2025/04/30 10:44:34 Requesting https://server4:443/zklhdaxtzn. 2025/04/30 10:44:34 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:34 Increased send buffer size to 14336 kiB 2025/04/30 10:44:34 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:34 Created qlog file: /logs/qlog/80e26ff29acfcc16b9cda05535a5e809.sqlog 2025/04/30 10:44:34 client Starting new connection to server4 ([::]:33659 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 80e26ff29acfcc16b9cda05535a5e809, version v1 2025/04/30 10:44:34 Adding connection ID (empty). 2025/04/30 10:44:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:34 client -> Sending packet 0 (1280 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, Initial 2025/04/30 10:44:34 client Long Header{Type: Initial, DestConnectionID: 80e26ff29acfcc16b9cda05535a5e809, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:34 client -> Sending packet 1 (1280 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, Initial 2025/04/30 10:44:34 client Long Header{Type: Initial, DestConnectionID: 80e26ff29acfcc16b9cda05535a5e809, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:34 client -> Sending packet 2 (1280 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, Initial 2025/04/30 10:44:34 client Long Header{Type: Initial, DestConnectionID: 80e26ff29acfcc16b9cda05535a5e809, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:34 client Parsed a coalesced packet. Part 1: 455 bytes. Remaining: 745 bytes. 2025/04/30 10:44:34 client <- Reading packet 0 (455 bytes) for connection (empty), Initial 2025/04/30 10:44:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d67dac82c0b502a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 437, Version: v1} 2025/04/30 10:44:34 client Received first packet. Switching destination connection ID to: 4d67dac82c0b502a 2025/04/30 10:44:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:34 client Parsed a coalesced packet. Part 2: 745 bytes. Remaining: 0 bytes. 2025/04/30 10:44:34 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/04/30 10:44:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d67dac82c0b502a, PacketNumber: 0, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:44:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:44:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 80e26ff29acfcc16b9cda05535a5e809, InitialSourceConnectionID: 4d67dac82c0b502a, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809 2025/04/30 10:44:34 client Long Header{Type: Initial, DestConnectionID: 4d67dac82c0b502a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:34 client Long Header{Type: Handshake, DestConnectionID: 4d67dac82c0b502a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:34 client Dropping Initial keys. 2025/04/30 10:44:34 client -> Sending packet 1 (40 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, Handshake 2025/04/30 10:44:34 client Long Header{Type: Handshake, DestConnectionID: 4d67dac82c0b502a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:34 client -> Sending packet 0 (46 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:34 client Short Header{DestConnectionID: 4d67dac82c0b502a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:34 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:44:34 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:34 client Dropping Handshake keys. 2025/04/30 10:44:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 15f7ffb5b8dc7da5, StatelessResetToken: 0xd20c5ec9bffb31155063696be580144d} 2025/04/30 10:44:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 56a5c349c03a3dfe, StatelessResetToken: 0x205b37da880b2f187f5b4f2949c620fd} 2025/04/30 10:44:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 037d445dcdc042f9, StatelessResetToken: 0xdcd2959ca87331438e8dd6a428479f00} 2025/04/30 10:44:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:34 client -> Sending packet 1 (1366 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:34 client Short Header{DestConnectionID: 15f7ffb5b8dc7da5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:34 client -> &wire.PingFrame{} 2025/04/30 10:44:34 client -> Sending packet 2 (34 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:34 client Short Header{DestConnectionID: 15f7ffb5b8dc7da5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 319.166µs} 2025/04/30 10:44:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:34 client <- Reading packet 2 (52 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:34 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 10:44:34 client newly acked packets (3): [0 1 2] 2025/04/30 10:44:34 client updated RTT: 36.831602ms (σ: 18.415801ms) 2025/04/30 10:44:34 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:34 client Canceling loss detection timer. 2025/04/30 10:44:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 28b01b05832a9d23, StatelessResetToken: 0x9b7871d7fe6da4e5d2373ee8eff00ec3} 2025/04/30 10:44:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:34 client Ignoring all packets below 1. 2025/04/30 10:44:34 client -> Sending packet 3 (32 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:34 client Short Header{DestConnectionID: 15f7ffb5b8dc7da5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 139.05µs} 2025/04/30 10:44:34 client <- Reading packet 3 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:34 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:34 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:34 client -> Sending packet 4 (30 bytes) for connection 80e26ff29acfcc16b9cda05535a5e809, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:34 client Short Header{DestConnectionID: 15f7ffb5b8dc7da5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:34 client Connection 80e26ff29acfcc16b9cda05535a5e809 closed. 2025/04/30 10:44:34 Requesting https://server4:443/odzlpmisit. 2025/04/30 10:44:34 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:34 Increased send buffer size to 14336 kiB 2025/04/30 10:44:34 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:34 Created qlog file: /logs/qlog/deec7d368b3d5df2dd677051ab6192c4.sqlog 2025/04/30 10:44:34 client Starting new connection to server4 ([::]:34795 -> 193.167.100.100:443), source connection ID (empty), destination connection ID deec7d368b3d5df2dd677051ab6192c4, version v1 2025/04/30 10:44:34 Adding connection ID (empty). 2025/04/30 10:44:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:34 client -> Sending packet 0 (1280 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Initial 2025/04/30 10:44:34 client Long Header{Type: Initial, DestConnectionID: deec7d368b3d5df2dd677051ab6192c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:34 client -> Sending packet 1 (1280 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Initial 2025/04/30 10:44:34 client Long Header{Type: Initial, DestConnectionID: deec7d368b3d5df2dd677051ab6192c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:34 client -> Sending packet 2 (1280 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Initial 2025/04/30 10:44:34 client Long Header{Type: Initial, DestConnectionID: deec7d368b3d5df2dd677051ab6192c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:35 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 02518b3c0d701ca5, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:35 client Received first packet. Switching destination connection ID to: 02518b3c0d701ca5 2025/04/30 10:44:35 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:35 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 02518b3c0d701ca5, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:35 client -> Sending packet 3 (1280 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: 02518b3c0d701ca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:44:35 client -> Sending packet 4 (1280 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: 02518b3c0d701ca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:35 client -> Sending packet 5 (1280 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: 02518b3c0d701ca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:35 client <- Reading packet 4 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 02518b3c0d701ca5, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:35 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:44:35 client <- Reading packet 5 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 02518b3c0d701ca5, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:35 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:44:35 client newly acked packets (1): [5] 2025/04/30 10:44:35 client updated RTT: 35.725751ms (σ: 17.862875ms) 2025/04/30 10:44:35 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 02518b3c0d701ca5, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:35 client -> Sending packet 6 (1280 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: 02518b3c0d701ca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:35 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:35 client <- Reading packet 7 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 02518b3c0d701ca5, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:35 client -> Sending packet 7 (1280 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Initial 2025/04/30 10:44:35 client Long Header{Type: Initial, DestConnectionID: 02518b3c0d701ca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:35 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:35 client <- Reading packet 3 (745 bytes) for connection (empty), Handshake 2025/04/30 10:44:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 02518b3c0d701ca5, PacketNumber: 3, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:44:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:44:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: deec7d368b3d5df2dd677051ab6192c4, InitialSourceConnectionID: 02518b3c0d701ca5, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:35 client -> Sending packet 0 (79 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Handshake 2025/04/30 10:44:35 client Long Header{Type: Handshake, DestConnectionID: 02518b3c0d701ca5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:35 client Dropping Initial keys. 2025/04/30 10:44:35 client -> Sending packet 0 (46 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:35 client Short Header{DestConnectionID: 02518b3c0d701ca5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:35 client -> Sending packet 1 (74 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Handshake 2025/04/30 10:44:35 client Long Header{Type: Handshake, DestConnectionID: 02518b3c0d701ca5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:35 client -> Sending packet 2 (74 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, Handshake 2025/04/30 10:44:35 client Long Header{Type: Handshake, DestConnectionID: 02518b3c0d701ca5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:36 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:36 client Dropping Handshake keys. 2025/04/30 10:44:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e28f683c3a72c435, StatelessResetToken: 0xc1bb0db44c15bb9d516bd89e28d94aa1} 2025/04/30 10:44:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0634268bb67c0a24, StatelessResetToken: 0x124e59633e275ef2743f458f21f922e7} 2025/04/30 10:44:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fbf6dbd60017db99, StatelessResetToken: 0x8860bb83ab62a5fbfb0c8140ca7f52d0} 2025/04/30 10:44:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:36 client -> Sending packet 2 (53 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:36 client Short Header{DestConnectionID: e28f683c3a72c435, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 171.611µs} 2025/04/30 10:44:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:36 client -> Sending packet 3 (48 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:36 client Short Header{DestConnectionID: e28f683c3a72c435, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:36 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:36 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:36 client newly acked packets (1): [3] 2025/04/30 10:44:36 client updated RTT: 35.515ms (σ: 13.815ms) 2025/04/30 10:44:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:36 client Canceling loss detection timer. 2025/04/30 10:44:36 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:36 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:36 client -> Sending packet 4 (34 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:36 client Short Header{DestConnectionID: e28f683c3a72c435, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 161.942µs} 2025/04/30 10:44:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:36 client -> Sending packet 5 (30 bytes) for connection deec7d368b3d5df2dd677051ab6192c4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:36 client Short Header{DestConnectionID: e28f683c3a72c435, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:36 client Connection deec7d368b3d5df2dd677051ab6192c4 closed. 2025/04/30 10:44:36 Requesting https://server4:443/zdruhiwjnv. 2025/04/30 10:44:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:36 Increased send buffer size to 14336 kiB 2025/04/30 10:44:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:36 Created qlog file: /logs/qlog/2505048485d5e92b1f59f35b915141bded.sqlog 2025/04/30 10:44:36 client Starting new connection to server4 ([::]:56467 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2505048485d5e92b1f59f35b915141bded, version v1 2025/04/30 10:44:36 Adding connection ID (empty). 2025/04/30 10:44:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:36 client -> Sending packet 0 (1280 bytes) for connection 2505048485d5e92b1f59f35b915141bded, Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: 2505048485d5e92b1f59f35b915141bded, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:44:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:36 client -> Sending packet 1 (1280 bytes) for connection 2505048485d5e92b1f59f35b915141bded, Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: 2505048485d5e92b1f59f35b915141bded, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:44:36 client -> Sending packet 2 (1280 bytes) for connection 2505048485d5e92b1f59f35b915141bded, Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: 2505048485d5e92b1f59f35b915141bded, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:44:36 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:44:36 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e9650f447e4cdc86, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:44:36 client Received first packet. Switching destination connection ID to: e9650f447e4cdc86 2025/04/30 10:44:36 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:36 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:44:36 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e9650f447e4cdc86, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2505048485d5e92b1f59f35b915141bded, InitialSourceConnectionID: e9650f447e4cdc86, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2505048485d5e92b1f59f35b915141bded 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: e9650f447e4cdc86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:36 client Long Header{Type: Handshake, DestConnectionID: e9650f447e4cdc86, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:36 client Dropping Initial keys. 2025/04/30 10:44:36 client -> Sending packet 1 (86 bytes) for connection 2505048485d5e92b1f59f35b915141bded, Handshake 2025/04/30 10:44:36 client Long Header{Type: Handshake, DestConnectionID: e9650f447e4cdc86, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:36 client Short Header{DestConnectionID: e9650f447e4cdc86, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:36 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:44:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:36 client -> Sending packet 2 (74 bytes) for connection 2505048485d5e92b1f59f35b915141bded, Handshake 2025/04/30 10:44:36 client Long Header{Type: Handshake, DestConnectionID: e9650f447e4cdc86, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:36 client -> Sending packet 3 (74 bytes) for connection 2505048485d5e92b1f59f35b915141bded, Handshake 2025/04/30 10:44:36 client Long Header{Type: Handshake, DestConnectionID: e9650f447e4cdc86, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:36 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:36 client Dropping Handshake keys. 2025/04/30 10:44:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b48d921ada0a1527, StatelessResetToken: 0x8c57cd62863214885fb2a7ec56f07861} 2025/04/30 10:44:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3256ab2ede0fdd58, StatelessResetToken: 0x0d178f396536bd7b85ca49abe1ec6b9f} 2025/04/30 10:44:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1c3c8412b89d2301, StatelessResetToken: 0xfe0a4621e6041d5046c5cb5af7f4bb8e} 2025/04/30 10:44:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:36 client -> Sending packet 2 (53 bytes) for connection 2505048485d5e92b1f59f35b915141bded, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:36 client Short Header{DestConnectionID: b48d921ada0a1527, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 135.583µs} 2025/04/30 10:44:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:36 client -> Sending packet 3 (48 bytes) for connection 2505048485d5e92b1f59f35b915141bded, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:36 client Short Header{DestConnectionID: b48d921ada0a1527, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:36 client -> Sending packet 4 (1366 bytes) for connection 2505048485d5e92b1f59f35b915141bded, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:36 client Short Header{DestConnectionID: b48d921ada0a1527, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.PingFrame{} 2025/04/30 10:44:36 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 588705e42781cdd0, StatelessResetToken: 0x91c000e07a5de9a924ecc008e872703e} 2025/04/30 10:44:36 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:36 client <- Reading packet 2 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:36 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:44:36 client newly acked packets (1): [4] 2025/04/30 10:44:36 client updated RTT: 34.630545ms (σ: 17.315272ms) 2025/04/30 10:44:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:36 client setting loss timer for packet 3 (1-RTT) to 38.959363ms (in 2025-04-30 10:44:36.687619992 +0000 UTC m=+2.345289814) 2025/04/30 10:44:36 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:36 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:36 client -> Sending packet 5 (32 bytes) for connection 2505048485d5e92b1f59f35b915141bded, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:36 client Short Header{DestConnectionID: b48d921ada0a1527, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 127.99µs} 2025/04/30 10:44:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:36 client -> Sending packet 6 (30 bytes) for connection 2505048485d5e92b1f59f35b915141bded, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:36 client Short Header{DestConnectionID: b48d921ada0a1527, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:36 client Connection 2505048485d5e92b1f59f35b915141bded closed. 2025/04/30 10:44:36 Requesting https://server4:443/pobqsyruiq. 2025/04/30 10:44:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:36 Increased send buffer size to 14336 kiB 2025/04/30 10:44:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:36 Created qlog file: /logs/qlog/eb9e5e4c3506b12c470a3631e535f847.sqlog 2025/04/30 10:44:36 client Starting new connection to server4 ([::]:42737 -> 193.167.100.100:443), source connection ID (empty), destination connection ID eb9e5e4c3506b12c470a3631e535f847, version v1 2025/04/30 10:44:36 Adding connection ID (empty). 2025/04/30 10:44:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:36 client -> Sending packet 0 (1280 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: eb9e5e4c3506b12c470a3631e535f847, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:36 client -> Sending packet 1 (1280 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: eb9e5e4c3506b12c470a3631e535f847, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:36 client -> Sending packet 2 (1280 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: eb9e5e4c3506b12c470a3631e535f847, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:36 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 320cfca3014d7103, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:36 client Received first packet. Switching destination connection ID to: 320cfca3014d7103 2025/04/30 10:44:36 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:36 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 320cfca3014d7103, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:36 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:36 client newly acked packets (1): [2] 2025/04/30 10:44:36 client updated RTT: 35.364888ms (σ: 17.682444ms) 2025/04/30 10:44:37 client Queueing packet (745 bytes) for later decryption 2025/04/30 10:44:37 client Queueing packet (745 bytes) for later decryption 2025/04/30 10:44:37 client -> Sending packet 3 (1280 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, Initial 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: 320cfca3014d7103, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:37 client -> &wire.PingFrame{} 2025/04/30 10:44:37 client <- Reading packet 4 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 320cfca3014d7103, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:37 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:37 client newly acked packets (1): [3] 2025/04/30 10:44:37 client updated RTT: 35.167ms (σ: 13.654ms) 2025/04/30 10:44:37 client -> Sending packet 4 (1280 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, Initial 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: 320cfca3014d7103, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:37 client -> &wire.PingFrame{} 2025/04/30 10:44:37 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 320cfca3014d7103, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:37 client -> Sending packet 5 (1280 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, Initial 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: 320cfca3014d7103, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:37 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:37 client <- Reading packet 1 (745 bytes) for connection (empty), Handshake 2025/04/30 10:44:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 320cfca3014d7103, PacketNumber: 1, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:44:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:44:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: eb9e5e4c3506b12c470a3631e535f847, InitialSourceConnectionID: 320cfca3014d7103, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:37 client <- Reading packet 2 (745 bytes) for connection (empty), Handshake 2025/04/30 10:44:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 320cfca3014d7103, PacketNumber: 2, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:44:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:44:37 client -> Sending packet 0 (79 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, Handshake 2025/04/30 10:44:37 client Long Header{Type: Handshake, DestConnectionID: 320cfca3014d7103, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:37 client Dropping Initial keys. 2025/04/30 10:44:37 client -> Sending packet 0 (46 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 320cfca3014d7103, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:37 client <- Reading packet 3 (745 bytes) for connection (empty), Handshake 2025/04/30 10:44:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 320cfca3014d7103, PacketNumber: 3, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:44:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:44:37 client -> Sending packet 1 (40 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, Handshake 2025/04/30 10:44:37 client Long Header{Type: Handshake, DestConnectionID: 320cfca3014d7103, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:37 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:37 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:37 client Dropping Handshake keys. 2025/04/30 10:44:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:37 client -> Sending packet 1 (32 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 320cfca3014d7103, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 101.058µs} 2025/04/30 10:44:37 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1ec1b08a21768289, StatelessResetToken: 0x61dfaafc9667f14beea36c3a3fa5a412} 2025/04/30 10:44:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 68c701ae72e4ecd0, StatelessResetToken: 0x0e5b34edb6c6c800758a450a6afcfa9b} 2025/04/30 10:44:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 20aad94f10063ce0, StatelessResetToken: 0x0caa0104a46a41e8853ba08ca02e360a} 2025/04/30 10:44:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:37 client -> Sending packet 2 (34 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 1ec1b08a21768289, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 49.735µs} 2025/04/30 10:44:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:37 client -> Sending packet 4 (46 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 1ec1b08a21768289, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:37 client Skipping packet number 3 2025/04/30 10:44:37 client -> Sending packet 5 (29 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 1ec1b08a21768289, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:37 client <- Reading packet 3 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:37 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:37 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:37 client newly acked packets (2): [4 5] 2025/04/30 10:44:37 client updated RTT: 34.837ms (σ: 10.898ms) 2025/04/30 10:44:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:37 client Canceling loss detection timer. 2025/04/30 10:44:37 client <- Reading packet 4 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:37 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:37 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:37 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:37 client -> Sending packet 6 (30 bytes) for connection eb9e5e4c3506b12c470a3631e535f847, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 1ec1b08a21768289, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:37 client Connection eb9e5e4c3506b12c470a3631e535f847 closed. 2025/04/30 10:44:37 Requesting https://server4:443/clhucmdjwl. 2025/04/30 10:44:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:37 Increased send buffer size to 14336 kiB 2025/04/30 10:44:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:37 Created qlog file: /logs/qlog/d799099d599cfaeda6d8.sqlog 2025/04/30 10:44:37 client Starting new connection to server4 ([::]:37909 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d799099d599cfaeda6d8, version v1 2025/04/30 10:44:37 Adding connection ID (empty). 2025/04/30 10:44:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:37 client -> Sending packet 0 (1280 bytes) for connection d799099d599cfaeda6d8, Initial 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: d799099d599cfaeda6d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:44:37 client Parsed a coalesced packet. Part 1: 462 bytes. Remaining: 738 bytes. 2025/04/30 10:44:37 client <- Reading packet 0 (462 bytes) for connection (empty), Initial 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5740c4db4be28b72, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 444, Version: v1} 2025/04/30 10:44:37 client Received first packet. Switching destination connection ID to: 5740c4db4be28b72 2025/04/30 10:44:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:37 client newly acked packets (1): [0] 2025/04/30 10:44:37 client updated RTT: 39.482359ms (σ: 19.741179ms) 2025/04/30 10:44:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:37 client Parsed a coalesced packet. Part 2: 738 bytes. Remaining: 0 bytes. 2025/04/30 10:44:37 client <- Reading packet 0 (738 bytes) for connection (empty), Handshake 2025/04/30 10:44:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5740c4db4be28b72, PacketNumber: 0, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:44:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:44:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d799099d599cfaeda6d8, InitialSourceConnectionID: 5740c4db4be28b72, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d799099d599cfaeda6d8 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: 5740c4db4be28b72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:37 client Long Header{Type: Handshake, DestConnectionID: 5740c4db4be28b72, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:37 client Dropping Initial keys. 2025/04/30 10:44:37 client -> Sending packet 1 (40 bytes) for connection d799099d599cfaeda6d8, Handshake 2025/04/30 10:44:37 client Long Header{Type: Handshake, DestConnectionID: 5740c4db4be28b72, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:37 client -> Sending packet 0 (46 bytes) for connection d799099d599cfaeda6d8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 5740c4db4be28b72, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:37 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:37 client Dropping Handshake keys. 2025/04/30 10:44:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 99b34ad010649c83, StatelessResetToken: 0xac779608e424c838b272f28ef42cbddd} 2025/04/30 10:44:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2ead885b4a3ae50, StatelessResetToken: 0x53f87b7f2946107e4b08a461defc4f5f} 2025/04/30 10:44:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12e8f03683c61b2a, StatelessResetToken: 0xbfa243ae6d4834690d64d7a9f5920156} 2025/04/30 10:44:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:37 client -> Sending packet 1 (34 bytes) for connection d799099d599cfaeda6d8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 99b34ad010649c83, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 127.899µs} 2025/04/30 10:44:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:37 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:37 client newly acked packets (1): [0] 2025/04/30 10:44:37 client updated RTT: 39.135ms (σ: 15.499ms) 2025/04/30 10:44:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:37 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:37 client -> Sending packet 2 (30 bytes) for connection d799099d599cfaeda6d8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:37 client Short Header{DestConnectionID: 99b34ad010649c83, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:37 client Connection d799099d599cfaeda6d8 closed. 2025/04/30 10:44:37 Requesting https://server4:443/xijgojrjku. 2025/04/30 10:44:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:37 Increased send buffer size to 14336 kiB 2025/04/30 10:44:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:37 Created qlog file: /logs/qlog/f899955fd976a5aa2bde117b2591bd4371a546c7.sqlog 2025/04/30 10:44:37 client Starting new connection to server4 ([::]:54950 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f899955fd976a5aa2bde117b2591bd4371a546c7, version v1 2025/04/30 10:44:37 Adding connection ID (empty). 2025/04/30 10:44:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:37 client -> Sending packet 0 (1280 bytes) for connection f899955fd976a5aa2bde117b2591bd4371a546c7, Initial 2025/04/30 10:44:37 client Long Header{Type: Initial, DestConnectionID: f899955fd976a5aa2bde117b2591bd4371a546c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:44:38 client Parsed a coalesced packet. Part 1: 451 bytes. Remaining: 749 bytes. 2025/04/30 10:44:38 client <- Reading packet 0 (451 bytes) for connection (empty), Initial 2025/04/30 10:44:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75253ac3ac1745be, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 433, Version: v1} 2025/04/30 10:44:38 client Received first packet. Switching destination connection ID to: 75253ac3ac1745be 2025/04/30 10:44:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:38 client newly acked packets (1): [0] 2025/04/30 10:44:38 client updated RTT: 40.159212ms (σ: 20.079606ms) 2025/04/30 10:44:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:38 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:38 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:38 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 0 bytes. 2025/04/30 10:44:38 client <- Reading packet 0 (749 bytes) for connection (empty), Handshake 2025/04/30 10:44:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 75253ac3ac1745be, PacketNumber: 0, PacketNumberLen: 1, Length: 732, Version: v1} 2025/04/30 10:44:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 10:44:38 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:38 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f899955fd976a5aa2bde117b2591bd4371a546c7, InitialSourceConnectionID: 75253ac3ac1745be, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:38 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f899955fd976a5aa2bde117b2591bd4371a546c7 2025/04/30 10:44:38 client Long Header{Type: Initial, DestConnectionID: 75253ac3ac1745be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:38 client Long Header{Type: Handshake, DestConnectionID: 75253ac3ac1745be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:38 client Dropping Initial keys. 2025/04/30 10:44:38 client -> Sending packet 1 (40 bytes) for connection f899955fd976a5aa2bde117b2591bd4371a546c7, Handshake 2025/04/30 10:44:38 client Long Header{Type: Handshake, DestConnectionID: 75253ac3ac1745be, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:38 client -> Sending packet 0 (46 bytes) for connection f899955fd976a5aa2bde117b2591bd4371a546c7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:38 client Short Header{DestConnectionID: 75253ac3ac1745be, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:38 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:38 client Dropping Handshake keys. 2025/04/30 10:44:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 71e06c0f53e823f6, StatelessResetToken: 0xb9e194a2b0a11048a2b73a2d68ef9bd3} 2025/04/30 10:44:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb1e0e982e82de0e, StatelessResetToken: 0x193a360b19c7deb5a2683a14c5229d71} 2025/04/30 10:44:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ff252af0e4c561a6, StatelessResetToken: 0x58d6b037f992ae674c18098f9e4d7efe} 2025/04/30 10:44:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:38 client -> Sending packet 1 (34 bytes) for connection f899955fd976a5aa2bde117b2591bd4371a546c7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:38 client Short Header{DestConnectionID: 71e06c0f53e823f6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144.6µs} 2025/04/30 10:44:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:38 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:38 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:38 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:38 client newly acked packets (1): [0] 2025/04/30 10:44:38 client updated RTT: 39.735ms (σ: 15.907ms) 2025/04/30 10:44:38 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:38 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:38 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:38 client -> Sending packet 2 (30 bytes) for connection f899955fd976a5aa2bde117b2591bd4371a546c7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:38 client Short Header{DestConnectionID: 71e06c0f53e823f6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:38 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:38 client Connection f899955fd976a5aa2bde117b2591bd4371a546c7 closed. 