2025/04/30 10:43:34 Requesting https://server4:443/bnsurpnniw. 2025/04/30 10:43:34 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:34 Increased send buffer size to 14336 kiB 2025/04/30 10:43:34 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:34 Created qlog file: /logs/qlog/b3488a90afa8f086457a12.sqlog 2025/04/30 10:43:34 client Starting new connection to server4 ([::]:42279 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b3488a90afa8f086457a12, version v1 2025/04/30 10:43:34 Adding connection ID (empty). 2025/04/30 10:43:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:34 client -> Sending packet 0 (1280 bytes) for connection b3488a90afa8f086457a12, Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: b3488a90afa8f086457a12, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:43:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:34 client -> Sending packet 1 (1280 bytes) for connection b3488a90afa8f086457a12, Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: b3488a90afa8f086457a12, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:43:34 client -> Sending packet 2 (1280 bytes) for connection b3488a90afa8f086457a12, Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: b3488a90afa8f086457a12, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:43:34 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f44c5c8d6e48976b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:34 client Received first packet. Switching destination connection ID to: f44c5c8d6e48976b 2025/04/30 10:43:34 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:34 client newly acked packets (1): [2] 2025/04/30 10:43:34 client updated RTT: 105.489199ms (σ: 52.744599ms) 2025/04/30 10:43:34 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f44c5c8d6e48976b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:34 client -> Sending packet 3 (1280 bytes) for connection b3488a90afa8f086457a12, Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: f44c5c8d6e48976b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:34 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f44c5c8d6e48976b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:34 client -> Sending packet 4 (1280 bytes) for connection b3488a90afa8f086457a12, Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: f44c5c8d6e48976b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:34 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:34 client <- Reading packet 1 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f44c5c8d6e48976b, PacketNumber: 1, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b3488a90afa8f086457a12, InitialSourceConnectionID: f44c5c8d6e48976b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:34 client -> Sending packet 0 (79 bytes) for connection b3488a90afa8f086457a12, Handshake 2025/04/30 10:43:34 client Long Header{Type: Handshake, DestConnectionID: f44c5c8d6e48976b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:34 client Dropping Initial keys. 2025/04/30 10:43:34 client -> Sending packet 0 (46 bytes) for connection b3488a90afa8f086457a12, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:34 client Short Header{DestConnectionID: f44c5c8d6e48976b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:34 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fe6d2a6bae5f2c14, StatelessResetToken: 0xe7639d2e0cac5c8b456e5f23f5ad4a4d} 2025/04/30 10:43:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: adf9c243109e7071, StatelessResetToken: 0x0cc961b7aea746138c1d1496f44c93f1} 2025/04/30 10:43:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a0b3a1709f39971c, StatelessResetToken: 0x8b7a495b147916509e82c516c93df470} 2025/04/30 10:43:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:34 client -> Sending packet 1 (34 bytes) for connection b3488a90afa8f086457a12, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:34 client Short Header{DestConnectionID: fe6d2a6bae5f2c14, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 133.219µs} 2025/04/30 10:43:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:34 client <- Reading packet 2 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 10:43:34 client Peer doesn't await address validation any longer. 2025/04/30 10:43:34 client newly acked packets (1): [0] 2025/04/30 10:43:34 client updated RTT: 98.639ms (σ: 53.257ms) 2025/04/30 10:43:34 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:34 client Dropping Handshake keys. 2025/04/30 10:43:34 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:34 client -> Sending packet 2 (30 bytes) for connection b3488a90afa8f086457a12, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:34 client Short Header{DestConnectionID: fe6d2a6bae5f2c14, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:34 client Connection b3488a90afa8f086457a12 closed. 2025/04/30 10:43:34 Requesting https://server4:443/rpzfhbtskp. 2025/04/30 10:43:34 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:34 Increased send buffer size to 14336 kiB 2025/04/30 10:43:34 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:34 Created qlog file: /logs/qlog/49ab8d0ba7469716.sqlog 2025/04/30 10:43:34 client Starting new connection to server4 ([::]:37312 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 49ab8d0ba7469716, version v1 2025/04/30 10:43:34 Adding connection ID (empty). 2025/04/30 10:43:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:34 client -> Sending packet 0 (1280 bytes) for connection 49ab8d0ba7469716, Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: 49ab8d0ba7469716, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:43:34 client Parsed a coalesced packet. Part 1: 466 bytes. Remaining: 734 bytes. 