2025/04/30 11:15:06 Requesting https://server4:443/czmovvogvd. 2025/04/30 11:15:06 Increased receive buffer size to 14336 kiB 2025/04/30 11:15:06 Increased send buffer size to 14336 kiB 2025/04/30 11:15:06 Setting DF for IPv4 and IPv6. 2025/04/30 11:15:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:15:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:15:06 Created qlog file: /logs/qlog/22ea9a8632b50b7bec3ddb4e5b.sqlog 2025/04/30 11:15:06 client Starting new connection to server4 ([::]:34832 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 22ea9a8632b50b7bec3ddb4e5b, version v1 2025/04/30 11:15:06 Adding connection ID (empty). 2025/04/30 11:15:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:15:06 client -> Sending packet 0 (1280 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Initial 2025/04/30 11:15:06 client Long Header{Type: Initial, DestConnectionID: 22ea9a8632b50b7bec3ddb4e5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:15:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:15:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:15:06 client -> Sending packet 1 (1280 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Initial 2025/04/30 11:15:06 client Long Header{Type: Initial, DestConnectionID: 22ea9a8632b50b7bec3ddb4e5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:15:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:15:06 client -> Sending packet 2 (1280 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Initial 2025/04/30 11:15:06 client Long Header{Type: Initial, DestConnectionID: 22ea9a8632b50b7bec3ddb4e5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:15:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:15:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:15:06 client -> Sending packet 3 (1280 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Initial 2025/04/30 11:15:06 client Long Header{Type: Initial, DestConnectionID: 22ea9a8632b50b7bec3ddb4e5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:15:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:15:06 client -> Sending packet 4 (1280 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Initial 2025/04/30 11:15:06 client Long Header{Type: Initial, DestConnectionID: 22ea9a8632b50b7bec3ddb4e5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:15:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:15:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:15:07 client -> Sending packet 5 (1280 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Initial 2025/04/30 11:15:07 client Long Header{Type: Initial, DestConnectionID: 22ea9a8632b50b7bec3ddb4e5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:15:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:15:07 client -> Sending packet 6 (1280 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Initial 2025/04/30 11:15:07 client Long Header{Type: Initial, DestConnectionID: 22ea9a8632b50b7bec3ddb4e5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:15:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:15:07 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1065 bytes. 2025/04/30 11:15:07 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 11:15:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fb3415fe6a5e93ce, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 11:15:07 client Received first packet. Switching destination connection ID to: fb3415fe6a5e93ce 2025/04/30 11:15:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:15:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:15:07 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:15:07 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:15:07 client Parsed a coalesced packet. Part 2: 1065 bytes. Remaining: 0 bytes. 2025/04/30 11:15:07 client <- Reading packet 0 (1065 bytes) for connection (empty), Handshake 2025/04/30 11:15:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fb3415fe6a5e93ce, PacketNumber: 0, PacketNumberLen: 1, Length: 1048, Version: v1} 2025/04/30 11:15:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:15:07 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:15:07 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 11:15:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 22ea9a8632b50b7bec3ddb4e5b, InitialSourceConnectionID: fb3415fe6a5e93ce, InitialMaxStreamDataBidiLocal: 16380, InitialMaxStreamDataBidiRemote: 1474200, InitialMaxStreamDataUni: 16380, InitialMaxData: 1638000, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x9b459bcd57bc5a46f03c29c318c15cc0} 2025/04/30 11:15:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b 2025/04/30 11:15:07 client Long Header{Type: Initial, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 11:15:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:15:07 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:15:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:15:07 client Dropping Initial keys. 2025/04/30 11:15:07 client -> Sending packet 1 (40 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:07 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:15:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:15:07 client -> Sending packet 0 (46 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:15:07 client Short Header{DestConnectionID: fb3415fe6a5e93ce, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:15:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:15:07 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:15:07 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/04/30 11:15:07 client Parsed a coalesced packet. Part 2: 39 bytes. Remaining: 1032 bytes. 2025/04/30 11:15:07 client Dropping %!s(logging.PacketType=0) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:15:07 client Parsed a coalesced packet. Part 3: 1032 bytes. Remaining: 0 bytes. 