d1664a2e65e2f, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/04/30 11:18:30 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:30 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: df1b72f3d17c8d602d98969727340b45, InitialSourceConnectionID: 1d3d1664a2e65e2f, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x09ce902e317983281e5560455e4932f4} 2025/04/30 11:18:30 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection df1b72f3d17c8d602d98969727340b45 2025/04/30 11:18:30 client Long Header{Type: Initial, DestConnectionID: 1d3d1664a2e65e2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:30 client Long Header{Type: Handshake, DestConnectionID: 1d3d1664a2e65e2f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:30 client Dropping Initial keys. 2025/04/30 11:18:30 client -> Sending packet 1 (40 bytes) for connection df1b72f3d17c8d602d98969727340b45, Handshake 2025/04/30 11:18:30 client Long Header{Type: Handshake, DestConnectionID: 1d3d1664a2e65e2f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:30 client -> Sending packet 0 (46 bytes) for connection df1b72f3d17c8d602d98969727340b45, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:30 client Short Header{DestConnectionID: 1d3d1664a2e65e2f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:30 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:30 client <- Reading packet 3 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1d3d1664a2e65e2f, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:30 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:30 client Peer doesn't await address validation any longer. 2025/04/30 11:18:30 client newly acked packets (1): [0] 2025/04/30 11:18:30 client Canceling loss detection timer. 2025/04/30 11:18:30 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:30 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:30 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:30 client -> Sending packet 1 (32 bytes) for connection df1b72f3d17c8d602d98969727340b45, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:30 client Short Header{DestConnectionID: 1d3d1664a2e65e2f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 145.483µs} 2025/04/30 11:18:30 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:30 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:30 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:30 client Dropping Handshake keys. 2025/04/30 11:18:30 client <- &wire.NewTokenFrame{Token: 0xb7db25ff6093a210a40c48def18aa16367aa51fac93d8c6aff53f0d90f6c34287b9e375241} 2025/04/30 11:18:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1a476257aa7868dc, StatelessResetToken: 0xeb2c0d2a84b8aaa40aac1702546ea940} 2025/04/30 11:18:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6e1e51e03fdce311, StatelessResetToken: 0x3077159ad53890a3d8c4e98ef81142ec} 2025/04/30 11:18:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b982189ef193d60d, StatelessResetToken: 0x169957407db78900d7f12ae5eb9f6eae} 2025/04/30 11:18:30 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:30 client -> Sending packet 2 (1366 bytes) for connection df1b72f3d17c8d602d98969727340b45, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:30 client Short Header{DestConnectionID: 1a476257aa7868dc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.PingFrame{} 2025/04/30 11:18:30 client -> Sending packet 3 (36 bytes) for connection df1b72f3d17c8d602d98969727340b45, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:30 client Short Header{DestConnectionID: 1a476257aa7868dc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 210.786µs} 2025/04/30 11:18:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:30 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:30 client <- Reading packet 7 (1074 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:30 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ccfcb012f8616087, StatelessResetToken: 0x8cac3e949730bed4d0296eb7c54420d5} 2025/04/30 11:18:30 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:30 client -> Sending packet 4 (36 bytes) for connection df1b72f3d17c8d602d98969727340b45, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:30 client Short Header{DestConnectionID: 1a476257aa7868dc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 104.125µs} 2025/04/30 11:18:30 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:30 client -> Sending packet 5 (30 bytes) for connection df1b72f3d17c8d602d98969727340b45, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:30 client Short Header{DestConnectionID: 1a476257aa7868dc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:30 client Connection df1b72f3d17c8d602d98969727340b45 closed. 2025/04/30 11:18:30 Requesting https://server4:443/zjsamaruov. 2025/04/30 11:18:30 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:30 Increased send buffer size to 14336 kiB 2025/04/30 11:18:30 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:30 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:30 Created qlog file: /logs/qlog/c311a0c4928357264b683f44e79309c5340f.sqlog 2025/04/30 11:18:30 client Starting new connection to server4 ([::]:50396 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c311a0c4928357264b683f44e79309c5340f, version v1 2025/04/30 11:18:30 Adding connection ID (empty). 2025/04/30 11:18:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:30 client -> Sending packet 0 (1280 bytes) for connection c311a0c4928357264b683f44e79309c5340f, Initial 2025/04/30 11:18:30 client Long Header{Type: Initial, DestConnectionID: c311a0c4928357264b683f44e79309c5340f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:18:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:30 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:30 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8e8ee05804d447c1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:30 client Received first packet. Switching destination connection ID to: 8e8ee05804d447c1 2025/04/30 11:18:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:30 client newly acked packets (1): [0] 2025/04/30 11:18:30 client updated RTT: 34.602884ms (σ: 17.301442ms) 2025/04/30 11:18:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:30 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:30 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:30 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:30 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8e8ee05804d447c1, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/04/30 11:18:30 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:30 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c311a0c4928357264b683f44e79309c5340f, InitialSourceConnectionID: 8e8ee05804d447c1, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa1bf05c052e380c0817c3694d04ac520} 2025/04/30 11:18:30 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c311a0c4928357264b683f44e79309c5340f 2025/04/30 11:18:30 client Long Header{Type: Initial, DestConnectionID: 8e8ee05804d447c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:30 client Long Header{Type: Handshake, DestConnectionID: 8e8ee05804d447c1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:30 client Dropping Initial keys. 2025/04/30 11:18:30 client -> Sending packet 1 (40 bytes) for connection c311a0c4928357264b683f44e79309c5340f, Handshake 2025/04/30 11:18:30 client Long Header{Type: Handshake, DestConnectionID: 8e8ee05804d447c1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:30 client -> Sending packet 0 (46 bytes) for connection c311a0c4928357264b683f44e79309c5340f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:30 client Short Header{DestConnectionID: 8e8ee05804d447c1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:30 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:30 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8e8ee05804d447c1, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:30 client Peer doesn't await address validation any longer. 2025/04/30 11:18:30 client newly acked packets (1): [0] 2025/04/30 11:18:30 client updated RTT: 34.502ms (σ: 13.174ms) 2025/04/30 11:18:30 client Canceling loss detection timer. 2025/04/30 11:18:30 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:30 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:30 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:30 client -> Sending packet 1 (32 bytes) for connection c311a0c4928357264b683f44e79309c5340f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:30 client Short Header{DestConnectionID: 8e8ee05804d447c1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 204.284µs} 2025/04/30 11:18:30 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:30 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 11:18:30 client newly acked packets (1): [0] 2025/04/30 11:18:30 client updated RTT: 34.492ms (σ: 9.899ms) 2025/04/30 11:18:30 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:30 client Dropping Handshake keys. 2025/04/30 11:18:30 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:30 client <- &wire.NewTokenFrame{Token: 0xb783479a523e8c1a8cfca3229b45a986fb4c01fe02f5d12d978a652f5a027adbb092786145} 2025/04/30 11:18:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff8f1488bd4816c3, StatelessResetToken: 0xe6f615c7705fd7c1c69385b8d5dac0a0} 2025/04/30 11:18:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b15afd20ee27af20, StatelessResetToken: 0xe6c4ae065c2eb03577742b576e75e182} 2025/04/30 11:18:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d5bbeef209f2de80, StatelessResetToken: 0x76094dc3323ec1b75a208a467fd15ea1} 2025/04/30 11:18:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:30 client -> Sending packet 2 (34 bytes) for connection c311a0c4928357264b683f44e79309c5340f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:30 client Short Header{DestConnectionID: ff8f1488bd4816c3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 141.374µs} 2025/04/30 11:18:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:30 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:30 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:30 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:30 client -> Sending packet 3 (30 bytes) for connection c311a0c4928357264b683f44e79309c5340f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:30 client Short Header{DestConnectionID: ff8f1488bd4816c3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:30 client Connection c311a0c4928357264b683f44e79309c5340f closed. 2025/04/30 11:18:30 Requesting https://server4:443/uwuqhmahui. 2025/04/30 11:18:30 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:30 Increased send buffer size to 14336 kiB 2025/04/30 11:18:30 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:30 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:30 Created qlog file: /logs/qlog/e33d74f3b513a9dead7c3ce7.sqlog 2025/04/30 11:18:30 client Starting new connection to server4 ([::]:54067 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e33d74f3b513a9dead7c3ce7, version v1 2025/04/30 11:18:30 Adding connection ID (empty). 2025/04/30 11:18:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:30 client -> Sending packet 0 (1280 bytes) for connection e33d74f3b513a9dead7c3ce7, Initial 2025/04/30 11:18:30 client Long Header{Type: Initial, DestConnectionID: e33d74f3b513a9dead7c3ce7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:30 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:30 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:30 client -> Sending packet 1 (1280 bytes) for connection e33d74f3b513a9dead7c3ce7, Initial 2025/04/30 11:18:30 client Long Header{Type: Initial, DestConnectionID: e33d74f3b513a9dead7c3ce7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:30 client -> Sending packet 2 (1280 bytes) for connection e33d74f3b513a9dead7c3ce7, Initial 2025/04/30 11:18:30 client Long Header{Type: Initial, DestConnectionID: e33d74f3b513a9dead7c3ce7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:31 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:31 client -> Sending packet 3 (1280 bytes) for connection e33d74f3b513a9dead7c3ce7, Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: e33d74f3b513a9dead7c3ce7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:31 client -> Sending packet 4 (1280 bytes) for connection e33d74f3b513a9dead7c3ce7, Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: e33d74f3b513a9dead7c3ce7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:31 client <- Reading packet 1 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8dd3b50815626c2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:31 client Received first packet. Switching destination connection ID to: f8dd3b50815626c2 2025/04/30 11:18:31 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:31 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8dd3b50815626c2, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:31 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:31 client newly acked packets (1): [4] 2025/04/30 11:18:31 client updated RTT: 33.188881ms (σ: 16.59444ms) 2025/04/30 11:18:31 client -> Sending packet 5 (1280 bytes) for connection e33d74f3b513a9dead7c3ce7, Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: f8dd3b50815626c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:31 client -> &wire.PingFrame{} 2025/04/30 11:18:31 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:31 client <- Reading packet 5 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8dd3b50815626c2, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:31 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:31 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:31 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:31 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8dd3b50815626c2, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:18:31 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:31 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e33d74f3b513a9dead7c3ce7, InitialSourceConnectionID: f8dd3b50815626c2, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x90727be25549e34fcfefd9320df77889} 2025/04/30 11:18:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e33d74f3b513a9dead7c3ce7 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: f8dd3b50815626c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:31 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: f8dd3b50815626c2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:31 client Dropping Initial keys. 2025/04/30 11:18:31 client -> Sending packet 1 (40 bytes) for connection e33d74f3b513a9dead7c3ce7, Handshake 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: f8dd3b50815626c2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:31 client -> Sending packet 0 (46 bytes) for connection e33d74f3b513a9dead7c3ce7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:31 client Short Header{DestConnectionID: f8dd3b50815626c2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:31 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:31 client -> Sending packet 1 (32 bytes) for connection e33d74f3b513a9dead7c3ce7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:31 client Short Header{DestConnectionID: f8dd3b50815626c2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 63.479µs} 2025/04/30 11:18:31 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:31 client -> Sending packet 2 (69 bytes) for connection e33d74f3b513a9dead7c3ce7, Handshake 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: f8dd3b50815626c2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:31 client Short Header{DestConnectionID: f8dd3b50815626c2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:31 client Connection e33d74f3b513a9dead7c3ce7 closed. 2025/04/30 11:18:31 Requesting https://server4:443/ptfpghgonp. 2025/04/30 11:18:31 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:31 Increased send buffer size to 14336 kiB 2025/04/30 11:18:31 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:31 Created qlog file: /logs/qlog/e600672af6e9c0c6c963121781a9e40a6b9c3f.sqlog 2025/04/30 11:18:31 client Starting new connection to server4 ([::]:45112 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e600672af6e9c0c6c963121781a9e40a6b9c3f, version v1 2025/04/30 11:18:31 Adding connection ID (empty). 2025/04/30 11:18:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:31 client -> Sending packet 0 (1280 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: e600672af6e9c0c6c963121781a9e40a6b9c3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:18:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:18:31 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:31 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 24b79d8d38ad354f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:31 client Received first packet. Switching destination connection ID to: 24b79d8d38ad354f 2025/04/30 11:18:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:31 client newly acked packets (1): [0] 2025/04/30 11:18:31 client updated RTT: 34.494192ms (σ: 17.247096ms) 2025/04/30 11:18:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:31 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:31 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:31 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:31 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24b79d8d38ad354f, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/04/30 11:18:31 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:31 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e600672af6e9c0c6c963121781a9e40a6b9c3f, InitialSourceConnectionID: 24b79d8d38ad354f, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xadd5709697b7c598eb2c636ccb9f6107} 2025/04/30 11:18:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: 24b79d8d38ad354f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: 24b79d8d38ad354f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:31 client Dropping Initial keys. 2025/04/30 11:18:31 client -> Sending packet 1 (86 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, Handshake 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: 24b79d8d38ad354f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:31 client Short Header{DestConnectionID: 24b79d8d38ad354f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:31 client -> Sending packet 2 (90 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, Handshake 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: 24b79d8d38ad354f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:31 client -> Sending packet 3 (90 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, Handshake 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: 24b79d8d38ad354f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:31 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:31 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24b79d8d38ad354f, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:31 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:31 client Peer doesn't await address validation any longer. 2025/04/30 11:18:31 client newly acked packets (1): [3] 2025/04/30 11:18:31 client updated RTT: 34.272ms (σ: 13.378ms) 2025/04/30 11:18:31 client Canceling loss detection timer. 2025/04/30 11:18:31 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:31 client -> Sending packet 1 (32 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:31 client Short Header{DestConnectionID: 24b79d8d38ad354f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 147.938µs} 2025/04/30 11:18:31 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:31 client Dropping Handshake keys. 2025/04/30 11:18:31 client <- &wire.NewTokenFrame{Token: 0xb767edb00661354744126f78a81c9a0e5db53b70c183614a38f95857646eb614396f723d59} 2025/04/30 11:18:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e727ec6e210f347a, StatelessResetToken: 0xc95f47b017630e84b9ad47d5567d0356} 2025/04/30 11:18:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6e817d1e6629b166, StatelessResetToken: 0xe8eb8eeb647038f0e8ccdc3bf00d6277} 2025/04/30 11:18:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2674e76369364a8f, StatelessResetToken: 0xcf486d1e05e95739ade8c96b3add156e} 2025/04/30 11:18:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:31 client -> Sending packet 3 (53 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:31 client Short Header{DestConnectionID: e727ec6e210f347a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 159.188µs} 2025/04/30 11:18:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:31 client -> Sending packet 4 (48 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:31 client Short Header{DestConnectionID: e727ec6e210f347a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:31 client <- Reading packet 2 (53 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:31 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:31 client newly acked packets (1): [4] 2025/04/30 11:18:31 client updated RTT: 34ms (σ: 10.576ms) 2025/04/30 11:18:31 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:31 client Canceling loss detection timer. 2025/04/30 11:18:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 27752c7512546d7b, StatelessResetToken: 0x5199d31293ee40605fe9eff3f0327ed2} 2025/04/30 11:18:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:31 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:31 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:31 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:31 client -> Sending packet 5 (32 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:31 client Short Header{DestConnectionID: e727ec6e210f347a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 62.237µs} 2025/04/30 11:18:31 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:31 client -> Sending packet 6 (30 bytes) for connection e600672af6e9c0c6c963121781a9e40a6b9c3f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:31 client Short Header{DestConnectionID: e727ec6e210f347a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:31 client Connection e600672af6e9c0c6c963121781a9e40a6b9c3f closed. 2025/04/30 11:18:31 Requesting https://server4:443/abpuuzbxdt. 2025/04/30 11:18:31 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:31 Increased send buffer size to 14336 kiB 2025/04/30 11:18:31 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:31 Created qlog file: /logs/qlog/457ec8e196740858372ca2.sqlog 2025/04/30 11:18:31 client Starting new connection to server4 ([::]:42114 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 457ec8e196740858372ca2, version v1 2025/04/30 11:18:31 Adding connection ID (empty). 2025/04/30 11:18:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:31 client -> Sending packet 0 (1280 bytes) for connection 457ec8e196740858372ca2, Initial 2025/04/30 11:18:31 client Long Header{Type: Initial, DestConnectionID: 457ec8e196740858372ca2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:18:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:32 client -> Sending packet 1 (1280 bytes) for connection 457ec8e196740858372ca2, Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 457ec8e196740858372ca2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:32 client -> Sending packet 2 (1280 bytes) for connection 457ec8e196740858372ca2, Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 457ec8e196740858372ca2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:32 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:32 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 72d091da816afb80, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:32 client Received first packet. Switching destination connection ID to: 72d091da816afb80 2025/04/30 11:18:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:32 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:32 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:32 client Parsed a coalesced packet. Part 2: 41 bytes. Remaining: 1030 bytes. 2025/04/30 11:18:32 client <- Reading packet 2 (41 bytes) for connection (empty), Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 72d091da816afb80, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:18:32 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:18:32 client newly acked packets (1): [2] 2025/04/30 11:18:32 client updated RTT: 34.470988ms (σ: 17.235494ms) 2025/04/30 11:18:32 client Parsed a coalesced packet. Part 3: 1030 bytes. Remaining: 0 bytes. 2025/04/30 11:18:32 client <- Reading packet 1 (1030 bytes) for connection (empty), Handshake 2025/04/30 11:18:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 72d091da816afb80, PacketNumber: 1, PacketNumberLen: 1, Length: 1013, Version: v1} 2025/04/30 11:18:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 11:18:32 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:32 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 457ec8e196740858372ca2, InitialSourceConnectionID: 72d091da816afb80, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2542b313415ce5c8b0acb2001776705c} 2025/04/30 11:18:32 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 457ec8e196740858372ca2 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 72d091da816afb80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:32 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:32 client Long Header{Type: Handshake, DestConnectionID: 72d091da816afb80, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:32 client Dropping Initial keys. 2025/04/30 11:18:32 client -> Sending packet 1 (86 bytes) for connection 457ec8e196740858372ca2, Handshake 2025/04/30 11:18:32 client Long Header{Type: Handshake, DestConnectionID: 72d091da816afb80, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:32 client Short Header{DestConnectionID: 72d091da816afb80, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:32 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:32 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:32 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 11:18:32 client Peer doesn't await address validation any longer. 2025/04/30 11:18:32 client newly acked packets (1): [0] 2025/04/30 11:18:32 client updated RTT: 34.533ms (σ: 13.053ms) 2025/04/30 11:18:32 client Canceling loss detection timer. 2025/04/30 11:18:32 client Dropping Handshake keys. 2025/04/30 11:18:32 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:32 client <- &wire.NewTokenFrame{Token: 0xb7ebdac910946497acd19188b41de8c7ba67222a76334223f2f30f832823d697ec7b431b50} 2025/04/30 11:18:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ea4db4615af5d053, StatelessResetToken: 0x3d956d70de6d62181ea05a3a1bee11c1} 2025/04/30 11:18:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5758386c9a64ed67, StatelessResetToken: 0xc5841f2a8bd0275b0dbdb5a733da9c28} 2025/04/30 11:18:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 218154f649edebc5, StatelessResetToken: 0x7509eea08aab007c40f70cf567185f3b} 2025/04/30 11:18:32 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:32 client -> Sending packet 1 (34 bytes) for connection 457ec8e196740858372ca2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:32 client Short Header{DestConnectionID: ea4db4615af5d053, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 142.276µs} 2025/04/30 11:18:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:32 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:32 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:32 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:32 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:32 client -> Sending packet 2 (30 bytes) for connection 457ec8e196740858372ca2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:32 client Short Header{DestConnectionID: ea4db4615af5d053, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:32 client Connection 457ec8e196740858372ca2 closed. 2025/04/30 11:18:32 Requesting https://server4:443/swxgzhklph. 2025/04/30 11:18:32 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:32 Increased send buffer size to 14336 kiB 2025/04/30 11:18:32 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:32 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:32 Created qlog file: /logs/qlog/2294b02b9309da9b54cbeb.sqlog 2025/04/30 11:18:32 client Starting new connection to server4 ([::]:45616 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2294b02b9309da9b54cbeb, version v1 2025/04/30 11:18:32 Adding connection ID (empty). 2025/04/30 11:18:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:32 client -> Sending packet 0 (1280 bytes) for connection 2294b02b9309da9b54cbeb, Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 2294b02b9309da9b54cbeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:18:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:32 client -> Sending packet 1 (1280 bytes) for connection 2294b02b9309da9b54cbeb, Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 2294b02b9309da9b54cbeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:18:32 client -> Sending packet 2 (1280 bytes) for connection 2294b02b9309da9b54cbeb, Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 2294b02b9309da9b54cbeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:18:32 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:32 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3e8f64621b490e40, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:32 client Received first packet. Switching destination connection ID to: 3e8f64621b490e40 2025/04/30 11:18:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:32 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:32 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:32 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:32 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3e8f64621b490e40, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:32 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:32 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:32 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e8f64621b490e40, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 11:18:32 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:32 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2294b02b9309da9b54cbeb, InitialSourceConnectionID: 3e8f64621b490e40, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x49ae71669f9d537096a12a0373ef9799} 2025/04/30 11:18:32 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2294b02b9309da9b54cbeb 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 3e8f64621b490e40, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:32 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:32 client Long Header{Type: Handshake, DestConnectionID: 3e8f64621b490e40, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:32 client Dropping Initial keys. 2025/04/30 11:18:32 client -> Sending packet 1 (86 bytes) for connection 2294b02b9309da9b54cbeb, Handshake 2025/04/30 11:18:32 client Long Header{Type: Handshake, DestConnectionID: 3e8f64621b490e40, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:32 client Short Header{DestConnectionID: 3e8f64621b490e40, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:32 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:32 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:32 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 11:18:32 client Peer doesn't await address validation any longer. 