2025/04/30 10:43:34 client <- Reading packet 0 (466 bytes) for connection (empty), Initial 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a9573fda4a82aa52, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 448, Version: v1} 2025/04/30 10:43:34 client Received first packet. Switching destination connection ID to: a9573fda4a82aa52 2025/04/30 10:43:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:34 client newly acked packets (1): [0] 2025/04/30 10:43:34 client updated RTT: 44.69435ms (σ: 22.347175ms) 2025/04/30 10:43:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:34 client Parsed a coalesced packet. Part 2: 734 bytes. Remaining: 0 bytes. 2025/04/30 10:43:34 client <- Reading packet 0 (734 bytes) for connection (empty), Handshake 2025/04/30 10:43:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a9573fda4a82aa52, PacketNumber: 0, PacketNumberLen: 1, Length: 717, Version: v1} 2025/04/30 10:43:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 10:43:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 49ab8d0ba7469716, InitialSourceConnectionID: a9573fda4a82aa52, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 49ab8d0ba7469716 2025/04/30 10:43:34 client Long Header{Type: Initial, DestConnectionID: a9573fda4a82aa52, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:34 client Long Header{Type: Handshake, DestConnectionID: a9573fda4a82aa52, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:34 client Dropping Initial keys. 2025/04/30 10:43:34 client -> Sending packet 1 (40 bytes) for connection 49ab8d0ba7469716, Handshake 2025/04/30 10:43:34 client Long Header{Type: Handshake, DestConnectionID: a9573fda4a82aa52, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:34 client -> Sending packet 0 (46 bytes) for connection 49ab8d0ba7469716, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:34 client Short Header{DestConnectionID: a9573fda4a82aa52, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:35 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:35 client Dropping Handshake keys. 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dfdadaa818ec6b22, StatelessResetToken: 0x1a86bf5c796f1f02ac9bdb90904931b9} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3b4636d8ed5cc3f9, StatelessResetToken: 0xdc0038523f60013fc8a7c11427bef543} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2046c85b26b3e3aa, StatelessResetToken: 0x6379c2c1c0a163c6395ddfb8868d6a01} 2025/04/30 10:43:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:35 client -> Sending packet 1 (34 bytes) for connection 49ab8d0ba7469716, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: dfdadaa818ec6b22, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 160.169µs} 2025/04/30 10:43:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:35 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dfdadaa818ec6b22, StatelessResetToken: 0x1a86bf5c796f1f02ac9bdb90904931b9} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3b4636d8ed5cc3f9, StatelessResetToken: 0xdc0038523f60013fc8a7c11427bef543} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2046c85b26b3e3aa, StatelessResetToken: 0x6379c2c1c0a163c6395ddfb8868d6a01} 2025/04/30 10:43:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:35 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:35 client -> Sending packet 2 (33 bytes) for connection 49ab8d0ba7469716, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: dfdadaa818ec6b22, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.350876ms} 2025/04/30 10:43:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:35 client -> Sending packet 4 (46 bytes) for connection 49ab8d0ba7469716, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: dfdadaa818ec6b22, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:35 client Skipping packet number 3 2025/04/30 10:43:35 client -> Sending packet 5 (29 bytes) for connection 49ab8d0ba7469716, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: dfdadaa818ec6b22, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:35 client <- Reading packet 2 (1083 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/04/30 10:43:35 client newly acked packets (2): [4 5] 2025/04/30 10:43:35 client updated RTT: 43.406ms (σ: 19.334ms) 2025/04/30 10:43:35 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:35 client Canceling loss detection timer. 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8c744f4628c03e05, StatelessResetToken: 0xfc40532059a37b0a39908cb340975ba3} 2025/04/30 10:43:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:35 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:35 client -> Sending packet 6 (30 bytes) for connection 49ab8d0ba7469716, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:35 client Short Header{DestConnectionID: dfdadaa818ec6b22, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:35 client Connection 49ab8d0ba7469716 closed. 2025/04/30 10:43:35 Requesting https://server4:443/bvvoeaizrh. 2025/04/30 10:43:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:35 Increased send buffer size to 14336 kiB 2025/04/30 10:43:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:35 Created qlog file: /logs/qlog/058d3f767054c301bbd2e7e04877f4.sqlog 2025/04/30 10:43:35 client Starting new connection to server4 ([::]:48596 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 058d3f767054c301bbd2e7e04877f4, version v1 2025/04/30 10:43:35 Adding connection ID (empty). 