2025/04/30 10:44:38 Requesting https://server4:443/momxpukfap. 2025/04/30 10:44:38 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:38 Increased send buffer size to 14336 kiB 2025/04/30 10:44:38 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:38 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:38 Created qlog file: /logs/qlog/bf780c3f37b8556beee5.sqlog 2025/04/30 10:44:38 client Starting new connection to server4 ([::]:55542 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bf780c3f37b8556beee5, version v1 2025/04/30 10:44:38 Adding connection ID (empty). 2025/04/30 10:44:38 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:38 client -> Sending packet 0 (1280 bytes) for connection bf780c3f37b8556beee5, Initial 2025/04/30 10:44:38 client Long Header{Type: Initial, DestConnectionID: bf780c3f37b8556beee5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:38 client -> Sending packet 1 (1280 bytes) for connection bf780c3f37b8556beee5, Initial 2025/04/30 10:44:38 client Long Header{Type: Initial, DestConnectionID: bf780c3f37b8556beee5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:38 client -> Sending packet 2 (1280 bytes) for connection bf780c3f37b8556beee5, Initial 2025/04/30 10:44:38 client Long Header{Type: Initial, DestConnectionID: bf780c3f37b8556beee5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:38 client Queueing packet (737 bytes) for later decryption 2025/04/30 10:44:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:44:38 client -> Sending packet 3 (1280 bytes) for connection bf780c3f37b8556beee5, Initial 2025/04/30 10:44:38 client Long Header{Type: Initial, DestConnectionID: bf780c3f37b8556beee5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:38 client -> Sending packet 4 (1280 bytes) for connection bf780c3f37b8556beee5, Initial 2025/04/30 10:44:38 client Long Header{Type: Initial, DestConnectionID: bf780c3f37b8556beee5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:38 client <- Reading packet 3 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9b49fe27356b878e, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:38 client Received first packet. Switching destination connection ID to: 9b49fe27356b878e 2025/04/30 10:44:38 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:44:39 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9b49fe27356b878e, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client -> Sending packet 5 (1280 bytes) for connection bf780c3f37b8556beee5, Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: 9b49fe27356b878e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:39 client <- Reading packet 1 (737 bytes) for connection (empty), Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9b49fe27356b878e, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:44:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bf780c3f37b8556beee5, InitialSourceConnectionID: 9b49fe27356b878e, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:39 client -> Sending packet 0 (79 bytes) for connection bf780c3f37b8556beee5, Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: 9b49fe27356b878e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:39 client Dropping Initial keys. 2025/04/30 10:44:39 client -> Sending packet 0 (46 bytes) for connection bf780c3f37b8556beee5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: 9b49fe27356b878e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:39 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:44:39 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:44:39 client <- Reading packet 3 (737 bytes) for connection (empty), Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9b49fe27356b878e, PacketNumber: 3, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:44:39 client -> Sending packet 1 (42 bytes) for connection bf780c3f37b8556beee5, Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: 9b49fe27356b878e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:39 client <- Reading packet 0 (47 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:39 client Dropping Handshake keys. 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f99f49f9f7ba9ac2, StatelessResetToken: 0x63b7688c0987013273f2f3c468767884} 2025/04/30 10:44:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:39 client -> Sending packet 1 (1366 bytes) for connection bf780c3f37b8556beee5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: f99f49f9f7ba9ac2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.PingFrame{} 2025/04/30 10:44:39 client -> Sending packet 2 (34 bytes) for connection bf780c3f37b8556beee5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: f99f49f9f7ba9ac2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 141.787µs} 2025/04/30 10:44:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:39 client <- Reading packet 1 (79 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 54ce338909dae200, StatelessResetToken: 0xb19ec622f66e6105b5773800a6592687} 2025/04/30 10:44:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client newly acked packets (1): [0] 2025/04/30 10:44:39 client updated RTT: 38.547344ms (σ: 19.273672ms) 2025/04/30 10:44:39 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 788a42de66ac8722, StatelessResetToken: 0x97054e811f2760e5f33630da4698b0a9} 2025/04/30 10:44:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:39 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:39 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:39 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:39 client -> Sending packet 3 (32 bytes) for connection bf780c3f37b8556beee5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:39 client Short Header{DestConnectionID: f99f49f9f7ba9ac2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 79.849µs} 2025/04/30 10:44:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:39 client -> Sending packet 4 (30 bytes) for connection bf780c3f37b8556beee5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:39 client Short Header{DestConnectionID: f99f49f9f7ba9ac2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:39 client Connection bf780c3f37b8556beee5 closed. 2025/04/30 10:44:39 Requesting https://server4:443/rzwmjrxcfy. 2025/04/30 10:44:39 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:39 Increased send buffer size to 14336 kiB 2025/04/30 10:44:39 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:39 Created qlog file: /logs/qlog/827e44f5fe3ee617917ff3f6aeea8f28.sqlog 2025/04/30 10:44:39 client Starting new connection to server4 ([::]:59776 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 827e44f5fe3ee617917ff3f6aeea8f28, version v1 2025/04/30 10:44:39 Adding connection ID (empty). 2025/04/30 10:44:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:39 client -> Sending packet 0 (1280 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: 827e44f5fe3ee617917ff3f6aeea8f28, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:39 client Parsed a coalesced packet. Part 1: 456 bytes. Remaining: 744 bytes. 2025/04/30 10:44:39 client <- Reading packet 0 (456 bytes) for connection (empty), Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8091453cbc01e941, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 438, Version: v1} 2025/04/30 10:44:39 client Received first packet. Switching destination connection ID to: 8091453cbc01e941 2025/04/30 10:44:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client newly acked packets (1): [0] 2025/04/30 10:44:39 client updated RTT: 38.769241ms (σ: 19.38462ms) 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 0 bytes. 2025/04/30 10:44:39 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8091453cbc01e941, PacketNumber: 0, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:44:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 827e44f5fe3ee617917ff3f6aeea8f28, InitialSourceConnectionID: 8091453cbc01e941, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: 8091453cbc01e941, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: 8091453cbc01e941, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:39 client Dropping Initial keys. 2025/04/30 10:44:39 client -> Sending packet 1 (40 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: 8091453cbc01e941, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client -> Sending packet 0 (46 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: 8091453cbc01e941, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:39 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:39 client Dropping Handshake keys. 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08b148b348afda77, StatelessResetToken: 0x86d766c683d394578ba910d6aa2b6796} 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d9aa011ad325887, StatelessResetToken: 0xfd8733f466dcd635732cb68478914176} 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b375bfe0256e8888, StatelessResetToken: 0x524ebb831f2a7373184612ef45253f6a} 2025/04/30 10:44:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:39 client -> Sending packet 1 (34 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: 08b148b348afda77, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 222.966µs} 2025/04/30 10:44:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:39 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2a1a54a905ff6eff, StatelessResetToken: 0xd700d72ecf9ec31621987bb6c3704413} 2025/04/30 10:44:39 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:39 client newly acked packets (1): [1] 2025/04/30 10:44:39 client updated RTT: 37.924ms (σ: 16.226ms) 2025/04/30 10:44:39 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:39 client lost packet 0 (time threshold) 2025/04/30 10:44:39 client Canceling loss detection timer. 2025/04/30 10:44:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:39 client Ignoring all packets below 1. 2025/04/30 10:44:39 client -> Sending packet 2 (51 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:39 client Short Header{DestConnectionID: 08b148b348afda77, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 176.169µs} 2025/04/30 10:44:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:39 client -> Sending packet 4 (46 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:39 client Short Header{DestConnectionID: 08b148b348afda77, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:39 client -> Sending packet 5 (46 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:39 client Short Header{DestConnectionID: 08b148b348afda77, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:39 client <- Reading packet 3 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:39 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:39 client -> Sending packet 6 (34 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:39 client Short Header{DestConnectionID: 08b148b348afda77, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 102.411µs} 2025/04/30 10:44:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:39 client -> Sending packet 7 (30 bytes) for connection 827e44f5fe3ee617917ff3f6aeea8f28, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:39 client Short Header{DestConnectionID: 08b148b348afda77, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:39 client Connection 827e44f5fe3ee617917ff3f6aeea8f28 closed. 2025/04/30 10:44:39 Requesting https://server4:443/xshaovwoln. 2025/04/30 10:44:39 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:39 Increased send buffer size to 14336 kiB 2025/04/30 10:44:39 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:39 Created qlog file: /logs/qlog/fa97d580339e78041359a5c3d7b6a75697.sqlog 2025/04/30 10:44:39 client Starting new connection to server4 ([::]:54983 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fa97d580339e78041359a5c3d7b6a75697, version v1 2025/04/30 10:44:39 Adding connection ID (empty). 2025/04/30 10:44:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:39 client -> Sending packet 0 (1280 bytes) for connection fa97d580339e78041359a5c3d7b6a75697, Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: fa97d580339e78041359a5c3d7b6a75697, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:44:39 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:44:39 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f2b1f01954f8285c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:44:39 client Received first packet. Switching destination connection ID to: f2b1f01954f8285c 2025/04/30 10:44:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client newly acked packets (1): [0] 2025/04/30 10:44:39 client updated RTT: 38.626253ms (σ: 19.313126ms) 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:44:39 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f2b1f01954f8285c, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fa97d580339e78041359a5c3d7b6a75697, InitialSourceConnectionID: f2b1f01954f8285c, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fa97d580339e78041359a5c3d7b6a75697 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: f2b1f01954f8285c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: f2b1f01954f8285c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:39 client Dropping Initial keys. 2025/04/30 10:44:39 client -> Sending packet 1 (40 bytes) for connection fa97d580339e78041359a5c3d7b6a75697, Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: f2b1f01954f8285c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client -> Sending packet 0 (46 bytes) for connection fa97d580339e78041359a5c3d7b6a75697, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: f2b1f01954f8285c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:39 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:39 client Dropping Handshake keys. 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ffdc202de77747ec, StatelessResetToken: 0xf4ef72d9232f33c96bab023aab138830} 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e7f4018bf2cc750, StatelessResetToken: 0x3a6a7b09d8160c8040e41c9be075b36b} 2025/04/30 10:44:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca36bcff2beb39df, StatelessResetToken: 0xb7ed04a28151569ac8058ea2d4f75963} 2025/04/30 10:44:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:39 client -> Sending packet 1 (34 bytes) for connection fa97d580339e78041359a5c3d7b6a75697, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: ffdc202de77747ec, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 146.614µs} 2025/04/30 10:44:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:39 client -> Sending packet 3 (46 bytes) for connection fa97d580339e78041359a5c3d7b6a75697, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: ffdc202de77747ec, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:39 client Skipping packet number 2 2025/04/30 10:44:39 client -> Sending packet 4 (29 bytes) for connection fa97d580339e78041359a5c3d7b6a75697, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: ffdc202de77747ec, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:39 client <- Reading packet 3 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:39 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:39 client -> Sending packet 5 (34 bytes) for connection fa97d580339e78041359a5c3d7b6a75697, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: ffdc202de77747ec, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 76.603µs} 2025/04/30 10:44:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:39 client -> Sending packet 6 (30 bytes) for connection fa97d580339e78041359a5c3d7b6a75697, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:39 client Short Header{DestConnectionID: ffdc202de77747ec, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:39 client Connection fa97d580339e78041359a5c3d7b6a75697 closed. 2025/04/30 10:44:39 Requesting https://server4:443/bvkskyhbqm. 2025/04/30 10:44:39 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:39 Increased send buffer size to 14336 kiB 2025/04/30 10:44:39 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:39 Created qlog file: /logs/qlog/abb998550c7bc772361f412ba02c659be4953849.sqlog 2025/04/30 10:44:39 client Starting new connection to server4 ([::]:34484 -> 193.167.100.100:443), source connection ID (empty), destination connection ID abb998550c7bc772361f412ba02c659be4953849, version v1 2025/04/30 10:44:39 Adding connection ID (empty). 2025/04/30 10:44:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:39 client -> Sending packet 0 (1280 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: abb998550c7bc772361f412ba02c659be4953849, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:44:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:39 client -> Sending packet 1 (1280 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: abb998550c7bc772361f412ba02c659be4953849, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:44:39 client -> Sending packet 2 (1280 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: abb998550c7bc772361f412ba02c659be4953849, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:44:39 client Parsed a coalesced packet. Part 1: 452 bytes. Remaining: 748 bytes. 2025/04/30 10:44:39 client <- Reading packet 0 (452 bytes) for connection (empty), Initial 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c01708908d40f52d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 434, Version: v1} 2025/04/30 10:44:39 client Received first packet. Switching destination connection ID to: c01708908d40f52d 2025/04/30 10:44:39 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 0 bytes. 2025/04/30 10:44:39 client <- Reading packet 0 (748 bytes) for connection (empty), Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c01708908d40f52d, PacketNumber: 0, PacketNumberLen: 1, Length: 731, Version: v1} 2025/04/30 10:44:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 10:44:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: abb998550c7bc772361f412ba02c659be4953849, InitialSourceConnectionID: c01708908d40f52d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection abb998550c7bc772361f412ba02c659be4953849 2025/04/30 10:44:39 client Long Header{Type: Initial, DestConnectionID: c01708908d40f52d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: c01708908d40f52d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:39 client Dropping Initial keys. 2025/04/30 10:44:39 client -> Sending packet 1 (86 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, Handshake 2025/04/30 10:44:39 client Long Header{Type: Handshake, DestConnectionID: c01708908d40f52d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:39 client Short Header{DestConnectionID: c01708908d40f52d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:39 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:44:40 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:40 client Dropping Handshake keys. 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3eb4977872176df8, StatelessResetToken: 0xbbbaba26727f78c668c9af7e9dad23e8} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e19ca0d7eb8ca804, StatelessResetToken: 0x4473eed36633151ac010fa751fa8ebdb} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eaeed714f946aeba, StatelessResetToken: 0x73f27ec0ef4a7fa4f73c900845e46dab} 2025/04/30 10:44:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:40 client -> Sending packet 1 (1366 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 3eb4977872176df8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.PingFrame{} 2025/04/30 10:44:40 client -> Sending packet 2 (34 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 3eb4977872176df8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 215.342µs} 2025/04/30 10:44:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:40 client <- Reading packet 3 (131 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3eb4977872176df8, StatelessResetToken: 0xbbbaba26727f78c668c9af7e9dad23e8} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e19ca0d7eb8ca804, StatelessResetToken: 0x4473eed36633151ac010fa751fa8ebdb} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eaeed714f946aeba, StatelessResetToken: 0x73f27ec0ef4a7fa4f73c900845e46dab} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ac4059174e0538d7, StatelessResetToken: 0x73afa98e0001651c1b6d17b1e18d5f8c} 2025/04/30 10:44:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:40 client -> Sending packet 3 (34 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 3eb4977872176df8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 154.278µs} 2025/04/30 10:44:40 client <- Reading packet 4 (136 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:40 client newly acked packets (2): [1 2] 2025/04/30 10:44:40 client updated RTT: 172.626615ms (σ: 86.313307ms) 2025/04/30 10:44:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:40 client lost packet 0 (time threshold) 2025/04/30 10:44:40 client Canceling loss detection timer. 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3eb4977872176df8, StatelessResetToken: 0xbbbaba26727f78c668c9af7e9dad23e8} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e19ca0d7eb8ca804, StatelessResetToken: 0x4473eed36633151ac010fa751fa8ebdb} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eaeed714f946aeba, StatelessResetToken: 0x73f27ec0ef4a7fa4f73c900845e46dab} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ac4059174e0538d7, StatelessResetToken: 0x73afa98e0001651c1b6d17b1e18d5f8c} 2025/04/30 10:44:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:40 client Ignoring all packets below 2. 2025/04/30 10:44:40 client -> Sending packet 4 (51 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 3eb4977872176df8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 185.206µs} 2025/04/30 10:44:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:40 client <- Reading packet 5 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:40 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:40 client newly acked packets (1): [4] 2025/04/30 10:44:40 client updated RTT: 155.206ms (σ: 99.573ms) 2025/04/30 10:44:40 client Canceling loss detection timer. 2025/04/30 10:44:40 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:40 client Ignoring all packets below 5. 2025/04/30 10:44:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:40 client -> Sending packet 5 (30 bytes) for connection abb998550c7bc772361f412ba02c659be4953849, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 3eb4977872176df8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:40 client Connection abb998550c7bc772361f412ba02c659be4953849 closed. 2025/04/30 10:44:40 Requesting https://server4:443/yapdjwwkyg. 2025/04/30 10:44:40 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:40 Increased send buffer size to 14336 kiB 2025/04/30 10:44:40 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:40 Created qlog file: /logs/qlog/992fb9f972e6d88729bc39be6385cf26175b.sqlog 2025/04/30 10:44:40 client Starting new connection to server4 ([::]:35296 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 992fb9f972e6d88729bc39be6385cf26175b, version v1 2025/04/30 10:44:40 Adding connection ID (empty). 2025/04/30 10:44:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:40 client -> Sending packet 0 (1280 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, Initial 2025/04/30 10:44:40 client Long Header{Type: Initial, DestConnectionID: 992fb9f972e6d88729bc39be6385cf26175b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:44:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:44:40 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:44:40 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:44:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 071d72275bb41f94, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:44:40 client Received first packet. Switching destination connection ID to: 071d72275bb41f94 2025/04/30 10:44:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:40 client newly acked packets (1): [0] 2025/04/30 10:44:40 client updated RTT: 39.752605ms (σ: 19.876302ms) 2025/04/30 10:44:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:40 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:44:40 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 071d72275bb41f94, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 992fb9f972e6d88729bc39be6385cf26175b, InitialSourceConnectionID: 071d72275bb41f94, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b 2025/04/30 10:44:40 client Long Header{Type: Initial, DestConnectionID: 071d72275bb41f94, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:40 client Long Header{Type: Handshake, DestConnectionID: 071d72275bb41f94, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:40 client Dropping Initial keys. 2025/04/30 10:44:40 client -> Sending packet 1 (40 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, Handshake 2025/04/30 10:44:40 client Long Header{Type: Handshake, DestConnectionID: 071d72275bb41f94, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:40 client -> Sending packet 0 (46 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 071d72275bb41f94, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:40 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:40 client -> Sending packet 2 (74 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, Handshake 2025/04/30 10:44:40 client Long Header{Type: Handshake, DestConnectionID: 071d72275bb41f94, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:40 client -> Sending packet 3 (74 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, Handshake 2025/04/30 10:44:40 client Long Header{Type: Handshake, DestConnectionID: 071d72275bb41f94, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:40 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:40 client Dropping Handshake keys. 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 99cf118b69c6193b, StatelessResetToken: 0x278f32e4381ed90f16d49831f0a6d437} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25120916e64be121, StatelessResetToken: 0x3a02686167bf89d6dad6de64b69bf8a7} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 05790435639bb9ad, StatelessResetToken: 0x737002075180be75da59c91027757962} 2025/04/30 10:44:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:40 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:40 client -> Sending packet 2 (53 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 143.308µs} 2025/04/30 10:44:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:40 client -> Sending packet 3 (48 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:40 client <- Reading packet 3 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 99cf118b69c6193b, StatelessResetToken: 0x278f32e4381ed90f16d49831f0a6d437} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25120916e64be121, StatelessResetToken: 0x3a02686167bf89d6dad6de64b69bf8a7} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 05790435639bb9ad, StatelessResetToken: 0x737002075180be75da59c91027757962} 2025/04/30 10:44:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:40 client -> Sending packet 4 (1366 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.PingFrame{} 2025/04/30 10:44:40 client -> Sending packet 5 (34 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 175.839µs} 2025/04/30 10:44:40 client <- Reading packet 4 (108 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:40 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 10:44:40 client newly acked packets (1): [4] 2025/04/30 10:44:40 client updated RTT: 38.986ms (σ: 16.437ms) 2025/04/30 10:44:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:40 client lost packet 3 (time threshold) 2025/04/30 10:44:40 client Canceling loss detection timer. 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 99cf118b69c6193b, StatelessResetToken: 0x278f32e4381ed90f16d49831f0a6d437} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25120916e64be121, StatelessResetToken: 0x3a02686167bf89d6dad6de64b69bf8a7} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 05790435639bb9ad, StatelessResetToken: 0x737002075180be75da59c91027757962} 2025/04/30 10:44:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:40 client -> Sending packet 6 (55 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 176.469µs} 2025/04/30 10:44:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:40 client <- Reading packet 5 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 99cf118b69c6193b, StatelessResetToken: 0x278f32e4381ed90f16d49831f0a6d437} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25120916e64be121, StatelessResetToken: 0x3a02686167bf89d6dad6de64b69bf8a7} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 05790435639bb9ad, StatelessResetToken: 0x737002075180be75da59c91027757962} 2025/04/30 10:44:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:40 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:40 client -> Sending packet 8 (56 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 23.130822ms} 2025/04/30 10:44:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:40 client -> Sending packet 9 (48 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:40 client <- Reading packet 6 (53 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1dd1a4d50a355c32, StatelessResetToken: 0x4d853e61b10ec88bbbf19462894d8956} 2025/04/30 10:44:40 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}}, DelayTime: 0s} 2025/04/30 10:44:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:40 client -> Sending packet 10 (1409 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.PingFrame{} 2025/04/30 10:44:40 client <- Reading packet 7 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:40 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:40 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}}, DelayTime: 0s} 2025/04/30 10:44:40 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:40 client -> Sending packet 11 (34 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 116.197µs} 2025/04/30 10:44:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:40 client -> Sending packet 12 (30 bytes) for connection 992fb9f972e6d88729bc39be6385cf26175b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:40 client Short Header{DestConnectionID: 99cf118b69c6193b, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:40 client Connection 992fb9f972e6d88729bc39be6385cf26175b closed. 2025/04/30 10:44:40 Requesting https://server4:443/jpmoygjyle. 2025/04/30 10:44:40 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:40 Increased send buffer size to 14336 kiB 2025/04/30 10:44:40 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:40 Created qlog file: /logs/qlog/3bf2945ce5637ef9e42d.sqlog 2025/04/30 10:44:40 client Starting new connection to server4 ([::]:55525 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3bf2945ce5637ef9e42d, version v1 2025/04/30 10:44:40 Adding connection ID (empty). 2025/04/30 10:44:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:40 client -> Sending packet 0 (1280 bytes) for connection 3bf2945ce5637ef9e42d, Initial 2025/04/30 10:44:40 client Long Header{Type: Initial, DestConnectionID: 3bf2945ce5637ef9e42d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:41 client -> Sending packet 1 (1280 bytes) for connection 3bf2945ce5637ef9e42d, Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: 3bf2945ce5637ef9e42d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:41 client -> Sending packet 2 (1280 bytes) for connection 3bf2945ce5637ef9e42d, Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: 3bf2945ce5637ef9e42d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:41 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f3fd4cdba2cdde9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:41 client Received first packet. Switching destination connection ID to: 1f3fd4cdba2cdde9 2025/04/30 10:44:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client -> Sending packet 3 (1280 bytes) for connection 3bf2945ce5637ef9e42d, Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: 1f3fd4cdba2cdde9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:41 client Parsed a coalesced packet. Part 1: 461 bytes. Remaining: 739 bytes. 2025/04/30 10:44:41 client <- Reading packet 2 (461 bytes) for connection (empty), Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f3fd4cdba2cdde9, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 443, Version: v1} 2025/04/30 10:44:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:41 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:41 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 0 bytes. 