2025/04/30 11:18:32 client newly acked packets (1): [0] 2025/04/30 11:18:32 client updated RTT: 34.927251ms (σ: 17.463625ms) 2025/04/30 11:18:32 client Canceling loss detection timer. 2025/04/30 11:18:32 client Dropping Handshake keys. 2025/04/30 11:18:32 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:32 client <- &wire.NewTokenFrame{Token: 0xb7c4a6f7d01cb0b106a9461f8af8aae50009c8d95a31af9dd0102efcfd9657c82bd361b394} 2025/04/30 11:18:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 71877d862c264def, StatelessResetToken: 0x6461bb14456239f64e8712c7799b755c} 2025/04/30 11:18:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 74cbfd92dc5764f8, StatelessResetToken: 0xbdbd74e01cdd4fac5da95729e7d2733c} 2025/04/30 11:18:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a498523885cf5bcf, StatelessResetToken: 0x84a87581ea3c0e3325987fd322459bf1} 2025/04/30 11:18:32 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:32 client -> Sending packet 1 (34 bytes) for connection 2294b02b9309da9b54cbeb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:32 client Short Header{DestConnectionID: 71877d862c264def, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 170.73µs} 2025/04/30 11:18:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:32 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:32 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:32 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:32 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:32 client -> Sending packet 2 (30 bytes) for connection 2294b02b9309da9b54cbeb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:32 client Short Header{DestConnectionID: 71877d862c264def, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:32 client Connection 2294b02b9309da9b54cbeb closed. 2025/04/30 11:18:32 Requesting https://server4:443/sorstbdjoz. 2025/04/30 11:18:32 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:32 Increased send buffer size to 14336 kiB 2025/04/30 11:18:32 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:32 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:32 Created qlog file: /logs/qlog/31866378c30f15abed88caa3.sqlog 2025/04/30 11:18:32 client Starting new connection to server4 ([::]:48109 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 31866378c30f15abed88caa3, version v1 2025/04/30 11:18:32 Adding connection ID (empty). 2025/04/30 11:18:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:32 client -> Sending packet 0 (1280 bytes) for connection 31866378c30f15abed88caa3, Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 31866378c30f15abed88caa3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:32 client -> Sending packet 1 (1280 bytes) for connection 31866378c30f15abed88caa3, Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 31866378c30f15abed88caa3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:32 client -> Sending packet 2 (1280 bytes) for connection 31866378c30f15abed88caa3, Initial 2025/04/30 11:18:32 client Long Header{Type: Initial, DestConnectionID: 31866378c30f15abed88caa3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:33 client -> Sending packet 3 (1280 bytes) for connection 31866378c30f15abed88caa3, Initial 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: 31866378c30f15abed88caa3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:33 client -> Sending packet 4 (1280 bytes) for connection 31866378c30f15abed88caa3, Initial 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: 31866378c30f15abed88caa3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:33 client <- Reading packet 1 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27667744d6865ba4, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:33 client Received first packet. Switching destination connection ID to: 27667744d6865ba4 2025/04/30 11:18:33 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:33 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27667744d6865ba4, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:33 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:33 client newly acked packets (1): [4] 2025/04/30 11:18:33 client updated RTT: 33.087407ms (σ: 16.543703ms) 2025/04/30 11:18:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:33 client -> Sending packet 5 (1280 bytes) for connection 31866378c30f15abed88caa3, Initial 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: 27667744d6865ba4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:33 client -> &wire.PingFrame{} 2025/04/30 11:18:33 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27667744d6865ba4, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:33 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:33 client newly acked packets (1): [5] 2025/04/30 11:18:33 client updated RTT: 32.965ms (σ: 12.649ms) 2025/04/30 11:18:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:33 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:33 client <- Reading packet 4 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27667744d6865ba4, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:33 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:33 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:33 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:33 client <- Reading packet 1 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 27667744d6865ba4, PacketNumber: 1, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:18:33 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:33 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 31866378c30f15abed88caa3, InitialSourceConnectionID: 27667744d6865ba4, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x639396963111351e7932dff8d664b436} 2025/04/30 11:18:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 31866378c30f15abed88caa3 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: 27667744d6865ba4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:33 client Long Header{Type: Handshake, DestConnectionID: 27667744d6865ba4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:33 client Dropping Initial keys. 2025/04/30 11:18:33 client -> Sending packet 1 (40 bytes) for connection 31866378c30f15abed88caa3, Handshake 2025/04/30 11:18:33 client Long Header{Type: Handshake, DestConnectionID: 27667744d6865ba4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:33 client -> Sending packet 0 (46 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 27667744d6865ba4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:33 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:33 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/04/30 11:18:33 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:33 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 27667744d6865ba4, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:18:33 client -> Sending packet 2 (40 bytes) for connection 31866378c30f15abed88caa3, Handshake 2025/04/30 11:18:33 client Long Header{Type: Handshake, DestConnectionID: 27667744d6865ba4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:33 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:33 client <- Reading packet 3 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 27667744d6865ba4, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:33 client Peer doesn't await address validation any longer. 2025/04/30 11:18:33 client newly acked packets (1): [0] 2025/04/30 11:18:33 client Canceling loss detection timer. 2025/04/30 11:18:33 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:33 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:33 client -> Sending packet 1 (32 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 27667744d6865ba4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.358µs} 2025/04/30 11:18:33 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:33 client Dropping Handshake keys. 2025/04/30 11:18:33 client <- &wire.NewTokenFrame{Token: 0xb798cf9a588525ce303610c1040b38e860bcddbf4dc50def474ea783c46679cb4b381496cb} 2025/04/30 11:18:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 63de581ba16b20ed, StatelessResetToken: 0xfcc98973ff969f3c1ee3c42ff82c71b5} 2025/04/30 11:18:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 138a67c4a83c72e1, StatelessResetToken: 0x95ce312f8c80e2758bdb7da4bc07d7dc} 2025/04/30 11:18:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 924d8ce8d9fed033, StatelessResetToken: 0x9f763c69aa8c08b0db784ed9303cb20b} 2025/04/30 11:18:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:33 client -> Sending packet 2 (34 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 63de581ba16b20ed, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 107.341µs} 2025/04/30 11:18:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:33 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:33 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:33 client newly acked packets (1): [2] 2025/04/30 11:18:33 client updated RTT: 32.802ms (σ: 9.811ms) 2025/04/30 11:18:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:33 client lost packet 0 (time threshold) 2025/04/30 11:18:33 client Canceling loss detection timer. 2025/04/30 11:18:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3e3249c2d45ad195, StatelessResetToken: 0x3c6dc1d2c40657de53a86a8b93df2ded} 2025/04/30 11:18:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:33 client Ignoring all packets below 2. 2025/04/30 11:18:33 client -> Sending packet 3 (51 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 63de581ba16b20ed, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 107.141µs} 2025/04/30 11:18:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:33 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:33 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3e3249c2d45ad195, StatelessResetToken: 0x3c6dc1d2c40657de53a86a8b93df2ded} 2025/04/30 11:18:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:33 client <- Reading packet 4 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:33 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3e3249c2d45ad195, StatelessResetToken: 0x3c6dc1d2c40657de53a86a8b93df2ded} 2025/04/30 11:18:33 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:33 client -> Sending packet 4 (32 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 63de581ba16b20ed, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 81.202µs} 2025/04/30 11:18:33 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:33 client -> Sending packet 6 (46 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 63de581ba16b20ed, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:33 client -> Sending packet 7 (46 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 63de581ba16b20ed, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:33 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:33 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:33 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:33 client -> Sending packet 8 (1366 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 63de581ba16b20ed, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.PingFrame{} 2025/04/30 11:18:33 client -> Sending packet 9 (34 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 63de581ba16b20ed, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 112.04µs} 2025/04/30 11:18:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:33 client -> Sending packet 10 (30 bytes) for connection 31866378c30f15abed88caa3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:33 client Short Header{DestConnectionID: 63de581ba16b20ed, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:33 client Connection 31866378c30f15abed88caa3 closed. 2025/04/30 11:18:33 Requesting https://server4:443/neczlwidrz. 2025/04/30 11:18:33 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:33 Increased send buffer size to 14336 kiB 2025/04/30 11:18:33 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:33 Created qlog file: /logs/qlog/515b0d10e9c31a2ae68e0aedd2b8.sqlog 2025/04/30 11:18:33 client Starting new connection to server4 ([::]:40497 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 515b0d10e9c31a2ae68e0aedd2b8, version v1 2025/04/30 11:18:33 Adding connection ID (empty). 2025/04/30 11:18:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:33 client -> Sending packet 0 (1280 bytes) for connection 515b0d10e9c31a2ae68e0aedd2b8, Initial 2025/04/30 11:18:33 client Long Header{Type: Initial, DestConnectionID: 515b0d10e9c31a2ae68e0aedd2b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:18:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:34 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 514a712941455e0e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:34 client Received first packet. Switching destination connection ID to: 514a712941455e0e 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:34 client newly acked packets (1): [0] 2025/04/30 11:18:34 client updated RTT: 34.80858ms (σ: 17.40429ms) 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:34 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:34 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 514a712941455e0e, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 11:18:34 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 515b0d10e9c31a2ae68e0aedd2b8, InitialSourceConnectionID: 514a712941455e0e, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2b972ad378d93fa5b8a7b6b16bc29809} 2025/04/30 11:18:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 515b0d10e9c31a2ae68e0aedd2b8 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: 514a712941455e0e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 514a712941455e0e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:34 client Dropping Initial keys. 2025/04/30 11:18:34 client -> Sending packet 1 (86 bytes) for connection 515b0d10e9c31a2ae68e0aedd2b8, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 514a712941455e0e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client Short Header{DestConnectionID: 514a712941455e0e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:34 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 514a712941455e0e, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client Peer doesn't await address validation any longer. 2025/04/30 11:18:34 client newly acked packets (1): [0] 2025/04/30 11:18:34 client Canceling loss detection timer. 2025/04/30 11:18:34 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:34 client -> Sending packet 1 (32 bytes) for connection 515b0d10e9c31a2ae68e0aedd2b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: 514a712941455e0e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 152.346µs} 2025/04/30 11:18:34 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:34 client -> Sending packet 2 (34 bytes) for connection 515b0d10e9c31a2ae68e0aedd2b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: 514a712941455e0e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 57.087µs} 2025/04/30 11:18:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:34 client -> Sending packet 2 (69 bytes) for connection 515b0d10e9c31a2ae68e0aedd2b8, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 514a712941455e0e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:34 client Short Header{DestConnectionID: 514a712941455e0e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:34 client Connection 515b0d10e9c31a2ae68e0aedd2b8 closed. 2025/04/30 11:18:34 Requesting https://server4:443/dpyhjcmepb. 2025/04/30 11:18:34 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:34 Increased send buffer size to 14336 kiB 2025/04/30 11:18:34 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:34 Created qlog file: /logs/qlog/bfe3f5cd470f5e24.sqlog 2025/04/30 11:18:34 client Starting new connection to server4 ([::]:36503 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bfe3f5cd470f5e24, version v1 2025/04/30 11:18:34 Adding connection ID (empty). 2025/04/30 11:18:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:34 client -> Sending packet 0 (1280 bytes) for connection bfe3f5cd470f5e24, Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: bfe3f5cd470f5e24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:34 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: feb3378aee6c90cd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:34 client Received first packet. Switching destination connection ID to: feb3378aee6c90cd 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:34 client newly acked packets (1): [0] 2025/04/30 11:18:34 client updated RTT: 34.298801ms (σ: 17.1494ms) 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:34 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:34 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: feb3378aee6c90cd, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 11:18:34 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bfe3f5cd470f5e24, InitialSourceConnectionID: feb3378aee6c90cd, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x596dca30f1e263e8ec168c29d9c65ab1} 2025/04/30 11:18:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bfe3f5cd470f5e24 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: feb3378aee6c90cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: feb3378aee6c90cd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:34 client Dropping Initial keys. 2025/04/30 11:18:34 client -> Sending packet 1 (40 bytes) for connection bfe3f5cd470f5e24, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: feb3378aee6c90cd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client -> Sending packet 0 (46 bytes) for connection bfe3f5cd470f5e24, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: feb3378aee6c90cd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:34 client -> Sending packet 2 (90 bytes) for connection bfe3f5cd470f5e24, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: feb3378aee6c90cd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:34 client -> Sending packet 3 (90 bytes) for connection bfe3f5cd470f5e24, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: feb3378aee6c90cd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:34 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:34 client Dropping Handshake keys. 2025/04/30 11:18:34 client <- &wire.NewTokenFrame{Token: 0xb766a134d1e0b73e8d116c2a5fa7382e313f76cf29ddc142f287609e0a4defc2d116984744} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f2e423c829a30b96, StatelessResetToken: 0xcf926b68aa3bca24de8a4bddc0810032} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a67838fadc65176, StatelessResetToken: 0x9ed9cb37cb6d6516aaf8bb76924b9ffa} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d1edc2c2b6ea991b, StatelessResetToken: 0xfc1a06f2a05a0c346e776db9fca07a4e} 2025/04/30 11:18:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:34 client -> Sending packet 2 (53 bytes) for connection bfe3f5cd470f5e24, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: f2e423c829a30b96, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 94.878µs} 2025/04/30 11:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:34 client -> Sending packet 3 (48 bytes) for connection bfe3f5cd470f5e24, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: f2e423c829a30b96, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:34 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:34 client newly acked packets (1): [3] 2025/04/30 11:18:34 client updated RTT: 34.004ms (σ: 13.449ms) 2025/04/30 11:18:34 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:34 client Canceling loss detection timer. 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8c0cb5ef75688f42, StatelessResetToken: 0xba32545b7e48a7bc29f9b12d81e4eaf1} 2025/04/30 11:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:34 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:34 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:34 client -> Sending packet 4 (32 bytes) for connection bfe3f5cd470f5e24, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:34 client Short Header{DestConnectionID: f2e423c829a30b96, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 61.876µs} 2025/04/30 11:18:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:34 client -> Sending packet 5 (30 bytes) for connection bfe3f5cd470f5e24, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:34 client Short Header{DestConnectionID: f2e423c829a30b96, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:34 client Connection bfe3f5cd470f5e24 closed. 2025/04/30 11:18:34 Requesting https://server4:443/lynzbkmgtw. 2025/04/30 11:18:34 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:34 Increased send buffer size to 14336 kiB 2025/04/30 11:18:34 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:34 Created qlog file: /logs/qlog/5472a6c81d42725c6e9e.sqlog 2025/04/30 11:18:34 client Starting new connection to server4 ([::]:48221 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5472a6c81d42725c6e9e, version v1 2025/04/30 11:18:34 Adding connection ID (empty). 2025/04/30 11:18:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:34 client -> Sending packet 0 (1280 bytes) for connection 5472a6c81d42725c6e9e, Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: 5472a6c81d42725c6e9e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:34 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9305cbf6e859159b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:34 client Received first packet. Switching destination connection ID to: 9305cbf6e859159b 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:34 client newly acked packets (1): [0] 2025/04/30 11:18:34 client updated RTT: 34.315597ms (σ: 17.157798ms) 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:34 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:34 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9305cbf6e859159b, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 11:18:34 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5472a6c81d42725c6e9e, InitialSourceConnectionID: 9305cbf6e859159b, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xc318db465dbdad72b452cb440f22e833} 2025/04/30 11:18:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5472a6c81d42725c6e9e 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: 9305cbf6e859159b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 9305cbf6e859159b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:34 client Dropping Initial keys. 2025/04/30 11:18:34 client -> Sending packet 1 (86 bytes) for connection 5472a6c81d42725c6e9e, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 9305cbf6e859159b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client Short Header{DestConnectionID: 9305cbf6e859159b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:34 client -> Sending packet 2 (90 bytes) for connection 5472a6c81d42725c6e9e, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 9305cbf6e859159b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:34 client -> Sending packet 3 (90 bytes) for connection 5472a6c81d42725c6e9e, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 9305cbf6e859159b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 568 bytes. 2025/04/30 11:18:34 client <- Reading packet 1 (40 bytes) for connection (empty), Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9305cbf6e859159b, PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:34 client Peer doesn't await address validation any longer. 2025/04/30 11:18:34 client newly acked packets (1): [3] 2025/04/30 11:18:34 client updated RTT: 34.102ms (σ: 13.293ms) 2025/04/30 11:18:34 client Canceling loss detection timer. 2025/04/30 11:18:34 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:34 client -> Sending packet 1 (32 bytes) for connection 5472a6c81d42725c6e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: 9305cbf6e859159b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 121.568µs} 2025/04/30 11:18:34 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103ms} 2025/04/30 11:18:34 client newly acked packets (1): [0] 2025/04/30 11:18:34 client updated RTT: 43.813ms (σ: 29.391ms) 2025/04/30 11:18:34 client Dropping Handshake keys. 2025/04/30 11:18:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:34 client <- &wire.NewTokenFrame{Token: 0xb73570cc37d4a191cd23da01ba99f38c14f032ec0967eb16a9517e3397af820e5c14b6dc8f} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b4694b837d25ed5c, StatelessResetToken: 0x4614cd81e30bb3c25b49dbbc2506eb62} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d97c29f7e1f48698, StatelessResetToken: 0xad1119951039414e7e5716f9f8eac2d1} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b4af202d27059fb, StatelessResetToken: 0x2fbbf3307cb4c61c26d9c209a07db7a8} 2025/04/30 11:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:34 client -> Sending packet 2 (34 bytes) for connection 5472a6c81d42725c6e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: b4694b837d25ed5c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 117.26µs} 2025/04/30 11:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:34 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:34 client newly acked packets (1): [2] 2025/04/30 11:18:34 client updated RTT: 42.254ms (σ: 25.159ms) 2025/04/30 11:18:34 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:34 client Canceling loss detection timer. 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: beeac794c928de44, StatelessResetToken: 0x72f4a8d8a1657098b968f851ad1561c5} 2025/04/30 11:18:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:34 client Ignoring all packets below 2. 2025/04/30 11:18:34 client -> Sending packet 3 (32 bytes) for connection 5472a6c81d42725c6e9e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:34 client Short Header{DestConnectionID: b4694b837d25ed5c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 106.65µs} 2025/04/30 11:18:34 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:34 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: beeac794c928de44, StatelessResetToken: 0x72f4a8d8a1657098b968f851ad1561c5} 2025/04/30 11:18:34 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:34 client -> Sending packet 4 (32 bytes) for connection 5472a6c81d42725c6e9e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:34 client Short Header{DestConnectionID: b4694b837d25ed5c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 83.356µs} 2025/04/30 11:18:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:34 client -> Sending packet 5 (30 bytes) for connection 5472a6c81d42725c6e9e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:34 client Short Header{DestConnectionID: b4694b837d25ed5c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:34 client Connection 5472a6c81d42725c6e9e closed. 2025/04/30 11:18:34 Requesting https://server4:443/wialufrnkt. 2025/04/30 11:18:34 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:34 Increased send buffer size to 14336 kiB 2025/04/30 11:18:34 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:34 Created qlog file: /logs/qlog/b85e7d4f58eab474c95dd47f28.sqlog 2025/04/30 11:18:34 client Starting new connection to server4 ([::]:41696 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b85e7d4f58eab474c95dd47f28, version v1 2025/04/30 11:18:34 Adding connection ID (empty). 2025/04/30 11:18:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:34 client -> Sending packet 0 (1280 bytes) for connection b85e7d4f58eab474c95dd47f28, Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: b85e7d4f58eab474c95dd47f28, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 11:18:34 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19b6d0f59d35909e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 11:18:34 client Received first packet. Switching destination connection ID to: 19b6d0f59d35909e 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client newly acked packets (1): [0] 2025/04/30 11:18:34 client updated RTT: 34.411267ms (σ: 17.205633ms) 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:34 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 11:18:34 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19b6d0f59d35909e, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 11:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:18:34 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b85e7d4f58eab474c95dd47f28, InitialSourceConnectionID: 19b6d0f59d35909e, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd3567a880c7741fbf200a624b4a30919} 2025/04/30 11:18:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b85e7d4f58eab474c95dd47f28 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: 19b6d0f59d35909e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 19b6d0f59d35909e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:34 client Dropping Initial keys. 2025/04/30 11:18:34 client -> Sending packet 1 (86 bytes) for connection b85e7d4f58eab474c95dd47f28, Handshake 2025/04/30 11:18:34 client Long Header{Type: Handshake, DestConnectionID: 19b6d0f59d35909e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:34 client Short Header{DestConnectionID: 19b6d0f59d35909e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:34 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 11:18:34 client Peer doesn't await address validation any longer. 2025/04/30 11:18:34 client newly acked packets (1): [0] 2025/04/30 11:18:34 client updated RTT: 34.462ms (σ: 13.005ms) 2025/04/30 11:18:34 client Canceling loss detection timer. 