2025/04/30 10:43:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:35 client -> Sending packet 0 (1280 bytes) for connection 058d3f767054c301bbd2e7e04877f4, Initial 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: 058d3f767054c301bbd2e7e04877f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:43:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:35 client Parsed a coalesced packet. Part 1: 458 bytes. Remaining: 742 bytes. 2025/04/30 10:43:35 client <- Reading packet 0 (458 bytes) for connection (empty), Initial 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 72c6f039e35fe392, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 440, Version: v1} 2025/04/30 10:43:35 client Received first packet. Switching destination connection ID to: 72c6f039e35fe392 2025/04/30 10:43:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client newly acked packets (1): [0] 2025/04/30 10:43:35 client updated RTT: 41.7327ms (σ: 20.86635ms) 2025/04/30 10:43:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 0 bytes. 2025/04/30 10:43:35 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 72c6f039e35fe392, PacketNumber: 0, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:43:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:43:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 058d3f767054c301bbd2e7e04877f4, InitialSourceConnectionID: 72c6f039e35fe392, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 058d3f767054c301bbd2e7e04877f4 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: 72c6f039e35fe392, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: 72c6f039e35fe392, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:35 client Dropping Initial keys. 2025/04/30 10:43:35 client -> Sending packet 1 (40 bytes) for connection 058d3f767054c301bbd2e7e04877f4, Handshake 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: 72c6f039e35fe392, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client -> Sending packet 0 (46 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: 72c6f039e35fe392, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:35 client -> Sending packet 2 (74 bytes) for connection 058d3f767054c301bbd2e7e04877f4, Handshake 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: 72c6f039e35fe392, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:35 client -> Sending packet 3 (74 bytes) for connection 058d3f767054c301bbd2e7e04877f4, Handshake 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: 72c6f039e35fe392, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:35 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:35 client Dropping Handshake keys. 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da40f6c95c9c54f6, StatelessResetToken: 0xd746ec233e53376c54adb9bbde142d7b} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f43a2ae01ba9c497, StatelessResetToken: 0xe7ebb0f08e2e3d4be289d81115fa0222} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 913a741172d2e93a, StatelessResetToken: 0x0db108daa1be542bd23863af3aa401f5} 2025/04/30 10:43:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:35 client -> Sending packet 2 (53 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 135.573µs} 2025/04/30 10:43:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:35 client -> Sending packet 3 (48 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:35 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da40f6c95c9c54f6, StatelessResetToken: 0xd746ec233e53376c54adb9bbde142d7b} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f43a2ae01ba9c497, StatelessResetToken: 0xe7ebb0f08e2e3d4be289d81115fa0222} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 913a741172d2e93a, StatelessResetToken: 0x0db108daa1be542bd23863af3aa401f5} 2025/04/30 10:43:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:35 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:35 client -> Sending packet 4 (33 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.348905ms} 2025/04/30 10:43:35 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00465554de32b90e, StatelessResetToken: 0x7423bcbea417498da8e77425f58ca56a} 2025/04/30 10:43:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:35 client -> Sending packet 5 (34 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 112.49µs} 2025/04/30 10:43:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:43:35 client -> Sending packet 7 (48 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:35 client -> Sending packet 8 (48 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:35 client -> Sending packet 9 (1366 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.PingFrame{} 2025/04/30 10:43:35 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:43:35 client newly acked packets (2): [8 9] 2025/04/30 10:43:35 client updated RTT: 40.635ms (σ: 17.842ms) 2025/04/30 10:43:35 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:35 client Canceling loss detection timer. 2025/04/30 10:43:35 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00465554de32b90e, StatelessResetToken: 0x7423bcbea417498da8e77425f58ca56a} 2025/04/30 10:43:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:35 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:35 client -> Sending packet 10 (35 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 25.27935ms} 2025/04/30 10:43:35 client <- Reading packet 9 (1078 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00465554de32b90e, StatelessResetToken: 0x7423bcbea417498da8e77425f58ca56a} 2025/04/30 10:43:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:35 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:35 client -> Sending packet 11 (36 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 159.578µs} 2025/04/30 10:43:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:35 client -> Sending packet 12 (30 bytes) for connection 058d3f767054c301bbd2e7e04877f4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:35 client Short Header{DestConnectionID: da40f6c95c9c54f6, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:35 client Connection 058d3f767054c301bbd2e7e04877f4 closed. 