2025/04/30 10:44:41 client <- Reading packet 1 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1f3fd4cdba2cdde9, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3bf2945ce5637ef9e42d, InitialSourceConnectionID: 1f3fd4cdba2cdde9, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3bf2945ce5637ef9e42d 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: 1f3fd4cdba2cdde9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: 1f3fd4cdba2cdde9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:41 client Dropping Initial keys. 2025/04/30 10:44:41 client -> Sending packet 1 (40 bytes) for connection 3bf2945ce5637ef9e42d, Handshake 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: 1f3fd4cdba2cdde9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:41 client -> Sending packet 0 (46 bytes) for connection 3bf2945ce5637ef9e42d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:41 client Short Header{DestConnectionID: 1f3fd4cdba2cdde9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:41 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:44:41 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:44:41 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:41 client -> Sending packet 2 (74 bytes) for connection 3bf2945ce5637ef9e42d, Handshake 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: 1f3fd4cdba2cdde9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:41 client -> Sending packet 3 (74 bytes) for connection 3bf2945ce5637ef9e42d, Handshake 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: 1f3fd4cdba2cdde9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:41 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:41 client Dropping Handshake keys. 2025/04/30 10:44:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:41 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 63934659af7e0696, StatelessResetToken: 0xc631771c8069a77a4beb97a556eb6f6d} 2025/04/30 10:44:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 61b8c5251d8b85f6, StatelessResetToken: 0x77777de6765053c9b15eb35566a6e0c7} 2025/04/30 10:44:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 093e054fdc7b98ee, StatelessResetToken: 0xe450392dd1a766e4e6c1e5c74dfbe6ce} 2025/04/30 10:44:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:41 client -> Sending packet 2 (53 bytes) for connection 3bf2945ce5637ef9e42d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:41 client Short Header{DestConnectionID: 63934659af7e0696, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 132.667µs} 2025/04/30 10:44:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:41 client -> Sending packet 3 (48 bytes) for connection 3bf2945ce5637ef9e42d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:41 client Short Header{DestConnectionID: 63934659af7e0696, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:41 client -> Sending packet 4 (1366 bytes) for connection 3bf2945ce5637ef9e42d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:41 client Short Header{DestConnectionID: 63934659af7e0696, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.PingFrame{} 2025/04/30 10:44:41 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:41 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:41 client newly acked packets (2): [3 4] 2025/04/30 10:44:41 client updated RTT: 32.848529ms (σ: 16.424264ms) 2025/04/30 10:44:41 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:41 client Canceling loss detection timer. 2025/04/30 10:44:41 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:41 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:41 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:41 client -> Sending packet 5 (30 bytes) for connection 3bf2945ce5637ef9e42d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:41 client Short Header{DestConnectionID: 63934659af7e0696, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:41 client Connection 3bf2945ce5637ef9e42d closed. 2025/04/30 10:44:41 Requesting https://server4:443/ywjsqxfcba. 2025/04/30 10:44:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:41 Increased send buffer size to 14336 kiB 2025/04/30 10:44:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:41 Created qlog file: /logs/qlog/61d2644c3f1d01237998ebde.sqlog 2025/04/30 10:44:41 client Starting new connection to server4 ([::]:35016 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 61d2644c3f1d01237998ebde, version v1 2025/04/30 10:44:41 Adding connection ID (empty). 2025/04/30 10:44:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:41 client -> Sending packet 0 (1280 bytes) for connection 61d2644c3f1d01237998ebde, Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: 61d2644c3f1d01237998ebde, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:41 client Parsed a coalesced packet. Part 1: 460 bytes. Remaining: 740 bytes. 2025/04/30 10:44:41 client <- Reading packet 0 (460 bytes) for connection (empty), Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 91c37ab5306e4aa9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 442, Version: v1} 2025/04/30 10:44:41 client Received first packet. Switching destination connection ID to: 91c37ab5306e4aa9 2025/04/30 10:44:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:41 client newly acked packets (1): [0] 2025/04/30 10:44:41 client updated RTT: 38.593578ms (σ: 19.296789ms) 2025/04/30 10:44:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 0 bytes. 2025/04/30 10:44:41 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 91c37ab5306e4aa9, PacketNumber: 0, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:44:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:44:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 61d2644c3f1d01237998ebde, InitialSourceConnectionID: 91c37ab5306e4aa9, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 61d2644c3f1d01237998ebde 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: 91c37ab5306e4aa9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: 91c37ab5306e4aa9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:41 client Dropping Initial keys. 2025/04/30 10:44:41 client -> Sending packet 1 (40 bytes) for connection 61d2644c3f1d01237998ebde, Handshake 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: 91c37ab5306e4aa9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:41 client -> Sending packet 0 (46 bytes) for connection 61d2644c3f1d01237998ebde, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:41 client Short Header{DestConnectionID: 91c37ab5306e4aa9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:41 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:41 client Peer doesn't await address validation any longer. 2025/04/30 10:44:41 client newly acked packets (1): [0] 2025/04/30 10:44:41 client updated RTT: 38.222ms (σ: 15.213ms) 2025/04/30 10:44:41 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:41 client Canceling loss detection timer. 2025/04/30 10:44:41 client Dropping Handshake keys. 2025/04/30 10:44:41 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:41 client -> Sending packet 1 (32 bytes) for connection 61d2644c3f1d01237998ebde, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:41 client Short Header{DestConnectionID: 91c37ab5306e4aa9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 147.826µs} 2025/04/30 10:44:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:41 client -> Sending packet 2 (30 bytes) for connection 61d2644c3f1d01237998ebde, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:41 client Short Header{DestConnectionID: 91c37ab5306e4aa9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:41 client Connection 61d2644c3f1d01237998ebde closed. 2025/04/30 10:44:41 Requesting https://server4:443/qyxsyoofvj. 2025/04/30 10:44:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:41 Increased send buffer size to 14336 kiB 2025/04/30 10:44:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:41 Created qlog file: /logs/qlog/c8a3961d4dbd3113957d535b2029d1e7fb98a4.sqlog 2025/04/30 10:44:41 client Starting new connection to server4 ([::]:34398 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c8a3961d4dbd3113957d535b2029d1e7fb98a4, version v1 2025/04/30 10:44:41 Adding connection ID (empty). 2025/04/30 10:44:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:41 client -> Sending packet 0 (1280 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: c8a3961d4dbd3113957d535b2029d1e7fb98a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:44:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:41 client -> Sending packet 1 (1280 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: c8a3961d4dbd3113957d535b2029d1e7fb98a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:44:41 client -> Sending packet 2 (1280 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: c8a3961d4dbd3113957d535b2029d1e7fb98a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:44:41 client Parsed a coalesced packet. Part 1: 453 bytes. Remaining: 747 bytes. 2025/04/30 10:44:41 client <- Reading packet 0 (453 bytes) for connection (empty), Initial 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c05efb47821c94c5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 435, Version: v1} 2025/04/30 10:44:41 client Received first packet. Switching destination connection ID to: c05efb47821c94c5 2025/04/30 10:44:41 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 0 bytes. 2025/04/30 10:44:41 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c05efb47821c94c5, PacketNumber: 0, PacketNumberLen: 1, Length: 730, Version: v1} 2025/04/30 10:44:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:44:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c8a3961d4dbd3113957d535b2029d1e7fb98a4, InitialSourceConnectionID: c05efb47821c94c5, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4 2025/04/30 10:44:41 client Long Header{Type: Initial, DestConnectionID: c05efb47821c94c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: c05efb47821c94c5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:41 client Dropping Initial keys. 2025/04/30 10:44:41 client -> Sending packet 1 (86 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, Handshake 2025/04/30 10:44:41 client Long Header{Type: Handshake, DestConnectionID: c05efb47821c94c5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:41 client Short Header{DestConnectionID: c05efb47821c94c5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:42 client -> Sending packet 2 (74 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, Handshake 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: c05efb47821c94c5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:42 client -> Sending packet 3 (74 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, Handshake 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: c05efb47821c94c5, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:42 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:42 client Dropping Handshake keys. 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 600ee11ce19f3573, StatelessResetToken: 0x08e988f7e201b8fa19465a136ddf4029} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4318ca6ca4882662, StatelessResetToken: 0x10f6fa5ff7f2e92add2ae1435f9b480d} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0678b13b65258994, StatelessResetToken: 0x7d7cd8c6606159f36e449f79552305f0} 2025/04/30 10:44:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:42 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:42 client -> Sending packet 2 (53 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 600ee11ce19f3573, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 159.037µs} 2025/04/30 10:44:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:42 client -> Sending packet 3 (48 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 600ee11ce19f3573, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:42 client -> Sending packet 4 (1366 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 600ee11ce19f3573, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.PingFrame{} 2025/04/30 10:44:42 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 600ee11ce19f3573, StatelessResetToken: 0x08e988f7e201b8fa19465a136ddf4029} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4318ca6ca4882662, StatelessResetToken: 0x10f6fa5ff7f2e92add2ae1435f9b480d} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0678b13b65258994, StatelessResetToken: 0x7d7cd8c6606159f36e449f79552305f0} 2025/04/30 10:44:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:42 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f181fa6020b6927a, StatelessResetToken: 0x0ee84fc70d83d1fe8ebda399e669446a} 2025/04/30 10:44:42 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:42 client -> Sending packet 5 (32 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 600ee11ce19f3573, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 137.135µs} 2025/04/30 10:44:42 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:42 client newly acked packets (1): [3] 2025/04/30 10:44:42 client updated RTT: 32.70498ms (σ: 16.35249ms) 2025/04/30 10:44:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:42 client Canceling loss detection timer. 2025/04/30 10:44:42 client <- Reading packet 5 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:42 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:42 client -> Sending packet 6 (30 bytes) for connection c8a3961d4dbd3113957d535b2029d1e7fb98a4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 600ee11ce19f3573, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:42 client Connection c8a3961d4dbd3113957d535b2029d1e7fb98a4 closed. 2025/04/30 10:44:42 Requesting https://server4:443/kkwowpyqxa. 2025/04/30 10:44:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:42 Increased send buffer size to 14336 kiB 2025/04/30 10:44:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:42 Created qlog file: /logs/qlog/7fcc86ec310ec26e7d675842a66909.sqlog 2025/04/30 10:44:42 client Starting new connection to server4 ([::]:54434 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7fcc86ec310ec26e7d675842a66909, version v1 2025/04/30 10:44:42 Adding connection ID (empty). 2025/04/30 10:44:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:42 client -> Sending packet 0 (1280 bytes) for connection 7fcc86ec310ec26e7d675842a66909, Initial 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: 7fcc86ec310ec26e7d675842a66909, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:44:42 client Parsed a coalesced packet. Part 1: 457 bytes. Remaining: 743 bytes. 2025/04/30 10:44:42 client <- Reading packet 0 (457 bytes) for connection (empty), Initial 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3e1b8823a61de2bd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 439, Version: v1} 2025/04/30 10:44:42 client Received first packet. Switching destination connection ID to: 3e1b8823a61de2bd 2025/04/30 10:44:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:42 client newly acked packets (1): [0] 2025/04/30 10:44:42 client updated RTT: 37.864309ms (σ: 18.932154ms) 2025/04/30 10:44:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:42 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 0 bytes. 2025/04/30 10:44:42 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e1b8823a61de2bd, PacketNumber: 0, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:44:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:44:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7fcc86ec310ec26e7d675842a66909, InitialSourceConnectionID: 3e1b8823a61de2bd, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7fcc86ec310ec26e7d675842a66909 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: 3e1b8823a61de2bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: 3e1b8823a61de2bd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:42 client Dropping Initial keys. 2025/04/30 10:44:42 client -> Sending packet 1 (40 bytes) for connection 7fcc86ec310ec26e7d675842a66909, Handshake 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: 3e1b8823a61de2bd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:42 client -> Sending packet 0 (46 bytes) for connection 7fcc86ec310ec26e7d675842a66909, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 3e1b8823a61de2bd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:42 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:42 client Dropping Handshake keys. 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e4015be870d13f1, StatelessResetToken: 0xa4d0607a9337fa3b2227fa3c2b8a0e75} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dde89864afea2952, StatelessResetToken: 0x1513c6bd7812c31c24ef264ba3a57344} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a26189c3048ae312, StatelessResetToken: 0x3f232899ad45fee4ded27f4a563cbf53} 2025/04/30 10:44:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:42 client -> Sending packet 1 (34 bytes) for connection 7fcc86ec310ec26e7d675842a66909, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 8e4015be870d13f1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 149.799µs} 2025/04/30 10:44:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:42 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:42 client newly acked packets (1): [0] 2025/04/30 10:44:42 client updated RTT: 37.562ms (σ: 14.801ms) 2025/04/30 10:44:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:42 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:42 client -> Sending packet 2 (30 bytes) for connection 7fcc86ec310ec26e7d675842a66909, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 8e4015be870d13f1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:42 client Connection 7fcc86ec310ec26e7d675842a66909 closed. 2025/04/30 10:44:42 Requesting https://server4:443/zpciajdbsd. 2025/04/30 10:44:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:42 Increased send buffer size to 14336 kiB 2025/04/30 10:44:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:42 Created qlog file: /logs/qlog/cd28b608e940de585ba10029d4.sqlog 2025/04/30 10:44:42 client Starting new connection to server4 ([::]:34735 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cd28b608e940de585ba10029d4, version v1 2025/04/30 10:44:42 Adding connection ID (empty). 2025/04/30 10:44:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:42 client -> Sending packet 0 (1280 bytes) for connection cd28b608e940de585ba10029d4, Initial 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: cd28b608e940de585ba10029d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:42 client -> Sending packet 1 (1280 bytes) for connection cd28b608e940de585ba10029d4, Initial 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: cd28b608e940de585ba10029d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:42 client -> Sending packet 2 (1280 bytes) for connection cd28b608e940de585ba10029d4, Initial 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: cd28b608e940de585ba10029d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:42 client Parsed a coalesced packet. Part 1: 458 bytes. Remaining: 742 bytes. 2025/04/30 10:44:42 client <- Reading packet 0 (458 bytes) for connection (empty), Initial 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8e58bebc2fda5b3c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 440, Version: v1} 2025/04/30 10:44:42 client Received first packet. Switching destination connection ID to: 8e58bebc2fda5b3c 2025/04/30 10:44:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:42 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 0 bytes. 2025/04/30 10:44:42 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8e58bebc2fda5b3c, PacketNumber: 0, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:44:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:44:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cd28b608e940de585ba10029d4, InitialSourceConnectionID: 8e58bebc2fda5b3c, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cd28b608e940de585ba10029d4 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: 8e58bebc2fda5b3c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: 8e58bebc2fda5b3c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:42 client Dropping Initial keys. 2025/04/30 10:44:42 client -> Sending packet 1 (40 bytes) for connection cd28b608e940de585ba10029d4, Handshake 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: 8e58bebc2fda5b3c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:42 client -> Sending packet 0 (46 bytes) for connection cd28b608e940de585ba10029d4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 8e58bebc2fda5b3c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:42 client -> Sending packet 2 (74 bytes) for connection cd28b608e940de585ba10029d4, Handshake 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: 8e58bebc2fda5b3c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:42 client -> Sending packet 3 (74 bytes) for connection cd28b608e940de585ba10029d4, Handshake 2025/04/30 10:44:42 client Long Header{Type: Handshake, DestConnectionID: 8e58bebc2fda5b3c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:42 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:42 client Dropping Handshake keys. 2025/04/30 10:44:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:42 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:42 client -> Sending packet 2 (51 bytes) for connection cd28b608e940de585ba10029d4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 8e58bebc2fda5b3c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 134.201µs} 2025/04/30 10:44:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:42 client -> Sending packet 3 (46 bytes) for connection cd28b608e940de585ba10029d4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 8e58bebc2fda5b3c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:42 client -> Sending packet 4 (1366 bytes) for connection cd28b608e940de585ba10029d4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 8e58bebc2fda5b3c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.PingFrame{} 2025/04/30 10:44:42 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 124f12f47c75185c, StatelessResetToken: 0x60eb590a5b30610a54c05c553c63c624} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 17a3963d9c18ff83, StatelessResetToken: 0xa5ccb39ae295386f01dbf031de7c78cf} 2025/04/30 10:44:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5fb08cf4e0436767, StatelessResetToken: 0x0095c5f41dc17a79c69762eb3d583037} 2025/04/30 10:44:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:42 client -> Sending packet 5 (34 bytes) for connection cd28b608e940de585ba10029d4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 124f12f47c75185c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 69.011µs} 2025/04/30 10:44:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:42 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:42 client newly acked packets (1): [3] 2025/04/30 10:44:42 client updated RTT: 33.495493ms (σ: 16.747746ms) 2025/04/30 10:44:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:42 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:42 client -> Sending packet 6 (30 bytes) for connection cd28b608e940de585ba10029d4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:42 client Short Header{DestConnectionID: 124f12f47c75185c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:42 client Connection cd28b608e940de585ba10029d4 closed. 2025/04/30 10:44:42 Requesting https://server4:443/zmzaifjjvi. 2025/04/30 10:44:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:42 Increased send buffer size to 14336 kiB 2025/04/30 10:44:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:42 Created qlog file: /logs/qlog/c12957c5d9fd7f7323d52812e2b212e0.sqlog 2025/04/30 10:44:42 client Starting new connection to server4 ([::]:55695 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c12957c5d9fd7f7323d52812e2b212e0, version v1 2025/04/30 10:44:42 Adding connection ID (empty). 2025/04/30 10:44:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:42 client -> Sending packet 0 (1280 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0, Initial 2025/04/30 10:44:42 client Long Header{Type: Initial, DestConnectionID: c12957c5d9fd7f7323d52812e2b212e0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:43 client Parsed a coalesced packet. Part 1: 457 bytes. Remaining: 743 bytes. 2025/04/30 10:44:43 client <- Reading packet 0 (457 bytes) for connection (empty), Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3974ddb9470bbc69, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 439, Version: v1} 2025/04/30 10:44:43 client Received first packet. Switching destination connection ID to: 3974ddb9470bbc69 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client newly acked packets (1): [0] 2025/04/30 10:44:43 client updated RTT: 37.555042ms (σ: 18.777521ms) 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 0 bytes. 2025/04/30 10:44:43 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3974ddb9470bbc69, PacketNumber: 0, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:44:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c12957c5d9fd7f7323d52812e2b212e0, InitialSourceConnectionID: 3974ddb9470bbc69, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: 3974ddb9470bbc69, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: 3974ddb9470bbc69, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:43 client Dropping Initial keys. 2025/04/30 10:44:43 client -> Sending packet 1 (86 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0, Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: 3974ddb9470bbc69, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client Short Header{DestConnectionID: 3974ddb9470bbc69, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:43 client -> Sending packet 2 (74 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0, Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: 3974ddb9470bbc69, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:43 client -> Sending packet 3 (74 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0, Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: 3974ddb9470bbc69, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:43 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:43 client Dropping Handshake keys. 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 046a756fe19eb1e2, StatelessResetToken: 0x3e7ed1abeb17c2011f24b528f3d9bdfa} 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 123a3bd13e1540ca, StatelessResetToken: 0x588a0f43ebe25ee5978c84789893fec8} 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7f7acd6ae27a4ba8, StatelessResetToken: 0x08d1d992864d57c47d56b9b266ed5d20} 2025/04/30 10:44:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:43 client -> Sending packet 2 (53 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 046a756fe19eb1e2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 158.406µs} 2025/04/30 10:44:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:43 client -> Sending packet 3 (48 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 046a756fe19eb1e2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:43 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a26d171b133a46c8, StatelessResetToken: 0x9f92d71231e2187cd8806f3220c6fbf9} 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:43 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:43 client newly acked packets (1): [3] 2025/04/30 10:44:43 client updated RTT: 37.068ms (σ: 15.055ms) 2025/04/30 10:44:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:43 client Canceling loss detection timer. 2025/04/30 10:44:43 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:43 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:43 client -> Sending packet 4 (32 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 046a756fe19eb1e2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 93.925µs} 2025/04/30 10:44:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:43 client -> Sending packet 5 (30 bytes) for connection c12957c5d9fd7f7323d52812e2b212e0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 046a756fe19eb1e2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:43 client Connection c12957c5d9fd7f7323d52812e2b212e0 closed. 2025/04/30 10:44:43 Requesting https://server4:443/vpswgosuaj. 2025/04/30 10:44:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:43 Increased send buffer size to 14336 kiB 2025/04/30 10:44:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:43 Created qlog file: /logs/qlog/6f5c7258c11c274ec4d890d2.sqlog 2025/04/30 10:44:43 client Starting new connection to server4 ([::]:56218 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6f5c7258c11c274ec4d890d2, version v1 2025/04/30 10:44:43 Adding connection ID (empty). 2025/04/30 10:44:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:43 client -> Sending packet 0 (1280 bytes) for connection 6f5c7258c11c274ec4d890d2, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: 6f5c7258c11c274ec4d890d2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:44:43 client Parsed a coalesced packet. Part 1: 460 bytes. Remaining: 740 bytes. 2025/04/30 10:44:43 client <- Reading packet 0 (460 bytes) for connection (empty), Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79c1c15a00eeb6b4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 442, Version: v1} 2025/04/30 10:44:43 client Received first packet. Switching destination connection ID to: 79c1c15a00eeb6b4 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client newly acked packets (1): [0] 2025/04/30 10:44:43 client updated RTT: 38.658845ms (σ: 19.329422ms) 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 0 bytes. 2025/04/30 10:44:43 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 79c1c15a00eeb6b4, PacketNumber: 0, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:44:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6f5c7258c11c274ec4d890d2, InitialSourceConnectionID: 79c1c15a00eeb6b4, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6f5c7258c11c274ec4d890d2 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: 79c1c15a00eeb6b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: 79c1c15a00eeb6b4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:43 client Dropping Initial keys. 2025/04/30 10:44:43 client -> Sending packet 1 (40 bytes) for connection 6f5c7258c11c274ec4d890d2, Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: 79c1c15a00eeb6b4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client -> Sending packet 0 (46 bytes) for connection 6f5c7258c11c274ec4d890d2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 79c1c15a00eeb6b4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:43 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:43 client Dropping Handshake keys. 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b45eeb25e945bb8c, StatelessResetToken: 0x1524468bf3060f22972098fd2eadc2f3} 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 23fa7e29408a4e77, StatelessResetToken: 0x6108dcc9253e86420c0c9c640c1ba515} 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ba85fdd88e48e3bb, StatelessResetToken: 0x0bcbb351782f7ca09b49b95de54bcbcf} 2025/04/30 10:44:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:43 client -> Sending packet 1 (34 bytes) for connection 6f5c7258c11c274ec4d890d2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:43 client Short Header{DestConnectionID: b45eeb25e945bb8c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 169.345µs} 2025/04/30 10:44:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:43 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client newly acked packets (1): [0] 2025/04/30 10:44:43 client updated RTT: 38.354ms (σ: 15.104ms) 2025/04/30 10:44:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:43 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:43 client -> Sending packet 2 (30 bytes) for connection 6f5c7258c11c274ec4d890d2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:43 client Short Header{DestConnectionID: b45eeb25e945bb8c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:43 client Connection 6f5c7258c11c274ec4d890d2 closed. 2025/04/30 10:44:43 Requesting https://server4:443/tdgdpqpfzf. 2025/04/30 10:44:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:43 Increased send buffer size to 14336 kiB 2025/04/30 10:44:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:43 Created qlog file: /logs/qlog/c1cb2dff65b6b99667f29a550706e4b105cdb7.sqlog 2025/04/30 10:44:43 client Starting new connection to server4 ([::]:53429 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c1cb2dff65b6b99667f29a550706e4b105cdb7, version v1 2025/04/30 10:44:43 Adding connection ID (empty). 2025/04/30 10:44:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:43 client -> Sending packet 0 (1280 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: c1cb2dff65b6b99667f29a550706e4b105cdb7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:43 client -> Sending packet 1 (1280 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: c1cb2dff65b6b99667f29a550706e4b105cdb7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:43 client -> Sending packet 2 (1280 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: c1cb2dff65b6b99667f29a550706e4b105cdb7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:43 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 543931f54b6fb266, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:43 client Received first packet. Switching destination connection ID to: 543931f54b6fb266 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 543931f54b6fb266, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client newly acked packets (1): [2] 2025/04/30 10:44:43 client updated RTT: 35.413288ms (σ: 17.706644ms) 2025/04/30 10:44:43 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 543931f54b6fb266, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client -> Sending packet 3 (1280 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: 543931f54b6fb266, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:43 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 543931f54b6fb266, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:43 client -> Sending packet 4 (1280 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: 543931f54b6fb266, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:43 client <- Reading packet 1 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 543931f54b6fb266, PacketNumber: 1, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c1cb2dff65b6b99667f29a550706e4b105cdb7, InitialSourceConnectionID: 543931f54b6fb266, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:43 client -> Sending packet 0 (79 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: 543931f54b6fb266, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:43 client Dropping Initial keys. 2025/04/30 10:44:43 client -> Sending packet 0 (46 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 543931f54b6fb266, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:43 client <- Reading packet 2 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 543931f54b6fb266, PacketNumber: 2, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:43 client -> Sending packet 1 (40 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: 543931f54b6fb266, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:43 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:43 client Dropping Handshake keys. 2025/04/30 10:44:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:43 client -> Sending packet 1 (32 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 543931f54b6fb266, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 61.855µs} 2025/04/30 10:44:43 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client newly acked packets (1): [0] 2025/04/30 10:44:43 client updated RTT: 35.334ms (σ: 13.436ms) 2025/04/30 10:44:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:43 client Canceling loss detection timer. 2025/04/30 10:44:43 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:43 client -> Sending packet 2 (34 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 543931f54b6fb266, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 101.88µs} 2025/04/30 10:44:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:43 client -> Sending packet 3 (30 bytes) for connection c1cb2dff65b6b99667f29a550706e4b105cdb7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 543931f54b6fb266, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:43 client Connection c1cb2dff65b6b99667f29a550706e4b105cdb7 closed. 