2025/04/30 11:18:34 client Dropping Handshake keys. 2025/04/30 11:18:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:34 client <- &wire.NewTokenFrame{Token: 0xb785bf58abce0ee2ce8dd6c0755489e1031d9afae256f125d57293d3d0ba6849f3bd7d3460} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fb4404872f3b2824, StatelessResetToken: 0x3231c6eade87e29084e10515d753dc08} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3c0f9d47e64fe9a9, StatelessResetToken: 0x158f9e8533bf5de70e964ea3a9789b9e} 2025/04/30 11:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 11cfb214acf4511e, StatelessResetToken: 0xc85b5592ab6cd66920d37a9dc83a37ab} 2025/04/30 11:18:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:34 client -> Sending packet 1 (34 bytes) for connection b85e7d4f58eab474c95dd47f28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: fb4404872f3b2824, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 190.447µs} 2025/04/30 11:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:34 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:34 client -> Sending packet 2 (30 bytes) for connection b85e7d4f58eab474c95dd47f28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:34 client Short Header{DestConnectionID: fb4404872f3b2824, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:34 client Connection b85e7d4f58eab474c95dd47f28 closed. 2025/04/30 11:18:34 Requesting https://server4:443/kuyajbqilh. 2025/04/30 11:18:34 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:34 Increased send buffer size to 14336 kiB 2025/04/30 11:18:34 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:34 Created qlog file: /logs/qlog/545bcf3e4ae3617c6e6469b991090fcc50.sqlog 2025/04/30 11:18:34 client Starting new connection to server4 ([::]:56837 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 545bcf3e4ae3617c6e6469b991090fcc50, version v1 2025/04/30 11:18:34 Adding connection ID (empty). 2025/04/30 11:18:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:34 client -> Sending packet 0 (1280 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: 545bcf3e4ae3617c6e6469b991090fcc50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:34 client -> Sending packet 1 (1280 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: 545bcf3e4ae3617c6e6469b991090fcc50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:34 client -> Sending packet 2 (1280 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, Initial 2025/04/30 11:18:34 client Long Header{Type: Initial, DestConnectionID: 545bcf3e4ae3617c6e6469b991090fcc50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:35 client -> Sending packet 3 (1280 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, Initial 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: 545bcf3e4ae3617c6e6469b991090fcc50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:35 client -> Sending packet 4 (1280 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, Initial 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: 545bcf3e4ae3617c6e6469b991090fcc50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:35 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:35 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2d186d3e3b48e5d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:35 client Received first packet. Switching destination connection ID to: b2d186d3e3b48e5d 2025/04/30 11:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:35 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:35 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:35 client Parsed a coalesced packet. Part 2: 41 bytes. Remaining: 1030 bytes. 2025/04/30 11:18:35 client <- Reading packet 2 (41 bytes) for connection (empty), Initial 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2d186d3e3b48e5d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:18:35 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:35 client Parsed a coalesced packet. Part 3: 1030 bytes. Remaining: 0 bytes. 2025/04/30 11:18:35 client <- Reading packet 1 (1030 bytes) for connection (empty), Handshake 2025/04/30 11:18:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2d186d3e3b48e5d, PacketNumber: 1, PacketNumberLen: 1, Length: 1013, Version: v1} 2025/04/30 11:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 11:18:35 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:35 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 545bcf3e4ae3617c6e6469b991090fcc50, InitialSourceConnectionID: b2d186d3e3b48e5d, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xdb51bcb76331f1c47c4f37186cff0b53} 2025/04/30 11:18:35 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2d186d3e3b48e5d, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:18:35 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:35 client newly acked packets (1): [4] 2025/04/30 11:18:35 client updated RTT: 33.666551ms (σ: 16.833275ms) 2025/04/30 11:18:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: b2d186d3e3b48e5d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:35 client Long Header{Type: Handshake, DestConnectionID: b2d186d3e3b48e5d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:35 client Dropping Initial keys. 2025/04/30 11:18:35 client -> Sending packet 1 (40 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, Handshake 2025/04/30 11:18:35 client Long Header{Type: Handshake, DestConnectionID: b2d186d3e3b48e5d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:35 client -> Sending packet 0 (46 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: b2d186d3e3b48e5d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:35 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:35 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2d186d3e3b48e5d, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:35 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:35 client Peer doesn't await address validation any longer. 2025/04/30 11:18:35 client newly acked packets (1): [0] 2025/04/30 11:18:35 client Canceling loss detection timer. 2025/04/30 11:18:35 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:35 client -> Sending packet 1 (32 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: b2d186d3e3b48e5d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 170.44µs} 2025/04/30 11:18:35 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:35 client Dropping Handshake keys. 2025/04/30 11:18:35 client <- &wire.NewTokenFrame{Token: 0xb7108b3e7614a7930c2c3782cf5a00388733522b7ea9cc959e6bceb86fd876da91e6e4ad44} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e62236794bfaebae, StatelessResetToken: 0x5c98db00147aa0e46176831f754af89f} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ad6ac823c6e8f24e, StatelessResetToken: 0x518c7a2da50e9cc2fc43fd55cc3009dd} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52295b9dee1f56d1, StatelessResetToken: 0xc357b0b0e64bce94d1e346389f49d24b} 2025/04/30 11:18:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:35 client -> Sending packet 2 (34 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 85.551µs} 2025/04/30 11:18:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:35 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:35 client <- Reading packet 2 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:35 client <- &wire.NewTokenFrame{Token: 0xb7108b3e7614a7930c2c3782cf5a00388733522b7ea9cc959e6bceb86fd876da91e6e4ad44} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e62236794bfaebae, StatelessResetToken: 0x5c98db00147aa0e46176831f754af89f} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ad6ac823c6e8f24e, StatelessResetToken: 0x518c7a2da50e9cc2fc43fd55cc3009dd} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52295b9dee1f56d1, StatelessResetToken: 0xc357b0b0e64bce94d1e346389f49d24b} 2025/04/30 11:18:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:35 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:35 client <- &wire.NewTokenFrame{Token: 0xb7108b3e7614a7930c2c3782cf5a00388733522b7ea9cc959e6bceb86fd876da91e6e4ad44} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e62236794bfaebae, StatelessResetToken: 0x5c98db00147aa0e46176831f754af89f} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ad6ac823c6e8f24e, StatelessResetToken: 0x518c7a2da50e9cc2fc43fd55cc3009dd} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52295b9dee1f56d1, StatelessResetToken: 0xc357b0b0e64bce94d1e346389f49d24b} 2025/04/30 11:18:35 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:35 client -> Sending packet 3 (32 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 108.243µs} 2025/04/30 11:18:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:35 client -> Sending packet 5 (46 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:35 client Skipping packet number 4 2025/04/30 11:18:35 client -> Sending packet 6 (29 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:35 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:35 client <- Reading packet 6 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f6efd0dadfcba6fb, StatelessResetToken: 0xc5e0fe4110b152834b5799daa75014ac} 2025/04/30 11:18:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:35 client -> Sending packet 7 (1366 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.PingFrame{} 2025/04/30 11:18:35 client -> Sending packet 8 (34 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 126.708µs} 2025/04/30 11:18:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:18:35 client -> Sending packet 10 (46 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:35 client Skipping packet number 9 2025/04/30 11:18:35 client -> Sending packet 11 (29 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:35 client <- Reading packet 11 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:35 client -> Sending packet 12 (36 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 88.205µs} 2025/04/30 11:18:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:35 client -> Sending packet 13 (30 bytes) for connection 545bcf3e4ae3617c6e6469b991090fcc50, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:35 client Short Header{DestConnectionID: e62236794bfaebae, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:35 client Connection 545bcf3e4ae3617c6e6469b991090fcc50 closed. 2025/04/30 11:18:35 Requesting https://server4:443/mdwooldsew. 2025/04/30 11:18:35 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:35 Increased send buffer size to 14336 kiB 2025/04/30 11:18:35 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:35 Created qlog file: /logs/qlog/cfb11ff2044f9a3eddd7a110c8.sqlog 2025/04/30 11:18:35 client Starting new connection to server4 ([::]:59850 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cfb11ff2044f9a3eddd7a110c8, version v1 2025/04/30 11:18:35 Adding connection ID (empty). 2025/04/30 11:18:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:35 client -> Sending packet 0 (1280 bytes) for connection cfb11ff2044f9a3eddd7a110c8, Initial 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: cfb11ff2044f9a3eddd7a110c8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:35 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:35 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 872ec382fc6f5e83, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:35 client Received first packet. Switching destination connection ID to: 872ec382fc6f5e83 2025/04/30 11:18:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:35 client newly acked packets (1): [0] 2025/04/30 11:18:35 client updated RTT: 34.615551ms (σ: 17.307775ms) 2025/04/30 11:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:35 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:35 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:35 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:35 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 872ec382fc6f5e83, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:18:35 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:35 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cfb11ff2044f9a3eddd7a110c8, InitialSourceConnectionID: 872ec382fc6f5e83, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7b8d39edc888f7f2a99f5928c9983723} 2025/04/30 11:18:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cfb11ff2044f9a3eddd7a110c8 2025/04/30 11:18:35 client Long Header{Type: Initial, DestConnectionID: 872ec382fc6f5e83, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:35 client Long Header{Type: Handshake, DestConnectionID: 872ec382fc6f5e83, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:35 client Dropping Initial keys. 2025/04/30 11:18:35 client -> Sending packet 1 (40 bytes) for connection cfb11ff2044f9a3eddd7a110c8, Handshake 2025/04/30 11:18:35 client Long Header{Type: Handshake, DestConnectionID: 872ec382fc6f5e83, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:35 client -> Sending packet 0 (46 bytes) for connection cfb11ff2044f9a3eddd7a110c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:35 client Short Header{DestConnectionID: 872ec382fc6f5e83, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:36 client -> Sending packet 2 (90 bytes) for connection cfb11ff2044f9a3eddd7a110c8, Handshake 2025/04/30 11:18:36 client Long Header{Type: Handshake, DestConnectionID: 872ec382fc6f5e83, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:36 client -> Sending packet 3 (90 bytes) for connection cfb11ff2044f9a3eddd7a110c8, Handshake 2025/04/30 11:18:36 client Long Header{Type: Handshake, DestConnectionID: 872ec382fc6f5e83, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:36 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:36 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 872ec382fc6f5e83, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:36 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:36 client Peer doesn't await address validation any longer. 2025/04/30 11:18:36 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:36 client -> Sending packet 1 (32 bytes) for connection cfb11ff2044f9a3eddd7a110c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:36 client Short Header{DestConnectionID: 872ec382fc6f5e83, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 231.471µs} 2025/04/30 11:18:36 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 105ms} 2025/04/30 11:18:36 client newly acked packets (1): [0] 2025/04/30 11:18:36 client updated RTT: 44.347ms (σ: 32.445ms) 2025/04/30 11:18:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:36 client Canceling loss detection timer. 2025/04/30 11:18:36 client Dropping Handshake keys. 2025/04/30 11:18:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:36 client <- &wire.NewTokenFrame{Token: 0xb7cf6657b6e2826ae9776958397987e849052a85e60ebeb3db5ae6f418c7c762dfd7804493} 2025/04/30 11:18:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5da1986ab3f60e71, StatelessResetToken: 0x09e50deef8e24cf4b451d0299236906e} 2025/04/30 11:18:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cb0fa7d3d63e9fac, StatelessResetToken: 0x9e210e8c865cf5e69ed1eac47987f647} 2025/04/30 11:18:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1d7e328a1311286b, StatelessResetToken: 0xc0b790aab8349a862d7beac230bbee23} 2025/04/30 11:18:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:36 client -> Sending packet 2 (34 bytes) for connection cfb11ff2044f9a3eddd7a110c8, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:36 client Short Header{DestConnectionID: 5da1986ab3f60e71, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 157.475µs} 2025/04/30 11:18:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:36 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:36 client -> Sending packet 3 (30 bytes) for connection cfb11ff2044f9a3eddd7a110c8, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:36 client Short Header{DestConnectionID: 5da1986ab3f60e71, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:36 client Connection cfb11ff2044f9a3eddd7a110c8 closed. 2025/04/30 11:18:36 Requesting https://server4:443/qqosagguhz. 2025/04/30 11:18:36 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:36 Increased send buffer size to 14336 kiB 2025/04/30 11:18:36 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:36 Created qlog file: /logs/qlog/a563ef31dbc651a72e21.sqlog 2025/04/30 11:18:36 client Starting new connection to server4 ([::]:46373 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a563ef31dbc651a72e21, version v1 2025/04/30 11:18:36 Adding connection ID (empty). 2025/04/30 11:18:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:36 client -> Sending packet 0 (1280 bytes) for connection a563ef31dbc651a72e21, Initial 2025/04/30 11:18:36 client Long Header{Type: Initial, DestConnectionID: a563ef31dbc651a72e21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:36 client -> Sending packet 1 (1280 bytes) for connection a563ef31dbc651a72e21, Initial 2025/04/30 11:18:36 client Long Header{Type: Initial, DestConnectionID: a563ef31dbc651a72e21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:36 client -> Sending packet 2 (1280 bytes) for connection a563ef31dbc651a72e21, Initial 2025/04/30 11:18:36 client Long Header{Type: Initial, DestConnectionID: a563ef31dbc651a72e21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:36 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b68bc11ae9d1a814, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:36 client Received first packet. Switching destination connection ID to: b68bc11ae9d1a814 2025/04/30 11:18:36 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:36 client newly acked packets (1): [2] 2025/04/30 11:18:36 client updated RTT: 33.307619ms (σ: 16.653809ms) 2025/04/30 11:18:36 client -> Sending packet 3 (1280 bytes) for connection a563ef31dbc651a72e21, Initial 2025/04/30 11:18:36 client Long Header{Type: Initial, DestConnectionID: b68bc11ae9d1a814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:36 client -> &wire.PingFrame{} 2025/04/30 11:18:36 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b68bc11ae9d1a814, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:36 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:36 client newly acked packets (1): [3] 2025/04/30 11:18:36 client updated RTT: 33.169ms (σ: 12.764ms) 2025/04/30 11:18:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:36 client -> Sending packet 4 (1280 bytes) for connection a563ef31dbc651a72e21, Initial 2025/04/30 11:18:36 client Long Header{Type: Initial, DestConnectionID: b68bc11ae9d1a814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:36 client -> &wire.PingFrame{} 2025/04/30 11:18:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:37 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:37 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 11:18:37 client -> Sending packet 5 (1280 bytes) for connection a563ef31dbc651a72e21, Initial 2025/04/30 11:18:37 client Long Header{Type: Initial, DestConnectionID: b68bc11ae9d1a814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:37 client -> &wire.PingFrame{} 2025/04/30 11:18:37 client -> Sending packet 6 (1280 bytes) for connection a563ef31dbc651a72e21, Initial 2025/04/30 11:18:37 client Long Header{Type: Initial, DestConnectionID: b68bc11ae9d1a814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:37 client -> &wire.PingFrame{} 2025/04/30 11:18:37 client <- Reading packet 8 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b68bc11ae9d1a814, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:37 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:37 client <- Reading packet 9 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b68bc11ae9d1a814, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:37 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:37 client newly acked packets (1): [6] 2025/04/30 11:18:37 client updated RTT: 33.158ms (σ: 9.593ms) 2025/04/30 11:18:37 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:37 client <- Reading packet 10 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b68bc11ae9d1a814, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:37 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:37 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:37 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:37 client <- Reading packet 4 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b68bc11ae9d1a814, PacketNumber: 4, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 11:18:37 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:37 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a563ef31dbc651a72e21, InitialSourceConnectionID: b68bc11ae9d1a814, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x61f38ed71b086125372291cf7337def4} 2025/04/30 11:18:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a563ef31dbc651a72e21 2025/04/30 11:18:37 client Long Header{Type: Initial, DestConnectionID: b68bc11ae9d1a814, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:37 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 4, Smallest: 3}}, DelayTime: 0s} 2025/04/30 11:18:37 client Long Header{Type: Handshake, DestConnectionID: b68bc11ae9d1a814, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:37 client Dropping Initial keys. 2025/04/30 11:18:37 client -> Sending packet 1 (86 bytes) for connection a563ef31dbc651a72e21, Handshake 2025/04/30 11:18:37 client Long Header{Type: Handshake, DestConnectionID: b68bc11ae9d1a814, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:37 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:18:37 client Short Header{DestConnectionID: b68bc11ae9d1a814, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:38 client <- Reading packet 6 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b68bc11ae9d1a814, PacketNumber: 6, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:38 client Peer doesn't await address validation any longer. 2025/04/30 11:18:38 client newly acked packets (1): [0] 2025/04/30 11:18:38 client updated RTT: 33.307ms (σ: 7.492ms) 2025/04/30 11:18:38 client Canceling loss detection timer. 2025/04/30 11:18:38 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:38 client -> Sending packet 1 (32 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:38 client Short Header{DestConnectionID: b68bc11ae9d1a814, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144.722µs} 2025/04/30 11:18:38 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:38 client Dropping Handshake keys. 2025/04/30 11:18:38 client <- &wire.NewTokenFrame{Token: 0xb7648b01e006aa7ada58421962bfa7d2364b42e4e43964267626d244e85c93a25d0bdd08c2} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d056eab04408983, StatelessResetToken: 0x6caa7a2620bb12f8f11b3054b924ef4e} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4499a9b03923f4ef, StatelessResetToken: 0x19c678c07f8381a5574113aa931c2912} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8094b05a41521d3, StatelessResetToken: 0x667b1d3cf67e9ec6df0e6aae146d925e} 2025/04/30 11:18:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:38 client -> Sending packet 2 (34 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 106.29µs} 2025/04/30 11:18:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:38 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:38 client newly acked packets (1): [2] 2025/04/30 11:18:38 client updated RTT: 33.109ms (σ: 6.014ms) 2025/04/30 11:18:38 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:38 client lost packet 0 (time threshold) 2025/04/30 11:18:38 client Canceling loss detection timer. 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 68e027b85f315fcb, StatelessResetToken: 0x05184d0b05d0ec3340cc3666331aafc9} 2025/04/30 11:18:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:38 client Ignoring all packets below 2. 2025/04/30 11:18:38 client -> Sending packet 3 (51 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 127.469µs} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 11:18:38 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:38 client -> Sending packet 5 (46 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 client -> Sending packet 6 (46 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 68e027b85f315fcb, StatelessResetToken: 0x05184d0b05d0ec3340cc3666331aafc9} 2025/04/30 11:18:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:38 client <- Reading packet 4 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 68e027b85f315fcb, StatelessResetToken: 0x05184d0b05d0ec3340cc3666331aafc9} 2025/04/30 11:18:38 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:38 client -> Sending packet 7 (32 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 72.365µs} 2025/04/30 11:18:38 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:18:38 client -> Sending packet 9 (46 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 client -> Sending packet 10 (46 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 client -> Sending packet 11 (1366 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.PingFrame{} 2025/04/30 11:18:38 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:38 client -> Sending packet 12 (34 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 92.764µs} 2025/04/30 11:18:38 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:38 client -> Sending packet 13 (30 bytes) for connection a563ef31dbc651a72e21, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 8d056eab04408983, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:38 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:38 client Connection a563ef31dbc651a72e21 closed. 2025/04/30 11:18:38 Requesting https://server4:443/dohldtrpxv. 2025/04/30 11:18:38 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:38 Increased send buffer size to 14336 kiB 2025/04/30 11:18:38 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:38 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:38 Created qlog file: /logs/qlog/fd1ad8ffb19e2749822ad2dff4.sqlog 2025/04/30 11:18:38 client Starting new connection to server4 ([::]:37822 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fd1ad8ffb19e2749822ad2dff4, version v1 2025/04/30 11:18:38 Adding connection ID (empty). 2025/04/30 11:18:38 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:38 client -> Sending packet 0 (1280 bytes) for connection fd1ad8ffb19e2749822ad2dff4, Initial 2025/04/30 11:18:38 client Long Header{Type: Initial, DestConnectionID: fd1ad8ffb19e2749822ad2dff4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:18:38 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:38 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1205c4714117e7b1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:38 client Received first packet. Switching destination connection ID to: 1205c4714117e7b1 2025/04/30 11:18:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:38 client newly acked packets (1): [0] 2025/04/30 11:18:38 client updated RTT: 34.414848ms (σ: 17.207424ms) 2025/04/30 11:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:38 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:38 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:38 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:38 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1205c4714117e7b1, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 11:18:38 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:38 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fd1ad8ffb19e2749822ad2dff4, InitialSourceConnectionID: 1205c4714117e7b1, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x8f1213206f5136778d0ad57023569e72} 2025/04/30 11:18:38 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fd1ad8ffb19e2749822ad2dff4 2025/04/30 11:18:38 client Long Header{Type: Initial, DestConnectionID: 1205c4714117e7b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: 1205c4714117e7b1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:38 client Dropping Initial keys. 2025/04/30 11:18:38 client -> Sending packet 1 (86 bytes) for connection fd1ad8ffb19e2749822ad2dff4, Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: 1205c4714117e7b1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:38 client Short Header{DestConnectionID: 1205c4714117e7b1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:38 client -> Sending packet 2 (90 bytes) for connection fd1ad8ffb19e2749822ad2dff4, Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: 1205c4714117e7b1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:38 client -> Sending packet 3 (90 bytes) for connection fd1ad8ffb19e2749822ad2dff4, Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: 1205c4714117e7b1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:38 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:38 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1205c4714117e7b1, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:38 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:38 client Peer doesn't await address validation any longer. 2025/04/30 11:18:38 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:38 client -> Sending packet 1 (32 bytes) for connection fd1ad8ffb19e2749822ad2dff4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 1205c4714117e7b1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 127.319µs} 2025/04/30 11:18:38 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104ms} 2025/04/30 11:18:38 client newly acked packets (1): [0] 2025/04/30 11:18:38 client updated RTT: 44.048ms (σ: 32.173ms) 2025/04/30 11:18:38 client Canceling loss detection timer. 2025/04/30 11:18:38 client Dropping Handshake keys. 2025/04/30 11:18:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:38 client <- &wire.NewTokenFrame{Token: 0xb7422675f3b94facbc7ea325d1f4e840533e44569ceb19236a4352d7b7210811f247ed10d8} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6e2d8720b074ca58, StatelessResetToken: 0x2c515282f00e4911e8f6884d1f1304e5} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d01b888d169f54b9, StatelessResetToken: 0xe0ed00dab09fe998b1d66cb3a7d648ee} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99322f23659db3de, StatelessResetToken: 0x91c423deff34336f629df7e8410ad372} 2025/04/30 11:18:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:38 client -> Sending packet 2 (34 bytes) for connection fd1ad8ffb19e2749822ad2dff4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 6e2d8720b074ca58, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 110.687µs} 2025/04/30 11:18:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:38 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:38 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:38 client -> Sending packet 3 (30 bytes) for connection fd1ad8ffb19e2749822ad2dff4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 6e2d8720b074ca58, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:38 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:38 client Connection fd1ad8ffb19e2749822ad2dff4 closed. 