2025/04/30 10:43:35 Requesting https://server4:443/qkdzldeedl. 2025/04/30 10:43:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:35 Increased send buffer size to 14336 kiB 2025/04/30 10:43:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:35 Created qlog file: /logs/qlog/0b463842fc32d7ec41dd15daa7760c.sqlog 2025/04/30 10:43:35 client Starting new connection to server4 ([::]:55777 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0b463842fc32d7ec41dd15daa7760c, version v1 2025/04/30 10:43:35 Adding connection ID (empty). 2025/04/30 10:43:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:35 client -> Sending packet 0 (1280 bytes) for connection 0b463842fc32d7ec41dd15daa7760c, Initial 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: 0b463842fc32d7ec41dd15daa7760c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:43:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:43:35 client Parsed a coalesced packet. Part 1: 459 bytes. Remaining: 741 bytes. 2025/04/30 10:43:35 client <- Reading packet 0 (459 bytes) for connection (empty), Initial 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0abc0a8b48e956d1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 441, Version: v1} 2025/04/30 10:43:35 client Received first packet. Switching destination connection ID to: 0abc0a8b48e956d1 2025/04/30 10:43:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client newly acked packets (1): [0] 2025/04/30 10:43:35 client updated RTT: 40.643624ms (σ: 20.321812ms) 2025/04/30 10:43:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Parsed a coalesced packet. Part 2: 741 bytes. Remaining: 0 bytes. 2025/04/30 10:43:35 client <- Reading packet 0 (741 bytes) for connection (empty), Handshake 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0abc0a8b48e956d1, PacketNumber: 0, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:43:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:43:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0b463842fc32d7ec41dd15daa7760c, InitialSourceConnectionID: 0abc0a8b48e956d1, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0b463842fc32d7ec41dd15daa7760c 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: 0abc0a8b48e956d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: 0abc0a8b48e956d1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:35 client Dropping Initial keys. 2025/04/30 10:43:35 client -> Sending packet 1 (40 bytes) for connection 0b463842fc32d7ec41dd15daa7760c, Handshake 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: 0abc0a8b48e956d1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client -> Sending packet 0 (46 bytes) for connection 0b463842fc32d7ec41dd15daa7760c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: 0abc0a8b48e956d1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:35 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:35 client Dropping Handshake keys. 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 848b1cfadf6a4877, StatelessResetToken: 0x3eabc9ff682c5cf0c807a5f735f4d6ab} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c780b2fbde3d0305, StatelessResetToken: 0x5f20669d760b7babf44795ac63b539ac} 2025/04/30 10:43:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0d1c7c9663a0c33e, StatelessResetToken: 0xc94977ee6659d0871222a7d5d9bb8838} 2025/04/30 10:43:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:35 client -> Sending packet 1 (34 bytes) for connection 0b463842fc32d7ec41dd15daa7760c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:35 client Short Header{DestConnectionID: 848b1cfadf6a4877, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 147.846µs} 2025/04/30 10:43:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:35 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client newly acked packets (1): [0] 2025/04/30 10:43:35 client updated RTT: 40.212ms (σ: 16.101ms) 2025/04/30 10:43:35 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:35 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:35 client -> Sending packet 2 (30 bytes) for connection 0b463842fc32d7ec41dd15daa7760c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:35 client Short Header{DestConnectionID: 848b1cfadf6a4877, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:35 client Connection 0b463842fc32d7ec41dd15daa7760c closed. 2025/04/30 10:43:35 Requesting https://server4:443/hxypztbvxn. 2025/04/30 10:43:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:35 Increased send buffer size to 14336 kiB 2025/04/30 10:43:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:35 Created qlog file: /logs/qlog/ef86d018c7a7e12aa69a96b8.sqlog 2025/04/30 10:43:35 client Starting new connection to server4 ([::]:49837 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ef86d018c7a7e12aa69a96b8, version v1 2025/04/30 10:43:35 Adding connection ID (empty). 2025/04/30 10:43:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:35 client -> Sending packet 0 (1280 bytes) for connection ef86d018c7a7e12aa69a96b8, Initial 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: ef86d018c7a7e12aa69a96b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:43:35 client Parsed a coalesced packet. Part 1: 461 bytes. Remaining: 739 bytes. 