2025/04/30 10:44:43 Requesting https://server4:443/qiawaugvsb. 2025/04/30 10:44:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:43 Increased send buffer size to 14336 kiB 2025/04/30 10:44:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:43 Created qlog file: /logs/qlog/818e60279dad4a34aba9e11ed0b9.sqlog 2025/04/30 10:44:43 client Starting new connection to server4 ([::]:48747 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 818e60279dad4a34aba9e11ed0b9, version v1 2025/04/30 10:44:43 Adding connection ID (empty). 2025/04/30 10:44:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:43 client -> Sending packet 0 (1280 bytes) for connection 818e60279dad4a34aba9e11ed0b9, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: 818e60279dad4a34aba9e11ed0b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:43 client -> Sending packet 1 (1280 bytes) for connection 818e60279dad4a34aba9e11ed0b9, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: 818e60279dad4a34aba9e11ed0b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:43 client -> Sending packet 2 (1280 bytes) for connection 818e60279dad4a34aba9e11ed0b9, Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: 818e60279dad4a34aba9e11ed0b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:43 client Parsed a coalesced packet. Part 1: 458 bytes. Remaining: 742 bytes. 2025/04/30 10:44:43 client <- Reading packet 0 (458 bytes) for connection (empty), Initial 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c20553bd0db09f3a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 440, Version: v1} 2025/04/30 10:44:43 client Received first packet. Switching destination connection ID to: c20553bd0db09f3a 2025/04/30 10:44:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:43 client newly acked packets (1): [2] 2025/04/30 10:44:43 client updated RTT: 39.717179ms (σ: 19.858589ms) 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 0 bytes. 2025/04/30 10:44:43 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c20553bd0db09f3a, PacketNumber: 0, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:44:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:44:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 818e60279dad4a34aba9e11ed0b9, InitialSourceConnectionID: c20553bd0db09f3a, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 818e60279dad4a34aba9e11ed0b9 2025/04/30 10:44:43 client Long Header{Type: Initial, DestConnectionID: c20553bd0db09f3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: c20553bd0db09f3a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:43 client Dropping Initial keys. 2025/04/30 10:44:43 client -> Sending packet 1 (86 bytes) for connection 818e60279dad4a34aba9e11ed0b9, Handshake 2025/04/30 10:44:43 client Long Header{Type: Handshake, DestConnectionID: c20553bd0db09f3a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:43 client Short Header{DestConnectionID: c20553bd0db09f3a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:43 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:43 client Dropping Handshake keys. 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6fe9aac566f5cf05, StatelessResetToken: 0x2a71dc9ff33cb70e9f6f66d8bb52bd90} 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70fd43587d981b26, StatelessResetToken: 0x6bae0d9c078eea11dec0f423bf46b024} 2025/04/30 10:44:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee65eb22aec41143, StatelessResetToken: 0x02e164a807904a84017d5448c313469a} 2025/04/30 10:44:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:43 client -> Sending packet 1 (34 bytes) for connection 818e60279dad4a34aba9e11ed0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:43 client Short Header{DestConnectionID: 6fe9aac566f5cf05, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 142.435µs} 2025/04/30 10:44:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:44 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1fa5b24dcbe7d07e, StatelessResetToken: 0x9e0969447d69562ca24f1b97c27e608d} 2025/04/30 10:44:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:44 client -> Sending packet 2 (34 bytes) for connection 818e60279dad4a34aba9e11ed0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 6fe9aac566f5cf05, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 127.858µs} 2025/04/30 10:44:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:44 client -> Sending packet 4 (46 bytes) for connection 818e60279dad4a34aba9e11ed0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 6fe9aac566f5cf05, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:44 client Skipping packet number 3 2025/04/30 10:44:44 client -> Sending packet 5 (29 bytes) for connection 818e60279dad4a34aba9e11ed0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 6fe9aac566f5cf05, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:44 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1fa5b24dcbe7d07e, StatelessResetToken: 0x9e0969447d69562ca24f1b97c27e608d} 2025/04/30 10:44:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:44 client -> Sending packet 6 (1366 bytes) for connection 818e60279dad4a34aba9e11ed0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 6fe9aac566f5cf05, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.PingFrame{} 2025/04/30 10:44:44 client Sending ACK because the ACK timer expired. 2025/04/30 10:44:44 client -> Sending packet 7 (35 bytes) for connection 818e60279dad4a34aba9e11ed0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 6fe9aac566f5cf05, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.38783ms} 2025/04/30 10:44:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:44 client <- Reading packet 6 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:44 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:44 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:44 client -> Sending packet 8 (36 bytes) for connection 818e60279dad4a34aba9e11ed0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 6fe9aac566f5cf05, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 142.556µs} 2025/04/30 10:44:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:44 client -> Sending packet 9 (30 bytes) for connection 818e60279dad4a34aba9e11ed0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 6fe9aac566f5cf05, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:44 client Connection 818e60279dad4a34aba9e11ed0b9 closed. 2025/04/30 10:44:44 Requesting https://server4:443/eofvnlvwct. 2025/04/30 10:44:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:44 Increased send buffer size to 14336 kiB 2025/04/30 10:44:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:44 Created qlog file: /logs/qlog/f63e553d45cbe40a2a2b4a67a3f864c96538.sqlog 2025/04/30 10:44:44 client Starting new connection to server4 ([::]:40372 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f63e553d45cbe40a2a2b4a67a3f864c96538, version v1 2025/04/30 10:44:44 Adding connection ID (empty). 2025/04/30 10:44:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:44 client -> Sending packet 0 (1280 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538, Initial 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: f63e553d45cbe40a2a2b4a67a3f864c96538, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:44:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:44 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:44:44 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bcf2327a1fe81af0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:44:44 client Received first packet. Switching destination connection ID to: bcf2327a1fe81af0 2025/04/30 10:44:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:44 client newly acked packets (1): [0] 2025/04/30 10:44:44 client updated RTT: 38.193227ms (σ: 19.096613ms) 2025/04/30 10:44:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:44 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:44:44 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bcf2327a1fe81af0, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f63e553d45cbe40a2a2b4a67a3f864c96538, InitialSourceConnectionID: bcf2327a1fe81af0, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: bcf2327a1fe81af0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:44 client Long Header{Type: Handshake, DestConnectionID: bcf2327a1fe81af0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:44 client Dropping Initial keys. 2025/04/30 10:44:44 client -> Sending packet 1 (40 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538, Handshake 2025/04/30 10:44:44 client Long Header{Type: Handshake, DestConnectionID: bcf2327a1fe81af0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:44 client -> Sending packet 0 (46 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: bcf2327a1fe81af0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:44 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:44 client Dropping Handshake keys. 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fb7516a650808a92, StatelessResetToken: 0x2213ad326e37efeb0fdf5fcc8a16c8a2} 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 02e458754ff4e890, StatelessResetToken: 0x73bcadfa9b1459d33dfc60bd9ed660e7} 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 602181fb4b9bf88c, StatelessResetToken: 0x92cbc39e04d1aea1fc5d5ba65e944ba6} 2025/04/30 10:44:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:44 client -> Sending packet 1 (34 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: fb7516a650808a92, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 142.475µs} 2025/04/30 10:44:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:44 client -> Sending packet 3 (46 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: fb7516a650808a92, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:44 client Skipping packet number 2 2025/04/30 10:44:44 client -> Sending packet 4 (29 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: fb7516a650808a92, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:44 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:44 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:44 client newly acked packets (1): [3] 2025/04/30 10:44:44 client updated RTT: 37.591ms (σ: 15.525ms) 2025/04/30 10:44:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:44 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:44 client -> Sending packet 5 (34 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:44 client Short Header{DestConnectionID: fb7516a650808a92, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 166.782µs} 2025/04/30 10:44:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:44 client -> Sending packet 6 (30 bytes) for connection f63e553d45cbe40a2a2b4a67a3f864c96538, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:44 client Short Header{DestConnectionID: fb7516a650808a92, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:44 client Connection f63e553d45cbe40a2a2b4a67a3f864c96538 closed. 2025/04/30 10:44:44 Requesting https://server4:443/zhlpffueow. 2025/04/30 10:44:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:44 Increased send buffer size to 14336 kiB 2025/04/30 10:44:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:44 Created qlog file: /logs/qlog/a01a696e009f400401c45233f31bea74d6a3.sqlog 2025/04/30 10:44:44 client Starting new connection to server4 ([::]:38723 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a01a696e009f400401c45233f31bea74d6a3, version v1 2025/04/30 10:44:44 Adding connection ID (empty). 2025/04/30 10:44:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:44 client -> Sending packet 0 (1280 bytes) for connection a01a696e009f400401c45233f31bea74d6a3, Initial 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: a01a696e009f400401c45233f31bea74d6a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:44:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:44:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:44 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:44:44 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 247b19d18bc9c3a5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:44:44 client Received first packet. Switching destination connection ID to: 247b19d18bc9c3a5 2025/04/30 10:44:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:44 client newly acked packets (1): [0] 2025/04/30 10:44:44 client updated RTT: 37.593965ms (σ: 18.796982ms) 2025/04/30 10:44:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:44 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:44:44 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 247b19d18bc9c3a5, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a01a696e009f400401c45233f31bea74d6a3, InitialSourceConnectionID: 247b19d18bc9c3a5, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a01a696e009f400401c45233f31bea74d6a3 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: 247b19d18bc9c3a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:44 client Long Header{Type: Handshake, DestConnectionID: 247b19d18bc9c3a5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:44 client Dropping Initial keys. 2025/04/30 10:44:44 client -> Sending packet 1 (86 bytes) for connection a01a696e009f400401c45233f31bea74d6a3, Handshake 2025/04/30 10:44:44 client Long Header{Type: Handshake, DestConnectionID: 247b19d18bc9c3a5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:44 client Short Header{DestConnectionID: 247b19d18bc9c3a5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:44 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:44 client Dropping Handshake keys. 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e7d65be4299b26e, StatelessResetToken: 0xf06916caa3301227af597b9d3216a20b} 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7fdd814a3c8a2ce3, StatelessResetToken: 0xe2c56f244125f313dfe07696093ce377} 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f8c7a77e7fe945a, StatelessResetToken: 0xef4749e6af9c2820428cc5001b45bb64} 2025/04/30 10:44:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:44 client -> Sending packet 1 (34 bytes) for connection a01a696e009f400401c45233f31bea74d6a3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 2e7d65be4299b26e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 165.919µs} 2025/04/30 10:44:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:44 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b54dcf1361ef0b34, StatelessResetToken: 0x80d33d9cab62d4d0bc49c01fe4abf513} 2025/04/30 10:44:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:44 client newly acked packets (1): [1] 2025/04/30 10:44:44 client updated RTT: 36.875ms (σ: 15.532ms) 2025/04/30 10:44:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:44 client lost packet 0 (time threshold) 2025/04/30 10:44:44 client Canceling loss detection timer. 2025/04/30 10:44:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:44 client Ignoring all packets below 1. 2025/04/30 10:44:44 client -> Sending packet 2 (51 bytes) for connection a01a696e009f400401c45233f31bea74d6a3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 2e7d65be4299b26e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 167.162µs} 2025/04/30 10:44:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:44 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:44 client newly acked packets (1): [2] 2025/04/30 10:44:44 client updated RTT: 36.403ms (σ: 12.591ms) 2025/04/30 10:44:44 client Canceling loss detection timer. 2025/04/30 10:44:44 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:44 client Ignoring all packets below 2. 2025/04/30 10:44:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:44 client -> Sending packet 3 (30 bytes) for connection a01a696e009f400401c45233f31bea74d6a3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:44 client Short Header{DestConnectionID: 2e7d65be4299b26e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:44 client Connection a01a696e009f400401c45233f31bea74d6a3 closed. 2025/04/30 10:44:44 Requesting https://server4:443/opmubdgvjm. 2025/04/30 10:44:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:44 Increased send buffer size to 14336 kiB 2025/04/30 10:44:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:44 Created qlog file: /logs/qlog/fbb57f6862fb0efbef0b5889a3c5.sqlog 2025/04/30 10:44:44 client Starting new connection to server4 ([::]:40424 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fbb57f6862fb0efbef0b5889a3c5, version v1 2025/04/30 10:44:44 Adding connection ID (empty). 2025/04/30 10:44:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:44 client -> Sending packet 0 (1280 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, Initial 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: fbb57f6862fb0efbef0b5889a3c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:44 client -> Sending packet 1 (1280 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, Initial 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: fbb57f6862fb0efbef0b5889a3c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:44 client -> Sending packet 2 (1280 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, Initial 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: fbb57f6862fb0efbef0b5889a3c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:44 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0968c5a6b37ff8d3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:44 client Received first packet. Switching destination connection ID to: 0968c5a6b37ff8d3 2025/04/30 10:44:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:44 client newly acked packets (1): [2] 2025/04/30 10:44:44 client updated RTT: 39.557654ms (σ: 19.778827ms) 2025/04/30 10:44:45 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0968c5a6b37ff8d3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:45 client -> Sending packet 3 (1280 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: 0968c5a6b37ff8d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:45 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0968c5a6b37ff8d3, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:45 client -> Sending packet 4 (1280 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: 0968c5a6b37ff8d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:45 client <- Reading packet 1 (742 bytes) for connection (empty), Handshake 2025/04/30 10:44:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0968c5a6b37ff8d3, PacketNumber: 1, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:44:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:44:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fbb57f6862fb0efbef0b5889a3c5, InitialSourceConnectionID: 0968c5a6b37ff8d3, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:45 client -> Sending packet 0 (79 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, Handshake 2025/04/30 10:44:45 client Long Header{Type: Handshake, DestConnectionID: 0968c5a6b37ff8d3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:45 client Dropping Initial keys. 2025/04/30 10:44:45 client -> Sending packet 0 (46 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:45 client Short Header{DestConnectionID: 0968c5a6b37ff8d3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:45 client -> Sending packet 1 (74 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, Handshake 2025/04/30 10:44:45 client Long Header{Type: Handshake, DestConnectionID: 0968c5a6b37ff8d3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:45 client -> Sending packet 2 (74 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, Handshake 2025/04/30 10:44:45 client Long Header{Type: Handshake, DestConnectionID: 0968c5a6b37ff8d3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:45 client <- Reading packet 2 (742 bytes) for connection (empty), Handshake 2025/04/30 10:44:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0968c5a6b37ff8d3, PacketNumber: 2, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:44:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:44:45 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:45 client Dropping Handshake keys. 2025/04/30 10:44:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:45 client -> Sending packet 2 (51 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:45 client Short Header{DestConnectionID: 0968c5a6b37ff8d3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 136.445µs} 2025/04/30 10:44:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:45 client -> Sending packet 3 (46 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:45 client Short Header{DestConnectionID: 0968c5a6b37ff8d3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:45 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d013e014004a85d1, StatelessResetToken: 0xd2674db68b1a8aae849cc6fdd44a9389} 2025/04/30 10:44:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e493bf10bda18625, StatelessResetToken: 0xc68338108238594f1ad7206b31411e57} 2025/04/30 10:44:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9e64ea4808216f3b, StatelessResetToken: 0xf5720d9e22cba628788077403bc25c91} 2025/04/30 10:44:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:45 client -> Sending packet 4 (34 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:45 client Short Header{DestConnectionID: d013e014004a85d1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 138.366µs} 2025/04/30 10:44:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:45 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a9e7c3e633b16a08, StatelessResetToken: 0x07d894dc21d91b4f87583fa890323fd2} 2025/04/30 10:44:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 10:44:45 client newly acked packets (1): [4] 2025/04/30 10:44:45 client updated RTT: 38.619ms (σ: 16.708ms) 2025/04/30 10:44:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:45 client setting loss timer for packet 3 (1-RTT) to 43.446375ms (in 2025-04-30 10:44:45.382786735 +0000 UTC m=+11.040456537) 2025/04/30 10:44:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:45 client Ignoring all packets below 2. 2025/04/30 10:44:45 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:44:45.382786735 +0000 UTC m=+11.040456537 2025/04/30 10:44:45 client lost packet 3 (time threshold) 2025/04/30 10:44:45 client Canceling loss detection timer. 2025/04/30 10:44:45 client -> Sending packet 5 (52 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:45 client Short Header{DestConnectionID: d013e014004a85d1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 11.24805ms} 2025/04/30 10:44:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:45 client -> Sending packet 7 (46 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:45 client Short Header{DestConnectionID: d013e014004a85d1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:45 client -> Sending packet 8 (46 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:45 client Short Header{DestConnectionID: d013e014004a85d1, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:45 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:45 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:45 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 0s} 2025/04/30 10:44:45 client newly acked packets (1): [8] 2025/04/30 10:44:45 client updated RTT: 37.779ms (σ: 14.209ms) 2025/04/30 10:44:45 client Canceling loss detection timer. 2025/04/30 10:44:45 client -> Sending packet 9 (1366 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:45 client Short Header{DestConnectionID: d013e014004a85d1, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.PingFrame{} 2025/04/30 10:44:45 client <- Reading packet 6 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:45 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:45 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:45 client -> Sending packet 10 (30 bytes) for connection fbb57f6862fb0efbef0b5889a3c5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:45 client Short Header{DestConnectionID: d013e014004a85d1, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:45 client Connection fbb57f6862fb0efbef0b5889a3c5 closed. 2025/04/30 10:44:45 Requesting https://server4:443/hfvpzjgwoz. 2025/04/30 10:44:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:45 Increased send buffer size to 14336 kiB 2025/04/30 10:44:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:45 Created qlog file: /logs/qlog/0e857a4131725daf3a78.sqlog 2025/04/30 10:44:45 client Starting new connection to server4 ([::]:43329 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0e857a4131725daf3a78, version v1 2025/04/30 10:44:45 Adding connection ID (empty). 2025/04/30 10:44:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:45 client -> Sending packet 0 (1280 bytes) for connection 0e857a4131725daf3a78, Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: 0e857a4131725daf3a78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:44:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:44:45 client Parsed a coalesced packet. Part 1: 461 bytes. Remaining: 739 bytes. 2025/04/30 10:44:45 client <- Reading packet 0 (461 bytes) for connection (empty), Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 048f44d683b8a873, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 443, Version: v1} 2025/04/30 10:44:45 client Received first packet. Switching destination connection ID to: 048f44d683b8a873 2025/04/30 10:44:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:45 client newly acked packets (1): [0] 2025/04/30 10:44:45 client updated RTT: 37.985327ms (σ: 18.992663ms) 2025/04/30 10:44:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:45 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 0 bytes. 2025/04/30 10:44:45 client <- Reading packet 0 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 048f44d683b8a873, PacketNumber: 0, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0e857a4131725daf3a78, InitialSourceConnectionID: 048f44d683b8a873, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0e857a4131725daf3a78 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: 048f44d683b8a873, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:45 client Long Header{Type: Handshake, DestConnectionID: 048f44d683b8a873, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:45 client Dropping Initial keys. 2025/04/30 10:44:45 client -> Sending packet 1 (40 bytes) for connection 0e857a4131725daf3a78, Handshake 2025/04/30 10:44:45 client Long Header{Type: Handshake, DestConnectionID: 048f44d683b8a873, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:45 client -> Sending packet 0 (46 bytes) for connection 0e857a4131725daf3a78, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:45 client Short Header{DestConnectionID: 048f44d683b8a873, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:45 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:45 client Peer doesn't await address validation any longer. 2025/04/30 10:44:45 client newly acked packets (1): [0] 2025/04/30 10:44:45 client updated RTT: 37.689ms (σ: 14.834ms) 2025/04/30 10:44:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:45 client Canceling loss detection timer. 2025/04/30 10:44:45 client Dropping Handshake keys. 2025/04/30 10:44:45 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:45 client -> Sending packet 1 (32 bytes) for connection 0e857a4131725daf3a78, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:45 client Short Header{DestConnectionID: 048f44d683b8a873, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 166.09µs} 2025/04/30 10:44:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:45 client -> Sending packet 2 (30 bytes) for connection 0e857a4131725daf3a78, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:45 client Short Header{DestConnectionID: 048f44d683b8a873, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:45 client Connection 0e857a4131725daf3a78 closed. 2025/04/30 10:44:45 Requesting https://server4:443/lewkomkxqc. 2025/04/30 10:44:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:45 Increased send buffer size to 14336 kiB 2025/04/30 10:44:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:45 Created qlog file: /logs/qlog/580c9b92be08cba747ff2c267d702243297ca43f.sqlog 2025/04/30 10:44:45 client Starting new connection to server4 ([::]:57133 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 580c9b92be08cba747ff2c267d702243297ca43f, version v1 2025/04/30 10:44:45 Adding connection ID (empty). 2025/04/30 10:44:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:45 client -> Sending packet 0 (1280 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: 580c9b92be08cba747ff2c267d702243297ca43f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:44:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:45 client -> Sending packet 1 (1280 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: 580c9b92be08cba747ff2c267d702243297ca43f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:44:45 client -> Sending packet 2 (1280 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, Initial 2025/04/30 10:44:45 client Long Header{Type: Initial, DestConnectionID: 580c9b92be08cba747ff2c267d702243297ca43f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:44:46 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7fc52ffedb046501, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:46 client Received first packet. Switching destination connection ID to: 7fc52ffedb046501 2025/04/30 10:44:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:46 client -> Sending packet 3 (1280 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, Initial 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: 7fc52ffedb046501, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:46 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 10:44:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7fc52ffedb046501, PacketNumber: 1, PacketNumberLen: 1, Length: 731, Version: v1} 2025/04/30 10:44:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 10:44:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 580c9b92be08cba747ff2c267d702243297ca43f, InitialSourceConnectionID: 7fc52ffedb046501, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:46 client -> Sending packet 0 (79 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, Handshake 2025/04/30 10:44:46 client Long Header{Type: Handshake, DestConnectionID: 7fc52ffedb046501, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:46 client Dropping Initial keys. 2025/04/30 10:44:46 client -> Sending packet 0 (46 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 7fc52ffedb046501, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:46 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:46 client Dropping Handshake keys. 2025/04/30 10:44:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:46 client -> Sending packet 1 (1366 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 7fc52ffedb046501, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.PingFrame{} 2025/04/30 10:44:46 client -> Sending packet 2 (32 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 7fc52ffedb046501, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 140.983µs} 2025/04/30 10:44:46 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2f05b88b5b471308, StatelessResetToken: 0x6e9e2958f79dc8f2022dbda8fa23279d} 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ccb3a0c4af393b21, StatelessResetToken: 0x042026c0974923af2337efacccfa885d} 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c8cc9c97b9acb88, StatelessResetToken: 0x5fa3d8a239def024eea5b2c6ba0a586a} 2025/04/30 10:44:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:46 client -> Sending packet 3 (34 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 2f05b88b5b471308, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 101.389µs} 2025/04/30 10:44:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:46 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:46 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:46 client newly acked packets (2): [1 3] 2025/04/30 10:44:46 client updated RTT: 33.217596ms (σ: 16.608798ms) 2025/04/30 10:44:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:46 client lost packet 0 (time threshold) 2025/04/30 10:44:46 client Canceling loss detection timer. 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ead4f9307f630b58, StatelessResetToken: 0xb3cec922015a0d93882d29e8e77d3e9e} 2025/04/30 10:44:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:46 client Ignoring all packets below 2. 2025/04/30 10:44:46 client -> Sending packet 4 (51 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 2f05b88b5b471308, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 174.515µs} 2025/04/30 10:44:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:46 client -> Sending packet 6 (46 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 2f05b88b5b471308, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:46 client -> Sending packet 7 (46 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 2f05b88b5b471308, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:46 client <- Reading packet 5 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:46 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:46 client newly acked packets (1): [7] 2025/04/30 10:44:46 client updated RTT: 33.234ms (σ: 12.489ms) 2025/04/30 10:44:46 client Canceling loss detection timer. 2025/04/30 10:44:46 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:46 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:46 client -> Sending packet 8 (1409 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 2f05b88b5b471308, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.PingFrame{} 2025/04/30 10:44:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:46 client -> Sending packet 9 (30 bytes) for connection 580c9b92be08cba747ff2c267d702243297ca43f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 2f05b88b5b471308, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:46 client Connection 580c9b92be08cba747ff2c267d702243297ca43f closed. 2025/04/30 10:44:46 Requesting https://server4:443/zuehiewdor. 2025/04/30 10:44:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:46 Increased send buffer size to 14336 kiB 2025/04/30 10:44:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:46 Created qlog file: /logs/qlog/bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1.sqlog 2025/04/30 10:44:46 client Starting new connection to server4 ([::]:49108 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, version v1 2025/04/30 10:44:46 Adding connection ID (empty). 2025/04/30 10:44:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:46 client -> Sending packet 0 (1280 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, Initial 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:44:46 client Parsed a coalesced packet. Part 1: 453 bytes. Remaining: 747 bytes. 