2025/04/30 11:18:38 Requesting https://server4:443/aqietpwhwm. 2025/04/30 11:18:38 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:38 Increased send buffer size to 14336 kiB 2025/04/30 11:18:38 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:38 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:38 Created qlog file: /logs/qlog/4d2d511c792fd09dd3b2.sqlog 2025/04/30 11:18:38 client Starting new connection to server4 ([::]:46287 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4d2d511c792fd09dd3b2, version v1 2025/04/30 11:18:38 Adding connection ID (empty). 2025/04/30 11:18:38 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:38 client -> Sending packet 0 (1280 bytes) for connection 4d2d511c792fd09dd3b2, Initial 2025/04/30 11:18:38 client Long Header{Type: Initial, DestConnectionID: 4d2d511c792fd09dd3b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 11:18:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:38 client -> Sending packet 1 (1280 bytes) for connection 4d2d511c792fd09dd3b2, Initial 2025/04/30 11:18:38 client Long Header{Type: Initial, DestConnectionID: 4d2d511c792fd09dd3b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 11:18:38 client -> Sending packet 2 (1280 bytes) for connection 4d2d511c792fd09dd3b2, Initial 2025/04/30 11:18:38 client Long Header{Type: Initial, DestConnectionID: 4d2d511c792fd09dd3b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 11:18:38 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 11:18:38 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 11:18:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f50be5aed65310f2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 11:18:38 client Received first packet. Switching destination connection ID to: f50be5aed65310f2 2025/04/30 11:18:38 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:38 client newly acked packets (1): [2] 2025/04/30 11:18:38 client updated RTT: 34.890411ms (σ: 17.445205ms) 2025/04/30 11:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:38 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:38 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:38 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 11:18:38 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f50be5aed65310f2, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 11:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 11:18:38 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:38 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4d2d511c792fd09dd3b2, InitialSourceConnectionID: f50be5aed65310f2, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4b23efda237efc268bbbe23a6856fdb8} 2025/04/30 11:18:38 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4d2d511c792fd09dd3b2 2025/04/30 11:18:38 client Long Header{Type: Initial, DestConnectionID: f50be5aed65310f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: f50be5aed65310f2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:38 client Dropping Initial keys. 2025/04/30 11:18:38 client -> Sending packet 1 (86 bytes) for connection 4d2d511c792fd09dd3b2, Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: f50be5aed65310f2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:38 client Short Header{DestConnectionID: f50be5aed65310f2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:38 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f50be5aed65310f2, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:38 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:38 client Peer doesn't await address validation any longer. 2025/04/30 11:18:38 client newly acked packets (1): [0] 2025/04/30 11:18:38 client Canceling loss detection timer. 2025/04/30 11:18:38 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:38 client -> Sending packet 1 (32 bytes) for connection 4d2d511c792fd09dd3b2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:38 client Short Header{DestConnectionID: f50be5aed65310f2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 105.568µs} 2025/04/30 11:18:38 client <- Reading packet 3 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:38 client <- Reading packet 4 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:38 client Dropping Handshake keys. 2025/04/30 11:18:38 client <- &wire.NewTokenFrame{Token: 0xb7de9aed6ce3c9e3cccf3ac25a2f55309689e20b2b824a8ef664b8a10cc07c52128c993b95} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 42065dd8751e0a1f, StatelessResetToken: 0xb30f75698ffd4f4f9f2340a7a49af17f} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 89814e53bbead047, StatelessResetToken: 0xb0aaf6092ea8f1906c17f347f17ec98b} 2025/04/30 11:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 65089922096c518e, StatelessResetToken: 0x472aca723880429b9a285ec65adc7157} 2025/04/30 11:18:38 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:38 client -> Sending packet 3 (55 bytes) for connection 4d2d511c792fd09dd3b2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 42065dd8751e0a1f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 134.683µs} 2025/04/30 11:18:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 client -> Sending packet 4 (48 bytes) for connection 4d2d511c792fd09dd3b2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:38 client Short Header{DestConnectionID: 42065dd8751e0a1f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:39 client <- Reading packet 5 (1081 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:18:39 client newly acked packets (1): [4] 2025/04/30 11:18:39 client updated RTT: 34.66ms (σ: 13.542ms) 2025/04/30 11:18:39 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:39 client Canceling loss detection timer. 2025/04/30 11:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9b171b7f121fad94, StatelessResetToken: 0x2e7bbb1035491d641c0b727fdd2a2b2b} 2025/04/30 11:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:39 client -> Sending packet 5 (30 bytes) for connection 4d2d511c792fd09dd3b2, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 42065dd8751e0a1f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:39 client Connection 4d2d511c792fd09dd3b2 closed. 2025/04/30 11:18:39 Requesting https://server4:443/csszulybjp. 2025/04/30 11:18:39 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:39 Increased send buffer size to 14336 kiB 2025/04/30 11:18:39 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:39 Created qlog file: /logs/qlog/6324595e1dacd7082d0fe8c7.sqlog 2025/04/30 11:18:39 client Starting new connection to server4 ([::]:57873 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6324595e1dacd7082d0fe8c7, version v1 2025/04/30 11:18:39 Adding connection ID (empty). 2025/04/30 11:18:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:39 client -> Sending packet 0 (1280 bytes) for connection 6324595e1dacd7082d0fe8c7, Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: 6324595e1dacd7082d0fe8c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:39 client -> Sending packet 1 (1280 bytes) for connection 6324595e1dacd7082d0fe8c7, Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: 6324595e1dacd7082d0fe8c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:39 client -> Sending packet 2 (1280 bytes) for connection 6324595e1dacd7082d0fe8c7, Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: 6324595e1dacd7082d0fe8c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:39 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: db432dffc285f7db, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:39 client Received first packet. Switching destination connection ID to: db432dffc285f7db 2025/04/30 11:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:39 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:39 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: db432dffc285f7db, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:39 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db432dffc285f7db, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:18:39 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6324595e1dacd7082d0fe8c7, InitialSourceConnectionID: db432dffc285f7db, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4a5f2535f871ce6ba9cde8ac4905f8c9} 2025/04/30 11:18:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6324595e1dacd7082d0fe8c7 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: db432dffc285f7db, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: db432dffc285f7db, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:39 client Dropping Initial keys. 2025/04/30 11:18:39 client -> Sending packet 1 (86 bytes) for connection 6324595e1dacd7082d0fe8c7, Handshake 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: db432dffc285f7db, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:39 client Short Header{DestConnectionID: db432dffc285f7db, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:39 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db432dffc285f7db, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client Peer doesn't await address validation any longer. 2025/04/30 11:18:39 client newly acked packets (1): [0] 2025/04/30 11:18:39 client updated RTT: 33.892039ms (σ: 16.946019ms) 2025/04/30 11:18:39 client Canceling loss detection timer. 2025/04/30 11:18:39 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:39 client -> Sending packet 1 (32 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: db432dffc285f7db, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 120.937µs} 2025/04/30 11:18:39 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:39 client Dropping Handshake keys. 2025/04/30 11:18:39 client <- &wire.NewTokenFrame{Token: 0xb72616fe042e2a4f26d575360c1400a509cea505bfae6274ab04a1ca77d83aa617b13ab382} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 24701c4596847f1a, StatelessResetToken: 0x00790bae648933a0fd91f79ff2809bbb} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3614c2d6dca1b4e9, StatelessResetToken: 0x0605b19f9b9bec3381168b4f1396ae25} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 094f9c993511601f, StatelessResetToken: 0x5e6c07028bf8fa314e0308ea5829c675} 2025/04/30 11:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:39 client -> Sending packet 2 (34 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 94.397µs} 2025/04/30 11:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:39 client -> Sending packet 4 (46 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 client Skipping packet number 3 2025/04/30 11:18:39 client -> Sending packet 5 (29 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:39 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b82ffbe54b9ded83, StatelessResetToken: 0xcc4980c24b8df65d314ee785fb7fd96f} 2025/04/30 11:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:39 client -> Sending packet 6 (34 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 84.599µs} 2025/04/30 11:18:39 client <- Reading packet 4 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b82ffbe54b9ded83, StatelessResetToken: 0xcc4980c24b8df65d314ee785fb7fd96f} 2025/04/30 11:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:39 client Sending ACK because the ACK timer expired. 2025/04/30 11:18:39 client -> Sending packet 7 (35 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.247868ms} 2025/04/30 11:18:39 client <- Reading packet 5 (26 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 6ms} 2025/04/30 11:18:39 client newly acked packets (1): [5] 2025/04/30 11:18:39 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:39 client lost packet 4 (time threshold) 2025/04/30 11:18:39 client Canceling loss detection timer. 2025/04/30 11:18:39 client -> Sending packet 8 (1366 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.PingFrame{} 2025/04/30 11:18:39 client -> Sending packet 9 (46 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 client <- Reading packet 6 (26 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 21ms} 2025/04/30 11:18:39 client newly acked packets (1): [8] 2025/04/30 11:18:39 client updated RTT: 36.332ms (σ: 17.589ms) 2025/04/30 11:18:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:39 client -> Sending packet 11 (46 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 client -> Sending packet 12 (46 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 client <- Reading packet 7 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 1ms} 2025/04/30 11:18:39 client newly acked packets (1): [12] 2025/04/30 11:18:39 client updated RTT: 35.934ms (σ: 13.987ms) 2025/04/30 11:18:39 client Canceling loss detection timer. 2025/04/30 11:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:39 client -> Sending packet 13 (30 bytes) for connection 6324595e1dacd7082d0fe8c7, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 24701c4596847f1a, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:39 client Connection 6324595e1dacd7082d0fe8c7 closed. 2025/04/30 11:18:39 Requesting https://server4:443/yjzwcycagu. 2025/04/30 11:18:39 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:39 Increased send buffer size to 14336 kiB 2025/04/30 11:18:39 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:39 Created qlog file: /logs/qlog/09ad88cff0ca6cffe73ea7cd0d145bba858272.sqlog 2025/04/30 11:18:39 client Starting new connection to server4 ([::]:38164 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 09ad88cff0ca6cffe73ea7cd0d145bba858272, version v1 2025/04/30 11:18:39 Adding connection ID (empty). 2025/04/30 11:18:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:39 client -> Sending packet 0 (1280 bytes) for connection 09ad88cff0ca6cffe73ea7cd0d145bba858272, Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: 09ad88cff0ca6cffe73ea7cd0d145bba858272, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:18:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 11:18:39 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a69e262c37e9239, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 11:18:39 client Received first packet. Switching destination connection ID to: 7a69e262c37e9239 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client newly acked packets (1): [0] 2025/04/30 11:18:39 client updated RTT: 34.34498ms (σ: 17.17249ms) 2025/04/30 11:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:39 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 11:18:39 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a69e262c37e9239, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 11:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/04/30 11:18:39 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 09ad88cff0ca6cffe73ea7cd0d145bba858272, InitialSourceConnectionID: 7a69e262c37e9239, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xbc9f6f84650a3f8dac14256c3f4cfbab} 2025/04/30 11:18:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 09ad88cff0ca6cffe73ea7cd0d145bba858272 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: 7a69e262c37e9239, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: 7a69e262c37e9239, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:39 client Dropping Initial keys. 2025/04/30 11:18:39 client -> Sending packet 1 (86 bytes) for connection 09ad88cff0ca6cffe73ea7cd0d145bba858272, Handshake 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: 7a69e262c37e9239, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client Short Header{DestConnectionID: 7a69e262c37e9239, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client Peer doesn't await address validation any longer. 2025/04/30 11:18:39 client newly acked packets (1): [0] 2025/04/30 11:18:39 client updated RTT: 34.377ms (σ: 12.946ms) 2025/04/30 11:18:39 client Canceling loss detection timer. 2025/04/30 11:18:39 client Dropping Handshake keys. 2025/04/30 11:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:39 client <- &wire.NewTokenFrame{Token: 0xb7b2a3bab76d9a09c8bac56d1b3aa06d24074a9623d82f9f280e4c20b174b14cb951b63c87} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9ff648567e679dc4, StatelessResetToken: 0x92602958232b9de339b6b56136b1ea94} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 759ab8cb7e4d358d, StatelessResetToken: 0xce0304f5c42da503089b7a0a86d463f8} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 68cf26a8159511d7, StatelessResetToken: 0x0a167c6717b49c185dc57f80bd6cef0f} 2025/04/30 11:18:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:39 client -> Sending packet 1 (34 bytes) for connection 09ad88cff0ca6cffe73ea7cd0d145bba858272, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 9ff648567e679dc4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 124.494µs} 2025/04/30 11:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:39 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:39 client -> Sending packet 2 (30 bytes) for connection 09ad88cff0ca6cffe73ea7cd0d145bba858272, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 9ff648567e679dc4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:39 client Connection 09ad88cff0ca6cffe73ea7cd0d145bba858272 closed. 2025/04/30 11:18:39 Requesting https://server4:443/onqpbacaru. 2025/04/30 11:18:39 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:39 Increased send buffer size to 14336 kiB 2025/04/30 11:18:39 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:39 Created qlog file: /logs/qlog/5838c1008663885c681564.sqlog 2025/04/30 11:18:39 client Starting new connection to server4 ([::]:55721 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5838c1008663885c681564, version v1 2025/04/30 11:18:39 Adding connection ID (empty). 2025/04/30 11:18:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:39 client -> Sending packet 0 (1280 bytes) for connection 5838c1008663885c681564, Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: 5838c1008663885c681564, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 11:18:39 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9ab22a1d996c6edf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 11:18:39 client Received first packet. Switching destination connection ID to: 9ab22a1d996c6edf 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client newly acked packets (1): [0] 2025/04/30 11:18:39 client updated RTT: 34.090631ms (σ: 17.045315ms) 2025/04/30 11:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:39 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 11:18:39 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ab22a1d996c6edf, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 11:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 11:18:39 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5838c1008663885c681564, InitialSourceConnectionID: 9ab22a1d996c6edf, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x6b6a553b40c8d9e91a5bb66919e99a7e} 2025/04/30 11:18:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5838c1008663885c681564 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: 9ab22a1d996c6edf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: 9ab22a1d996c6edf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:39 client Dropping Initial keys. 2025/04/30 11:18:39 client -> Sending packet 1 (40 bytes) for connection 5838c1008663885c681564, Handshake 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: 9ab22a1d996c6edf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client -> Sending packet 0 (46 bytes) for connection 5838c1008663885c681564, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 9ab22a1d996c6edf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:39 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ab22a1d996c6edf, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:39 client Peer doesn't await address validation any longer. 2025/04/30 11:18:39 client newly acked packets (1): [0] 2025/04/30 11:18:39 client Canceling loss detection timer. 2025/04/30 11:18:39 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:39 client -> Sending packet 1 (32 bytes) for connection 5838c1008663885c681564, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 9ab22a1d996c6edf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 108.724µs} 2025/04/30 11:18:39 client <- Reading packet 2 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:39 client Dropping Handshake keys. 2025/04/30 11:18:39 client <- &wire.NewTokenFrame{Token: 0xb72100d3b1b5d5b29211280a086deaa5e709631f3d90509225ebe755e026226ed627f87854} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ae588d268e98604, StatelessResetToken: 0x79cf7bc88884d225e12c61c3805801d3} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 051bd5e140c81c46, StatelessResetToken: 0xa27ffbe662c7771eb79ae6f0213f45a6} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 842d2589aecb148b, StatelessResetToken: 0xf135f81cc728390beb1078472c1e6e38} 2025/04/30 11:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:39 client -> Sending packet 3 (55 bytes) for connection 5838c1008663885c681564, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 5ae588d268e98604, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 127.88µs} 2025/04/30 11:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 client -> Sending packet 4 (48 bytes) for connection 5838c1008663885c681564, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 5ae588d268e98604, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:39 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:39 client <- &wire.NewTokenFrame{Token: 0xb72100d3b1b5d5b29211280a086deaa5e709631f3d90509225ebe755e026226ed627f87854} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ae588d268e98604, StatelessResetToken: 0x79cf7bc88884d225e12c61c3805801d3} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 051bd5e140c81c46, StatelessResetToken: 0xa27ffbe662c7771eb79ae6f0213f45a6} 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 842d2589aecb148b, StatelessResetToken: 0xf135f81cc728390beb1078472c1e6e38} 2025/04/30 11:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:39 client Sending ACK because the ACK timer expired. 2025/04/30 11:18:39 client -> Sending packet 5 (35 bytes) for connection 5838c1008663885c681564, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 5ae588d268e98604, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.310399ms} 2025/04/30 11:18:39 client <- Reading packet 4 (53 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:39 client newly acked packets (1): [4] 2025/04/30 11:18:39 client updated RTT: 33.893ms (σ: 13.175ms) 2025/04/30 11:18:39 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:39 client Canceling loss detection timer. 2025/04/30 11:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0a1efc4bf1a1f283, StatelessResetToken: 0xd467f6c807db4c9306a121b192a7babc} 2025/04/30 11:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:39 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:39 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:39 client -> Sending packet 6 (34 bytes) for connection 5838c1008663885c681564, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 5ae588d268e98604, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 61.626µs} 2025/04/30 11:18:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:39 client -> Sending packet 7 (30 bytes) for connection 5838c1008663885c681564, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:39 client Short Header{DestConnectionID: 5ae588d268e98604, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:39 client Connection 5838c1008663885c681564 closed. 2025/04/30 11:18:39 Requesting https://server4:443/ehufkqwivh. 2025/04/30 11:18:39 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:39 Increased send buffer size to 14336 kiB 2025/04/30 11:18:39 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:39 Created qlog file: /logs/qlog/f94562eca4e5e1464c5987b67f1836.sqlog 2025/04/30 11:18:39 client Starting new connection to server4 ([::]:57883 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f94562eca4e5e1464c5987b67f1836, version v1 2025/04/30 11:18:39 Adding connection ID (empty). 2025/04/30 11:18:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:39 client -> Sending packet 0 (1280 bytes) for connection f94562eca4e5e1464c5987b67f1836, Initial 2025/04/30 11:18:39 client Long Header{Type: Initial, DestConnectionID: f94562eca4e5e1464c5987b67f1836, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:40 client -> Sending packet 1 (1280 bytes) for connection f94562eca4e5e1464c5987b67f1836, Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: f94562eca4e5e1464c5987b67f1836, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:40 client -> Sending packet 2 (1280 bytes) for connection f94562eca4e5e1464c5987b67f1836, Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: f94562eca4e5e1464c5987b67f1836, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:40 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:40 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 20ecfd50b4cafca3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:40 client Received first packet. Switching destination connection ID to: 20ecfd50b4cafca3 2025/04/30 11:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:40 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:40 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:40 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:40 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 20ecfd50b4cafca3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:40 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:40 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:40 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 20ecfd50b4cafca3, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 11:18:40 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:40 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f94562eca4e5e1464c5987b67f1836, InitialSourceConnectionID: 20ecfd50b4cafca3, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x89251ab2ede51df632f5d96dab3beff6} 2025/04/30 11:18:40 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 20ecfd50b4cafca3, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:40 client newly acked packets (1): [2] 2025/04/30 11:18:40 client updated RTT: 33.69949ms (σ: 16.849745ms) 2025/04/30 11:18:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f94562eca4e5e1464c5987b67f1836 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: 20ecfd50b4cafca3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: 20ecfd50b4cafca3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:40 client Dropping Initial keys. 2025/04/30 11:18:40 client -> Sending packet 1 (86 bytes) for connection f94562eca4e5e1464c5987b67f1836, Handshake 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: 20ecfd50b4cafca3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:40 client Short Header{DestConnectionID: 20ecfd50b4cafca3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:40 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:40 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 20ecfd50b4cafca3, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:40 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:40 client Peer doesn't await address validation any longer. 2025/04/30 11:18:40 client newly acked packets (1): [0] 2025/04/30 11:18:40 client Canceling loss detection timer. 2025/04/30 11:18:40 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:40 client -> Sending packet 1 (32 bytes) for connection f94562eca4e5e1464c5987b67f1836, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:40 client Short Header{DestConnectionID: 20ecfd50b4cafca3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 137.808µs} 2025/04/30 11:18:40 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/04/30 11:18:40 client newly acked packets (1): [0] 2025/04/30 11:18:40 client updated RTT: 33.876ms (σ: 12.992ms) 2025/04/30 11:18:40 client Dropping Handshake keys. 2025/04/30 11:18:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:40 client <- &wire.NewTokenFrame{Token: 0xb7d6bfd02c6b752fc03ef60b8fb319f8c7639a69a352ed214bad0ebe6566875ce2f8eb65e7} 2025/04/30 11:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f126a06209a1c1a7, StatelessResetToken: 0xce474a017c596402878324ac48cbf102} 2025/04/30 11:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0de85531c722205a, StatelessResetToken: 0x92c4f02b8affa488c16ae800edb535ee} 2025/04/30 11:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ff88d469e0290df6, StatelessResetToken: 0x4317097ee1dbe04ae35202d96ae74e40} 2025/04/30 11:18:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:40 client -> Sending packet 2 (34 bytes) for connection f94562eca4e5e1464c5987b67f1836, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:40 client Short Header{DestConnectionID: f126a06209a1c1a7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 146.505µs} 2025/04/30 11:18:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:40 client <- Reading packet 3 (53 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:18:40 client newly acked packets (1): [2] 2025/04/30 11:18:40 client updated RTT: 33.585ms (σ: 10.324ms) 2025/04/30 11:18:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:40 client Canceling loss detection timer. 2025/04/30 11:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1ce08251bac51f55, StatelessResetToken: 0xa753ee7e156c3399b979ba7d1bd325b5} 2025/04/30 11:18:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:40 client Ignoring all packets below 2. 2025/04/30 11:18:40 client -> Sending packet 3 (32 bytes) for connection f94562eca4e5e1464c5987b67f1836, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:40 client Short Header{DestConnectionID: f126a06209a1c1a7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 126.568µs} 2025/04/30 11:18:40 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:40 client -> Sending packet 4 (30 bytes) for connection f94562eca4e5e1464c5987b67f1836, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:40 client Short Header{DestConnectionID: f126a06209a1c1a7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:40 client Connection f94562eca4e5e1464c5987b67f1836 closed. 2025/04/30 11:18:40 Requesting https://server4:443/xbzyrwzjwp. 