2025/04/30 10:43:35 client <- Reading packet 0 (461 bytes) for connection (empty), Initial 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e005b3b604dec27d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 443, Version: v1} 2025/04/30 10:43:35 client Received first packet. Switching destination connection ID to: e005b3b604dec27d 2025/04/30 10:43:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client newly acked packets (1): [0] 2025/04/30 10:43:35 client updated RTT: 41.236208ms (σ: 20.618104ms) 2025/04/30 10:43:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 0 bytes. 2025/04/30 10:43:35 client <- Reading packet 0 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e005b3b604dec27d, PacketNumber: 0, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ef86d018c7a7e12aa69a96b8, InitialSourceConnectionID: e005b3b604dec27d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ef86d018c7a7e12aa69a96b8 2025/04/30 10:43:35 client Long Header{Type: Initial, DestConnectionID: e005b3b604dec27d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: e005b3b604dec27d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:35 client Dropping Initial keys. 2025/04/30 10:43:35 client -> Sending packet 1 (86 bytes) for connection ef86d018c7a7e12aa69a96b8, Handshake 2025/04/30 10:43:35 client Long Header{Type: Handshake, DestConnectionID: e005b3b604dec27d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:35 client Short Header{DestConnectionID: e005b3b604dec27d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:36 client -> Sending packet 2 (74 bytes) for connection ef86d018c7a7e12aa69a96b8, Handshake 2025/04/30 10:43:36 client Long Header{Type: Handshake, DestConnectionID: e005b3b604dec27d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:36 client -> Sending packet 3 (74 bytes) for connection ef86d018c7a7e12aa69a96b8, Handshake 2025/04/30 10:43:36 client Long Header{Type: Handshake, DestConnectionID: e005b3b604dec27d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:36 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:36 client Dropping Handshake keys. 2025/04/30 10:43:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f23f9afb9ab5aa16, StatelessResetToken: 0xb0427d54432dc93cd043ffc7298b4d12} 2025/04/30 10:43:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 133d42183d9353e8, StatelessResetToken: 0xb522b7aa15e18f59559eb187f617f3da} 2025/04/30 10:43:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 64fd500f090bdc4a, StatelessResetToken: 0x1afef733fbc0d62de3a131a5997515ae} 2025/04/30 10:43:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:36 client -> Sending packet 2 (53 bytes) for connection ef86d018c7a7e12aa69a96b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:36 client Short Header{DestConnectionID: f23f9afb9ab5aa16, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 149.669µs} 2025/04/30 10:43:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:36 client -> Sending packet 3 (48 bytes) for connection ef86d018c7a7e12aa69a96b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:36 client Short Header{DestConnectionID: f23f9afb9ab5aa16, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:36 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2b0ff48654a7f8e9, StatelessResetToken: 0x8c1844ba7a62a604526bf95aa4af3826} 2025/04/30 10:43:36 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:36 client -> Sending packet 4 (34 bytes) for connection ef86d018c7a7e12aa69a96b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:36 client Short Header{DestConnectionID: f23f9afb9ab5aa16, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 161.834µs} 2025/04/30 10:43:36 client <- Reading packet 5 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:36 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:36 client newly acked packets (1): [3] 2025/04/30 10:43:36 client updated RTT: 40.442ms (σ: 17.05ms) 2025/04/30 10:43:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:36 client Canceling loss detection timer. 2025/04/30 10:43:36 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:36 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:36 client -> Sending packet 5 (36 bytes) for connection ef86d018c7a7e12aa69a96b8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:36 client Short Header{DestConnectionID: f23f9afb9ab5aa16, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 114.584µs} 2025/04/30 10:43:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:36 client -> Sending packet 6 (30 bytes) for connection ef86d018c7a7e12aa69a96b8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:36 client Short Header{DestConnectionID: f23f9afb9ab5aa16, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:36 client Connection ef86d018c7a7e12aa69a96b8 closed. 2025/04/30 10:43:36 Requesting https://server4:443/dvstoeuyqq. 2025/04/30 10:43:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:36 Increased send buffer size to 14336 kiB 2025/04/30 10:43:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:36 Created qlog file: /logs/qlog/d1f193664fc2b387c285.sqlog 2025/04/30 10:43:36 client Starting new connection to server4 ([::]:41905 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d1f193664fc2b387c285, version v1 2025/04/30 10:43:36 Adding connection ID (empty). 2025/04/30 10:43:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:36 client -> Sending packet 0 (1280 bytes) for connection d1f193664fc2b387c285, Initial 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: d1f193664fc2b387c285, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:43:36 client Parsed a coalesced packet. Part 1: 463 bytes. Remaining: 737 bytes. 