2025/04/30 10:44:46 client <- Reading packet 0 (453 bytes) for connection (empty), Initial 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8804aa5939a1d133, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 435, Version: v1} 2025/04/30 10:44:46 client Received first packet. Switching destination connection ID to: 8804aa5939a1d133 2025/04/30 10:44:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:46 client newly acked packets (1): [0] 2025/04/30 10:44:46 client updated RTT: 38.165341ms (σ: 19.08267ms) 2025/04/30 10:44:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:46 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 0 bytes. 2025/04/30 10:44:46 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 10:44:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8804aa5939a1d133, PacketNumber: 0, PacketNumberLen: 1, Length: 730, Version: v1} 2025/04/30 10:44:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:44:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, InitialSourceConnectionID: 8804aa5939a1d133, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: 8804aa5939a1d133, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:46 client Long Header{Type: Handshake, DestConnectionID: 8804aa5939a1d133, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:46 client Dropping Initial keys. 2025/04/30 10:44:46 client -> Sending packet 1 (40 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, Handshake 2025/04/30 10:44:46 client Long Header{Type: Handshake, DestConnectionID: 8804aa5939a1d133, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:46 client -> Sending packet 0 (46 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 8804aa5939a1d133, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:46 client -> Sending packet 2 (74 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, Handshake 2025/04/30 10:44:46 client Long Header{Type: Handshake, DestConnectionID: 8804aa5939a1d133, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:46 client -> Sending packet 3 (74 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, Handshake 2025/04/30 10:44:46 client Long Header{Type: Handshake, DestConnectionID: 8804aa5939a1d133, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:46 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:46 client Dropping Handshake keys. 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 496a256fc2eb80f2, StatelessResetToken: 0xe26ef96257da069da323ce2df4fbc5cc} 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 744079ea2d24b28d, StatelessResetToken: 0x0e2d32b4ede3548937c163e2a35b5441} 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee6697587bb7e3e6, StatelessResetToken: 0x6f896aa901a76d23724b06c4bd4a0fb8} 2025/04/30 10:44:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:46 client -> Sending packet 2 (53 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 496a256fc2eb80f2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 162.694µs} 2025/04/30 10:44:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:46 client -> Sending packet 3 (48 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 496a256fc2eb80f2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:46 client <- Reading packet 3 (1140 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 496a256fc2eb80f2, StatelessResetToken: 0xe26ef96257da069da323ce2df4fbc5cc} 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 744079ea2d24b28d, StatelessResetToken: 0x0e2d32b4ede3548937c163e2a35b5441} 2025/04/30 10:44:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee6697587bb7e3e6, StatelessResetToken: 0x6f896aa901a76d23724b06c4bd4a0fb8} 2025/04/30 10:44:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:46 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:46 client -> Sending packet 4 (30 bytes) for connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:46 client Short Header{DestConnectionID: 496a256fc2eb80f2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:46 client Connection bc5fdd9865c797f9fa8b63da0f8a6f007a45b0c1 closed. 2025/04/30 10:44:46 Requesting https://server4:443/whnjnitbpb. 2025/04/30 10:44:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:46 Increased send buffer size to 14336 kiB 2025/04/30 10:44:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:46 Created qlog file: /logs/qlog/03bdf2730a96ba83a14dc35a3f79.sqlog 2025/04/30 10:44:46 client Starting new connection to server4 ([::]:34276 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 03bdf2730a96ba83a14dc35a3f79, version v1 2025/04/30 10:44:46 Adding connection ID (empty). 2025/04/30 10:44:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:46 client -> Sending packet 0 (1280 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, Initial 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: 03bdf2730a96ba83a14dc35a3f79, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:44:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:46 client -> Sending packet 1 (1280 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, Initial 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: 03bdf2730a96ba83a14dc35a3f79, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:44:46 client -> Sending packet 2 (1280 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, Initial 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: 03bdf2730a96ba83a14dc35a3f79, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:44:46 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 945651b92b2629d0, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:46 client Received first packet. Switching destination connection ID to: 945651b92b2629d0 2025/04/30 10:44:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:46 client newly acked packets (1): [2] 2025/04/30 10:44:46 client updated RTT: 39.24226ms (σ: 19.62113ms) 2025/04/30 10:44:47 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 945651b92b2629d0, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client -> Sending packet 3 (1280 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: 945651b92b2629d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:47 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 945651b92b2629d0, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:47 client -> Sending packet 4 (1280 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: 945651b92b2629d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:47 client <- Reading packet 1 (743 bytes) for connection (empty), Handshake 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 945651b92b2629d0, PacketNumber: 1, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:44:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:44:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 03bdf2730a96ba83a14dc35a3f79, InitialSourceConnectionID: 945651b92b2629d0, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:47 client -> Sending packet 0 (79 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, Handshake 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: 945651b92b2629d0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:47 client Dropping Initial keys. 2025/04/30 10:44:47 client -> Sending packet 0 (46 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:47 client Short Header{DestConnectionID: 945651b92b2629d0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:47 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:47 client Dropping Handshake keys. 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7c9a4d7a55f203f9, StatelessResetToken: 0xd0f647dfa953f3d81ea0da568eccfe6a} 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 38a0e47439658ee3, StatelessResetToken: 0x9f2606dc5a39c1191418e57d79dcded8} 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2eb2455c5683b4e3, StatelessResetToken: 0xa7cc57fc08ff43b0613cbe9bc1418c6e} 2025/04/30 10:44:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:47 client -> Sending packet 1 (34 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:47 client Short Header{DestConnectionID: 7c9a4d7a55f203f9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 160.479µs} 2025/04/30 10:44:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:47 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:47 client newly acked packets (1): [0] 2025/04/30 10:44:47 client updated RTT: 38.623ms (σ: 15.953ms) 2025/04/30 10:44:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:47 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:47 client -> Sending packet 2 (30 bytes) for connection 03bdf2730a96ba83a14dc35a3f79, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:47 client Short Header{DestConnectionID: 7c9a4d7a55f203f9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:47 client Connection 03bdf2730a96ba83a14dc35a3f79 closed. 2025/04/30 10:44:47 Requesting https://server4:443/mnspzlsjjb. 2025/04/30 10:44:47 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:47 Increased send buffer size to 14336 kiB 2025/04/30 10:44:47 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:47 Created qlog file: /logs/qlog/bf234eae1ad41c50.sqlog 2025/04/30 10:44:47 client Starting new connection to server4 ([::]:42874 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bf234eae1ad41c50, version v1 2025/04/30 10:44:47 Adding connection ID (empty). 2025/04/30 10:44:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:47 client -> Sending packet 0 (1280 bytes) for connection bf234eae1ad41c50, Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: bf234eae1ad41c50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:47 client -> Sending packet 1 (1280 bytes) for connection bf234eae1ad41c50, Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: bf234eae1ad41c50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:47 client -> Sending packet 2 (1280 bytes) for connection bf234eae1ad41c50, Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: bf234eae1ad41c50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:47 client Parsed a coalesced packet. Part 1: 464 bytes. Remaining: 736 bytes. 2025/04/30 10:44:47 client <- Reading packet 0 (464 bytes) for connection (empty), Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6dcf7bd3d6815922, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 446, Version: v1} 2025/04/30 10:44:47 client Received first packet. Switching destination connection ID to: 6dcf7bd3d6815922 2025/04/30 10:44:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:47 client newly acked packets (1): [2] 2025/04/30 10:44:47 client updated RTT: 38.824208ms (σ: 19.412104ms) 2025/04/30 10:44:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Parsed a coalesced packet. Part 2: 736 bytes. Remaining: 0 bytes. 2025/04/30 10:44:47 client <- Reading packet 0 (736 bytes) for connection (empty), Handshake 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6dcf7bd3d6815922, PacketNumber: 0, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:44:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:44:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bf234eae1ad41c50, InitialSourceConnectionID: 6dcf7bd3d6815922, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bf234eae1ad41c50 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: 6dcf7bd3d6815922, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: 6dcf7bd3d6815922, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:47 client Dropping Initial keys. 2025/04/30 10:44:47 client -> Sending packet 1 (40 bytes) for connection bf234eae1ad41c50, Handshake 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: 6dcf7bd3d6815922, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:47 client -> Sending packet 0 (46 bytes) for connection bf234eae1ad41c50, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:47 client Short Header{DestConnectionID: 6dcf7bd3d6815922, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:47 client -> Sending packet 2 (74 bytes) for connection bf234eae1ad41c50, Handshake 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: 6dcf7bd3d6815922, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:47 client -> Sending packet 3 (74 bytes) for connection bf234eae1ad41c50, Handshake 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: 6dcf7bd3d6815922, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:47 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:47 client Dropping Handshake keys. 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 14bfe67734058d0f, StatelessResetToken: 0xe618033d97fbfa05685d2ffc184e5150} 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b5f04f18a129df76, StatelessResetToken: 0x354d484e170d5e3c0091085baec9f53e} 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5d4588618234a4d, StatelessResetToken: 0x541815ff170404a753bd4508370175bc} 2025/04/30 10:44:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:47 client -> Sending packet 2 (53 bytes) for connection bf234eae1ad41c50, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:47 client Short Header{DestConnectionID: 14bfe67734058d0f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 197.038µs} 2025/04/30 10:44:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:47 client -> Sending packet 3 (48 bytes) for connection bf234eae1ad41c50, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:47 client Short Header{DestConnectionID: 14bfe67734058d0f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:47 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 14bfe67734058d0f, StatelessResetToken: 0xe618033d97fbfa05685d2ffc184e5150} 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b5f04f18a129df76, StatelessResetToken: 0x354d484e170d5e3c0091085baec9f53e} 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5d4588618234a4d, StatelessResetToken: 0x541815ff170404a753bd4508370175bc} 2025/04/30 10:44:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:47 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d60a920cd0390834, StatelessResetToken: 0xc0ef6144f7e9113aa4609d4a0808ff8a} 2025/04/30 10:44:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:47 client -> Sending packet 4 (32 bytes) for connection bf234eae1ad41c50, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:47 client Short Header{DestConnectionID: 14bfe67734058d0f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 85.718µs} 2025/04/30 10:44:47 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:47 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:47 client newly acked packets (1): [3] 2025/04/30 10:44:47 client updated RTT: 38.2ms (σ: 15.806ms) 2025/04/30 10:44:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:47 client Canceling loss detection timer. 2025/04/30 10:44:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:47 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:47 client -> Sending packet 5 (30 bytes) for connection bf234eae1ad41c50, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:47 client Short Header{DestConnectionID: 14bfe67734058d0f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:47 client Connection bf234eae1ad41c50 closed. 2025/04/30 10:44:47 Requesting https://server4:443/qxwdodtruk. 2025/04/30 10:44:47 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:47 Increased send buffer size to 14336 kiB 2025/04/30 10:44:47 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:47 Created qlog file: /logs/qlog/a426f8654f2f859858.sqlog 2025/04/30 10:44:47 client Starting new connection to server4 ([::]:37957 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a426f8654f2f859858, version v1 2025/04/30 10:44:47 Adding connection ID (empty). 2025/04/30 10:44:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:47 client -> Sending packet 0 (1280 bytes) for connection a426f8654f2f859858, Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: a426f8654f2f859858, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:47 client -> Sending packet 1 (1280 bytes) for connection a426f8654f2f859858, Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: a426f8654f2f859858, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:47 client -> Sending packet 2 (1280 bytes) for connection a426f8654f2f859858, Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: a426f8654f2f859858, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:47 client Parsed a coalesced packet. Part 1: 462 bytes. Remaining: 738 bytes. 2025/04/30 10:44:47 client <- Reading packet 0 (462 bytes) for connection (empty), Initial 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9b09e5ea882af742, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 444, Version: v1} 2025/04/30 10:44:47 client Received first packet. Switching destination connection ID to: 9b09e5ea882af742 2025/04/30 10:44:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Parsed a coalesced packet. Part 2: 738 bytes. Remaining: 0 bytes. 2025/04/30 10:44:47 client <- Reading packet 0 (738 bytes) for connection (empty), Handshake 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9b09e5ea882af742, PacketNumber: 0, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:44:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:44:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a426f8654f2f859858, InitialSourceConnectionID: 9b09e5ea882af742, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a426f8654f2f859858 2025/04/30 10:44:47 client Long Header{Type: Initial, DestConnectionID: 9b09e5ea882af742, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: 9b09e5ea882af742, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:47 client Dropping Initial keys. 2025/04/30 10:44:47 client -> Sending packet 1 (86 bytes) for connection a426f8654f2f859858, Handshake 2025/04/30 10:44:47 client Long Header{Type: Handshake, DestConnectionID: 9b09e5ea882af742, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:47 client Short Header{DestConnectionID: 9b09e5ea882af742, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:47 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:44:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:48 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:48 client Dropping Handshake keys. 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 743b74ea9399bdec, StatelessResetToken: 0x0fbdba590a803e19b7bdc13925ef4f59} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8c97a001cbe74d96, StatelessResetToken: 0x8cfa53309c62ec8b7f5ca7e8e44946d8} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e32431d467633a39, StatelessResetToken: 0x05857c5a37d894c61b62e628cfd84a0d} 2025/04/30 10:44:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:48 client -> Sending packet 1 (1366 bytes) for connection a426f8654f2f859858, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 743b74ea9399bdec, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.PingFrame{} 2025/04/30 10:44:48 client -> Sending packet 2 (34 bytes) for connection a426f8654f2f859858, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 743b74ea9399bdec, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 226.242µs} 2025/04/30 10:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:48 client <- Reading packet 2 (24 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 19ms} 2025/04/30 10:44:48 client newly acked packets (1): [1] 2025/04/30 10:44:48 client updated RTT: 51.880178ms (σ: 25.940089ms) 2025/04/30 10:44:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:48 client lost packet 0 (time threshold) 2025/04/30 10:44:48 client -> Sending packet 3 (46 bytes) for connection a426f8654f2f859858, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 743b74ea9399bdec, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:48 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:48 client newly acked packets (1): [3] 2025/04/30 10:44:48 client updated RTT: 49.576ms (σ: 24.061ms) 2025/04/30 10:44:48 client lost packet 2 (time threshold) 2025/04/30 10:44:48 client Canceling loss detection timer. 2025/04/30 10:44:48 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:48 client -> Sending packet 4 (34 bytes) for connection a426f8654f2f859858, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 743b74ea9399bdec, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 184.835µs} 2025/04/30 10:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:48 client -> Sending packet 5 (30 bytes) for connection a426f8654f2f859858, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 743b74ea9399bdec, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:48 client Connection a426f8654f2f859858 closed. 2025/04/30 10:44:48 Requesting https://server4:443/xgbqwtvamr. 2025/04/30 10:44:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:48 Increased send buffer size to 14336 kiB 2025/04/30 10:44:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:48 Created qlog file: /logs/qlog/67de1c811a36e4f4f8aa6966f5aec1.sqlog 2025/04/30 10:44:48 client Starting new connection to server4 ([::]:52191 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 67de1c811a36e4f4f8aa6966f5aec1, version v1 2025/04/30 10:44:48 Adding connection ID (empty). 2025/04/30 10:44:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:48 client -> Sending packet 0 (1280 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, Initial 2025/04/30 10:44:48 client Long Header{Type: Initial, DestConnectionID: 67de1c811a36e4f4f8aa6966f5aec1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:44:48 client Parsed a coalesced packet. Part 1: 457 bytes. Remaining: 743 bytes. 2025/04/30 10:44:48 client <- Reading packet 0 (457 bytes) for connection (empty), Initial 2025/04/30 10:44:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2cd905562c3f8aa7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 439, Version: v1} 2025/04/30 10:44:48 client Received first packet. Switching destination connection ID to: 2cd905562c3f8aa7 2025/04/30 10:44:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:48 client newly acked packets (1): [0] 2025/04/30 10:44:48 client updated RTT: 37.186885ms (σ: 18.593442ms) 2025/04/30 10:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:48 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 0 bytes. 2025/04/30 10:44:48 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 10:44:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2cd905562c3f8aa7, PacketNumber: 0, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:44:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 67de1c811a36e4f4f8aa6966f5aec1, InitialSourceConnectionID: 2cd905562c3f8aa7, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1 2025/04/30 10:44:48 client Long Header{Type: Initial, DestConnectionID: 2cd905562c3f8aa7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:48 client Long Header{Type: Handshake, DestConnectionID: 2cd905562c3f8aa7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:48 client Dropping Initial keys. 2025/04/30 10:44:48 client -> Sending packet 1 (40 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, Handshake 2025/04/30 10:44:48 client Long Header{Type: Handshake, DestConnectionID: 2cd905562c3f8aa7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:48 client -> Sending packet 0 (46 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 2cd905562c3f8aa7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:48 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:48 client Dropping Handshake keys. 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65f3da33883c5e33, StatelessResetToken: 0xe2367a8722d1792903f4c42dce7ecd9e} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 92e2b423944d6387, StatelessResetToken: 0x79a02c8e2adbf9be7e1aa87385e4b925} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2849148d0979778b, StatelessResetToken: 0xa171b23ea40d49c857d68bdafb6d0870} 2025/04/30 10:44:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:48 client -> Sending packet 1 (34 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 65f3da33883c5e33, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 174.786µs} 2025/04/30 10:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:48 client -> Sending packet 3 (46 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 65f3da33883c5e33, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:48 client Skipping packet number 2 2025/04/30 10:44:48 client -> Sending packet 4 (29 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 65f3da33883c5e33, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:48 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:44:48 client newly acked packets (1): [3] 2025/04/30 10:44:48 client updated RTT: 38.861ms (σ: 17.295ms) 2025/04/30 10:44:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:48 client -> Sending packet 6 (29 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 65f3da33883c5e33, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:48 client -> Sending packet 7 (29 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 65f3da33883c5e33, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:48 client -> Sending packet 8 (1366 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 65f3da33883c5e33, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.PingFrame{} 2025/04/30 10:44:48 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:44:48 client newly acked packets (1): [7] 2025/04/30 10:44:48 client updated RTT: 37.959ms (σ: 14.774ms) 2025/04/30 10:44:48 client Canceling loss detection timer. 2025/04/30 10:44:48 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:44:48 client newly acked packets (1): [8] 2025/04/30 10:44:48 client updated RTT: 37.261ms (σ: 12.474ms) 2025/04/30 10:44:48 client <- Reading packet 7 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:48 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:48 client -> Sending packet 9 (30 bytes) for connection 67de1c811a36e4f4f8aa6966f5aec1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 65f3da33883c5e33, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:48 client Connection 67de1c811a36e4f4f8aa6966f5aec1 closed. 2025/04/30 10:44:48 Requesting https://server4:443/sxqsowroax. 2025/04/30 10:44:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:48 Increased send buffer size to 14336 kiB 2025/04/30 10:44:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:48 Created qlog file: /logs/qlog/b42ea885a56fb93e3d.sqlog 2025/04/30 10:44:48 client Starting new connection to server4 ([::]:44466 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b42ea885a56fb93e3d, version v1 2025/04/30 10:44:48 Adding connection ID (empty). 2025/04/30 10:44:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:48 client -> Sending packet 0 (1280 bytes) for connection b42ea885a56fb93e3d, Initial 2025/04/30 10:44:48 client Long Header{Type: Initial, DestConnectionID: b42ea885a56fb93e3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:44:48 client Parsed a coalesced packet. Part 1: 464 bytes. Remaining: 736 bytes. 2025/04/30 10:44:48 client <- Reading packet 0 (464 bytes) for connection (empty), Initial 2025/04/30 10:44:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5bd479769f5804d9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 446, Version: v1} 2025/04/30 10:44:48 client Received first packet. Switching destination connection ID to: 5bd479769f5804d9 2025/04/30 10:44:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:48 client newly acked packets (1): [0] 2025/04/30 10:44:48 client updated RTT: 38.121719ms (σ: 19.060859ms) 2025/04/30 10:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:48 client Parsed a coalesced packet. Part 2: 736 bytes. Remaining: 0 bytes. 2025/04/30 10:44:48 client <- Reading packet 0 (736 bytes) for connection (empty), Handshake 2025/04/30 10:44:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5bd479769f5804d9, PacketNumber: 0, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:44:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b42ea885a56fb93e3d, InitialSourceConnectionID: 5bd479769f5804d9, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b42ea885a56fb93e3d 2025/04/30 10:44:48 client Long Header{Type: Initial, DestConnectionID: 5bd479769f5804d9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:48 client Long Header{Type: Handshake, DestConnectionID: 5bd479769f5804d9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:48 client Dropping Initial keys. 2025/04/30 10:44:48 client -> Sending packet 1 (40 bytes) for connection b42ea885a56fb93e3d, Handshake 2025/04/30 10:44:48 client Long Header{Type: Handshake, DestConnectionID: 5bd479769f5804d9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:48 client -> Sending packet 0 (46 bytes) for connection b42ea885a56fb93e3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 5bd479769f5804d9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:48 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:48 client Dropping Handshake keys. 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2286e95262f2e8f7, StatelessResetToken: 0xb9d939ebc3aa13dbd5b40508bf86bae0} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 86c0ddd5cebf1368, StatelessResetToken: 0x9225647660e3efe4741446a94a393912} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 869a3f680b149c84, StatelessResetToken: 0xb1ae67a5264201b28cd512e114418e15} 2025/04/30 10:44:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:48 client -> Sending packet 1 (34 bytes) for connection b42ea885a56fb93e3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 2286e95262f2e8f7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 135.963µs} 2025/04/30 10:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:48 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2286e95262f2e8f7, StatelessResetToken: 0xb9d939ebc3aa13dbd5b40508bf86bae0} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 86c0ddd5cebf1368, StatelessResetToken: 0x9225647660e3efe4741446a94a393912} 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 869a3f680b149c84, StatelessResetToken: 0xb1ae67a5264201b28cd512e114418e15} 2025/04/30 10:44:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:48 client -> Sending packet 3 (52 bytes) for connection b42ea885a56fb93e3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 2286e95262f2e8f7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 17.298521ms} 2025/04/30 10:44:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:48 client Skipping packet number 2 2025/04/30 10:44:48 client -> Sending packet 4 (29 bytes) for connection b42ea885a56fb93e3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 2286e95262f2e8f7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:48 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:48 client newly acked packets (2): [3 4] 2025/04/30 10:44:48 client updated RTT: 37.428ms (σ: 15.68ms) 2025/04/30 10:44:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:48 client Canceling loss detection timer. 2025/04/30 10:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1b1592c86d297170, StatelessResetToken: 0xe12504f20eebb596c4d2521c6ca6f7ce} 2025/04/30 10:44:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:48 client Ignoring all packets below 2. 2025/04/30 10:44:48 client -> Sending packet 5 (1366 bytes) for connection b42ea885a56fb93e3d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 2286e95262f2e8f7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.PingFrame{} 2025/04/30 10:44:48 client Sending ACK because the ACK timer expired. 2025/04/30 10:44:48 client -> Sending packet 6 (33 bytes) for connection b42ea885a56fb93e3d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 2286e95262f2e8f7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 25.419845ms} 2025/04/30 10:44:48 client <- Reading packet 4 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:48 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:48 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:48 client -> Sending packet 7 (34 bytes) for connection b42ea885a56fb93e3d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 2286e95262f2e8f7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 158.987µs} 2025/04/30 10:44:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:48 client -> Sending packet 8 (30 bytes) for connection b42ea885a56fb93e3d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:48 client Short Header{DestConnectionID: 2286e95262f2e8f7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:48 client Connection b42ea885a56fb93e3d closed. 2025/04/30 10:44:48 Requesting https://server4:443/jsjsufcptf. 2025/04/30 10:44:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:48 Increased send buffer size to 14336 kiB 2025/04/30 10:44:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:48 Created qlog file: /logs/qlog/9f793715513dc2381e5f3d.sqlog 2025/04/30 10:44:48 client Starting new connection to server4 ([::]:60169 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9f793715513dc2381e5f3d, version v1 2025/04/30 10:44:48 Adding connection ID (empty). 2025/04/30 10:44:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:48 client -> Sending packet 0 (1280 bytes) for connection 9f793715513dc2381e5f3d, Initial 2025/04/30 10:44:48 client Long Header{Type: Initial, DestConnectionID: 9f793715513dc2381e5f3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:49 client -> Sending packet 1 (1280 bytes) for connection 9f793715513dc2381e5f3d, Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: 9f793715513dc2381e5f3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:49 client -> Sending packet 2 (1280 bytes) for connection 9f793715513dc2381e5f3d, Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: 9f793715513dc2381e5f3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:44:49 client Parsed a coalesced packet. Part 1: 460 bytes. Remaining: 740 bytes. 2025/04/30 10:44:49 client <- Reading packet 0 (460 bytes) for connection (empty), Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6ad463ae59f527c2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 442, Version: v1} 2025/04/30 10:44:49 client Received first packet. Switching destination connection ID to: 6ad463ae59f527c2 2025/04/30 10:44:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:49 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 0 bytes. 