2025/04/30 11:18:40 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:40 Increased send buffer size to 14336 kiB 2025/04/30 11:18:40 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:40 Created qlog file: /logs/qlog/658a4715f3515c225cf5f9016550a54b.sqlog 2025/04/30 11:18:40 client Starting new connection to server4 ([::]:51830 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 658a4715f3515c225cf5f9016550a54b, version v1 2025/04/30 11:18:40 Adding connection ID (empty). 2025/04/30 11:18:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:40 client -> Sending packet 0 (1280 bytes) for connection 658a4715f3515c225cf5f9016550a54b, Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: 658a4715f3515c225cf5f9016550a54b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:18:40 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:40 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7433b15ad817ff30, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:40 client Received first packet. Switching destination connection ID to: 7433b15ad817ff30 2025/04/30 11:18:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:40 client newly acked packets (1): [0] 2025/04/30 11:18:40 client updated RTT: 34.477038ms (σ: 17.238519ms) 2025/04/30 11:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:40 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:40 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:40 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:40 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7433b15ad817ff30, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 11:18:40 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:40 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 658a4715f3515c225cf5f9016550a54b, InitialSourceConnectionID: 7433b15ad817ff30, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x6585202e993f2f6728a1ff4341b16a63} 2025/04/30 11:18:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 658a4715f3515c225cf5f9016550a54b 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: 7433b15ad817ff30, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: 7433b15ad817ff30, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:40 client Dropping Initial keys. 2025/04/30 11:18:40 client -> Sending packet 1 (40 bytes) for connection 658a4715f3515c225cf5f9016550a54b, Handshake 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: 7433b15ad817ff30, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:40 client -> Sending packet 0 (46 bytes) for connection 658a4715f3515c225cf5f9016550a54b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:40 client Short Header{DestConnectionID: 7433b15ad817ff30, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:40 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:40 client -> Sending packet 2 (90 bytes) for connection 658a4715f3515c225cf5f9016550a54b, Handshake 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: 7433b15ad817ff30, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:40 client -> Sending packet 3 (90 bytes) for connection 658a4715f3515c225cf5f9016550a54b, Handshake 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: 7433b15ad817ff30, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:40 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:40 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7433b15ad817ff30, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:40 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:40 client Peer doesn't await address validation any longer. 2025/04/30 11:18:40 client newly acked packets (1): [3] 2025/04/30 11:18:40 client updated RTT: 34.256ms (σ: 13.368ms) 2025/04/30 11:18:40 client Canceling loss detection timer. 2025/04/30 11:18:40 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:40 client -> Sending packet 1 (32 bytes) for connection 658a4715f3515c225cf5f9016550a54b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:40 client Short Header{DestConnectionID: 7433b15ad817ff30, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 137.828µs} 2025/04/30 11:18:40 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:40 client Dropping Handshake keys. 2025/04/30 11:18:40 client <- &wire.NewTokenFrame{Token: 0xb77c2d439dc45c73a9f235efa44e042f728d1bf5d4a63f6ea8caa7acd4738509c87b20d582} 2025/04/30 11:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4a9d5217449c863, StatelessResetToken: 0x361ed59ab97031dee2cb0e9c017360c6} 2025/04/30 11:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b353fa5de84a09e8, StatelessResetToken: 0xe912b751c0190ccc599bceb22ab714c8} 2025/04/30 11:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 895d99a67949af67, StatelessResetToken: 0x535572ecf74eddb095941b41c20d8d15} 2025/04/30 11:18:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:40 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:40 client -> Sending packet 3 (53 bytes) for connection 658a4715f3515c225cf5f9016550a54b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:40 client Short Header{DestConnectionID: d4a9d5217449c863, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 75.802µs} 2025/04/30 11:18:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:40 client -> Sending packet 4 (48 bytes) for connection 658a4715f3515c225cf5f9016550a54b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:40 client Short Header{DestConnectionID: d4a9d5217449c863, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:40 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:40 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:18:40 client newly acked packets (1): [4] 2025/04/30 11:18:40 client updated RTT: 33.988ms (σ: 10.56ms) 2025/04/30 11:18:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:40 client Canceling loss detection timer. 2025/04/30 11:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c46a74c522bd42f9, StatelessResetToken: 0x0fd00672c3a5825b219868ece8f67759} 2025/04/30 11:18:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:40 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:40 client -> Sending packet 5 (32 bytes) for connection 658a4715f3515c225cf5f9016550a54b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:40 client Short Header{DestConnectionID: d4a9d5217449c863, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 59.902µs} 2025/04/30 11:18:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:40 client -> Sending packet 6 (30 bytes) for connection 658a4715f3515c225cf5f9016550a54b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:40 client Short Header{DestConnectionID: d4a9d5217449c863, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:40 client Connection 658a4715f3515c225cf5f9016550a54b closed. 2025/04/30 11:18:40 Requesting https://server4:443/jbevdvydbt. 2025/04/30 11:18:40 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:40 Increased send buffer size to 14336 kiB 2025/04/30 11:18:40 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:40 Created qlog file: /logs/qlog/8a6fdd9d737b62c0.sqlog 2025/04/30 11:18:40 client Starting new connection to server4 ([::]:54486 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8a6fdd9d737b62c0, version v1 2025/04/30 11:18:40 Adding connection ID (empty). 2025/04/30 11:18:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:40 client -> Sending packet 0 (1280 bytes) for connection 8a6fdd9d737b62c0, Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: 8a6fdd9d737b62c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:40 client -> Sending packet 1 (1280 bytes) for connection 8a6fdd9d737b62c0, Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: 8a6fdd9d737b62c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:40 client -> Sending packet 2 (1280 bytes) for connection 8a6fdd9d737b62c0, Initial 2025/04/30 11:18:40 client Long Header{Type: Initial, DestConnectionID: 8a6fdd9d737b62c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:41 client -> Sending packet 3 (1280 bytes) for connection 8a6fdd9d737b62c0, Initial 2025/04/30 11:18:41 client Long Header{Type: Initial, DestConnectionID: 8a6fdd9d737b62c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:41 client -> Sending packet 4 (1280 bytes) for connection 8a6fdd9d737b62c0, Initial 2025/04/30 11:18:41 client Long Header{Type: Initial, DestConnectionID: 8a6fdd9d737b62c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:41 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7e103a2c5e0ea929, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:41 client Received first packet. Switching destination connection ID to: 7e103a2c5e0ea929 2025/04/30 11:18:41 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:41 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:41 client <- Reading packet 6 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7e103a2c5e0ea929, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:41 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:41 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:41 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:41 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7e103a2c5e0ea929, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 11:18:41 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:41 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8a6fdd9d737b62c0, InitialSourceConnectionID: 7e103a2c5e0ea929, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x11bffe0efffcc4b2a18e03958a7805c9} 2025/04/30 11:18:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8a6fdd9d737b62c0 2025/04/30 11:18:41 client Long Header{Type: Initial, DestConnectionID: 7e103a2c5e0ea929, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:41 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 0s} 2025/04/30 11:18:41 client Long Header{Type: Handshake, DestConnectionID: 7e103a2c5e0ea929, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:41 client Dropping Initial keys. 2025/04/30 11:18:41 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:41 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/04/30 11:18:41 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:41 client <- Reading packet 3 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7e103a2c5e0ea929, PacketNumber: 3, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 11:18:41 client -> Sending packet 1 (86 bytes) for connection 8a6fdd9d737b62c0, Handshake 2025/04/30 11:18:41 client Long Header{Type: Handshake, DestConnectionID: 7e103a2c5e0ea929, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:41 client Short Header{DestConnectionID: 7e103a2c5e0ea929, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:41 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:41 client <- Reading packet 4 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7e103a2c5e0ea929, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:41 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:41 client Peer doesn't await address validation any longer. 2025/04/30 11:18:41 client newly acked packets (1): [0] 2025/04/30 11:18:41 client Canceling loss detection timer. 2025/04/30 11:18:41 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:41 client -> Sending packet 1 (32 bytes) for connection 8a6fdd9d737b62c0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:41 client Short Header{DestConnectionID: 7e103a2c5e0ea929, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 152.647µs} 2025/04/30 11:18:41 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:41 client -> Sending packet 2 (34 bytes) for connection 8a6fdd9d737b62c0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:41 client Short Header{DestConnectionID: 7e103a2c5e0ea929, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:41 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 76.924µs} 2025/04/30 11:18:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:41 client -> Sending packet 2 (69 bytes) for connection 8a6fdd9d737b62c0, Handshake 2025/04/30 11:18:41 client Long Header{Type: Handshake, DestConnectionID: 7e103a2c5e0ea929, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:41 client Short Header{DestConnectionID: 7e103a2c5e0ea929, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:41 client Connection 8a6fdd9d737b62c0 closed. 2025/04/30 11:18:41 Requesting https://server4:443/krfeusvrwb. 2025/04/30 11:18:41 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:41 Increased send buffer size to 14336 kiB 2025/04/30 11:18:41 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:41 Created qlog file: /logs/qlog/eee2c6976e2c0fc98f.sqlog 2025/04/30 11:18:41 client Starting new connection to server4 ([::]:54776 -> 193.167.100.100:443), source connection ID (empty), destination connection ID eee2c6976e2c0fc98f, version v1 2025/04/30 11:18:41 Adding connection ID (empty). 2025/04/30 11:18:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:41 client -> Sending packet 0 (1280 bytes) for connection eee2c6976e2c0fc98f, Initial 2025/04/30 11:18:41 client Long Header{Type: Initial, DestConnectionID: eee2c6976e2c0fc98f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:18:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:41 client -> Sending packet 1 (1280 bytes) for connection eee2c6976e2c0fc98f, Initial 2025/04/30 11:18:41 client Long Header{Type: Initial, DestConnectionID: eee2c6976e2c0fc98f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:18:41 client -> Sending packet 2 (1280 bytes) for connection eee2c6976e2c0fc98f, Initial 2025/04/30 11:18:41 client Long Header{Type: Initial, DestConnectionID: eee2c6976e2c0fc98f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:18:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:42 client -> Sending packet 3 (1280 bytes) for connection eee2c6976e2c0fc98f, Initial 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: eee2c6976e2c0fc98f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:18:42 client -> Sending packet 4 (1280 bytes) for connection eee2c6976e2c0fc98f, Initial 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: eee2c6976e2c0fc98f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:18:42 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 20b3e96a31284a1b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:18:42 client Received first packet. Switching destination connection ID to: 20b3e96a31284a1b 2025/04/30 11:18:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:18:42 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:42 client <- Reading packet 5 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 20b3e96a31284a1b, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:42 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:42 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:42 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:42 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 20b3e96a31284a1b, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 11:18:42 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:42 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: eee2c6976e2c0fc98f, InitialSourceConnectionID: 20b3e96a31284a1b, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x67ea78a2413cc3ecfac03717dd678663} 2025/04/30 11:18:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection eee2c6976e2c0fc98f 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: 20b3e96a31284a1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: 20b3e96a31284a1b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:42 client Dropping Initial keys. 2025/04/30 11:18:42 client -> Sending packet 1 (40 bytes) for connection eee2c6976e2c0fc98f, Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: 20b3e96a31284a1b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:42 client -> Sending packet 0 (46 bytes) for connection eee2c6976e2c0fc98f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:42 client Short Header{DestConnectionID: 20b3e96a31284a1b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:42 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:42 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/04/30 11:18:42 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:42 client <- Reading packet 3 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 20b3e96a31284a1b, PacketNumber: 3, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 11:18:42 client -> Sending packet 2 (40 bytes) for connection eee2c6976e2c0fc98f, Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: 20b3e96a31284a1b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:42 client <- Reading packet 2 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:42 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:42 client Dropping Handshake keys. 2025/04/30 11:18:42 client <- &wire.NewTokenFrame{Token: 0xb743c7a0134ed861ac5af1e3af67e3ea85abb8434c47151be72f23d6f5e9bde7c1ca35c3fe} 2025/04/30 11:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ea3b67783a8a6da8, StatelessResetToken: 0x72702405c679efa1987b0aede3380447} 2025/04/30 11:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cb9e8cd44df97ad9, StatelessResetToken: 0xd4f6ee9a22ff3b85db420c55ea3f75dc} 2025/04/30 11:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ab72bdaddd53c218, StatelessResetToken: 0x44c952d37b17cbb4505973a7b9e9144d} 2025/04/30 11:18:42 client -> Sending packet 1 (1366 bytes) for connection eee2c6976e2c0fc98f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:42 client Short Header{DestConnectionID: ea3b67783a8a6da8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.PingFrame{} 2025/04/30 11:18:42 client -> Sending packet 2 (34 bytes) for connection eee2c6976e2c0fc98f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:42 client Short Header{DestConnectionID: ea3b67783a8a6da8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 238.207µs} 2025/04/30 11:18:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:42 client <- Reading packet 4 (24 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 22ms} 2025/04/30 11:18:42 client newly acked packets (1): [1] 2025/04/30 11:18:42 client updated RTT: 53.656041ms (σ: 26.82802ms) 2025/04/30 11:18:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:42 client lost packet 0 (time threshold) 2025/04/30 11:18:42 client -> Sending packet 3 (46 bytes) for connection eee2c6976e2c0fc98f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:42 client Short Header{DestConnectionID: ea3b67783a8a6da8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:42 client <- Reading packet 5 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 1ms} 2025/04/30 11:18:42 client newly acked packets (1): [3] 2025/04/30 11:18:42 client updated RTT: 51.053ms (σ: 25.325ms) 2025/04/30 11:18:42 client lost packet 2 (time threshold) 2025/04/30 11:18:42 client Canceling loss detection timer. 2025/04/30 11:18:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:42 client -> Sending packet 4 (34 bytes) for connection eee2c6976e2c0fc98f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:42 client Short Header{DestConnectionID: ea3b67783a8a6da8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 148.869µs} 2025/04/30 11:18:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:42 client -> Sending packet 5 (30 bytes) for connection eee2c6976e2c0fc98f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:42 client Short Header{DestConnectionID: ea3b67783a8a6da8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:42 client Connection eee2c6976e2c0fc98f closed. 2025/04/30 11:18:42 Requesting https://server4:443/ewuabewaky. 2025/04/30 11:18:42 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:42 Increased send buffer size to 14336 kiB 2025/04/30 11:18:42 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:42 Created qlog file: /logs/qlog/bbefca74908a462ad237.sqlog 2025/04/30 11:18:42 client Starting new connection to server4 ([::]:49802 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bbefca74908a462ad237, version v1 2025/04/30 11:18:42 Adding connection ID (empty). 2025/04/30 11:18:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:42 client -> Sending packet 0 (1280 bytes) for connection bbefca74908a462ad237, Initial 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: bbefca74908a462ad237, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:42 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:42 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7f1737b8f7a7de20, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:42 client Received first packet. Switching destination connection ID to: 7f1737b8f7a7de20 2025/04/30 11:18:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:42 client newly acked packets (1): [0] 2025/04/30 11:18:42 client updated RTT: 34.257963ms (σ: 17.128981ms) 2025/04/30 11:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:42 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:42 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:42 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:42 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7f1737b8f7a7de20, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 11:18:42 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:42 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bbefca74908a462ad237, InitialSourceConnectionID: 7f1737b8f7a7de20, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x44f32dea93dcdd5a1527ed528f5e08d0} 2025/04/30 11:18:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bbefca74908a462ad237 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: 7f1737b8f7a7de20, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: 7f1737b8f7a7de20, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:42 client Dropping Initial keys. 2025/04/30 11:18:42 client -> Sending packet 1 (40 bytes) for connection bbefca74908a462ad237, Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: 7f1737b8f7a7de20, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:42 client -> Sending packet 0 (46 bytes) for connection bbefca74908a462ad237, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:42 client Short Header{DestConnectionID: 7f1737b8f7a7de20, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:42 client -> Sending packet 2 (90 bytes) for connection bbefca74908a462ad237, Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: 7f1737b8f7a7de20, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:42 client -> Sending packet 3 (90 bytes) for connection bbefca74908a462ad237, Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: 7f1737b8f7a7de20, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:42 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:42 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7f1737b8f7a7de20, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:42 client Peer doesn't await address validation any longer. 2025/04/30 11:18:42 client newly acked packets (1): [3] 2025/04/30 11:18:42 client updated RTT: 34.046ms (σ: 13.267ms) 2025/04/30 11:18:42 client Canceling loss detection timer. 2025/04/30 11:18:42 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:42 client -> Sending packet 1 (32 bytes) for connection bbefca74908a462ad237, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:42 client Short Header{DestConnectionID: 7f1737b8f7a7de20, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 113.873µs} 2025/04/30 11:18:42 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102ms} 2025/04/30 11:18:42 client newly acked packets (1): [0] 2025/04/30 11:18:42 client updated RTT: 43.731ms (σ: 29.322ms) 2025/04/30 11:18:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:42 client Dropping Handshake keys. 2025/04/30 11:18:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:42 client <- &wire.NewTokenFrame{Token: 0xb77eb108fb5d0de520573a87dbc4db2e6cc72f6f425910af3df6234023ada9f963f746384b} 2025/04/30 11:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74f7ba7349cfdff7, StatelessResetToken: 0x3856d1b81bb69eeab2ec8f4d84133123} 2025/04/30 11:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5115d12d0b9b8e96, StatelessResetToken: 0x46b13767d6cefb45e8d250df2c6d1e05} 2025/04/30 11:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c5a9f54d01dcc634, StatelessResetToken: 0x8035c853c9b9a35f0c0e645f39da9413} 2025/04/30 11:18:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:42 client -> Sending packet 2 (34 bytes) for connection bbefca74908a462ad237, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:42 client Short Header{DestConnectionID: 74f7ba7349cfdff7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 143.68µs} 2025/04/30 11:18:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:42 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:42 client -> Sending packet 3 (30 bytes) for connection bbefca74908a462ad237, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:42 client Short Header{DestConnectionID: 74f7ba7349cfdff7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:42 client Connection bbefca74908a462ad237 closed. 2025/04/30 11:18:42 Requesting https://server4:443/phcrvnpufv. 2025/04/30 11:18:42 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:42 Increased send buffer size to 14336 kiB 2025/04/30 11:18:42 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:42 Created qlog file: /logs/qlog/80dcffdbf30367da38.sqlog 2025/04/30 11:18:42 client Starting new connection to server4 ([::]:51240 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 80dcffdbf30367da38, version v1 2025/04/30 11:18:42 Adding connection ID (empty). 2025/04/30 11:18:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:42 client -> Sending packet 0 (1280 bytes) for connection 80dcffdbf30367da38, Initial 2025/04/30 11:18:42 client Long Header{Type: Initial, DestConnectionID: 80dcffdbf30367da38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 11:18:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:43 client -> Sending packet 1 (1280 bytes) for connection 80dcffdbf30367da38, Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 80dcffdbf30367da38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 11:18:43 client -> Sending packet 2 (1280 bytes) for connection 80dcffdbf30367da38, Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 80dcffdbf30367da38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:43 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 352d14da853984ef, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:43 client Received first packet. Switching destination connection ID to: 352d14da853984ef 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:43 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:43 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 352d14da853984ef, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:43 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 352d14da853984ef, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 11:18:43 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 80dcffdbf30367da38, InitialSourceConnectionID: 352d14da853984ef, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd1a69fb943a34fb69a35f574214b2377} 2025/04/30 11:18:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 80dcffdbf30367da38 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 352d14da853984ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 352d14da853984ef, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:43 client Dropping Initial keys. 2025/04/30 11:18:43 client -> Sending packet 1 (40 bytes) for connection 80dcffdbf30367da38, Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 352d14da853984ef, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:43 client -> Sending packet 0 (46 bytes) for connection 80dcffdbf30367da38, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 352d14da853984ef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:43 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 352d14da853984ef, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Peer doesn't await address validation any longer. 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client Canceling loss detection timer. 2025/04/30 11:18:43 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:43 client -> Sending packet 1 (32 bytes) for connection 80dcffdbf30367da38, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 352d14da853984ef, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 159.289µs} 2025/04/30 11:18:43 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:43 client -> Sending packet 2 (34 bytes) for connection 80dcffdbf30367da38, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 352d14da853984ef, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 62.397µs} 2025/04/30 11:18:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:43 client -> Sending packet 2 (69 bytes) for connection 80dcffdbf30367da38, Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 352d14da853984ef, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:43 client Short Header{DestConnectionID: 352d14da853984ef, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:43 client Connection 80dcffdbf30367da38 closed. 2025/04/30 11:18:43 Requesting https://server4:443/qsanwmnvhe. 2025/04/30 11:18:43 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:43 Increased send buffer size to 14336 kiB 2025/04/30 11:18:43 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:43 Created qlog file: /logs/qlog/9ce846360b370fc8.sqlog 2025/04/30 11:18:43 client Starting new connection to server4 ([::]:49002 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9ce846360b370fc8, version v1 2025/04/30 11:18:43 Adding connection ID (empty). 2025/04/30 11:18:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:43 client -> Sending packet 0 (1280 bytes) for connection 9ce846360b370fc8, Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 9ce846360b370fc8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d40a9597a64f0953, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:43 client Received first packet. Switching destination connection ID to: d40a9597a64f0953 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client updated RTT: 34.782217ms (σ: 17.391108ms) 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:43 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d40a9597a64f0953, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 11:18:43 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9ce846360b370fc8, InitialSourceConnectionID: d40a9597a64f0953, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x749cdc89a64964921e32a9cefd143d40} 2025/04/30 11:18:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9ce846360b370fc8 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: d40a9597a64f0953, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: d40a9597a64f0953, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:43 client Dropping Initial keys. 2025/04/30 11:18:43 client -> Sending packet 1 (40 bytes) for connection 9ce846360b370fc8, Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: d40a9597a64f0953, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client -> Sending packet 0 (46 bytes) for connection 9ce846360b370fc8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: d40a9597a64f0953, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:43 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d40a9597a64f0953, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Peer doesn't await address validation any longer. 