2025/04/30 10:43:36 client <- Reading packet 0 (463 bytes) for connection (empty), Initial 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 07f59c9f733b08f1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 445, Version: v1} 2025/04/30 10:43:36 client Received first packet. Switching destination connection ID to: 07f59c9f733b08f1 2025/04/30 10:43:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:36 client newly acked packets (1): [0] 2025/04/30 10:43:36 client updated RTT: 40.959636ms (σ: 20.479818ms) 2025/04/30 10:43:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:36 client Parsed a coalesced packet. Part 2: 737 bytes. Remaining: 0 bytes. 2025/04/30 10:43:36 client <- Reading packet 0 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 07f59c9f733b08f1, PacketNumber: 0, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d1f193664fc2b387c285, InitialSourceConnectionID: 07f59c9f733b08f1, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d1f193664fc2b387c285 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: 07f59c9f733b08f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:36 client Long Header{Type: Handshake, DestConnectionID: 07f59c9f733b08f1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:36 client Dropping Initial keys. 2025/04/30 10:43:36 client -> Sending packet 1 (40 bytes) for connection d1f193664fc2b387c285, Handshake 2025/04/30 10:43:36 client Long Header{Type: Handshake, DestConnectionID: 07f59c9f733b08f1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:36 client -> Sending packet 0 (46 bytes) for connection d1f193664fc2b387c285, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:36 client Short Header{DestConnectionID: 07f59c9f733b08f1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:36 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:36 client Peer doesn't await address validation any longer. 2025/04/30 10:43:36 client newly acked packets (1): [0] 2025/04/30 10:43:36 client updated RTT: 40.387ms (σ: 16.501ms) 2025/04/30 10:43:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:36 client Canceling loss detection timer. 2025/04/30 10:43:36 client Dropping Handshake keys. 2025/04/30 10:43:36 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:36 client -> Sending packet 1 (30 bytes) for connection d1f193664fc2b387c285, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:36 client Short Header{DestConnectionID: 07f59c9f733b08f1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:36 client Connection d1f193664fc2b387c285 closed. 2025/04/30 10:43:36 Requesting https://server4:443/akkjuheqbf. 2025/04/30 10:43:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:36 Increased send buffer size to 14336 kiB 2025/04/30 10:43:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:36 Created qlog file: /logs/qlog/97866b70631664dafcb4f1.sqlog 2025/04/30 10:43:36 client Starting new connection to server4 ([::]:33731 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 97866b70631664dafcb4f1, version v1 2025/04/30 10:43:36 Adding connection ID (empty). 2025/04/30 10:43:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:36 client -> Sending packet 0 (1280 bytes) for connection 97866b70631664dafcb4f1, Initial 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: 97866b70631664dafcb4f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:43:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:36 client -> Sending packet 1 (1280 bytes) for connection 97866b70631664dafcb4f1, Initial 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: 97866b70631664dafcb4f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:43:36 client -> Sending packet 2 (1280 bytes) for connection 97866b70631664dafcb4f1, Initial 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: 97866b70631664dafcb4f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:43:36 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0de1cfee5bbb612, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:36 client Received first packet. Switching destination connection ID to: f0de1cfee5bbb612 2025/04/30 10:43:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:36 client -> Sending packet 3 (1280 bytes) for connection 97866b70631664dafcb4f1, Initial 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: f0de1cfee5bbb612, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:36 client <- Reading packet 1 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0de1cfee5bbb612, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 97866b70631664dafcb4f1, InitialSourceConnectionID: f0de1cfee5bbb612, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:36 client -> Sending packet 0 (79 bytes) for connection 97866b70631664dafcb4f1, Handshake 2025/04/30 10:43:36 client Long Header{Type: Handshake, DestConnectionID: f0de1cfee5bbb612, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:36 client Dropping Initial keys. 2025/04/30 10:43:36 client -> Sending packet 0 (46 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:36 client Short Header{DestConnectionID: f0de1cfee5bbb612, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:36 client <- Reading packet 2 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0de1cfee5bbb612, PacketNumber: 2, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:36 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:36 client Dropping Handshake keys. 2025/04/30 10:43:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:36 client -> Sending packet 1 (1366 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:36 client Short Header{DestConnectionID: f0de1cfee5bbb612, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.PingFrame{} 2025/04/30 10:43:36 client -> Sending packet 2 (32 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:36 client Short Header{DestConnectionID: f0de1cfee5bbb612, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 176.329µs} 2025/04/30 10:43:36 