2025/04/30 10:44:49 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 10:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6ad463ae59f527c2, PacketNumber: 0, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:44:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9f793715513dc2381e5f3d, InitialSourceConnectionID: 6ad463ae59f527c2, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9f793715513dc2381e5f3d 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: 6ad463ae59f527c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:49 client Long Header{Type: Handshake, DestConnectionID: 6ad463ae59f527c2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:49 client Dropping Initial keys. 2025/04/30 10:44:49 client -> Sending packet 1 (86 bytes) for connection 9f793715513dc2381e5f3d, Handshake 2025/04/30 10:44:49 client Long Header{Type: Handshake, DestConnectionID: 6ad463ae59f527c2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:49 client Short Header{DestConnectionID: 6ad463ae59f527c2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:49 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:49 client Dropping Handshake keys. 2025/04/30 10:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a1ead92238bfcea0, StatelessResetToken: 0x233f9fedf4d057febe759c6d1a0e085a} 2025/04/30 10:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e1cd19edeba7a153, StatelessResetToken: 0x05246e4156dbd9f68de32c2cc3dec45d} 2025/04/30 10:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0d5f6e2530c2eea7, StatelessResetToken: 0x3a3713c55b242b3463fcc0cb91d8b6bb} 2025/04/30 10:44:49 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:49 client -> Sending packet 1 (1366 bytes) for connection 9f793715513dc2381e5f3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:49 client Short Header{DestConnectionID: a1ead92238bfcea0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:49 client -> &wire.PingFrame{} 2025/04/30 10:44:49 client -> Sending packet 2 (34 bytes) for connection 9f793715513dc2381e5f3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:49 client Short Header{DestConnectionID: a1ead92238bfcea0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 168.935µs} 2025/04/30 10:44:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:49 client <- Reading packet 1 (24 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 19ms} 2025/04/30 10:44:49 client newly acked packets (1): [1] 2025/04/30 10:44:49 client updated RTT: 52.035594ms (σ: 26.017797ms) 2025/04/30 10:44:49 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:49 client lost packet 0 (time threshold) 2025/04/30 10:44:49 client -> Sending packet 3 (46 bytes) for connection 9f793715513dc2381e5f3d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:49 client Short Header{DestConnectionID: a1ead92238bfcea0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:49 client <- Reading packet 2 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:49 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:49 client newly acked packets (1): [3] 2025/04/30 10:44:49 client updated RTT: 49.669ms (σ: 24.243ms) 2025/04/30 10:44:49 client lost packet 2 (time threshold) 2025/04/30 10:44:49 client Canceling loss detection timer. 2025/04/30 10:44:49 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:49 client -> Sending packet 4 (34 bytes) for connection 9f793715513dc2381e5f3d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:49 client Short Header{DestConnectionID: a1ead92238bfcea0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 208.419µs} 2025/04/30 10:44:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:49 client -> Sending packet 5 (30 bytes) for connection 9f793715513dc2381e5f3d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:49 client Short Header{DestConnectionID: a1ead92238bfcea0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:49 client Connection 9f793715513dc2381e5f3d closed. 2025/04/30 10:44:49 Requesting https://server4:443/ztvutdskkj. 2025/04/30 10:44:49 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:49 Increased send buffer size to 14336 kiB 2025/04/30 10:44:49 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:49 Created qlog file: /logs/qlog/3d3700d34a6ac21940.sqlog 2025/04/30 10:44:49 client Starting new connection to server4 ([::]:46670 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3d3700d34a6ac21940, version v1 2025/04/30 10:44:49 Adding connection ID (empty). 2025/04/30 10:44:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:49 client -> Sending packet 0 (1280 bytes) for connection 3d3700d34a6ac21940, Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: 3d3700d34a6ac21940, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:49 client -> Sending packet 1 (1280 bytes) for connection 3d3700d34a6ac21940, Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: 3d3700d34a6ac21940, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:49 client -> Sending packet 2 (1280 bytes) for connection 3d3700d34a6ac21940, Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: 3d3700d34a6ac21940, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:49 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6fae2a555e80c3d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:49 client Received first packet. Switching destination connection ID to: a6fae2a555e80c3d 2025/04/30 10:44:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:49 client Queueing packet (736 bytes) for later decryption 2025/04/30 10:44:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:44:49 client -> Sending packet 3 (1280 bytes) for connection 3d3700d34a6ac21940, Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: a6fae2a555e80c3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:49 client -> Sending packet 4 (1280 bytes) for connection 3d3700d34a6ac21940, Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: a6fae2a555e80c3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:44:49 client <- Reading packet 3 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6fae2a555e80c3d, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:49 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:44:50 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6fae2a555e80c3d, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client -> Sending packet 5 (1280 bytes) for connection 3d3700d34a6ac21940, Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: a6fae2a555e80c3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:50 client <- Reading packet 2 (736 bytes) for connection (empty), Handshake 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6fae2a555e80c3d, PacketNumber: 2, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:44:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3d3700d34a6ac21940, InitialSourceConnectionID: a6fae2a555e80c3d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:50 client -> Sending packet 0 (79 bytes) for connection 3d3700d34a6ac21940, Handshake 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: a6fae2a555e80c3d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:50 client Dropping Initial keys. 2025/04/30 10:44:50 client -> Sending packet 0 (46 bytes) for connection 3d3700d34a6ac21940, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:50 client Short Header{DestConnectionID: a6fae2a555e80c3d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:50 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:44:50 client <- Reading packet 4 (736 bytes) for connection (empty), Handshake 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6fae2a555e80c3d, PacketNumber: 4, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:44:50 client -> Sending packet 1 (42 bytes) for connection 3d3700d34a6ac21940, Handshake 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: a6fae2a555e80c3d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:44:50 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:50 client Dropping Handshake keys. 2025/04/30 10:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dbfdc3b83ab7e7e7, StatelessResetToken: 0x3a3f34050d56dd44a5fc63ce6015c43d} 2025/04/30 10:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dd2f7b0b30b531db, StatelessResetToken: 0xc1b8a095f501db55fea6af0f82bca6ab} 2025/04/30 10:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d243f8086457dcf9, StatelessResetToken: 0xf9e9e4c1be5882f56208ccbb126445db} 2025/04/30 10:44:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:50 client -> Sending packet 1 (1366 bytes) for connection 3d3700d34a6ac21940, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:50 client Short Header{DestConnectionID: dbfdc3b83ab7e7e7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:50 client -> &wire.PingFrame{} 2025/04/30 10:44:50 client -> Sending packet 2 (34 bytes) for connection 3d3700d34a6ac21940, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:50 client Short Header{DestConnectionID: dbfdc3b83ab7e7e7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104.724µs} 2025/04/30 10:44:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:50 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:50 client newly acked packets (1): [0] 2025/04/30 10:44:50 client updated RTT: 35.319197ms (σ: 17.659598ms) 2025/04/30 10:44:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:50 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:50 client -> Sending packet 3 (30 bytes) for connection 3d3700d34a6ac21940, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:50 client Short Header{DestConnectionID: dbfdc3b83ab7e7e7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:50 client Connection 3d3700d34a6ac21940 closed. 2025/04/30 10:44:50 Requesting https://server4:443/xcphbpyfeu. 2025/04/30 10:44:50 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:50 Increased send buffer size to 14336 kiB 2025/04/30 10:44:50 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:50 Created qlog file: /logs/qlog/690c42bfe5109c95140f673f0218226d.sqlog 2025/04/30 10:44:50 client Starting new connection to server4 ([::]:36328 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 690c42bfe5109c95140f673f0218226d, version v1 2025/04/30 10:44:50 Adding connection ID (empty). 2025/04/30 10:44:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:50 client -> Sending packet 0 (1280 bytes) for connection 690c42bfe5109c95140f673f0218226d, Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: 690c42bfe5109c95140f673f0218226d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:44:50 client Parsed a coalesced packet. Part 1: 457 bytes. Remaining: 743 bytes. 2025/04/30 10:44:50 client <- Reading packet 0 (457 bytes) for connection (empty), Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ee3f9e6811c61a35, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 439, Version: v1} 2025/04/30 10:44:50 client Received first packet. Switching destination connection ID to: ee3f9e6811c61a35 2025/04/30 10:44:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:50 client newly acked packets (1): [0] 2025/04/30 10:44:50 client updated RTT: 37.087369ms (σ: 18.543684ms) 2025/04/30 10:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 0 bytes. 2025/04/30 10:44:50 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ee3f9e6811c61a35, PacketNumber: 0, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:44:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 690c42bfe5109c95140f673f0218226d, InitialSourceConnectionID: ee3f9e6811c61a35, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 690c42bfe5109c95140f673f0218226d 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: ee3f9e6811c61a35, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: ee3f9e6811c61a35, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:50 client Dropping Initial keys. 2025/04/30 10:44:50 client -> Sending packet 1 (40 bytes) for connection 690c42bfe5109c95140f673f0218226d, Handshake 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: ee3f9e6811c61a35, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:50 client -> Sending packet 0 (46 bytes) for connection 690c42bfe5109c95140f673f0218226d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:50 client Short Header{DestConnectionID: ee3f9e6811c61a35, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:50 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:50 client Dropping Handshake keys. 2025/04/30 10:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e9e327294efb6037, StatelessResetToken: 0x5ef3cc2ba79478a4ae5238d254bff138} 2025/04/30 10:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6cbfe2c9e6b4cc3b, StatelessResetToken: 0xf21577566522f8d33cb52be659c02553} 2025/04/30 10:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6549066873843704, StatelessResetToken: 0xe9ce65f90694c8a94e22984b793d1c99} 2025/04/30 10:44:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:50 client -> Sending packet 1 (34 bytes) for connection 690c42bfe5109c95140f673f0218226d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:50 client Short Header{DestConnectionID: e9e327294efb6037, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 160.128µs} 2025/04/30 10:44:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:50 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:50 client newly acked packets (1): [0] 2025/04/30 10:44:50 client updated RTT: 36.845ms (σ: 14.39ms) 2025/04/30 10:44:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:50 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:50 client -> Sending packet 2 (30 bytes) for connection 690c42bfe5109c95140f673f0218226d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:50 client Short Header{DestConnectionID: e9e327294efb6037, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:50 client Connection 690c42bfe5109c95140f673f0218226d closed. 2025/04/30 10:44:50 Requesting https://server4:443/ssschfidnh. 2025/04/30 10:44:50 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:50 Increased send buffer size to 14336 kiB 2025/04/30 10:44:50 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:50 Created qlog file: /logs/qlog/7c3329c546c8574e8e1beae3861b26.sqlog 2025/04/30 10:44:50 client Starting new connection to server4 ([::]:46626 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7c3329c546c8574e8e1beae3861b26, version v1 2025/04/30 10:44:50 Adding connection ID (empty). 2025/04/30 10:44:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:50 client -> Sending packet 0 (1280 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: 7c3329c546c8574e8e1beae3861b26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:50 client -> Sending packet 1 (1280 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: 7c3329c546c8574e8e1beae3861b26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:50 client -> Sending packet 2 (1280 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: 7c3329c546c8574e8e1beae3861b26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:50 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c517f7cbb11b818b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:50 client Received first packet. Switching destination connection ID to: c517f7cbb11b818b 2025/04/30 10:44:50 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:50 client newly acked packets (1): [2] 2025/04/30 10:44:50 client updated RTT: 38.899782ms (σ: 19.449891ms) 2025/04/30 10:44:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:50 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c517f7cbb11b818b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client -> Sending packet 3 (1280 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:50 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c517f7cbb11b818b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:50 client -> Sending packet 4 (1280 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Initial 2025/04/30 10:44:50 client Long Header{Type: Initial, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:50 client <- Reading packet 1 (742 bytes) for connection (empty), Handshake 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c517f7cbb11b818b, PacketNumber: 1, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:44:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7c3329c546c8574e8e1beae3861b26, InitialSourceConnectionID: c517f7cbb11b818b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:50 client -> Sending packet 0 (79 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Handshake 2025/04/30 10:44:50 client Long Header{Type: Handshake, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:50 client Dropping Initial keys. 2025/04/30 10:44:50 client -> Sending packet 0 (46 bytes) for connection 7c3329c546c8574e8e1beae3861b26, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:50 client Short Header{DestConnectionID: c517f7cbb11b818b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:51 client <- Reading packet 2 (742 bytes) for connection (empty), Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c517f7cbb11b818b, PacketNumber: 2, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:44:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:44:51 client -> Sending packet 1 (40 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:51 client -> Sending packet 2 (74 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:51 client -> Sending packet 3 (74 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:51 client <- Reading packet 3 (742 bytes) for connection (empty), Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c517f7cbb11b818b, PacketNumber: 3, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:44:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:44:51 client -> Sending packet 4 (40 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:44:51 client -> Sending packet 5 (74 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:51 client -> Sending packet 6 (74 bytes) for connection 7c3329c546c8574e8e1beae3861b26, Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: c517f7cbb11b818b, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:51 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:51 client Dropping Handshake keys. 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 647d3442b283a533, StatelessResetToken: 0x2b869ad69cbf1d9e3d14ced4f660165f} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 737da8502fbadcf6, StatelessResetToken: 0x055301d90f24933cfdeb04a158eed32d} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 68e8ca777a0bb510, StatelessResetToken: 0x49e714bc2d2b6abc2b2e29d0e6f85b31} 2025/04/30 10:44:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:51 client -> Sending packet 2 (53 bytes) for connection 7c3329c546c8574e8e1beae3861b26, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 647d3442b283a533, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 131.165µs} 2025/04/30 10:44:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:51 client -> Sending packet 3 (48 bytes) for connection 7c3329c546c8574e8e1beae3861b26, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 647d3442b283a533, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:51 client <- Reading packet 3 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:51 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 647d3442b283a533, StatelessResetToken: 0x2b869ad69cbf1d9e3d14ced4f660165f} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 737da8502fbadcf6, StatelessResetToken: 0x055301d90f24933cfdeb04a158eed32d} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 68e8ca777a0bb510, StatelessResetToken: 0x49e714bc2d2b6abc2b2e29d0e6f85b31} 2025/04/30 10:44:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:51 client Sending ACK because the ACK timer expired. 2025/04/30 10:44:51 client -> Sending packet 4 (33 bytes) for connection 7c3329c546c8574e8e1beae3861b26, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 647d3442b283a533, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.267394ms} 2025/04/30 10:44:51 client <- Reading packet 4 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:51 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 647d3442b283a533, StatelessResetToken: 0x2b869ad69cbf1d9e3d14ced4f660165f} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 737da8502fbadcf6, StatelessResetToken: 0x055301d90f24933cfdeb04a158eed32d} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 68e8ca777a0bb510, StatelessResetToken: 0x49e714bc2d2b6abc2b2e29d0e6f85b31} 2025/04/30 10:44:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:51 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:51 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7a705d6b8cdad21e, StatelessResetToken: 0xb4aadf27d516308982476ce271b35a86} 2025/04/30 10:44:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:51 client -> Sending packet 5 (32 bytes) for connection 7c3329c546c8574e8e1beae3861b26, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 647d3442b283a533, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 138.579µs} 2025/04/30 10:44:51 client <- Reading packet 6 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:51 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:51 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:51 client -> Sending packet 6 (30 bytes) for connection 7c3329c546c8574e8e1beae3861b26, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 647d3442b283a533, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:51 client Connection 7c3329c546c8574e8e1beae3861b26 closed. 2025/04/30 10:44:51 Requesting https://server4:443/apgecnuftd. 2025/04/30 10:44:51 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:51 Increased send buffer size to 14336 kiB 2025/04/30 10:44:51 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:51 Created qlog file: /logs/qlog/c36b97a0d27d39fd542469d3c19ae3cb07.sqlog 2025/04/30 10:44:51 client Starting new connection to server4 ([::]:56289 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c36b97a0d27d39fd542469d3c19ae3cb07, version v1 2025/04/30 10:44:51 Adding connection ID (empty). 2025/04/30 10:44:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:51 client -> Sending packet 0 (1280 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, Initial 2025/04/30 10:44:51 client Long Header{Type: Initial, DestConnectionID: c36b97a0d27d39fd542469d3c19ae3cb07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:44:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:51 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:51 client -> Sending packet 1 (1280 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, Initial 2025/04/30 10:44:51 client Long Header{Type: Initial, DestConnectionID: c36b97a0d27d39fd542469d3c19ae3cb07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:44:51 client -> Sending packet 2 (1280 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, Initial 2025/04/30 10:44:51 client Long Header{Type: Initial, DestConnectionID: c36b97a0d27d39fd542469d3c19ae3cb07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:44:51 client Parsed a coalesced packet. Part 1: 455 bytes. Remaining: 745 bytes. 2025/04/30 10:44:51 client <- Reading packet 0 (455 bytes) for connection (empty), Initial 2025/04/30 10:44:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ee767a566fbde3f4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 437, Version: v1} 2025/04/30 10:44:51 client Received first packet. Switching destination connection ID to: ee767a566fbde3f4 2025/04/30 10:44:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:51 client Parsed a coalesced packet. Part 2: 745 bytes. Remaining: 0 bytes. 2025/04/30 10:44:51 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ee767a566fbde3f4, PacketNumber: 0, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:44:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:44:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c36b97a0d27d39fd542469d3c19ae3cb07, InitialSourceConnectionID: ee767a566fbde3f4, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07 2025/04/30 10:44:51 client Long Header{Type: Initial, DestConnectionID: ee767a566fbde3f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: ee767a566fbde3f4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:51 client Dropping Initial keys. 2025/04/30 10:44:51 client -> Sending packet 1 (86 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, Handshake 2025/04/30 10:44:51 client Long Header{Type: Handshake, DestConnectionID: ee767a566fbde3f4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:51 client Short Header{DestConnectionID: ee767a566fbde3f4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:51 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:51 client Dropping Handshake keys. 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e51069d0999b8f0, StatelessResetToken: 0x7d03925804728742f9c0fd4586912a94} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8486ad208f4103d0, StatelessResetToken: 0xa73ce8539d9aea32340056a8d07080d5} 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e38e29aad831bb82, StatelessResetToken: 0x95fdd7e76ca3662d3e1b8819ba7466a8} 2025/04/30 10:44:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:51 client -> Sending packet 1 (1366 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.PingFrame{} 2025/04/30 10:44:51 client -> Sending packet 2 (34 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240.759µs} 2025/04/30 10:44:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:51 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:51 client newly acked packets (2): [1 2] 2025/04/30 10:44:51 client updated RTT: 32.923147ms (σ: 16.461573ms) 2025/04/30 10:44:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:51 client lost packet 0 (time threshold) 2025/04/30 10:44:51 client Canceling loss detection timer. 2025/04/30 10:44:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d325e835ac7c7873, StatelessResetToken: 0xe326e54c68d2935575b330d158789631} 2025/04/30 10:44:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:51 client Ignoring all packets below 1. 2025/04/30 10:44:51 client -> Sending packet 3 (51 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 147.646µs} 2025/04/30 10:44:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:51 client -> Sending packet 5 (46 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:51 client -> Sending packet 6 (46 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:51 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:52 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:52 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d325e835ac7c7873, StatelessResetToken: 0xe326e54c68d2935575b330d158789631} 2025/04/30 10:44:52 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:52 client -> Sending packet 7 (1409 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.PingFrame{} 2025/04/30 10:44:52 client -> Sending packet 8 (34 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 193.131µs} 2025/04/30 10:44:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:52 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:44:52 client -> Sending packet 10 (46 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:52 client -> Sending packet 11 (46 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:52 client <- Reading packet 7 (30 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:52 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:52 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 19ms} 2025/04/30 10:44:52 client newly acked packets (2): [7 11] 2025/04/30 10:44:52 client updated RTT: 35.164ms (σ: 16.827ms) 2025/04/30 10:44:52 client Canceling loss detection timer. 2025/04/30 10:44:52 client -> Sending packet 12 (1430 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.PingFrame{} 2025/04/30 10:44:52 client <- Reading packet 8 (30 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:52 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:52 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 1, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 19ms} 2025/04/30 10:44:52 client newly acked packets (1): [12] 2025/04/30 10:44:52 client updated RTT: 37.22ms (σ: 16.733ms) 2025/04/30 10:44:52 client <- Reading packet 9 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:52 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d325e835ac7c7873, StatelessResetToken: 0xe326e54c68d2935575b330d158789631} 2025/04/30 10:44:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:52 client <- Reading packet 10 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:52 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d325e835ac7c7873, StatelessResetToken: 0xe326e54c68d2935575b330d158789631} 2025/04/30 10:44:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:52 client -> Sending packet 13 (36 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 64.1µs} 2025/04/30 10:44:52 client <- Reading packet 11 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:52 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:52 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:52 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:52 client -> Sending packet 14 (30 bytes) for connection c36b97a0d27d39fd542469d3c19ae3cb07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 2e51069d0999b8f0, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:52 client Connection c36b97a0d27d39fd542469d3c19ae3cb07 closed. 2025/04/30 10:44:52 Requesting https://server4:443/yeuymzgala. 2025/04/30 10:44:52 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:52 Increased send buffer size to 14336 kiB 2025/04/30 10:44:52 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:52 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:52 Created qlog file: /logs/qlog/39845f0d336807977bfba905f64266b2ebd9b13e.sqlog 2025/04/30 10:44:52 client Starting new connection to server4 ([::]:32891 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 39845f0d336807977bfba905f64266b2ebd9b13e, version v1 2025/04/30 10:44:52 Adding connection ID (empty). 2025/04/30 10:44:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:52 client -> Sending packet 0 (1280 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e, Initial 2025/04/30 10:44:52 client Long Header{Type: Initial, DestConnectionID: 39845f0d336807977bfba905f64266b2ebd9b13e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:44:52 client Parsed a coalesced packet. Part 1: 453 bytes. Remaining: 747 bytes. 2025/04/30 10:44:52 client <- Reading packet 0 (453 bytes) for connection (empty), Initial 2025/04/30 10:44:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e7fa7003a663ab0d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 435, Version: v1} 2025/04/30 10:44:52 client Received first packet. Switching destination connection ID to: e7fa7003a663ab0d 2025/04/30 10:44:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:52 client newly acked packets (1): [0] 2025/04/30 10:44:52 client updated RTT: 37.114972ms (σ: 18.557486ms) 2025/04/30 10:44:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:52 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 0 bytes. 2025/04/30 10:44:52 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 10:44:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e7fa7003a663ab0d, PacketNumber: 0, PacketNumberLen: 1, Length: 730, Version: v1} 2025/04/30 10:44:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:44:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 39845f0d336807977bfba905f64266b2ebd9b13e, InitialSourceConnectionID: e7fa7003a663ab0d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e 2025/04/30 10:44:52 client Long Header{Type: Initial, DestConnectionID: e7fa7003a663ab0d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:52 client Long Header{Type: Handshake, DestConnectionID: e7fa7003a663ab0d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:52 client Dropping Initial keys. 2025/04/30 10:44:52 client -> Sending packet 1 (86 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e, Handshake 2025/04/30 10:44:52 client Long Header{Type: Handshake, DestConnectionID: e7fa7003a663ab0d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:52 client Short Header{DestConnectionID: e7fa7003a663ab0d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:52 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:52 client -> Sending packet 2 (74 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e, Handshake 2025/04/30 10:44:52 client Long Header{Type: Handshake, DestConnectionID: e7fa7003a663ab0d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:52 client -> Sending packet 3 (74 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e, Handshake 2025/04/30 10:44:52 client Long Header{Type: Handshake, DestConnectionID: e7fa7003a663ab0d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:52 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:52 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:52 client Dropping Handshake keys. 2025/04/30 10:44:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5dd02e41906183b1, StatelessResetToken: 0x722827ec383fa1edc50b83f3873aef94} 2025/04/30 10:44:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5871221a90919008, StatelessResetToken: 0xc4240598f8559def18ce547f52a8cd82} 2025/04/30 10:44:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 788234f3cbdd1cf9, StatelessResetToken: 0x8b7540403c427db90d341c5797e9c502} 2025/04/30 10:44:52 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:52 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:52 client -> Sending packet 2 (53 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 5dd02e41906183b1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 172.252µs} 2025/04/30 10:44:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:52 client -> Sending packet 3 (48 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 5dd02e41906183b1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:52 client <- Reading packet 5 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:52 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:52 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:52 client newly acked packets (1): [3] 2025/04/30 10:44:52 client updated RTT: 36.708ms (σ: 14.729ms) 2025/04/30 10:44:52 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:52 client Canceling loss detection timer. 2025/04/30 10:44:52 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:52 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:52 client -> Sending packet 4 (34 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 5dd02e41906183b1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 143.928µs} 2025/04/30 10:44:52 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:52 client -> Sending packet 5 (30 bytes) for connection 39845f0d336807977bfba905f64266b2ebd9b13e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:52 client Short Header{DestConnectionID: 5dd02e41906183b1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:52 client Connection 39845f0d336807977bfba905f64266b2ebd9b13e closed. 2025/04/30 10:44:52 Requesting https://server4:443/mnqbnyrdht. 2025/04/30 10:44:52 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:52 Increased send buffer size to 14336 kiB 2025/04/30 10:44:52 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:52 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:52 Created qlog file: /logs/qlog/c8beb1865d6dba79aead31.sqlog 2025/04/30 10:44:52 client Starting new connection to server4 ([::]:54122 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c8beb1865d6dba79aead31, version v1 2025/04/30 10:44:52 Adding connection ID (empty). 