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client updated RTT: 34.661ms (σ: 13.283ms) 2025/04/30 11:18:43 client Canceling loss detection timer. 2025/04/30 11:18:43 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:43 client -> Sending packet 1 (32 bytes) for connection 9ce846360b370fc8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: d40a9597a64f0953, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 153.969µs} 2025/04/30 11:18:43 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:43 client -> Sending packet 2 (34 bytes) for connection 9ce846360b370fc8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: d40a9597a64f0953, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 55.184µs} 2025/04/30 11:18:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:43 client -> Sending packet 2 (69 bytes) for connection 9ce846360b370fc8, Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: d40a9597a64f0953, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:43 client Short Header{DestConnectionID: d40a9597a64f0953, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:43 client Connection 9ce846360b370fc8 closed. 2025/04/30 11:18:43 Requesting https://server4:443/humyzzzvzl. 2025/04/30 11:18:43 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:43 Increased send buffer size to 14336 kiB 2025/04/30 11:18:43 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:43 Created qlog file: /logs/qlog/53cc57e10771bf8c86a9fad94f4800f884e77e.sqlog 2025/04/30 11:18:43 client Starting new connection to server4 ([::]:54611 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 53cc57e10771bf8c86a9fad94f4800f884e77e, version v1 2025/04/30 11:18:43 Adding connection ID (empty). 2025/04/30 11:18:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:43 client -> Sending packet 0 (1280 bytes) for connection 53cc57e10771bf8c86a9fad94f4800f884e77e, Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 53cc57e10771bf8c86a9fad94f4800f884e77e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 791f33a445f3c498, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:43 client Received first packet. Switching destination connection ID to: 791f33a445f3c498 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client updated RTT: 34.165745ms (σ: 17.082872ms) 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:43 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 791f33a445f3c498, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/04/30 11:18:43 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 53cc57e10771bf8c86a9fad94f4800f884e77e, InitialSourceConnectionID: 791f33a445f3c498, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x26db92b75d951ab7b3589d433f86eaa9} 2025/04/30 11:18:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 53cc57e10771bf8c86a9fad94f4800f884e77e 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 791f33a445f3c498, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 791f33a445f3c498, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:43 client Dropping Initial keys. 2025/04/30 11:18:43 client -> Sending packet 1 (40 bytes) for connection 53cc57e10771bf8c86a9fad94f4800f884e77e, Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 791f33a445f3c498, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client -> Sending packet 0 (46 bytes) for connection 53cc57e10771bf8c86a9fad94f4800f884e77e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 791f33a445f3c498, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:43 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 791f33a445f3c498, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Peer doesn't await address validation any longer. 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client Canceling loss detection timer. 2025/04/30 11:18:43 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:43 client -> Sending packet 1 (32 bytes) for connection 53cc57e10771bf8c86a9fad94f4800f884e77e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 791f33a445f3c498, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.205µs} 2025/04/30 11:18:43 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client updated RTT: 34.226ms (σ: 12.933ms) 2025/04/30 11:18:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:43 client Dropping Handshake keys. 2025/04/30 11:18:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:43 client <- &wire.NewTokenFrame{Token: 0xb714f33bc3c8d2d2899288f073f7ada28d9fc43cc4ef9e0b681e3881e749dfa227d5943361} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 095d2c418c48d737, StatelessResetToken: 0xbe34b43a397d6f96e238fe7f19b16cec} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 36852b83f14877dd, StatelessResetToken: 0xc7b17d7220a3f70ac737c88b8385bdad} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 13bb1a1ead707483, StatelessResetToken: 0x8a58b7006f3cd1021a195f901b07a60b} 2025/04/30 11:18:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:43 client -> Sending packet 2 (34 bytes) for connection 53cc57e10771bf8c86a9fad94f4800f884e77e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 095d2c418c48d737, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 143.94µs} 2025/04/30 11:18:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:43 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:43 client -> Sending packet 3 (30 bytes) for connection 53cc57e10771bf8c86a9fad94f4800f884e77e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 095d2c418c48d737, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:43 client Connection 53cc57e10771bf8c86a9fad94f4800f884e77e closed. 2025/04/30 11:18:43 Requesting https://server4:443/acdknhghjb. 2025/04/30 11:18:43 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:43 Increased send buffer size to 14336 kiB 2025/04/30 11:18:43 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:43 Created qlog file: /logs/qlog/a4e10c28d9f170cddd75cca48df8.sqlog 2025/04/30 11:18:43 client Starting new connection to server4 ([::]:43590 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a4e10c28d9f170cddd75cca48df8, version v1 2025/04/30 11:18:43 Adding connection ID (empty). 2025/04/30 11:18:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:43 client -> Sending packet 0 (1280 bytes) for connection a4e10c28d9f170cddd75cca48df8, Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: a4e10c28d9f170cddd75cca48df8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c8679c4b4659bec4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:43 client Received first packet. Switching destination connection ID to: c8679c4b4659bec4 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client updated RTT: 34.558912ms (σ: 17.279456ms) 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:43 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c8679c4b4659bec4, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 11:18:43 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a4e10c28d9f170cddd75cca48df8, InitialSourceConnectionID: c8679c4b4659bec4, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2cef5af62c207cd73ec0b71145036a88} 2025/04/30 11:18:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a4e10c28d9f170cddd75cca48df8 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: c8679c4b4659bec4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: c8679c4b4659bec4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:43 client Dropping Initial keys. 2025/04/30 11:18:43 client -> Sending packet 1 (40 bytes) for connection a4e10c28d9f170cddd75cca48df8, Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: c8679c4b4659bec4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client -> Sending packet 0 (46 bytes) for connection a4e10c28d9f170cddd75cca48df8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: c8679c4b4659bec4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:43 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c8679c4b4659bec4, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Peer doesn't await address validation any longer. 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client Canceling loss detection timer. 2025/04/30 11:18:43 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:43 client -> Sending packet 1 (32 bytes) for connection a4e10c28d9f170cddd75cca48df8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: c8679c4b4659bec4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 132.829µs} 2025/04/30 11:18:43 client <- Reading packet 2 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:43 client -> Sending packet 2 (34 bytes) for connection a4e10c28d9f170cddd75cca48df8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: c8679c4b4659bec4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 77.014µs} 2025/04/30 11:18:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:43 client <- Reading packet 5 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:43 client Dropping Handshake keys. 2025/04/30 11:18:43 client <- &wire.NewTokenFrame{Token: 0xb76e5e4f070d6e47afbd5331e0fe661290a3ec91aa851bcd2eb5bc294736b9c253b91dd97c} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e38518c5e64b38d4, StatelessResetToken: 0x70ab749eaf39d044e2a5729072b00839} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e9cec87a8ec6524, StatelessResetToken: 0xfbca688d1d77255df6f5facb72ae7fd4} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 93df8ea2501441bc, StatelessResetToken: 0xeeeebcaa18e36d840d102b1a6bc0c6a7} 2025/04/30 11:18:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:43 client -> Sending packet 4 (57 bytes) for connection a4e10c28d9f170cddd75cca48df8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: e38518c5e64b38d4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 157.686µs} 2025/04/30 11:18:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:43 client -> Sending packet 5 (48 bytes) for connection a4e10c28d9f170cddd75cca48df8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: e38518c5e64b38d4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:43 client <- Reading packet 6 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:18:43 client newly acked packets (1): [5] 2025/04/30 11:18:43 client updated RTT: 34.283ms (σ: 13.507ms) 2025/04/30 11:18:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:43 client Canceling loss detection timer. 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bac1dd96d1c9142d, StatelessResetToken: 0x978a9fdbc36ccae9d658e241ad62e602} 2025/04/30 11:18:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:43 client Sending ACK because the ACK timer expired. 2025/04/30 11:18:43 client -> Sending packet 6 (37 bytes) for connection a4e10c28d9f170cddd75cca48df8, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:43 client Short Header{DestConnectionID: e38518c5e64b38d4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.346481ms} 2025/04/30 11:18:43 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:43 client -> Sending packet 7 (38 bytes) for connection a4e10c28d9f170cddd75cca48df8, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:43 client Short Header{DestConnectionID: e38518c5e64b38d4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 70.943µs} 2025/04/30 11:18:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:43 client -> Sending packet 8 (30 bytes) for connection a4e10c28d9f170cddd75cca48df8, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:43 client Short Header{DestConnectionID: e38518c5e64b38d4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:43 client Connection a4e10c28d9f170cddd75cca48df8 closed. 2025/04/30 11:18:43 Requesting https://server4:443/gzbaxbmhvz. 2025/04/30 11:18:43 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:43 Increased send buffer size to 14336 kiB 2025/04/30 11:18:43 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:43 Created qlog file: /logs/qlog/0c04a11b16e97903afc7510c5340b9653c89.sqlog 2025/04/30 11:18:43 client Starting new connection to server4 ([::]:56146 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0c04a11b16e97903afc7510c5340b9653c89, version v1 2025/04/30 11:18:43 Adding connection ID (empty). 2025/04/30 11:18:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:43 client -> Sending packet 0 (1280 bytes) for connection 0c04a11b16e97903afc7510c5340b9653c89, Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 0c04a11b16e97903afc7510c5340b9653c89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 845959ba04820a08, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:43 client Received first packet. Switching destination connection ID to: 845959ba04820a08 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client updated RTT: 34.500548ms (σ: 17.250274ms) 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:43 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 845959ba04820a08, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/04/30 11:18:43 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0c04a11b16e97903afc7510c5340b9653c89, InitialSourceConnectionID: 845959ba04820a08, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2f608a6fa9aefce484a1d4d364a34454} 2025/04/30 11:18:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0c04a11b16e97903afc7510c5340b9653c89 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 845959ba04820a08, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 845959ba04820a08, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:43 client Dropping Initial keys. 2025/04/30 11:18:43 client -> Sending packet 1 (40 bytes) for connection 0c04a11b16e97903afc7510c5340b9653c89, Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 845959ba04820a08, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client -> Sending packet 0 (46 bytes) for connection 0c04a11b16e97903afc7510c5340b9653c89, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 845959ba04820a08, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:43 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 845959ba04820a08, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Peer doesn't await address validation any longer. 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client Canceling loss detection timer. 2025/04/30 11:18:43 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:43 client -> Sending packet 1 (32 bytes) for connection 0c04a11b16e97903afc7510c5340b9653c89, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 845959ba04820a08, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 149.441µs} 2025/04/30 11:18:43 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client updated RTT: 34.597ms (σ: 13.132ms) 2025/04/30 11:18:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:43 client Dropping Handshake keys. 2025/04/30 11:18:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:43 client <- &wire.NewTokenFrame{Token: 0xb7bba117bed631ce0fe47da9507f083a2084a97f88f05bb8a4fdc479d7f6bf41fcc8926cb6} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b75ccda0cfee471a, StatelessResetToken: 0x22aaec7553429022902cf93641b83d51} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0009014b5a5a2491, StatelessResetToken: 0xfd204591af5e119ee8cc5c7d964f0b32} 2025/04/30 11:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ecddc6f2550d4dd8, StatelessResetToken: 0xf918f242d1a927e5a2e18333cae45453} 2025/04/30 11:18:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:43 client -> Sending packet 2 (34 bytes) for connection 0c04a11b16e97903afc7510c5340b9653c89, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:43 client Short Header{DestConnectionID: b75ccda0cfee471a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 144.992µs} 2025/04/30 11:18:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:43 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:43 client -> Sending packet 3 (30 bytes) for connection 0c04a11b16e97903afc7510c5340b9653c89, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:43 client Short Header{DestConnectionID: b75ccda0cfee471a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:43 client Connection 0c04a11b16e97903afc7510c5340b9653c89 closed. 2025/04/30 11:18:43 Requesting https://server4:443/kfvoextgzs. 2025/04/30 11:18:43 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:43 Increased send buffer size to 14336 kiB 2025/04/30 11:18:43 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:43 Created qlog file: /logs/qlog/66aabd026bc4e0b7aa22551b4980f9b63b.sqlog 2025/04/30 11:18:43 client Starting new connection to server4 ([::]:60109 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 66aabd026bc4e0b7aa22551b4980f9b63b, version v1 2025/04/30 11:18:43 Adding connection ID (empty). 2025/04/30 11:18:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:43 client -> Sending packet 0 (1280 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 66aabd026bc4e0b7aa22551b4980f9b63b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8052c234347ba09b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:43 client Received first packet. Switching destination connection ID to: 8052c234347ba09b 2025/04/30 11:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:43 client newly acked packets (1): [0] 2025/04/30 11:18:43 client updated RTT: 34.421202ms (σ: 17.210601ms) 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:43 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:43 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8052c234347ba09b, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 11:18:43 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 66aabd026bc4e0b7aa22551b4980f9b63b, InitialSourceConnectionID: 8052c234347ba09b, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x6ccfd572eb60d9d01b3c8b7b92a9d148} 2025/04/30 11:18:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b 2025/04/30 11:18:43 client Long Header{Type: Initial, DestConnectionID: 8052c234347ba09b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 8052c234347ba09b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:43 client Dropping Initial keys. 2025/04/30 11:18:43 client -> Sending packet 1 (40 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, Handshake 2025/04/30 11:18:43 client Long Header{Type: Handshake, DestConnectionID: 8052c234347ba09b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:43 client -> Sending packet 0 (46 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:43 client Short Header{DestConnectionID: 8052c234347ba09b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:44 client -> Sending packet 2 (90 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, Handshake 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: 8052c234347ba09b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:44 client -> Sending packet 3 (90 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, Handshake 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: 8052c234347ba09b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:44 client <- Reading packet 3 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:44 client Dropping Handshake keys. 2025/04/30 11:18:44 client <- &wire.NewTokenFrame{Token: 0xb7b582a3e60a941ccc3f39e29fb6e8f6e97b78b9788e1d1846cbe6692f2991ac1fa3bd8ed0} 2025/04/30 11:18:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 68979412b1cdc7a9, StatelessResetToken: 0x2b3b61d524903322acdfd4ac2e57ec8b} 2025/04/30 11:18:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fe0a37778b93ce7, StatelessResetToken: 0x09a6215c53ade8720e29fdd6bdebaa7e} 2025/04/30 11:18:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 44315804afeb4f5b, StatelessResetToken: 0x899779dd85bc6762e0913c9334a6870a} 2025/04/30 11:18:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:44 client -> Sending packet 2 (53 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:44 client Short Header{DestConnectionID: 68979412b1cdc7a9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:44 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 214.071µs} 2025/04/30 11:18:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:44 client -> Sending packet 3 (48 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:44 client Short Header{DestConnectionID: 68979412b1cdc7a9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:44 client <- Reading packet 4 (601 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:44 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:44 client newly acked packets (1): [3] 2025/04/30 11:18:44 client updated RTT: 34.214ms (σ: 13.32ms) 2025/04/30 11:18:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:44 client Canceling loss detection timer. 2025/04/30 11:18:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ac0504d610dd71c1, StatelessResetToken: 0xe9ff83e6cc221536e8665e4ffdc0b839} 2025/04/30 11:18:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:44 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:44 client -> Sending packet 4 (32 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:44 client Short Header{DestConnectionID: 68979412b1cdc7a9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:44 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 57.448µs} 2025/04/30 11:18:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:44 client -> Sending packet 5 (30 bytes) for connection 66aabd026bc4e0b7aa22551b4980f9b63b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:44 client Short Header{DestConnectionID: 68979412b1cdc7a9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:44 client Connection 66aabd026bc4e0b7aa22551b4980f9b63b closed. 2025/04/30 11:18:44 Requesting https://server4:443/xrvuwpjnrp. 2025/04/30 11:18:44 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:44 Increased send buffer size to 14336 kiB 2025/04/30 11:18:44 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:44 Created qlog file: /logs/qlog/26c9d82120ced0a2509b231aab.sqlog 2025/04/30 11:18:44 client Starting new connection to server4 ([::]:43498 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 26c9d82120ced0a2509b231aab, version v1 2025/04/30 11:18:44 Adding connection ID (empty). 2025/04/30 11:18:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:44 client -> Sending packet 0 (1280 bytes) for connection 26c9d82120ced0a2509b231aab, Initial 2025/04/30 11:18:44 client Long Header{Type: Initial, DestConnectionID: 26c9d82120ced0a2509b231aab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:44 client -> Sending packet 1 (1280 bytes) for connection 26c9d82120ced0a2509b231aab, Initial 2025/04/30 11:18:44 client Long Header{Type: Initial, DestConnectionID: 26c9d82120ced0a2509b231aab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:44 client -> Sending packet 2 (1280 bytes) for connection 26c9d82120ced0a2509b231aab, Initial 2025/04/30 11:18:44 client Long Header{Type: Initial, DestConnectionID: 26c9d82120ced0a2509b231aab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:44 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:44 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2c58fe6df3d9fe3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:44 client Received first packet. Switching destination connection ID to: d2c58fe6df3d9fe3 2025/04/30 11:18:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:44 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:44 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:44 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:44 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2c58fe6df3d9fe3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:44 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:44 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d2c58fe6df3d9fe3, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 11:18:44 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:44 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 26c9d82120ced0a2509b231aab, InitialSourceConnectionID: d2c58fe6df3d9fe3, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x370dea7ac7cd47cbda6307c2f8c8b79d} 2025/04/30 11:18:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 26c9d82120ced0a2509b231aab 2025/04/30 11:18:44 client Long Header{Type: Initial, DestConnectionID: d2c58fe6df3d9fe3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: d2c58fe6df3d9fe3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:44 client Dropping Initial keys. 2025/04/30 11:18:44 client -> Sending packet 1 (40 bytes) for connection 26c9d82120ced0a2509b231aab, Handshake 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: d2c58fe6df3d9fe3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:44 client -> Sending packet 0 (46 bytes) for connection 26c9d82120ced0a2509b231aab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:44 client Short Header{DestConnectionID: d2c58fe6df3d9fe3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:44 client -> Sending packet 2 (90 bytes) for connection 26c9d82120ced0a2509b231aab, Handshake 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: d2c58fe6df3d9fe3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:44 client -> Sending packet 3 (90 bytes) for connection 26c9d82120ced0a2509b231aab, Handshake 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: d2c58fe6df3d9fe3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:18:44 client -> Sending packet 4 (90 bytes) for connection 26c9d82120ced0a2509b231aab, Handshake 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: d2c58fe6df3d9fe3, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:44 client -> Sending packet 5 (90 bytes) for connection 26c9d82120ced0a2509b231aab, Handshake 2025/04/30 11:18:44 client Long Header{Type: Handshake, DestConnectionID: d2c58fe6df3d9fe3, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:45 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 568 bytes. 2025/04/30 11:18:45 client <- Reading packet 2 (40 bytes) for connection (empty), Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d2c58fe6df3d9fe3, PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:45 client Peer doesn't await address validation any longer. 2025/04/30 11:18:45 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:45 client -> Sending packet 1 (32 bytes) for connection 26c9d82120ced0a2509b231aab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: d2c58fe6df3d9fe3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 169.828µs} 2025/04/30 11:18:45 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:45 client Dropping Handshake keys. 2025/04/30 11:18:45 client <- &wire.NewTokenFrame{Token: 0xb7b628babd280d8bbaf957a9de12343a8a2ce7a2682da3ae4fd937f8c7fa9896e42e9e8f25} 2025/04/30 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9466a3a4b82def94, StatelessResetToken: 0x78fd285a6949324c57f460ff2ada17e0} 2025/04/30 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fc80fcaafdb7afda, StatelessResetToken: 0x773738f9f700f95f9d8b6df8e0b87f0c} 2025/04/30 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 17b1e7fad060760a, StatelessResetToken: 0xf0f033024e78e335d436cbd8e4100ce4} 2025/04/30 11:18:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:45 client -> Sending packet 3 (53 bytes) for connection 26c9d82120ced0a2509b231aab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 9466a3a4b82def94, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 134.892µs} 2025/04/30 11:18:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:45 client -> Sending packet 4 (48 bytes) for connection 26c9d82120ced0a2509b231aab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 9466a3a4b82def94, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:45 client -> Sending packet 5 (1366 bytes) for connection 26c9d82120ced0a2509b231aab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 9466a3a4b82def94, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.PingFrame{} 2025/04/30 11:18:45 client <- Reading packet 2 (53 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f87670a72a631d24, StatelessResetToken: 0x50157a61e132b041c4f602435b99f9f5} 2025/04/30 11:18:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:45 client <- Reading packet 3 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 3ms} 2025/04/30 11:18:45 client newly acked packets (1): [5] 2025/04/30 11:18:45 client updated RTT: 34.159993ms (σ: 17.079996ms) 2025/04/30 11:18:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:45 client setting loss timer for packet 4 (1-RTT) to 38.429992ms (in 2025-04-30 11:18:45.046593413 +0000 UTC m=+21.430185923) 2025/04/30 11:18:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:45 client -> Sending packet 6 (32 bytes) for connection 26c9d82120ced0a2509b231aab, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 9466a3a4b82def94, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 135.544µs} 2025/04/30 11:18:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:45 client -> Sending packet 7 (30 bytes) for connection 26c9d82120ced0a2509b231aab, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 9466a3a4b82def94, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:45 client Connection 26c9d82120ced0a2509b231aab closed. 2025/04/30 11:18:45 Requesting https://server4:443/hzegliipyk. 2025/04/30 11:18:45 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:45 Increased send buffer size to 14336 kiB 2025/04/30 11:18:45 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:45 Created qlog file: /logs/qlog/dd236936d3f4e73252c9ce17fc41.sqlog 2025/04/30 11:18:45 client Starting new connection to server4 ([::]:54289 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dd236936d3f4e73252c9ce17fc41, version v1 2025/04/30 11:18:45 Adding connection ID (empty). 