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0af9bd9bfe4249af, StatelessResetToken: 0x8f3439bfbd431e5ebe447dbee786d95b} 2025/04/30 10:43:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c175ade37bd7eee5, StatelessResetToken: 0x7b5b294782217808ff285b347f0a82a1} 2025/04/30 10:43:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 665980178981a320, StatelessResetToken: 0xfea9bccb2bb5c2eead7e9d90be921e01} 2025/04/30 10:43:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:36 client -> Sending packet 3 (34 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:36 client Short Header{DestConnectionID: 0af9bd9bfe4249af, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 102.962µs} 2025/04/30 10:43:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:36 client <- Reading packet 2 (52 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 1ms} 2025/04/30 10:43:36 client newly acked packets (2): [1 3] 2025/04/30 10:43:36 client updated RTT: 33.819361ms (σ: 16.90968ms) 2025/04/30 10:43:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:36 client lost packet 0 (time threshold) 2025/04/30 10:43:36 client Canceling loss detection timer. 2025/04/30 10:43:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 52e4bfa2d97be7ba, StatelessResetToken: 0xbadeb92188ec80241b56b88e8c381c59} 2025/04/30 10:43:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:36 client Ignoring all packets below 2. 2025/04/30 10:43:36 client -> Sending packet 4 (51 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:36 client Short Header{DestConnectionID: 0af9bd9bfe4249af, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 178.302µs} 2025/04/30 10:43:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:36 client -> Sending packet 6 (46 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:36 client Short Header{DestConnectionID: 0af9bd9bfe4249af, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:36 client -> Sending packet 7 (46 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:36 client Short Header{DestConnectionID: 0af9bd9bfe4249af, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:36 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:36 client newly acked packets (1): [7] 2025/04/30 10:43:36 client updated RTT: 33.628ms (σ: 13.063ms) 2025/04/30 10:43:36 client Canceling loss detection timer. 2025/04/30 10:43:36 client -> Sending packet 8 (1409 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:36 client Short Header{DestConnectionID: 0af9bd9bfe4249af, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.PingFrame{} 2025/04/30 10:43:36 client <- Reading packet 5 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:36 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:36 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:36 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:36 client -> Sending packet 9 (30 bytes) for connection 97866b70631664dafcb4f1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:36 client Short Header{DestConnectionID: 0af9bd9bfe4249af, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:36 client Connection 97866b70631664dafcb4f1 closed. 2025/04/30 10:43:36 Requesting https://server4:443/zepxiakrum. 2025/04/30 10:43:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:36 Increased send buffer size to 14336 kiB 2025/04/30 10:43:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:36 Created qlog file: /logs/qlog/caf9313d5d1ab647d121d04ec90f.sqlog 2025/04/30 10:43:36 client Starting new connection to server4 ([::]:51638 -> 193.167.100.100:443), source connection ID (empty), destination connection ID caf9313d5d1ab647d121d04ec90f, version v1 2025/04/30 10:43:36 Adding connection ID (empty). 2025/04/30 10:43:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:36 client -> Sending packet 0 (1280 bytes) for connection caf9313d5d1ab647d121d04ec90f, Initial 2025/04/30 10:43:36 client Long Header{Type: Initial, DestConnectionID: caf9313d5d1ab647d121d04ec90f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:43:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:43:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:37 client -> Sending packet 1 (1280 bytes) for connection caf9313d5d1ab647d121d04ec90f, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: caf9313d5d1ab647d121d04ec90f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:43:37 client -> Sending packet 2 (1280 bytes) for connection caf9313d5d1ab647d121d04ec90f, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: caf9313d5d1ab647d121d04ec90f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:43:37 client Parsed a coalesced packet. Part 1: 460 bytes. Remaining: 740 bytes. 2025/04/30 10:43:37 client <- Reading packet 0 (460 bytes) for connection (empty), Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e5d9e92d404420a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 442, Version: v1} 2025/04/30 10:43:37 client Received first packet. Switching destination connection ID to: 1e5d9e92d404420a 2025/04/30 10:43:37 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 0 bytes. 2025/04/30 10:43:37 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1e5d9e92d404420a, PacketNumber: 0, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:43:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: caf9313d5d1ab647d121d04ec90f, InitialSourceConnectionID: 1e5d9e92d404420a, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection caf9313d5d1ab647d121d04ec90f 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: 1e5d9e92d404420a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: 1e5d9e92d404420a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:37 client Dropping Initial keys. 2025/04/30 10:43:37 client -> Sending packet 1 (86 bytes) for connection caf9313d5d1ab647d121d04ec90f, Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: 1e5d9e92d404420a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client Short Header{DestConnectionID: 1e5d9e92d404420a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:37 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:43:37 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:37 client Dropping Handshake keys. 