2025/04/30 10:44:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:52 client -> Sending packet 0 (1280 bytes) for connection c8beb1865d6dba79aead31, Initial 2025/04/30 10:44:52 client Long Header{Type: Initial, DestConnectionID: c8beb1865d6dba79aead31, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:53 client -> Sending packet 1 (1280 bytes) for connection c8beb1865d6dba79aead31, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: c8beb1865d6dba79aead31, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:53 client -> Sending packet 2 (1280 bytes) for connection c8beb1865d6dba79aead31, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: c8beb1865d6dba79aead31, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 1: 461 bytes. Remaining: 739 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (461 bytes) for connection (empty), Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 81791867e6262bdf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 443, Version: v1} 2025/04/30 10:44:53 client Received first packet. Switching destination connection ID to: 81791867e6262bdf 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 0 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 81791867e6262bdf, PacketNumber: 0, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c8beb1865d6dba79aead31, InitialSourceConnectionID: 81791867e6262bdf, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c8beb1865d6dba79aead31 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 81791867e6262bdf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: 81791867e6262bdf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:53 client Dropping Initial keys. 2025/04/30 10:44:53 client -> Sending packet 1 (40 bytes) for connection c8beb1865d6dba79aead31, Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: 81791867e6262bdf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client -> Sending packet 0 (46 bytes) for connection c8beb1865d6dba79aead31, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 81791867e6262bdf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:53 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:53 client Dropping Handshake keys. 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7991b38c69a2842b, StatelessResetToken: 0x67335be1d142b6f1c72a3081b8a7a6fe} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 06eba4f4260bf16d, StatelessResetToken: 0x8cb28d5e48f231a61ea96a8aaf3b6bfd} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0ba087e28da2b23b, StatelessResetToken: 0x261ca4a1559d9da65c6ef8045dfaf784} 2025/04/30 10:44:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:53 client -> Sending packet 1 (1366 bytes) for connection c8beb1865d6dba79aead31, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 7991b38c69a2842b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.PingFrame{} 2025/04/30 10:44:53 client -> Sending packet 2 (34 bytes) for connection c8beb1865d6dba79aead31, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 7991b38c69a2842b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 189.273µs} 2025/04/30 10:44:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:53 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client newly acked packets (3): [0 1 2] 2025/04/30 10:44:53 client updated RTT: 32.914811ms (σ: 16.457405ms) 2025/04/30 10:44:53 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:53 client Canceling loss detection timer. 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2daa5af163a1ac09, StatelessResetToken: 0x4ce64fbae2cabd41ed2ebf0717d676ac} 2025/04/30 10:44:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:53 client Ignoring all packets below 1. 2025/04/30 10:44:53 client -> Sending packet 3 (32 bytes) for connection c8beb1865d6dba79aead31, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 7991b38c69a2842b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 177µs} 2025/04/30 10:44:53 client <- Reading packet 3 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:53 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:53 client -> Sending packet 4 (30 bytes) for connection c8beb1865d6dba79aead31, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 7991b38c69a2842b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:53 client Connection c8beb1865d6dba79aead31 closed. 2025/04/30 10:44:53 Requesting https://server4:443/bymnsshgso. 2025/04/30 10:44:53 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:53 Increased send buffer size to 14336 kiB 2025/04/30 10:44:53 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:53 Created qlog file: /logs/qlog/6d14f4ce8619c66eaca4b4aa77.sqlog 2025/04/30 10:44:53 client Starting new connection to server4 ([::]:59761 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6d14f4ce8619c66eaca4b4aa77, version v1 2025/04/30 10:44:53 Adding connection ID (empty). 2025/04/30 10:44:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:53 client -> Sending packet 0 (1280 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 6d14f4ce8619c66eaca4b4aa77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:53 client -> Sending packet 1 (1280 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 6d14f4ce8619c66eaca4b4aa77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:53 client -> Sending packet 2 (1280 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 6d14f4ce8619c66eaca4b4aa77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 1: 458 bytes. Remaining: 742 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (458 bytes) for connection (empty), Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0a7031bf70519d9f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 440, Version: v1} 2025/04/30 10:44:53 client Received first packet. Switching destination connection ID to: 0a7031bf70519d9f 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 0 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a7031bf70519d9f, PacketNumber: 0, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:44:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6d14f4ce8619c66eaca4b4aa77, InitialSourceConnectionID: 0a7031bf70519d9f, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d14f4ce8619c66eaca4b4aa77 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 0a7031bf70519d9f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: 0a7031bf70519d9f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:53 client Dropping Initial keys. 2025/04/30 10:44:53 client -> Sending packet 1 (40 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: 0a7031bf70519d9f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client -> Sending packet 0 (46 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 0a7031bf70519d9f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:53 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:44:53 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:53 client Dropping Handshake keys. 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9fc22bccf7622382, StatelessResetToken: 0xf9b31fada9b063ab652795941b9731f7} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d37ced4440c1894f, StatelessResetToken: 0x69b2d3b9f667a29bf9ab00ccf827f44e} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b222d11ee31c0a5, StatelessResetToken: 0xa6f7096cb12a9ccd31bb1c072dc41cbc} 2025/04/30 10:44:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:53 client -> Sending packet 1 (1366 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 9fc22bccf7622382, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.PingFrame{} 2025/04/30 10:44:53 client -> Sending packet 2 (34 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 9fc22bccf7622382, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 262.991µs} 2025/04/30 10:44:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:53 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:53 client newly acked packets (2): [1 2] 2025/04/30 10:44:53 client updated RTT: 32.784146ms (σ: 16.392073ms) 2025/04/30 10:44:53 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:53 client lost packet 0 (time threshold) 2025/04/30 10:44:53 client Canceling loss detection timer. 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 88d2f80f5db51203, StatelessResetToken: 0x61b639bb9bdc77eddb87274510ed2de0} 2025/04/30 10:44:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:53 client Ignoring all packets below 1. 2025/04/30 10:44:53 client -> Sending packet 3 (51 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 9fc22bccf7622382, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 174.416µs} 2025/04/30 10:44:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:53 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:53 client newly acked packets (1): [3] 2025/04/30 10:44:53 client updated RTT: 32.822ms (σ: 12.37ms) 2025/04/30 10:44:53 client Canceling loss detection timer. 2025/04/30 10:44:53 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:53 client Ignoring all packets below 2. 2025/04/30 10:44:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:53 client -> Sending packet 4 (30 bytes) for connection 6d14f4ce8619c66eaca4b4aa77, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 9fc22bccf7622382, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:53 client Connection 6d14f4ce8619c66eaca4b4aa77 closed. 2025/04/30 10:44:53 Requesting https://server4:443/lemruqoqmy. 2025/04/30 10:44:53 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:53 Increased send buffer size to 14336 kiB 2025/04/30 10:44:53 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:53 Created qlog file: /logs/qlog/3d6d19c66109ed3975735ca8.sqlog 2025/04/30 10:44:53 client Starting new connection to server4 ([::]:42302 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3d6d19c66109ed3975735ca8, version v1 2025/04/30 10:44:53 Adding connection ID (empty). 2025/04/30 10:44:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:53 client -> Sending packet 0 (1280 bytes) for connection 3d6d19c66109ed3975735ca8, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 3d6d19c66109ed3975735ca8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:44:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 1: 459 bytes. Remaining: 741 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (459 bytes) for connection (empty), Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 31a2371fcf1bd7b9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 441, Version: v1} 2025/04/30 10:44:53 client Received first packet. Switching destination connection ID to: 31a2371fcf1bd7b9 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client newly acked packets (1): [0] 2025/04/30 10:44:53 client updated RTT: 37.005482ms (σ: 18.502741ms) 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 2: 741 bytes. Remaining: 0 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (741 bytes) for connection (empty), Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 31a2371fcf1bd7b9, PacketNumber: 0, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:44:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3d6d19c66109ed3975735ca8, InitialSourceConnectionID: 31a2371fcf1bd7b9, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3d6d19c66109ed3975735ca8 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 31a2371fcf1bd7b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: 31a2371fcf1bd7b9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:53 client Dropping Initial keys. 2025/04/30 10:44:53 client -> Sending packet 1 (40 bytes) for connection 3d6d19c66109ed3975735ca8, Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: 31a2371fcf1bd7b9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client -> Sending packet 0 (46 bytes) for connection 3d6d19c66109ed3975735ca8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 31a2371fcf1bd7b9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:53 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:53 client Dropping Handshake keys. 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4f5f7a400f6731ea, StatelessResetToken: 0x055b0dd7d7644fb7422e1b79f1489056} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 123669a9825221c5, StatelessResetToken: 0x09e69875ac9beb369f0800ad7fd07029} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7de245ef9dde9da8, StatelessResetToken: 0x8517ebc289d02abad056ab5769ee8950} 2025/04/30 10:44:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:53 client -> Sending packet 1 (34 bytes) for connection 3d6d19c66109ed3975735ca8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 4f5f7a400f6731ea, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 127.017µs} 2025/04/30 10:44:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:53 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client newly acked packets (1): [0] 2025/04/30 10:44:53 client updated RTT: 36.741ms (σ: 14.402ms) 2025/04/30 10:44:53 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:53 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:53 client -> Sending packet 2 (30 bytes) for connection 3d6d19c66109ed3975735ca8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 4f5f7a400f6731ea, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:53 client Connection 3d6d19c66109ed3975735ca8 closed. 2025/04/30 10:44:53 Requesting https://server4:443/ksnnimifrd. 2025/04/30 10:44:53 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:53 Increased send buffer size to 14336 kiB 2025/04/30 10:44:53 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:53 Created qlog file: /logs/qlog/8f63362345771070b6a4ece5a6d47e599d07.sqlog 2025/04/30 10:44:53 client Starting new connection to server4 ([::]:46845 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8f63362345771070b6a4ece5a6d47e599d07, version v1 2025/04/30 10:44:53 Adding connection ID (empty). 2025/04/30 10:44:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:53 client -> Sending packet 0 (1280 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 8f63362345771070b6a4ece5a6d47e599d07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:44:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:53 client -> Sending packet 1 (1280 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 8f63362345771070b6a4ece5a6d47e599d07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:44:53 client -> Sending packet 2 (1280 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 8f63362345771070b6a4ece5a6d47e599d07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a04a600e0213de63, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:44:53 client Received first packet. Switching destination connection ID to: a04a600e0213de63 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a04a600e0213de63, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8f63362345771070b6a4ece5a6d47e599d07, InitialSourceConnectionID: a04a600e0213de63, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: a04a600e0213de63, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: a04a600e0213de63, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:53 client Dropping Initial keys. 2025/04/30 10:44:53 client -> Sending packet 1 (86 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07, Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: a04a600e0213de63, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client Short Header{DestConnectionID: a04a600e0213de63, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:53 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:44:53 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:53 client Dropping Handshake keys. 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 49001b52afea10ba, StatelessResetToken: 0xa8ca6e02b773a24244df9341bb8fc772} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4cdb6b12bebfb7c8, StatelessResetToken: 0x59d4f67353eea09446580626d30e7d32} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ffbfd96cd1057665, StatelessResetToken: 0x8264c77e567515fabe1812edb2ba41e3} 2025/04/30 10:44:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:53 client -> Sending packet 1 (1366 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 49001b52afea10ba, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.PingFrame{} 2025/04/30 10:44:53 client -> Sending packet 2 (34 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 49001b52afea10ba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 199.492µs} 2025/04/30 10:44:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:53 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c6e697163aa94f46, StatelessResetToken: 0xcd1ae392f3eee4f806ca261f6e895ff4} 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:53 client newly acked packets (1): [2] 2025/04/30 10:44:53 client updated RTT: 32.873917ms (σ: 16.436958ms) 2025/04/30 10:44:53 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:53 client lost packet 0 (time threshold) 2025/04/30 10:44:53 client setting loss timer for packet 1 (1-RTT) to 36.983156ms (in 2025-04-30 10:44:53.925549672 +0000 UTC m=+19.583219484) 2025/04/30 10:44:53 client Canceling loss detection timer. 2025/04/30 10:44:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:53 client Ignoring all packets below 1. 2025/04/30 10:44:53 client -> Sending packet 3 (51 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 49001b52afea10ba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 246.087µs} 2025/04/30 10:44:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:53 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:44:53.925549672 +0000 UTC m=+19.583219484 2025/04/30 10:44:53 client lost packet 1 (time threshold) 2025/04/30 10:44:53 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:53 client newly acked packets (1): [3] 2025/04/30 10:44:53 client updated RTT: 32.913ms (σ: 12.408ms) 2025/04/30 10:44:53 client Canceling loss detection timer. 2025/04/30 10:44:53 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:53 client Ignoring all packets below 2. 2025/04/30 10:44:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:53 client -> Sending packet 4 (30 bytes) for connection 8f63362345771070b6a4ece5a6d47e599d07, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:53 client Short Header{DestConnectionID: 49001b52afea10ba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:53 client Connection 8f63362345771070b6a4ece5a6d47e599d07 closed. 2025/04/30 10:44:53 Requesting https://server4:443/doqwiprgdt. 2025/04/30 10:44:53 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:53 Increased send buffer size to 14336 kiB 2025/04/30 10:44:53 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:53 Created qlog file: /logs/qlog/4282e135b5f2e3f25cf46d81cd68d53874.sqlog 2025/04/30 10:44:53 client Starting new connection to server4 ([::]:40229 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4282e135b5f2e3f25cf46d81cd68d53874, version v1 2025/04/30 10:44:53 Adding connection ID (empty). 2025/04/30 10:44:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:53 client -> Sending packet 0 (1280 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: 4282e135b5f2e3f25cf46d81cd68d53874, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b6657bc41feacaa5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:44:53 client Received first packet. Switching destination connection ID to: b6657bc41feacaa5 2025/04/30 10:44:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client newly acked packets (1): [0] 2025/04/30 10:44:53 client updated RTT: 37.208931ms (σ: 18.604465ms) 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:44:53 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b6657bc41feacaa5, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:44:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:44:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4282e135b5f2e3f25cf46d81cd68d53874, InitialSourceConnectionID: b6657bc41feacaa5, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874 2025/04/30 10:44:53 client Long Header{Type: Initial, DestConnectionID: b6657bc41feacaa5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: b6657bc41feacaa5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:53 client Dropping Initial keys. 2025/04/30 10:44:53 client -> Sending packet 1 (86 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, Handshake 2025/04/30 10:44:53 client Long Header{Type: Handshake, DestConnectionID: b6657bc41feacaa5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:53 client Short Header{DestConnectionID: b6657bc41feacaa5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:54 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:54 client -> Sending packet 2 (74 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: b6657bc41feacaa5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:54 client -> Sending packet 3 (74 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: b6657bc41feacaa5, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:54 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:44:54 client -> Sending packet 4 (74 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: b6657bc41feacaa5, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:54 client -> Sending packet 5 (74 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: b6657bc41feacaa5, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:54 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:54 client Dropping Handshake keys. 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e924dc865e4c88f, StatelessResetToken: 0x3e669f8fdfb947af919d3cac3ae029ef} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9615ec8819e0fbb2, StatelessResetToken: 0x8699da5313cd836662eb4ddec74212a4} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 794a25575415cc56, StatelessResetToken: 0x99708eedd08fc2f4c1c327bde7144e77} 2025/04/30 10:44:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:54 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:54 client -> Sending packet 2 (53 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:54 client Short Header{DestConnectionID: 7e924dc865e4c88f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 126.897µs} 2025/04/30 10:44:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:54 client -> Sending packet 3 (48 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:54 client Short Header{DestConnectionID: 7e924dc865e4c88f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:54 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:54 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e924dc865e4c88f, StatelessResetToken: 0x3e669f8fdfb947af919d3cac3ae029ef} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9615ec8819e0fbb2, StatelessResetToken: 0x8699da5313cd836662eb4ddec74212a4} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 794a25575415cc56, StatelessResetToken: 0x99708eedd08fc2f4c1c327bde7144e77} 2025/04/30 10:44:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:54 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:54 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 964dc655255932a8, StatelessResetToken: 0x7edb8ce3e3ad1d942c6845cc7352e47e} 2025/04/30 10:44:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:54 client -> Sending packet 4 (32 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:54 client Short Header{DestConnectionID: 7e924dc865e4c88f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 81.26µs} 2025/04/30 10:44:54 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:54 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:54 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:54 client newly acked packets (1): [3] 2025/04/30 10:44:54 client updated RTT: 36.613ms (σ: 15.143ms) 2025/04/30 10:44:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:54 client Canceling loss detection timer. 2025/04/30 10:44:54 client <- Reading packet 5 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:54 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:54 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:54 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:54 client -> Sending packet 5 (30 bytes) for connection 4282e135b5f2e3f25cf46d81cd68d53874, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:54 client Short Header{DestConnectionID: 7e924dc865e4c88f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:54 client Connection 4282e135b5f2e3f25cf46d81cd68d53874 closed. 2025/04/30 10:44:54 Requesting https://server4:443/fqzcvkjfuu. 2025/04/30 10:44:54 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:54 Increased send buffer size to 14336 kiB 2025/04/30 10:44:54 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:54 Created qlog file: /logs/qlog/4b757eb664e14fa732ff3d67082f133124.sqlog 2025/04/30 10:44:54 client Starting new connection to server4 ([::]:58793 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4b757eb664e14fa732ff3d67082f133124, version v1 2025/04/30 10:44:54 Adding connection ID (empty). 2025/04/30 10:44:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:54 client -> Sending packet 0 (1280 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, Initial 2025/04/30 10:44:54 client Long Header{Type: Initial, DestConnectionID: 4b757eb664e14fa732ff3d67082f133124, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:54 client -> Sending packet 1 (1280 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, Initial 2025/04/30 10:44:54 client Long Header{Type: Initial, DestConnectionID: 4b757eb664e14fa732ff3d67082f133124, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:54 client -> Sending packet 2 (1280 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, Initial 2025/04/30 10:44:54 client Long Header{Type: Initial, DestConnectionID: 4b757eb664e14fa732ff3d67082f133124, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:54 client Parsed a coalesced packet. Part 1: 455 bytes. Remaining: 745 bytes. 2025/04/30 10:44:54 client <- Reading packet 0 (455 bytes) for connection (empty), Initial 2025/04/30 10:44:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 64b2d8cf536022bf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 437, Version: v1} 2025/04/30 10:44:54 client Received first packet. Switching destination connection ID to: 64b2d8cf536022bf 2025/04/30 10:44:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:54 client Parsed a coalesced packet. Part 2: 745 bytes. Remaining: 0 bytes. 2025/04/30 10:44:54 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 64b2d8cf536022bf, PacketNumber: 0, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:44:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:44:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4b757eb664e14fa732ff3d67082f133124, InitialSourceConnectionID: 64b2d8cf536022bf, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4b757eb664e14fa732ff3d67082f133124 2025/04/30 10:44:54 client Long Header{Type: Initial, DestConnectionID: 64b2d8cf536022bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: 64b2d8cf536022bf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:54 client Dropping Initial keys. 2025/04/30 10:44:54 client -> Sending packet 1 (40 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: 64b2d8cf536022bf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:54 client -> Sending packet 0 (46 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:54 client Short Header{DestConnectionID: 64b2d8cf536022bf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:54 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:44:54 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:54 client -> Sending packet 2 (74 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: 64b2d8cf536022bf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:54 client -> Sending packet 3 (74 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: 64b2d8cf536022bf, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:54 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: adc60dce9650f2d2, StatelessResetToken: 0x6522be922a6cee048cdf354e6f610430} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c7e1c1a8721d5273, StatelessResetToken: 0xfeb614ee56411f28a8194a156b62f5f3} 2025/04/30 10:44:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5db537df81966f77, StatelessResetToken: 0x0847dcbef1b6f7e3de553d022ba3ff27} 2025/04/30 10:44:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:54 client -> Sending packet 1 (34 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:54 client Short Header{DestConnectionID: adc60dce9650f2d2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 111.218µs} 2025/04/30 10:44:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:54 client <- Reading packet 3 (24 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:54 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:54 client Dropping Handshake keys. 2025/04/30 10:44:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:54 client newly acked packets (1): [1] 2025/04/30 10:44:54 client updated RTT: 36.681274ms (σ: 18.340637ms) 2025/04/30 10:44:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:54 client lost packet 0 (time threshold) 2025/04/30 10:44:54 client Canceling loss detection timer. 2025/04/30 10:44:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:54 client Ignoring all packets below 2. 2025/04/30 10:44:54 client -> Sending packet 2 (51 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:54 client Short Header{DestConnectionID: adc60dce9650f2d2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 145.982µs} 2025/04/30 10:44:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:54 client <- Reading packet 5 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:54 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:54 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:54 client newly acked packets (1): [2] 2025/04/30 10:44:54 client updated RTT: 36.25ms (σ: 14.615ms) 2025/04/30 10:44:54 client Canceling loss detection timer. 2025/04/30 10:44:54 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:54 client Ignoring all packets below 4. 2025/04/30 10:44:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:54 client -> Sending packet 3 (30 bytes) for connection 4b757eb664e14fa732ff3d67082f133124, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:54 client Short Header{DestConnectionID: adc60dce9650f2d2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:54 client Connection 4b757eb664e14fa732ff3d67082f133124 closed. 2025/04/30 10:44:54 Requesting https://server4:443/dzdrnlgemn. 2025/04/30 10:44:54 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:54 Increased send buffer size to 14336 kiB 2025/04/30 10:44:54 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:54 Created qlog file: /logs/qlog/82db85b8ba163ae554dcbf46cff7bf706e.sqlog 2025/04/30 10:44:54 client Starting new connection to server4 ([::]:53660 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 82db85b8ba163ae554dcbf46cff7bf706e, version v1 2025/04/30 10:44:54 Adding connection ID (empty). 2025/04/30 10:44:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:54 client -> Sending packet 0 (1280 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, Initial 2025/04/30 10:44:54 client Long Header{Type: Initial, DestConnectionID: 82db85b8ba163ae554dcbf46cff7bf706e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:44:54 client Parsed a coalesced packet. Part 1: 455 bytes. Remaining: 745 bytes. 2025/04/30 10:44:54 client <- Reading packet 0 (455 bytes) for connection (empty), Initial 2025/04/30 10:44:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28aa4662e54bafef, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 437, Version: v1} 2025/04/30 10:44:54 client Received first packet. Switching destination connection ID to: 28aa4662e54bafef 2025/04/30 10:44:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:54 client newly acked packets (1): [0] 2025/04/30 10:44:54 client updated RTT: 37.186384ms (σ: 18.593192ms) 2025/04/30 10:44:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:54 client Parsed a coalesced packet. Part 2: 745 bytes. Remaining: 0 bytes. 2025/04/30 10:44:54 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 28aa4662e54bafef, PacketNumber: 0, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:44:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:44:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 82db85b8ba163ae554dcbf46cff7bf706e, InitialSourceConnectionID: 28aa4662e54bafef, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e 2025/04/30 10:44:54 client Long Header{Type: Initial, DestConnectionID: 28aa4662e54bafef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: 28aa4662e54bafef, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:54 client Dropping Initial keys. 2025/04/30 10:44:54 client -> Sending packet 1 (40 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, Handshake 2025/04/30 10:44:54 client Long Header{Type: Handshake, DestConnectionID: 28aa4662e54bafef, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:54 client -> Sending packet 0 (46 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:54 client Short Header{DestConnectionID: 28aa4662e54bafef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:55 client -> Sending packet 2 (74 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, Handshake 2025/04/30 10:44:55 client Long Header{Type: Handshake, DestConnectionID: 28aa4662e54bafef, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:55 client -> Sending packet 3 (74 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, Handshake 2025/04/30 10:44:55 client Long Header{Type: Handshake, DestConnectionID: 28aa4662e54bafef, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:55 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:55 client Dropping Handshake keys. 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b86d568c626a3b47, StatelessResetToken: 0xfa54b41cb0a7d0e7db7e6ecb9bfcaf53} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f546db15371d2a96, StatelessResetToken: 0x6ce3fc75c48067f10e92f76b100ac972} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c19bd7dc8738904, StatelessResetToken: 0x4a3c0ab9f231e2c659582327dfd5102d} 2025/04/30 10:44:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:55 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:55 client -> Sending packet 2 (53 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:55 client Short Header{DestConnectionID: b86d568c626a3b47, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 120.385µs} 2025/04/30 10:44:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:55 client -> Sending packet 3 (48 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:55 client Short Header{DestConnectionID: b86d568c626a3b47, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:55 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:55 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c4c65ca280a46395, StatelessResetToken: 0x1634ee98fa4a4c4d448d4e9b224e6ccb} 2025/04/30 10:44:55 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:55 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:55 client newly acked packets (1): [3] 2025/04/30 10:44:55 client updated RTT: 36.738ms (σ: 14.839ms) 2025/04/30 10:44:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:55 client Canceling loss detection timer. 