2025/04/30 11:15:07 client <- Reading packet 1 (1032 bytes) for connection (empty), Handshake 2025/04/30 11:15:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fb3415fe6a5e93ce, PacketNumber: 1, PacketNumberLen: 1, Length: 1015, Version: v1} 2025/04/30 11:15:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:15:07 client Dropping %!s(logging.PacketType=0) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:15:07 client -> Sending packet 2 (40 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:07 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:15:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:15:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:15:07 client -> Sending packet 3 (90 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:07 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:15:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:15:07 client -> Sending packet 4 (90 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:07 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:15:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:15:08 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 11:15:08 client Dropping %!s(logging.PacketType=0) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:15:08 client Dropping %!s(logging.PacketType=0) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:15:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:15:08 client -> Sending packet 5 (90 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:08 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:15:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:15:08 client -> Sending packet 6 (90 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:08 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:15:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:15:08 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:15:08 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/04/30 11:15:08 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:15:08 client <- Reading packet 2 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:15:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fb3415fe6a5e93ce, PacketNumber: 2, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:15:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:15:08 client -> Sending packet 7 (40 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:08 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:15:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:15:08 client Parsed a coalesced packet. Part 1: 129 bytes. Remaining: 1071 bytes. 2025/04/30 11:15:08 client Dropping %!s(logging.PacketType=0) packet (129 bytes) because we already dropped the keys. 2025/04/30 11:15:08 client Parsed a coalesced packet. Part 2: 1071 bytes. Remaining: 0 bytes. 2025/04/30 11:15:08 client <- Reading packet 3 (1071 bytes) for connection (empty), Handshake 2025/04/30 11:15:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fb3415fe6a5e93ce, PacketNumber: 3, PacketNumberLen: 1, Length: 1054, Version: v1} 2025/04/30 11:15:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 11:15:08 client -> Sending packet 8 (40 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:08 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:15:08 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:15:09 client Dropping %!s(logging.PacketType=0) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:15:09 client Dropping %!s(logging.PacketType=0) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:15:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 11:15:09 client -> Sending packet 9 (90 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:09 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:15:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:15:09 client -> Sending packet 10 (90 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, Handshake 2025/04/30 11:15:09 client Long Header{Type: Handshake, DestConnectionID: fb3415fe6a5e93ce, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 11:15:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 11:15:09 client Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 568 bytes. 2025/04/30 11:15:09 client <- Reading packet 4 (38 bytes) for connection (empty), Handshake 2025/04/30 11:15:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fb3415fe6a5e93ce, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:15:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:15:09 client Peer doesn't await address validation any longer. 2025/04/30 11:15:09 client <- Reading packet 0 (568 bytes) for connection (empty), 1-RTT 2025/04/30 11:15:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:15:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 546, Offset + Data length: 546} 2025/04/30 11:15:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:15:09 client -> Sending packet 1 (32 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:15:09 client Short Header{DestConnectionID: fb3415fe6a5e93ce, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:15:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 125.045µs} 2025/04/30 11:15:09 client <- Reading packet 1 (147 bytes) for connection (empty), 1-RTT 2025/04/30 11:15:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:15:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:15:09 client newly acked packets (1): [0] 2025/04/30 11:15:09 client updated RTT: 1.505304321s (σ: 752.65216ms) 2025/04/30 11:15:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 11:15:09 client Canceling loss detection timer. 2025/04/30 11:15:09 client Dropping Handshake keys. 2025/04/30 11:15:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:15:09 client <- &wire.NewTokenFrame{Token: 0xb7423bb6bf7d2f8b56d10f98eb482d9676ef2864a2b98ce9e996424ccda45184558135d67e} 2025/04/30 11:15:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a898fecaf92c5851, StatelessResetToken: 0x15bb6c03b5b2743f89b5d5f4c7cf182b} 2025/04/30 11:15:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df8ce266aa82bb81, StatelessResetToken: 0x063faba06fa262584b3391244e7f03dd} 2025/04/30 11:15:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 82d7a6b341895ad2, StatelessResetToken: 0xf01da7cd9ab1b81e61679f0b311563a5} 2025/04/30 11:15:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:15:09 client -> Sending packet 2 (34 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:15:09 client Short Header{DestConnectionID: a898fecaf92c5851, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:15:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 138.439µs} 2025/04/30 11:15:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:15:09 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 11:15:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:15:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:15:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:15:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:15:09 client -> Sending packet 3 (30 bytes) for connection 22ea9a8632b50b7bec3ddb4e5b, 1-RTT (ECN: Not-ECT) 2025/04/30 11:15:09 client Short Header{DestConnectionID: a898fecaf92c5851, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:15:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:15:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:15:09 client Connection 22ea9a8632b50b7bec3ddb4e5b closed.