2025/04/30 11:18:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:45 client -> Sending packet 0 (1280 bytes) for connection dd236936d3f4e73252c9ce17fc41, Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: dd236936d3f4e73252c9ce17fc41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:45 client -> Sending packet 1 (1280 bytes) for connection dd236936d3f4e73252c9ce17fc41, Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: dd236936d3f4e73252c9ce17fc41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:45 client -> Sending packet 2 (1280 bytes) for connection dd236936d3f4e73252c9ce17fc41, Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: dd236936d3f4e73252c9ce17fc41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:45 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:45 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: deac2095251d5d2c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:45 client Received first packet. Switching destination connection ID to: deac2095251d5d2c 2025/04/30 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:45 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:45 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: deac2095251d5d2c, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:45 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:45 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: deac2095251d5d2c, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 11:18:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dd236936d3f4e73252c9ce17fc41, InitialSourceConnectionID: deac2095251d5d2c, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2d6bc0f824fc86b16382489b91315949} 2025/04/30 11:18:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dd236936d3f4e73252c9ce17fc41 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: deac2095251d5d2c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: deac2095251d5d2c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:45 client Dropping Initial keys. 2025/04/30 11:18:45 client -> Sending packet 1 (40 bytes) for connection dd236936d3f4e73252c9ce17fc41, Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: deac2095251d5d2c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:45 client -> Sending packet 0 (46 bytes) for connection dd236936d3f4e73252c9ce17fc41, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: deac2095251d5d2c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:45 client -> Sending packet 2 (90 bytes) for connection dd236936d3f4e73252c9ce17fc41, Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: deac2095251d5d2c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:45 client -> Sending packet 3 (90 bytes) for connection dd236936d3f4e73252c9ce17fc41, Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: deac2095251d5d2c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:45 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:45 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: deac2095251d5d2c, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:45 client Peer doesn't await address validation any longer. 2025/04/30 11:18:45 client newly acked packets (1): [3] 2025/04/30 11:18:45 client updated RTT: 33.012942ms (σ: 16.506471ms) 2025/04/30 11:18:45 client Canceling loss detection timer. 2025/04/30 11:18:45 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:45 client -> Sending packet 1 (32 bytes) for connection dd236936d3f4e73252c9ce17fc41, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: deac2095251d5d2c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 118.302µs} 2025/04/30 11:18:45 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:45 client -> Sending packet 2 (34 bytes) for connection dd236936d3f4e73252c9ce17fc41, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: deac2095251d5d2c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 64.191µs} 2025/04/30 11:18:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:45 client -> Sending packet 4 (69 bytes) for connection dd236936d3f4e73252c9ce17fc41, Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: deac2095251d5d2c, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:45 client Short Header{DestConnectionID: deac2095251d5d2c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:45 client Connection dd236936d3f4e73252c9ce17fc41 closed. 2025/04/30 11:18:45 Requesting https://server4:443/mvcldrbcou. 2025/04/30 11:18:45 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:45 Increased send buffer size to 14336 kiB 2025/04/30 11:18:45 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:45 Created qlog file: /logs/qlog/01fa7f137c9ea01f8117f412d7405b2fcddf3a27.sqlog 2025/04/30 11:18:45 client Starting new connection to server4 ([::]:52116 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, version v1 2025/04/30 11:18:45 Adding connection ID (empty). 2025/04/30 11:18:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:45 client -> Sending packet 0 (1280 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:45 client -> Sending packet 1 (1280 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:45 client -> Sending packet 2 (1280 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:45 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:45 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c27369a9e21230db, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:45 client Received first packet. Switching destination connection ID to: c27369a9e21230db 2025/04/30 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:45 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:45 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:45 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:45 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c27369a9e21230db, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:45 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:45 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c27369a9e21230db, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/04/30 11:18:45 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:45 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, InitialSourceConnectionID: c27369a9e21230db, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb1d3421c2bc641904221f43315a53a3c} 2025/04/30 11:18:45 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c27369a9e21230db, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:45 client newly acked packets (1): [2] 2025/04/30 11:18:45 client updated RTT: 33.476141ms (σ: 16.73807ms) 2025/04/30 11:18:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27 2025/04/30 11:18:45 client Long Header{Type: Initial, DestConnectionID: c27369a9e21230db, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: c27369a9e21230db, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:45 client Short Header{DestConnectionID: c27369a9e21230db, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:45 client Dropping Initial keys. 2025/04/30 11:18:45 client -> Sending packet 1 (40 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, Handshake 2025/04/30 11:18:45 client Long Header{Type: Handshake, DestConnectionID: c27369a9e21230db, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:45 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:45 client Peer doesn't await address validation any longer. 2025/04/30 11:18:45 client newly acked packets (1): [0] 2025/04/30 11:18:45 client updated RTT: 33.735ms (σ: 13.073ms) 2025/04/30 11:18:45 client Canceling loss detection timer. 2025/04/30 11:18:45 client Dropping Handshake keys. 2025/04/30 11:18:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:45 client <- &wire.NewTokenFrame{Token: 0xb7c0f946232ea89f12fb3860932c33229a0c3f3b882544031bb5480f7a1ee824f5cdaebf93} 2025/04/30 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 38274b653b701019, StatelessResetToken: 0x6ee34d9d7b15a5a497eead271f7bc64c} 2025/04/30 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 53f5580283473f01, StatelessResetToken: 0x20c66b6d324f763aa256bf0d2bd8cfc7} 2025/04/30 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f4c18131598ebb6a, StatelessResetToken: 0xcd4adac58e8d2fb9b373a3e051373261} 2025/04/30 11:18:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:45 client -> Sending packet 1 (34 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 38274b653b701019, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 175.218µs} 2025/04/30 11:18:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:45 client -> Sending packet 3 (29 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 38274b653b701019, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:45 client -> Sending packet 4 (29 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 38274b653b701019, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:45 client <- Reading packet 5 (53 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4d535b34bbdb1265, StatelessResetToken: 0xd55345ca21682f8dcc5386328f83f013} 2025/04/30 11:18:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:45 client -> Sending packet 5 (34 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:45 client Short Header{DestConnectionID: 38274b653b701019, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:45 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 67.215µs} 2025/04/30 11:18:46 client <- Reading packet 6 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:46 client -> Sending packet 6 (1366 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 38274b653b701019, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.PingFrame{} 2025/04/30 11:18:46 client <- Reading packet 7 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:46 client <- &wire.NewTokenFrame{Token: 0xb7c0f946232ea89f12fb3860932c33229a0c3f3b882544031bb5480f7a1ee824f5cdaebf93} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 38274b653b701019, StatelessResetToken: 0x6ee34d9d7b15a5a497eead271f7bc64c} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 53f5580283473f01, StatelessResetToken: 0x20c66b6d324f763aa256bf0d2bd8cfc7} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f4c18131598ebb6a, StatelessResetToken: 0xcd4adac58e8d2fb9b373a3e051373261} 2025/04/30 11:18:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:46 client -> Sending packet 7 (34 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 38274b653b701019, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 169.491µs} 2025/04/30 11:18:46 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:46 client -> Sending packet 8 (30 bytes) for connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 38274b653b701019, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:46 client Connection 01fa7f137c9ea01f8117f412d7405b2fcddf3a27 closed. 2025/04/30 11:18:46 Requesting https://server4:443/cdeuydsysw. 2025/04/30 11:18:46 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:46 Increased send buffer size to 14336 kiB 2025/04/30 11:18:46 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:46 Created qlog file: /logs/qlog/ee65e2cba756bc89f85a5bc6.sqlog 2025/04/30 11:18:46 client Starting new connection to server4 ([::]:58215 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ee65e2cba756bc89f85a5bc6, version v1 2025/04/30 11:18:46 Adding connection ID (empty). 2025/04/30 11:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:46 client -> Sending packet 0 (1280 bytes) for connection ee65e2cba756bc89f85a5bc6, Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: ee65e2cba756bc89f85a5bc6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:46 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4ae7868d81d4a1d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:46 client Received first packet. Switching destination connection ID to: f4ae7868d81d4a1d 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:46 client newly acked packets (1): [0] 2025/04/30 11:18:46 client updated RTT: 34.526801ms (σ: 17.2634ms) 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:46 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f4ae7868d81d4a1d, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 11:18:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ee65e2cba756bc89f85a5bc6, InitialSourceConnectionID: f4ae7868d81d4a1d, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x07f7e913edd5503501872ec89d63d311} 2025/04/30 11:18:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ee65e2cba756bc89f85a5bc6 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: f4ae7868d81d4a1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: f4ae7868d81d4a1d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:46 client Dropping Initial keys. 2025/04/30 11:18:46 client -> Sending packet 1 (40 bytes) for connection ee65e2cba756bc89f85a5bc6, Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: f4ae7868d81d4a1d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client -> Sending packet 0 (46 bytes) for connection ee65e2cba756bc89f85a5bc6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: f4ae7868d81d4a1d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:46 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f4ae7868d81d4a1d, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Peer doesn't await address validation any longer. 2025/04/30 11:18:46 client newly acked packets (1): [0] 2025/04/30 11:18:46 client Canceling loss detection timer. 2025/04/30 11:18:46 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:46 client -> Sending packet 1 (32 bytes) for connection ee65e2cba756bc89f85a5bc6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: f4ae7868d81d4a1d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 157.626µs} 2025/04/30 11:18:46 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:46 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:46 client -> Sending packet 2 (34 bytes) for connection ee65e2cba756bc89f85a5bc6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: f4ae7868d81d4a1d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 60.954µs} 2025/04/30 11:18:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:46 client -> Sending packet 2 (69 bytes) for connection ee65e2cba756bc89f85a5bc6, Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: f4ae7868d81d4a1d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:46 client Short Header{DestConnectionID: f4ae7868d81d4a1d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:46 client Connection ee65e2cba756bc89f85a5bc6 closed. 2025/04/30 11:18:46 Requesting https://server4:443/viffitozrx. 2025/04/30 11:18:46 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:46 Increased send buffer size to 14336 kiB 2025/04/30 11:18:46 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:46 Created qlog file: /logs/qlog/49705b062e38bdd9d5609db56fbd1db5893677.sqlog 2025/04/30 11:18:46 client Starting new connection to server4 ([::]:34433 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 49705b062e38bdd9d5609db56fbd1db5893677, version v1 2025/04/30 11:18:46 Adding connection ID (empty). 2025/04/30 11:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:46 client -> Sending packet 0 (1280 bytes) for connection 49705b062e38bdd9d5609db56fbd1db5893677, Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: 49705b062e38bdd9d5609db56fbd1db5893677, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:46 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d32231d5f8df699, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:46 client Received first packet. Switching destination connection ID to: 4d32231d5f8df699 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:46 client newly acked packets (1): [0] 2025/04/30 11:18:46 client updated RTT: 34.323049ms (σ: 17.161524ms) 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:46 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d32231d5f8df699, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/04/30 11:18:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 49705b062e38bdd9d5609db56fbd1db5893677, InitialSourceConnectionID: 4d32231d5f8df699, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2afe83e03d81b2062358fa9582051489} 2025/04/30 11:18:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 49705b062e38bdd9d5609db56fbd1db5893677 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: 4d32231d5f8df699, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 4d32231d5f8df699, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:46 client Dropping Initial keys. 2025/04/30 11:18:46 client -> Sending packet 1 (40 bytes) for connection 49705b062e38bdd9d5609db56fbd1db5893677, Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 4d32231d5f8df699, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client -> Sending packet 0 (46 bytes) for connection 49705b062e38bdd9d5609db56fbd1db5893677, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 4d32231d5f8df699, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:46 client Dropping Handshake keys. 2025/04/30 11:18:46 client <- &wire.NewTokenFrame{Token: 0xb7f9a4195cc26f4545326c2814b9097269b0377ddb858b17082317c18dca972a9a08d14d3c} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c06e756a0e57fbad, StatelessResetToken: 0x4801b88eacbb04f41e237ed680bd5f44} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dd9c27f5c1e8b50f, StatelessResetToken: 0x1b17b8465483423289f1feebc229ee00} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fc1c1203aedce1c1, StatelessResetToken: 0xed27721a382b8a6ee751f940812ff2f5} 2025/04/30 11:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:46 client -> Sending packet 1 (34 bytes) for connection 49705b062e38bdd9d5609db56fbd1db5893677, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: c06e756a0e57fbad, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 121.568µs} 2025/04/30 11:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:46 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:46 client newly acked packets (1): [1] 2025/04/30 11:18:46 client updated RTT: 33.956ms (σ: 13.604ms) 2025/04/30 11:18:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:46 client lost packet 0 (time threshold) 2025/04/30 11:18:46 client Canceling loss detection timer. 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 63295a3f08e081d3, StatelessResetToken: 0xca72eb7c7a8c29d5bc1186766cf99988} 2025/04/30 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:46 client Ignoring all packets below 2. 2025/04/30 11:18:46 client -> Sending packet 2 (51 bytes) for connection 49705b062e38bdd9d5609db56fbd1db5893677, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: c06e756a0e57fbad, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 153.758µs} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:46 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:46 client -> Sending packet 3 (34 bytes) for connection 49705b062e38bdd9d5609db56fbd1db5893677, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: c06e756a0e57fbad, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 70.051µs} 2025/04/30 11:18:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:46 client -> Sending packet 4 (30 bytes) for connection 49705b062e38bdd9d5609db56fbd1db5893677, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: c06e756a0e57fbad, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:46 client Connection 49705b062e38bdd9d5609db56fbd1db5893677 closed. 2025/04/30 11:18:46 Requesting https://server4:443/tdvxwdzpot. 2025/04/30 11:18:46 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:46 Increased send buffer size to 14336 kiB 2025/04/30 11:18:46 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:46 Created qlog file: /logs/qlog/dbd93bbb17f5af98.sqlog 2025/04/30 11:18:46 client Starting new connection to server4 ([::]:53133 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dbd93bbb17f5af98, version v1 2025/04/30 11:18:46 Adding connection ID (empty). 2025/04/30 11:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:46 client -> Sending packet 0 (1280 bytes) for connection dbd93bbb17f5af98, Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: dbd93bbb17f5af98, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:46 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 691f358dc596bc61, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:46 client Received first packet. Switching destination connection ID to: 691f358dc596bc61 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:46 client newly acked packets (1): [0] 2025/04/30 11:18:46 client updated RTT: 34.250143ms (σ: 17.125071ms) 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:46 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 691f358dc596bc61, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 11:18:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dbd93bbb17f5af98, InitialSourceConnectionID: 691f358dc596bc61, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x130a4c7b512c07bd78f25d11e4730bf8} 2025/04/30 11:18:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dbd93bbb17f5af98 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: 691f358dc596bc61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 691f358dc596bc61, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:46 client Dropping Initial keys. 2025/04/30 11:18:46 client -> Sending packet 1 (40 bytes) for connection dbd93bbb17f5af98, Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 691f358dc596bc61, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client -> Sending packet 0 (46 bytes) for connection dbd93bbb17f5af98, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 691f358dc596bc61, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:46 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 691f358dc596bc61, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Peer doesn't await address validation any longer. 2025/04/30 11:18:46 client newly acked packets (1): [0] 2025/04/30 11:18:46 client updated RTT: 34.226ms (σ: 12.89ms) 2025/04/30 11:18:46 client Canceling loss detection timer. 2025/04/30 11:18:46 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:46 client -> Sending packet 1 (32 bytes) for connection dbd93bbb17f5af98, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 691f358dc596bc61, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 148.318µs} 2025/04/30 11:18:46 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client newly acked packets (1): [0] 2025/04/30 11:18:46 client updated RTT: 34.27ms (σ: 9.756ms) 2025/04/30 11:18:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:46 client Dropping Handshake keys. 2025/04/30 11:18:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:46 client <- &wire.NewTokenFrame{Token: 0xb7efea259caa623d6b9c0e8d2c03aeb40673484b54b1d17434c9bf090b3968746736c0cfb5} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5c2ee8b560c62ee6, StatelessResetToken: 0xd5c81033b5c56b39d57cd1d10aa43504} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d26d1eed0d849739, StatelessResetToken: 0xad685c0c21b5fde53d5f3e34e5e1f36d} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 073da7a95da05a39, StatelessResetToken: 0xc70cf8e3069f27ad862d3dd2f2021b5e} 2025/04/30 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:46 client -> Sending packet 2 (34 bytes) for connection dbd93bbb17f5af98, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 5c2ee8b560c62ee6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104.216µs} 2025/04/30 11:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:46 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:46 client -> Sending packet 3 (30 bytes) for connection dbd93bbb17f5af98, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 5c2ee8b560c62ee6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:46 client Connection dbd93bbb17f5af98 closed. 2025/04/30 11:18:46 Requesting https://server4:443/rfmzekebts. 2025/04/30 11:18:46 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:46 Increased send buffer size to 14336 kiB 2025/04/30 11:18:46 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:46 Created qlog file: /logs/qlog/ad8557e3da673b9dee8c7e.sqlog 2025/04/30 11:18:46 client Starting new connection to server4 ([::]:34693 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ad8557e3da673b9dee8c7e, version v1 2025/04/30 11:18:46 Adding connection ID (empty). 2025/04/30 11:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:46 client -> Sending packet 0 (1280 bytes) for connection ad8557e3da673b9dee8c7e, Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: ad8557e3da673b9dee8c7e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:46 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 97d7ee751e9d7034, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:46 client Received first packet. Switching destination connection ID to: 97d7ee751e9d7034 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:18:46 client newly acked packets (1): [0] 2025/04/30 11:18:46 client updated RTT: 34.273623ms (σ: 17.136811ms) 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:46 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 97d7ee751e9d7034, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 11:18:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ad8557e3da673b9dee8c7e, InitialSourceConnectionID: 97d7ee751e9d7034, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x5cb4573b04237b66977972283933aba2} 2025/04/30 11:18:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ad8557e3da673b9dee8c7e 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: 97d7ee751e9d7034, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 97d7ee751e9d7034, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:46 client Dropping Initial keys. 2025/04/30 11:18:46 client -> Sending packet 1 (86 bytes) for connection ad8557e3da673b9dee8c7e, Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 97d7ee751e9d7034, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Short Header{DestConnectionID: 97d7ee751e9d7034, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:46 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 97d7ee751e9d7034, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Peer doesn't await address validation any longer. 2025/04/30 11:18:46 client newly acked packets (1): [0] 2025/04/30 11:18:46 client updated RTT: 34.189ms (σ: 13.019ms) 2025/04/30 11:18:46 client Canceling loss detection timer. 2025/04/30 11:18:46 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:46 client -> Sending packet 1 (32 bytes) for connection ad8557e3da673b9dee8c7e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 97d7ee751e9d7034, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 153.988µs} 2025/04/30 11:18:46 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:46 client Dropping Handshake keys. 2025/04/30 11:18:46 client <- &wire.NewTokenFrame{Token: 0xb721813d7fd51a036bee061f0bc2744f536ab71eb721f7c14d0d272c3779750453cf7472f7} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9cb96bec34f054e9, StatelessResetToken: 0xd5044a1e89c3cd9a8ab836f91728ad7d} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 591a8de9fc50ed84, StatelessResetToken: 0x51e9dfd979af7cb4b8dad5558256f5fd} 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2af9a917de833495, StatelessResetToken: 0xe13aca9d73f104bb7e297b3a80639da5} 2025/04/30 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:46 client -> Sending packet 2 (34 bytes) for connection ad8557e3da673b9dee8c7e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 9cb96bec34f054e9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104.295µs} 2025/04/30 11:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:46 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:18:46 client newly acked packets (1): [2] 2025/04/30 11:18:46 client updated RTT: 33.84ms (σ: 10.46ms) 2025/04/30 11:18:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:46 client lost packet 0 (time threshold) 2025/04/30 11:18:46 client Canceling loss detection timer. 2025/04/30 11:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6bf7bd726c0965d6, StatelessResetToken: 0x57f2d20e82c9aaf24e20a90062e262f5} 2025/04/30 11:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:46 client Ignoring all packets below 2. 2025/04/30 11:18:46 client -> Sending packet 3 (51 bytes) for connection ad8557e3da673b9dee8c7e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 9cb96bec34f054e9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 98.214µs} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:46 client -> Sending packet 5 (46 bytes) for connection ad8557e3da673b9dee8c7e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 9cb96bec34f054e9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 client -> Sending packet 6 (46 bytes) for connection ad8557e3da673b9dee8c7e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 9cb96bec34f054e9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:46 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:46 client -> Sending packet 7 (34 bytes) for connection ad8557e3da673b9dee8c7e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 9cb96bec34f054e9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 66.164µs} 2025/04/30 11:18:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:46 client -> Sending packet 8 (30 bytes) for connection ad8557e3da673b9dee8c7e, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 9cb96bec34f054e9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:46 client Connection ad8557e3da673b9dee8c7e closed. 2025/04/30 11:18:46 Requesting https://server4:443/gdqlvqjfum. 2025/04/30 11:18:46 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:46 Increased send buffer size to 14336 kiB 2025/04/30 11:18:46 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:46 Created qlog file: /logs/qlog/5cc22b755ee4d3dc16e0304026ee7e79af8a6648.sqlog 2025/04/30 11:18:46 client Starting new connection to server4 ([::]:33400 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, version v1 2025/04/30 11:18:46 Adding connection ID (empty). 