2025/04/30 10:44:55 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:55 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:44:55 client -> Sending packet 4 (32 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:55 client Short Header{DestConnectionID: b86d568c626a3b47, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 103.142µs} 2025/04/30 10:44:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:55 client -> Sending packet 5 (30 bytes) for connection 82db85b8ba163ae554dcbf46cff7bf706e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:55 client Short Header{DestConnectionID: b86d568c626a3b47, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:55 client Connection 82db85b8ba163ae554dcbf46cff7bf706e closed. 2025/04/30 10:44:55 Requesting https://server4:443/gsbbaccmdy. 2025/04/30 10:44:55 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:55 Increased send buffer size to 14336 kiB 2025/04/30 10:44:55 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:55 Created qlog file: /logs/qlog/8482ecf5a2f62e213241794f8cb3.sqlog 2025/04/30 10:44:55 client Starting new connection to server4 ([::]:57319 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8482ecf5a2f62e213241794f8cb3, version v1 2025/04/30 10:44:55 Adding connection ID (empty). 2025/04/30 10:44:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:55 client -> Sending packet 0 (1280 bytes) for connection 8482ecf5a2f62e213241794f8cb3, Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: 8482ecf5a2f62e213241794f8cb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:44:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:44:55 client Parsed a coalesced packet. Part 1: 457 bytes. Remaining: 743 bytes. 2025/04/30 10:44:55 client <- Reading packet 0 (457 bytes) for connection (empty), Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 21f7169ff3b189db, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 439, Version: v1} 2025/04/30 10:44:55 client Received first packet. Switching destination connection ID to: 21f7169ff3b189db 2025/04/30 10:44:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:55 client newly acked packets (1): [0] 2025/04/30 10:44:55 client updated RTT: 36.981319ms (σ: 18.490659ms) 2025/04/30 10:44:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:55 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 0 bytes. 2025/04/30 10:44:55 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 10:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 21f7169ff3b189db, PacketNumber: 0, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:44:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:44:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8482ecf5a2f62e213241794f8cb3, InitialSourceConnectionID: 21f7169ff3b189db, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8482ecf5a2f62e213241794f8cb3 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: 21f7169ff3b189db, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:55 client Long Header{Type: Handshake, DestConnectionID: 21f7169ff3b189db, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:55 client Dropping Initial keys. 2025/04/30 10:44:55 client -> Sending packet 1 (40 bytes) for connection 8482ecf5a2f62e213241794f8cb3, Handshake 2025/04/30 10:44:55 client Long Header{Type: Handshake, DestConnectionID: 21f7169ff3b189db, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:55 client -> Sending packet 0 (46 bytes) for connection 8482ecf5a2f62e213241794f8cb3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:55 client Short Header{DestConnectionID: 21f7169ff3b189db, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:55 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:55 client Dropping Handshake keys. 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1d72fb2aab9aa8cf, StatelessResetToken: 0x1a859013ca013e0e630803203e6d06d2} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f480c9c286afd98b, StatelessResetToken: 0xbfdaa94a467d5d70c7aae0e2478cc313} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ab89fa805aed4a21, StatelessResetToken: 0x1ebe13144c886368b72f23ffa3f7ac6d} 2025/04/30 10:44:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:55 client -> Sending packet 1 (34 bytes) for connection 8482ecf5a2f62e213241794f8cb3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:55 client Short Header{DestConnectionID: 1d72fb2aab9aa8cf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 172.312µs} 2025/04/30 10:44:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:55 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:55 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:55 client newly acked packets (1): [0] 2025/04/30 10:44:55 client updated RTT: 36.728ms (σ: 14.372ms) 2025/04/30 10:44:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:55 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:55 client -> Sending packet 2 (30 bytes) for connection 8482ecf5a2f62e213241794f8cb3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:55 client Short Header{DestConnectionID: 1d72fb2aab9aa8cf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:55 client Connection 8482ecf5a2f62e213241794f8cb3 closed. 2025/04/30 10:44:55 Requesting https://server4:443/xuvsbduqum. 2025/04/30 10:44:55 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:55 Increased send buffer size to 14336 kiB 2025/04/30 10:44:55 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:55 Created qlog file: /logs/qlog/dbf45f9e11d26f1296.sqlog 2025/04/30 10:44:55 client Starting new connection to server4 ([::]:45316 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dbf45f9e11d26f1296, version v1 2025/04/30 10:44:55 Adding connection ID (empty). 2025/04/30 10:44:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:55 client -> Sending packet 0 (1280 bytes) for connection dbf45f9e11d26f1296, Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: dbf45f9e11d26f1296, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:55 client -> Sending packet 1 (1280 bytes) for connection dbf45f9e11d26f1296, Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: dbf45f9e11d26f1296, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:55 client -> Sending packet 2 (1280 bytes) for connection dbf45f9e11d26f1296, Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: dbf45f9e11d26f1296, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:44:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:55 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e95b9eb6885a533e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:55 client Received first packet. Switching destination connection ID to: e95b9eb6885a533e 2025/04/30 10:44:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:55 client -> Sending packet 3 (1280 bytes) for connection dbf45f9e11d26f1296, Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: e95b9eb6885a533e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:55 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e95b9eb6885a533e, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:55 client -> Sending packet 4 (1280 bytes) for connection dbf45f9e11d26f1296, Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: e95b9eb6885a533e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:44:55 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e95b9eb6885a533e, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:44:55 client newly acked packets (1): [2] 2025/04/30 10:44:55 client -> Sending packet 5 (1280 bytes) for connection dbf45f9e11d26f1296, Initial 2025/04/30 10:44:55 client Long Header{Type: Initial, DestConnectionID: e95b9eb6885a533e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:44:55 client <- Reading packet 3 (738 bytes) for connection (empty), Handshake 2025/04/30 10:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e95b9eb6885a533e, PacketNumber: 3, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:44:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:44:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dbf45f9e11d26f1296, InitialSourceConnectionID: e95b9eb6885a533e, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:55 client -> Sending packet 0 (79 bytes) for connection dbf45f9e11d26f1296, Handshake 2025/04/30 10:44:55 client Long Header{Type: Handshake, DestConnectionID: e95b9eb6885a533e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:55 client Dropping Initial keys. 2025/04/30 10:44:55 client -> Sending packet 0 (46 bytes) for connection dbf45f9e11d26f1296, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:55 client Short Header{DestConnectionID: e95b9eb6885a533e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:55 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:55 client Dropping Handshake keys. 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d438780bb4060dc, StatelessResetToken: 0x223b35171118ea6d490c11401b513b23} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55e9a72b21ef810e, StatelessResetToken: 0x232ebdc50775b6d24ab1d5a1e20109ce} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6e82276c2010b512, StatelessResetToken: 0x81234f97b711a2d1be6bec2e583d5b23} 2025/04/30 10:44:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:55 client -> Sending packet 1 (1366 bytes) for connection dbf45f9e11d26f1296, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:55 client Short Header{DestConnectionID: 4d438780bb4060dc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.PingFrame{} 2025/04/30 10:44:55 client -> Sending packet 2 (34 bytes) for connection dbf45f9e11d26f1296, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:55 client Short Header{DestConnectionID: 4d438780bb4060dc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 232.261µs} 2025/04/30 10:44:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:55 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 62c9dbddc1c60856, StatelessResetToken: 0x3899fa51d4427554373e1b8edb2cf5bf} 2025/04/30 10:44:55 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:55 client -> Sending packet 3 (34 bytes) for connection dbf45f9e11d26f1296, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:55 client Short Header{DestConnectionID: 4d438780bb4060dc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 108.712µs} 2025/04/30 10:44:55 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:55 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 62c9dbddc1c60856, StatelessResetToken: 0x3899fa51d4427554373e1b8edb2cf5bf} 2025/04/30 10:44:55 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:55 client newly acked packets (2): [1 2] 2025/04/30 10:44:55 client updated RTT: 146.982858ms (σ: 73.491429ms) 2025/04/30 10:44:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:55 client lost packet 0 (time threshold) 2025/04/30 10:44:55 client Canceling loss detection timer. 2025/04/30 10:44:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:55 client Ignoring all packets below 1. 2025/04/30 10:44:55 client -> Sending packet 4 (51 bytes) for connection dbf45f9e11d26f1296, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:55 client Short Header{DestConnectionID: 4d438780bb4060dc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:55 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 186.145µs} 2025/04/30 10:44:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:56 client <- Reading packet 5 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:56 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:56 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:56 client -> Sending packet 5 (34 bytes) for connection dbf45f9e11d26f1296, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:56 client Short Header{DestConnectionID: 4d438780bb4060dc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:56 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 164.346µs} 2025/04/30 10:44:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:56 client -> Sending packet 6 (30 bytes) for connection dbf45f9e11d26f1296, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:56 client Short Header{DestConnectionID: 4d438780bb4060dc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:56 client Connection dbf45f9e11d26f1296 closed. 2025/04/30 10:44:56 Requesting https://server4:443/izmwdzqttd. 2025/04/30 10:44:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:56 Increased send buffer size to 14336 kiB 2025/04/30 10:44:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:56 Created qlog file: /logs/qlog/9aaa2027d55619ce3cbaddd9.sqlog 2025/04/30 10:44:56 client Starting new connection to server4 ([::]:59846 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9aaa2027d55619ce3cbaddd9, version v1 2025/04/30 10:44:56 Adding connection ID (empty). 2025/04/30 10:44:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:56 client -> Sending packet 0 (1280 bytes) for connection 9aaa2027d55619ce3cbaddd9, Initial 2025/04/30 10:44:56 client Long Header{Type: Initial, DestConnectionID: 9aaa2027d55619ce3cbaddd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:56 client -> Sending packet 1 (1280 bytes) for connection 9aaa2027d55619ce3cbaddd9, Initial 2025/04/30 10:44:56 client Long Header{Type: Initial, DestConnectionID: 9aaa2027d55619ce3cbaddd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:56 client -> Sending packet 2 (1280 bytes) for connection 9aaa2027d55619ce3cbaddd9, Initial 2025/04/30 10:44:56 client Long Header{Type: Initial, DestConnectionID: 9aaa2027d55619ce3cbaddd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:44:56 client -> Sending packet 3 (1280 bytes) for connection 9aaa2027d55619ce3cbaddd9, Initial 2025/04/30 10:44:56 client Long Header{Type: Initial, DestConnectionID: 9aaa2027d55619ce3cbaddd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:56 client -> Sending packet 4 (1280 bytes) for connection 9aaa2027d55619ce3cbaddd9, Initial 2025/04/30 10:44:56 client Long Header{Type: Initial, DestConnectionID: 9aaa2027d55619ce3cbaddd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:44:56 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cda295b75142a14f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:56 client Received first packet. Switching destination connection ID to: cda295b75142a14f 2025/04/30 10:44:56 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:56 client newly acked packets (1): [4] 2025/04/30 10:44:56 client updated RTT: 38.192101ms (σ: 19.09605ms) 2025/04/30 10:44:57 client Queueing packet (739 bytes) for later decryption 2025/04/30 10:44:57 client Queueing packet (739 bytes) for later decryption 2025/04/30 10:44:57 client -> Sending packet 5 (1280 bytes) for connection 9aaa2027d55619ce3cbaddd9, Initial 2025/04/30 10:44:57 client Long Header{Type: Initial, DestConnectionID: cda295b75142a14f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:57 client -> &wire.PingFrame{} 2025/04/30 10:44:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:57 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cda295b75142a14f, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:57 client -> Sending packet 6 (1280 bytes) for connection 9aaa2027d55619ce3cbaddd9, Initial 2025/04/30 10:44:57 client Long Header{Type: Initial, DestConnectionID: cda295b75142a14f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:57 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:44:57 client <- Reading packet 1 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cda295b75142a14f, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9aaa2027d55619ce3cbaddd9, InitialSourceConnectionID: cda295b75142a14f, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:57 client <- Reading packet 2 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cda295b75142a14f, PacketNumber: 2, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:57 client -> Sending packet 0 (79 bytes) for connection 9aaa2027d55619ce3cbaddd9, Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: cda295b75142a14f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:57 client Dropping Initial keys. 2025/04/30 10:44:57 client -> Sending packet 0 (46 bytes) for connection 9aaa2027d55619ce3cbaddd9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:57 client Short Header{DestConnectionID: cda295b75142a14f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:57 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:44:57 client <- Reading packet 3 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cda295b75142a14f, PacketNumber: 3, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:57 client -> Sending packet 1 (40 bytes) for connection 9aaa2027d55619ce3cbaddd9, Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: cda295b75142a14f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:57 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:57 client Dropping Handshake keys. 2025/04/30 10:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 956c7b60a0640a72, StatelessResetToken: 0xaed05b2f5f20ff99f26dfe923138190f} 2025/04/30 10:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d96fe6a24e5ea3d4, StatelessResetToken: 0x0414c3946d8287a84b3a595ef059a948} 2025/04/30 10:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dea497c8e3fc3b70, StatelessResetToken: 0xaf7cfad62d86ddc1721776eb20d6cd4d} 2025/04/30 10:44:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:57 client -> Sending packet 1 (34 bytes) for connection 9aaa2027d55619ce3cbaddd9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:57 client Short Header{DestConnectionID: 956c7b60a0640a72, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 101.209µs} 2025/04/30 10:44:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:57 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:57 client newly acked packets (1): [0] 2025/04/30 10:44:57 client updated RTT: 37.804ms (σ: 15.096ms) 2025/04/30 10:44:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:57 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:57 client -> Sending packet 2 (30 bytes) for connection 9aaa2027d55619ce3cbaddd9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:57 client Short Header{DestConnectionID: 956c7b60a0640a72, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:57 client Connection 9aaa2027d55619ce3cbaddd9 closed. 2025/04/30 10:44:57 Requesting https://server4:443/udkihsabur. 2025/04/30 10:44:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:57 Increased send buffer size to 14336 kiB 2025/04/30 10:44:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:57 Created qlog file: /logs/qlog/12e0b524ae4dffe537b46fb0281762580fa1db52.sqlog 2025/04/30 10:44:57 client Starting new connection to server4 ([::]:46610 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 12e0b524ae4dffe537b46fb0281762580fa1db52, version v1 2025/04/30 10:44:57 Adding connection ID (empty). 2025/04/30 10:44:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:57 client -> Sending packet 0 (1280 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, Initial 2025/04/30 10:44:57 client Long Header{Type: Initial, DestConnectionID: 12e0b524ae4dffe537b46fb0281762580fa1db52, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:44:57 client Parsed a coalesced packet. Part 1: 452 bytes. Remaining: 748 bytes. 2025/04/30 10:44:57 client <- Reading packet 0 (452 bytes) for connection (empty), Initial 2025/04/30 10:44:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 50a85620ed9dfcd7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 434, Version: v1} 2025/04/30 10:44:57 client Received first packet. Switching destination connection ID to: 50a85620ed9dfcd7 2025/04/30 10:44:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:57 client newly acked packets (1): [0] 2025/04/30 10:44:57 client updated RTT: 36.953691ms (σ: 18.476845ms) 2025/04/30 10:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:57 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 0 bytes. 2025/04/30 10:44:57 client <- Reading packet 0 (748 bytes) for connection (empty), Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 50a85620ed9dfcd7, PacketNumber: 0, PacketNumberLen: 1, Length: 731, Version: v1} 2025/04/30 10:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 10:44:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 12e0b524ae4dffe537b46fb0281762580fa1db52, InitialSourceConnectionID: 50a85620ed9dfcd7, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52 2025/04/30 10:44:57 client Long Header{Type: Initial, DestConnectionID: 50a85620ed9dfcd7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: 50a85620ed9dfcd7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:57 client Dropping Initial keys. 2025/04/30 10:44:57 client -> Sending packet 1 (40 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: 50a85620ed9dfcd7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:57 client -> Sending packet 0 (46 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:57 client Short Header{DestConnectionID: 50a85620ed9dfcd7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:57 client -> Sending packet 2 (74 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: 50a85620ed9dfcd7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:57 client -> Sending packet 3 (74 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, Handshake 2025/04/30 10:44:57 client Long Header{Type: Handshake, DestConnectionID: 50a85620ed9dfcd7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:57 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:57 client Dropping Handshake keys. 2025/04/30 10:44:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:57 client -> Sending packet 2 (51 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:57 client Short Header{DestConnectionID: 50a85620ed9dfcd7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 128.249µs} 2025/04/30 10:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:57 client -> Sending packet 3 (46 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:57 client Short Header{DestConnectionID: 50a85620ed9dfcd7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:57 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 67f1e3e2e5e919db, StatelessResetToken: 0x9c40eb3fcc78f40a03b4340fc2b4a285} 2025/04/30 10:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ef80428ecbecb60d, StatelessResetToken: 0x1138266a242cf508bf71c075c46942c2} 2025/04/30 10:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 615cd5b62bba29bb, StatelessResetToken: 0x25639c2ee78d87041909d4735bfb94f8} 2025/04/30 10:44:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:57 client -> Sending packet 4 (34 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:57 client Short Header{DestConnectionID: 67f1e3e2e5e919db, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 63.245µs} 2025/04/30 10:44:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:57 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:44:57 client newly acked packets (1): [3] 2025/04/30 10:44:57 client updated RTT: 36.504ms (σ: 14.754ms) 2025/04/30 10:44:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:57 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:57 client -> Sending packet 5 (30 bytes) for connection 12e0b524ae4dffe537b46fb0281762580fa1db52, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:57 client Short Header{DestConnectionID: 67f1e3e2e5e919db, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:57 client Connection 12e0b524ae4dffe537b46fb0281762580fa1db52 closed. 2025/04/30 10:44:57 Requesting https://server4:443/llxvygzzfg. 2025/04/30 10:44:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:57 Increased send buffer size to 14336 kiB 2025/04/30 10:44:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:57 Created qlog file: /logs/qlog/65829dc85ccd791179c426279e67fe810e24bf.sqlog 2025/04/30 10:44:57 client Starting new connection to server4 ([::]:48573 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 65829dc85ccd791179c426279e67fe810e24bf, version v1 2025/04/30 10:44:57 Adding connection ID (empty). 2025/04/30 10:44:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:57 client -> Sending packet 0 (1280 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, Initial 2025/04/30 10:44:57 client Long Header{Type: Initial, DestConnectionID: 65829dc85ccd791179c426279e67fe810e24bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:44:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:58 client -> Sending packet 1 (1280 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: 65829dc85ccd791179c426279e67fe810e24bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:44:58 client -> Sending packet 2 (1280 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: 65829dc85ccd791179c426279e67fe810e24bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:58 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c02b25b2ff578db8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:44:58 client Received first packet. Switching destination connection ID to: c02b25b2ff578db8 2025/04/30 10:44:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:44:58 client newly acked packets (1): [2] 2025/04/30 10:44:58 client updated RTT: 34.503195ms (σ: 17.251597ms) 2025/04/30 10:44:58 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c02b25b2ff578db8, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:58 client -> Sending packet 3 (1280 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: c02b25b2ff578db8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:58 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 10:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c02b25b2ff578db8, PacketNumber: 1, PacketNumberLen: 1, Length: 731, Version: v1} 2025/04/30 10:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 10:44:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 65829dc85ccd791179c426279e67fe810e24bf, InitialSourceConnectionID: c02b25b2ff578db8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:58 client -> Sending packet 0 (79 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, Handshake 2025/04/30 10:44:58 client Long Header{Type: Handshake, DestConnectionID: c02b25b2ff578db8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:58 client Dropping Initial keys. 2025/04/30 10:44:58 client -> Sending packet 0 (46 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:58 client Short Header{DestConnectionID: c02b25b2ff578db8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:44:58 client -> Sending packet 1 (74 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, Handshake 2025/04/30 10:44:58 client Long Header{Type: Handshake, DestConnectionID: c02b25b2ff578db8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:58 client -> Sending packet 2 (74 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, Handshake 2025/04/30 10:44:58 client Long Header{Type: Handshake, DestConnectionID: c02b25b2ff578db8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:58 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:58 client Dropping Handshake keys. 2025/04/30 10:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 88ede9f7fa480e30, StatelessResetToken: 0x4d2e5fe0bb180052ad1011cf26971455} 2025/04/30 10:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 12a9ffa84956da96, StatelessResetToken: 0x0af7a280b1372949615850fb4f6b1722} 2025/04/30 10:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b48c535976ef902e, StatelessResetToken: 0x368bb71212f5e681dc6a0710edfc4565} 2025/04/30 10:44:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:58 client -> Sending packet 2 (53 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:58 client Short Header{DestConnectionID: 88ede9f7fa480e30, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 164.507µs} 2025/04/30 10:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:58 client -> Sending packet 3 (48 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:58 client Short Header{DestConnectionID: 88ede9f7fa480e30, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:58 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 61110b409714100a, StatelessResetToken: 0xa0c938555e51a0be373200ebaa00b693} 2025/04/30 10:44:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:58 client -> Sending packet 4 (34 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:58 client Short Header{DestConnectionID: 88ede9f7fa480e30, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 94.126µs} 2025/04/30 10:44:58 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:58 client newly acked packets (1): [3] 2025/04/30 10:44:58 client updated RTT: 34.222ms (σ: 13.498ms) 2025/04/30 10:44:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:58 client Canceling loss detection timer. 2025/04/30 10:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:58 client <- Reading packet 6 (108 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 88ede9f7fa480e30, StatelessResetToken: 0x4d2e5fe0bb180052ad1011cf26971455} 2025/04/30 10:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 12a9ffa84956da96, StatelessResetToken: 0x0af7a280b1372949615850fb4f6b1722} 2025/04/30 10:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b48c535976ef902e, StatelessResetToken: 0x368bb71212f5e681dc6a0710edfc4565} 2025/04/30 10:44:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:58 client -> Sending packet 5 (36 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:58 client Short Header{DestConnectionID: 88ede9f7fa480e30, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:58 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 165.258µs} 2025/04/30 10:44:58 client <- Reading packet 7 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:58 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:58 client -> Sending packet 6 (30 bytes) for connection 65829dc85ccd791179c426279e67fe810e24bf, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:58 client Short Header{DestConnectionID: 88ede9f7fa480e30, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:58 client Connection 65829dc85ccd791179c426279e67fe810e24bf closed. 2025/04/30 10:44:58 Requesting https://server4:443/ghgnuevkio. 2025/04/30 10:44:58 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:58 Increased send buffer size to 14336 kiB 2025/04/30 10:44:58 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:58 Created qlog file: /logs/qlog/78bb76bfb8e9f674552478.sqlog 2025/04/30 10:44:58 client Starting new connection to server4 ([::]:53079 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 78bb76bfb8e9f674552478, version v1 2025/04/30 10:44:58 Adding connection ID (empty). 2025/04/30 10:44:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:58 client -> Sending packet 0 (1280 bytes) for connection 78bb76bfb8e9f674552478, Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: 78bb76bfb8e9f674552478, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:44:58 client -> Sending packet 1 (1280 bytes) for connection 78bb76bfb8e9f674552478, Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: 78bb76bfb8e9f674552478, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:58 client -> Sending packet 2 (1280 bytes) for connection 78bb76bfb8e9f674552478, Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: 78bb76bfb8e9f674552478, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:44:58 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 696f6a76acd35d23, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:58 client Received first packet. Switching destination connection ID to: 696f6a76acd35d23 2025/04/30 10:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:58 client -> Sending packet 3 (1280 bytes) for connection 78bb76bfb8e9f674552478, Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: 696f6a76acd35d23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:58 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 696f6a76acd35d23, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:44:58 client newly acked packets (1): [2] 2025/04/30 10:44:58 client updated RTT: 70.577179ms (σ: 35.288589ms) 2025/04/30 10:44:58 client -> Sending packet 4 (1280 bytes) for connection 78bb76bfb8e9f674552478, Initial 2025/04/30 10:44:58 client Long Header{Type: Initial, DestConnectionID: 696f6a76acd35d23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:44:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:59 client <- Reading packet 2 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 696f6a76acd35d23, PacketNumber: 2, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 78bb76bfb8e9f674552478, InitialSourceConnectionID: 696f6a76acd35d23, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:59 client -> Sending packet 0 (79 bytes) for connection 78bb76bfb8e9f674552478, Handshake 2025/04/30 10:44:59 client Long Header{Type: Handshake, DestConnectionID: 696f6a76acd35d23, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:44:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:59 client Dropping Initial keys. 2025/04/30 10:44:59 client -> Sending packet 0 (46 bytes) for connection 78bb76bfb8e9f674552478, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:59 client Short Header{DestConnectionID: 696f6a76acd35d23, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:59 client <- Reading packet 3 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 696f6a76acd35d23, PacketNumber: 3, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:59 client -> Sending packet 1 (40 bytes) for connection 78bb76bfb8e9f674552478, Handshake 2025/04/30 10:44:59 client Long Header{Type: Handshake, DestConnectionID: 696f6a76acd35d23, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:59 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:44:59 client <- Reading packet 4 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 696f6a76acd35d23, PacketNumber: 4, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:59 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:59 client Dropping Handshake keys. 2025/04/30 10:44:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b36bd49177dcacd8, StatelessResetToken: 0xdb37507f91863865f5b3999fa59947f6} 2025/04/30 10:44:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 50f199b7bdb2af84, StatelessResetToken: 0x53a11975a8bb42333018c49999225db9} 2025/04/30 10:44:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 21f9580fd8bdb36a, StatelessResetToken: 0xa013ca3c63ecbe9b157059e03ee5e379} 2025/04/30 10:44:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:59 client -> Sending packet 1 (34 bytes) for connection 78bb76bfb8e9f674552478, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:59 client Short Header{DestConnectionID: b36bd49177dcacd8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 146.965µs} 2025/04/30 10:44:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:59 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:59 client newly acked packets (1): [0] 2025/04/30 10:44:59 client updated RTT: 66.009ms (σ: 35.6ms) 2025/04/30 10:44:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:59 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:59 client -> Sending packet 2 (30 bytes) for connection 78bb76bfb8e9f674552478, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:59 client Short Header{DestConnectionID: b36bd49177dcacd8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:59 client Connection 78bb76bfb8e9f674552478 closed.