2025/04/30 11:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:46 client -> Sending packet 0 (1280 bytes) for connection 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:46 client -> Sending packet 1 (1280 bytes) for connection 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:46 client -> Sending packet 2 (1280 bytes) for connection 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:46 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 84837670b8d7bf01, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:46 client Received first packet. Switching destination connection ID to: 84837670b8d7bf01 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:46 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:46 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 84837670b8d7bf01, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:46 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 84837670b8d7bf01, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/04/30 11:18:46 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, InitialSourceConnectionID: 84837670b8d7bf01, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xbae3c874dce17494f9f1e5f3d8ccf51d} 2025/04/30 11:18:46 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 84837670b8d7bf01, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:46 client newly acked packets (1): [2] 2025/04/30 11:18:46 client updated RTT: 33.573242ms (σ: 16.786621ms) 2025/04/30 11:18:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5cc22b755ee4d3dc16e0304026ee7e79af8a6648 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: 84837670b8d7bf01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1126, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 84837670b8d7bf01, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:46 client Short Header{DestConnectionID: 84837670b8d7bf01, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:46 client Dropping Initial keys. 2025/04/30 11:18:46 client -> Sending packet 1 (40 bytes) for connection 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 84837670b8d7bf01, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:46 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:46 client -> Sending packet 1 (32 bytes) for connection 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:46 client Short Header{DestConnectionID: 84837670b8d7bf01, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 61.706µs} 2025/04/30 11:18:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:46 client -> Sending packet 2 (69 bytes) for connection 5cc22b755ee4d3dc16e0304026ee7e79af8a6648, Handshake 2025/04/30 11:18:46 client Long Header{Type: Handshake, DestConnectionID: 84837670b8d7bf01, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:46 client Short Header{DestConnectionID: 84837670b8d7bf01, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:46 client Connection 5cc22b755ee4d3dc16e0304026ee7e79af8a6648 closed. 2025/04/30 11:18:46 Requesting https://server4:443/scnzdmlexk. 2025/04/30 11:18:46 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:46 Increased send buffer size to 14336 kiB 2025/04/30 11:18:46 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:46 Created qlog file: /logs/qlog/abeb0066f75f56087b.sqlog 2025/04/30 11:18:46 client Starting new connection to server4 ([::]:59805 -> 193.167.100.100:443), source connection ID (empty), destination connection ID abeb0066f75f56087b, version v1 2025/04/30 11:18:46 Adding connection ID (empty). 2025/04/30 11:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:46 client -> Sending packet 0 (1280 bytes) for connection abeb0066f75f56087b, Initial 2025/04/30 11:18:46 client Long Header{Type: Initial, DestConnectionID: abeb0066f75f56087b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:47 client -> Sending packet 1 (1280 bytes) for connection abeb0066f75f56087b, Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: abeb0066f75f56087b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:47 client -> Sending packet 2 (1280 bytes) for connection abeb0066f75f56087b, Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: abeb0066f75f56087b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:18:47 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:47 client <- Reading packet 1 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b0781523066bd70, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:47 client Received first packet. Switching destination connection ID to: 0b0781523066bd70 2025/04/30 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:47 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:47 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:47 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:18:47 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b0781523066bd70, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:47 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:18:47 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b0781523066bd70, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 11:18:47 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:47 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: abeb0066f75f56087b, InitialSourceConnectionID: 0b0781523066bd70, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xdd3139b2974893350cd31294d0ab55cf} 2025/04/30 11:18:47 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b0781523066bd70, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:47 client newly acked packets (1): [2] 2025/04/30 11:18:47 client updated RTT: 33.446364ms (σ: 16.723182ms) 2025/04/30 11:18:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection abeb0066f75f56087b 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: 0b0781523066bd70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:47 client Long Header{Type: Handshake, DestConnectionID: 0b0781523066bd70, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:47 client Dropping Initial keys. 2025/04/30 11:18:47 client -> Sending packet 1 (40 bytes) for connection abeb0066f75f56087b, Handshake 2025/04/30 11:18:47 client Long Header{Type: Handshake, DestConnectionID: 0b0781523066bd70, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:47 client -> Sending packet 0 (46 bytes) for connection abeb0066f75f56087b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:47 client Short Header{DestConnectionID: 0b0781523066bd70, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:47 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:47 client <- Reading packet 2 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b0781523066bd70, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:47 client Peer doesn't await address validation any longer. 2025/04/30 11:18:47 client newly acked packets (1): [0] 2025/04/30 11:18:47 client Canceling loss detection timer. 2025/04/30 11:18:47 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:47 client -> Sending packet 1 (32 bytes) for connection abeb0066f75f56087b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:47 client Short Header{DestConnectionID: 0b0781523066bd70, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 131.226µs} 2025/04/30 11:18:47 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/04/30 11:18:47 client newly acked packets (1): [0] 2025/04/30 11:18:47 client updated RTT: 33.649ms (σ: 12.949ms) 2025/04/30 11:18:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:47 client Dropping Handshake keys. 2025/04/30 11:18:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:47 client <- &wire.NewTokenFrame{Token: 0xb76b9744cdb859342cbd9a3bacc97f953cfbb4d45d3c1c06cc4d3aeb882da806ab9b1888f6} 2025/04/30 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2b97d9dc65e412a3, StatelessResetToken: 0xe9caf6f3e8e7b46fe4bac6dfe805a978} 2025/04/30 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4077eaaab7fcb5ba, StatelessResetToken: 0x5260d0ffe8b538fdf4a342399057ac15} 2025/04/30 11:18:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5010ca286d99e573, StatelessResetToken: 0x034477fd6509c6d331d22062034bf487} 2025/04/30 11:18:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:47 client -> Sending packet 2 (34 bytes) for connection abeb0066f75f56087b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:47 client Short Header{DestConnectionID: 2b97d9dc65e412a3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 118.913µs} 2025/04/30 11:18:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:47 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:47 client -> Sending packet 3 (30 bytes) for connection abeb0066f75f56087b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:47 client Short Header{DestConnectionID: 2b97d9dc65e412a3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:47 client Connection abeb0066f75f56087b closed. 2025/04/30 11:18:47 Requesting https://server4:443/uikiontfvw. 2025/04/30 11:18:47 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:47 Increased send buffer size to 14336 kiB 2025/04/30 11:18:47 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:47 Created qlog file: /logs/qlog/f40f59c4d5032863eefb8deeaad057.sqlog 2025/04/30 11:18:47 client Starting new connection to server4 ([::]:51377 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f40f59c4d5032863eefb8deeaad057, version v1 2025/04/30 11:18:47 Adding connection ID (empty). 2025/04/30 11:18:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:47 client -> Sending packet 0 (1280 bytes) for connection f40f59c4d5032863eefb8deeaad057, Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: f40f59c4d5032863eefb8deeaad057, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:47 client -> Sending packet 1 (1280 bytes) for connection f40f59c4d5032863eefb8deeaad057, Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: f40f59c4d5032863eefb8deeaad057, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:47 client -> Sending packet 2 (1280 bytes) for connection f40f59c4d5032863eefb8deeaad057, Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: f40f59c4d5032863eefb8deeaad057, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:18:47 client -> Sending packet 3 (1280 bytes) for connection f40f59c4d5032863eefb8deeaad057, Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: f40f59c4d5032863eefb8deeaad057, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:47 client -> Sending packet 4 (1280 bytes) for connection f40f59c4d5032863eefb8deeaad057, Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: f40f59c4d5032863eefb8deeaad057, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:18:47 client <- Reading packet 4 (41 bytes) for connection (empty), Initial 2025/04/30 11:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ae912de2ac7cecdf, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:18:47 client Received first packet. Switching destination connection ID to: ae912de2ac7cecdf 2025/04/30 11:18:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:18:47 client newly acked packets (1): [4] 2025/04/30 11:18:47 client updated RTT: 33.039836ms (σ: 16.519918ms) 2025/04/30 11:18:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:48 client -> Sending packet 5 (1280 bytes) for connection f40f59c4d5032863eefb8deeaad057, Initial 2025/04/30 11:18:48 client Long Header{Type: Initial, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:48 client -> &wire.PingFrame{} 2025/04/30 11:18:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 11:18:49 client -> Sending packet 6 (1280 bytes) for connection f40f59c4d5032863eefb8deeaad057, Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:49 client -> &wire.PingFrame{} 2025/04/30 11:18:49 client -> Sending packet 7 (1280 bytes) for connection f40f59c4d5032863eefb8deeaad057, Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:18:49 client -> &wire.PingFrame{} 2025/04/30 11:18:49 client <- Reading packet 7 (43 bytes) for connection (empty), Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ae912de2ac7cecdf, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 11:18:49 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:49 client <- Reading packet 9 (129 bytes) for connection (empty), Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ae912de2ac7cecdf, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 111, Version: v1} 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:49 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:49 client <- Reading packet 4 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ae912de2ac7cecdf, PacketNumber: 4, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 11:18:49 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f40f59c4d5032863eefb8deeaad057, InitialSourceConnectionID: ae912de2ac7cecdf, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x976e38004e9b8726e4c2128cae96ecf5} 2025/04/30 11:18:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f40f59c4d5032863eefb8deeaad057 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 0s} 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:49 client Dropping Initial keys. 2025/04/30 11:18:49 client -> Sending packet 1 (86 bytes) for connection f40f59c4d5032863eefb8deeaad057, Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:18:49 client Short Header{DestConnectionID: ae912de2ac7cecdf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:18:49 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:18:49 client <- Reading packet 5 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ae912de2ac7cecdf, PacketNumber: 5, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 11:18:49 client -> Sending packet 2 (40 bytes) for connection f40f59c4d5032863eefb8deeaad057, Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:18:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:18:49 client -> Sending packet 3 (90 bytes) for connection f40f59c4d5032863eefb8deeaad057, Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:49 client -> Sending packet 4 (90 bytes) for connection f40f59c4d5032863eefb8deeaad057, Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: ae912de2ac7cecdf, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:49 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 568 bytes. 2025/04/30 11:18:49 client <- Reading packet 6 (40 bytes) for connection (empty), Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ae912de2ac7cecdf, PacketNumber: 6, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:18:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 11:18:49 client Peer doesn't await address validation any longer. 2025/04/30 11:18:49 client newly acked packets (1): [4] 2025/04/30 11:18:49 client updated RTT: 32.957ms (σ: 12.552ms) 2025/04/30 11:18:49 client Canceling loss detection timer. 2025/04/30 11:18:49 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:49 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:49 client -> Sending packet 1 (32 bytes) for connection f40f59c4d5032863eefb8deeaad057, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:49 client Short Header{DestConnectionID: ae912de2ac7cecdf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 149.731µs} 2025/04/30 11:18:49 client <- Reading packet 1 (142 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:49 client Dropping Handshake keys. 2025/04/30 11:18:49 client <- &wire.NewTokenFrame{Token: 0xb7cefa2c774b6ad82207110c1daff9439716c63b364a36ec20cbf554d2ad310e0f62e0c844} 2025/04/30 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f5cddccd556d323c, StatelessResetToken: 0x8f16734ec828dd98f0bc70eb402933d6} 2025/04/30 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 246393174f1fba87, StatelessResetToken: 0x4717bd149c81cd90a213568497ab516b} 2025/04/30 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 94477299520736f5, StatelessResetToken: 0x36f71fbac0048d043277c502745dea5d} 2025/04/30 11:18:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:18:49 client -> Sending packet 3 (53 bytes) for connection f40f59c4d5032863eefb8deeaad057, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:49 client Short Header{DestConnectionID: f5cddccd556d323c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 111.799µs} 2025/04/30 11:18:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:49 client -> Sending packet 4 (48 bytes) for connection f40f59c4d5032863eefb8deeaad057, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:49 client Short Header{DestConnectionID: f5cddccd556d323c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:49 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:18:49 client newly acked packets (1): [4] 2025/04/30 11:18:49 client updated RTT: 32.822ms (σ: 9.682ms) 2025/04/30 11:18:49 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:49 client Canceling loss detection timer. 2025/04/30 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 44639c1295b3b7e5, StatelessResetToken: 0xe5add3f31e977ea514e227075cad98b2} 2025/04/30 11:18:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:49 client Sending ACK because the ACK timer expired. 2025/04/30 11:18:49 client -> Sending packet 5 (33 bytes) for connection f40f59c4d5032863eefb8deeaad057, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:49 client Short Header{DestConnectionID: f5cddccd556d323c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.416354ms} 2025/04/30 11:18:49 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:49 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:49 client -> Sending packet 6 (34 bytes) for connection f40f59c4d5032863eefb8deeaad057, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:49 client Short Header{DestConnectionID: f5cddccd556d323c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 66.415µs} 2025/04/30 11:18:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:49 client -> Sending packet 7 (30 bytes) for connection f40f59c4d5032863eefb8deeaad057, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:49 client Short Header{DestConnectionID: f5cddccd556d323c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:49 client Connection f40f59c4d5032863eefb8deeaad057 closed. 2025/04/30 11:18:49 Requesting https://server4:443/mpagnslcss. 2025/04/30 11:18:49 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:49 Increased send buffer size to 14336 kiB 2025/04/30 11:18:49 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:49 Created qlog file: /logs/qlog/5606f9be62fa7f642d8f3a1bacdb2c.sqlog 2025/04/30 11:18:49 client Starting new connection to server4 ([::]:44239 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5606f9be62fa7f642d8f3a1bacdb2c, version v1 2025/04/30 11:18:49 Adding connection ID (empty). 2025/04/30 11:18:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:49 client -> Sending packet 0 (1280 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c, Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: 5606f9be62fa7f642d8f3a1bacdb2c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:18:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:49 client -> Sending packet 1 (1280 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c, Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: 5606f9be62fa7f642d8f3a1bacdb2c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:18:49 client -> Sending packet 2 (1280 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c, Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: 5606f9be62fa7f642d8f3a1bacdb2c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 11:18:49 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ee7fb45926cd645, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 11:18:49 client Received first packet. Switching destination connection ID to: 3ee7fb45926cd645 2025/04/30 11:18:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:49 client newly acked packets (1): [2] 2025/04/30 11:18:49 client updated RTT: 35.583899ms (σ: 17.791949ms) 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:49 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 11:18:49 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ee7fb45926cd645, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 11:18:49 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5606f9be62fa7f642d8f3a1bacdb2c, InitialSourceConnectionID: 3ee7fb45926cd645, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x50437913bad0ad8a59a02f24b75f4e98} 2025/04/30 11:18:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: 3ee7fb45926cd645, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: 3ee7fb45926cd645, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:49 client Dropping Initial keys. 2025/04/30 11:18:49 client -> Sending packet 1 (86 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c, Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: 3ee7fb45926cd645, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:49 client Short Header{DestConnectionID: 3ee7fb45926cd645, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:49 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 11:18:49 client Peer doesn't await address validation any longer. 2025/04/30 11:18:49 client newly acked packets (1): [0] 2025/04/30 11:18:49 client updated RTT: 35.474ms (σ: 13.559ms) 2025/04/30 11:18:49 client Canceling loss detection timer. 2025/04/30 11:18:49 client Dropping Handshake keys. 2025/04/30 11:18:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:49 client <- &wire.NewTokenFrame{Token: 0xb79d4abbb210e49689d7cbf4a49d45ed1e0cc8430cdc0d45405b2e903ca933e08f19a45fa8} 2025/04/30 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2fbdfa9b95e9cca4, StatelessResetToken: 0x62699d284bf6d6e15adfff8085e795f5} 2025/04/30 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f750c67902b5b4ff, StatelessResetToken: 0xff31987ab03c3543acbdd377e6137e0d} 2025/04/30 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: df963178f0ef652e, StatelessResetToken: 0x182c58068870cdc85a0a4bf9c5500497} 2025/04/30 11:18:49 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:49 client -> Sending packet 1 (34 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:49 client Short Header{DestConnectionID: 2fbdfa9b95e9cca4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 139.803µs} 2025/04/30 11:18:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:49 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:49 client newly acked packets (1): [1] 2025/04/30 11:18:49 client updated RTT: 34.971ms (σ: 11.173ms) 2025/04/30 11:18:49 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:49 client Canceling loss detection timer. 2025/04/30 11:18:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3235d1e07ea273e6, StatelessResetToken: 0x5aa71dada567f413688eeca1b97e93ca} 2025/04/30 11:18:49 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:49 client Ignoring all packets below 2. 2025/04/30 11:18:49 client -> Sending packet 2 (32 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:49 client Short Header{DestConnectionID: 2fbdfa9b95e9cca4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 122.791µs} 2025/04/30 11:18:49 client <- Reading packet 4 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:49 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:18:49 client -> Sending packet 3 (32 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:49 client Short Header{DestConnectionID: 2fbdfa9b95e9cca4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 94.447µs} 2025/04/30 11:18:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:49 client -> Sending packet 4 (30 bytes) for connection 5606f9be62fa7f642d8f3a1bacdb2c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:49 client Short Header{DestConnectionID: 2fbdfa9b95e9cca4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:49 client Connection 5606f9be62fa7f642d8f3a1bacdb2c closed. 2025/04/30 11:18:49 Requesting https://server4:443/lmgnqoxeai. 2025/04/30 11:18:49 Increased receive buffer size to 14336 kiB 2025/04/30 11:18:49 Increased send buffer size to 14336 kiB 2025/04/30 11:18:49 Setting DF for IPv4 and IPv6. 2025/04/30 11:18:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:18:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:18:49 Created qlog file: /logs/qlog/0c24ccba31121d7242814424573c.sqlog 2025/04/30 11:18:49 client Starting new connection to server4 ([::]:33070 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0c24ccba31121d7242814424573c, version v1 2025/04/30 11:18:49 Adding connection ID (empty). 2025/04/30 11:18:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:18:49 client -> Sending packet 0 (1280 bytes) for connection 0c24ccba31121d7242814424573c, Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: 0c24ccba31121d7242814424573c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:18:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:18:49 client -> Sending packet 1 (1280 bytes) for connection 0c24ccba31121d7242814424573c, Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: 0c24ccba31121d7242814424573c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:18:49 client -> Sending packet 2 (1280 bytes) for connection 0c24ccba31121d7242814424573c, Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: 0c24ccba31121d7242814424573c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:18:49 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f197428b8540c5b2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:18:49 client Received first packet. Switching destination connection ID to: f197428b8540c5b2 2025/04/30 11:18:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1ms} 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:18:49 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:18:49 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f197428b8540c5b2, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 11:18:49 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:18:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0c24ccba31121d7242814424573c, InitialSourceConnectionID: f197428b8540c5b2, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x4f09a7abc452080c34e2ae17f90d030b} 2025/04/30 11:18:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0c24ccba31121d7242814424573c 2025/04/30 11:18:49 client Long Header{Type: Initial, DestConnectionID: f197428b8540c5b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: f197428b8540c5b2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:18:49 client Dropping Initial keys. 2025/04/30 11:18:49 client -> Sending packet 1 (40 bytes) for connection 0c24ccba31121d7242814424573c, Handshake 2025/04/30 11:18:49 client Long Header{Type: Handshake, DestConnectionID: f197428b8540c5b2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:18:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:49 client -> Sending packet 0 (46 bytes) for connection 0c24ccba31121d7242814424573c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:49 client Short Header{DestConnectionID: f197428b8540c5b2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:18:50 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:18:50 client <- Reading packet 1 (38 bytes) for connection (empty), Handshake 2025/04/30 11:18:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f197428b8540c5b2, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:18:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:18:50 client Peer doesn't await address validation any longer. 2025/04/30 11:18:50 client newly acked packets (1): [0] 2025/04/30 11:18:50 client Canceling loss detection timer. 2025/04/30 11:18:50 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:18:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:18:50 client -> Sending packet 1 (32 bytes) for connection 0c24ccba31121d7242814424573c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:18:50 client Short Header{DestConnectionID: f197428b8540c5b2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 234.24µs} 2025/04/30 11:18:50 client <- Reading packet 1 (148 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3ms} 2025/04/30 11:18:50 client newly acked packets (1): [0] 2025/04/30 11:18:50 client updated RTT: 35.439057ms (σ: 17.719528ms) 2025/04/30 11:18:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:18:50 client Dropping Handshake keys. 2025/04/30 11:18:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:18:50 client <- &wire.NewTokenFrame{Token: 0xb72db79cc9340b9d562c286425a143ab73e53d49f3aab95093e9d3a7c30d5612003191d603} 2025/04/30 11:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a5d7aaaabc0877e5, StatelessResetToken: 0x7c07f818ce3565e2e516f7c389c7d84b} 2025/04/30 11:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f0d362d839a3105d, StatelessResetToken: 0xe7888283982d58c1b59c0377e9a7e999} 2025/04/30 11:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e8526dbbd237106, StatelessResetToken: 0xc6cc535df16e7a620b137ea9e8864f29} 2025/04/30 11:18:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:18:50 client -> Sending packet 2 (34 bytes) for connection 0c24ccba31121d7242814424573c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:50 client Short Header{DestConnectionID: a5d7aaaabc0877e5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 141.766µs} 2025/04/30 11:18:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:18:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:18:50 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:50 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:18:50 client newly acked packets (1): [2] 2025/04/30 11:18:50 client updated RTT: 34.933ms (σ: 14.299ms) 2025/04/30 11:18:50 client Canceling loss detection timer. 2025/04/30 11:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7b0e5d774ea72d2d, StatelessResetToken: 0x5752245f40d507174dd75cfa438c1690} 2025/04/30 11:18:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:50 client Ignoring all packets below 2. 2025/04/30 11:18:50 client -> Sending packet 3 (32 bytes) for connection 0c24ccba31121d7242814424573c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:50 client Short Header{DestConnectionID: a5d7aaaabc0877e5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 144.641µs} 2025/04/30 11:18:50 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:18:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:18:50 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/04/30 11:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7b0e5d774ea72d2d, StatelessResetToken: 0x5752245f40d507174dd75cfa438c1690} 2025/04/30 11:18:50 client -> Sending packet 4 (1366 bytes) for connection 0c24ccba31121d7242814424573c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:50 client Short Header{DestConnectionID: a5d7aaaabc0877e5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:50 client -> &wire.PingFrame{} 2025/04/30 11:18:50 client -> Sending packet 5 (34 bytes) for connection 0c24ccba31121d7242814424573c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:50 client Short Header{DestConnectionID: a5d7aaaabc0877e5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:50 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 187.021µs} 2025/04/30 11:18:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:18:50 client -> Sending packet 6 (30 bytes) for connection 0c24ccba31121d7242814424573c, 1-RTT (ECN: Not-ECT) 2025/04/30 11:18:50 client Short Header{DestConnectionID: a5d7aaaabc0877e5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:18:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:18:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:18:50 client Connection 0c24ccba31121d7242814424573c closed.