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a1b70213f9dcd25, StatelessResetToken: 0xe15cd8d07893267072cc986f64d6d7bc} 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecaa9a20101fdfcf, StatelessResetToken: 0xd63e0eb8c09b45ccf918e5b74bc67e34} 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ddd2b3b2f6227106, StatelessResetToken: 0x136fda5f1d8ea7ad96aad97afd0a69f3} 2025/04/30 10:43:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:37 client -> Sending packet 1 (1366 bytes) for connection caf9313d5d1ab647d121d04ec90f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 9a1b70213f9dcd25, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.PingFrame{} 2025/04/30 10:43:37 client -> Sending packet 2 (34 bytes) for connection caf9313d5d1ab647d121d04ec90f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 9a1b70213f9dcd25, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 169.176µs} 2025/04/30 10:43:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:37 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fb25aa25a16804c2, StatelessResetToken: 0x4ceb9c339b7864d794199ccf6a5850aa} 2025/04/30 10:43:37 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:37 client newly acked packets (1): [2] 2025/04/30 10:43:37 client updated RTT: 33.553332ms (σ: 16.776666ms) 2025/04/30 10:43:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:37 client lost packet 0 (time threshold) 2025/04/30 10:43:37 client setting loss timer for packet 1 (1-RTT) to 37.747498ms (in 2025-04-30 10:43:37.116124693 +0000 UTC m=+2.777920456) 2025/04/30 10:43:37 client Canceling loss detection timer. 2025/04/30 10:43:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:37 client Ignoring all packets below 1. 2025/04/30 10:43:37 client -> Sending packet 3 (51 bytes) for connection caf9313d5d1ab647d121d04ec90f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 9a1b70213f9dcd25, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 213.659µs} 2025/04/30 10:43:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:37 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:43:37.116124693 +0000 UTC m=+2.777920456 2025/04/30 10:43:37 client lost packet 1 (time threshold) 2025/04/30 10:43:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:37 client -> Sending packet 5 (46 bytes) for connection caf9313d5d1ab647d121d04ec90f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 9a1b70213f9dcd25, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:37 client -> Sending packet 6 (46 bytes) for connection caf9313d5d1ab647d121d04ec90f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 9a1b70213f9dcd25, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:37 client <- Reading packet 3 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:37 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:37 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:37 client -> Sending packet 7 (1323 bytes) for connection caf9313d5d1ab647d121d04ec90f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 9a1b70213f9dcd25, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.PingFrame{} 2025/04/30 10:43:37 client -> Sending packet 8 (34 bytes) for connection caf9313d5d1ab647d121d04ec90f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 9a1b70213f9dcd25, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 211.564µs} 2025/04/30 10:43:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:37 client -> Sending packet 9 (30 bytes) for connection caf9313d5d1ab647d121d04ec90f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 9a1b70213f9dcd25, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:37 client Connection caf9313d5d1ab647d121d04ec90f closed. 2025/04/30 10:43:37 Requesting https://server4:443/rkpwvykklq. 2025/04/30 10:43:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:37 Increased send buffer size to 14336 kiB 2025/04/30 10:43:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:37 Created qlog file: /logs/qlog/a114a6fcc93f22bfbf224bf2e6b5.sqlog 2025/04/30 10:43:37 client Starting new connection to server4 ([::]:49516 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a114a6fcc93f22bfbf224bf2e6b5, version v1 2025/04/30 10:43:37 Adding connection ID (empty). 2025/04/30 10:43:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:37 client -> Sending packet 0 (1280 bytes) for connection a114a6fcc93f22bfbf224bf2e6b5, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: a114a6fcc93f22bfbf224bf2e6b5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:43:37 client Parsed a coalesced packet. Part 1: 459 bytes. Remaining: 741 bytes. 2025/04/30 10:43:37 client <- Reading packet 0 (459 bytes) for connection (empty), Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 068475dcd2ee8219, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 441, Version: v1} 2025/04/30 10:43:37 client Received first packet. Switching destination connection ID to: 068475dcd2ee8219 2025/04/30 10:43:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client newly acked packets (1): [0] 2025/04/30 10:43:37 client updated RTT: 40.3419ms (σ: 20.17095ms) 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Parsed a coalesced packet. Part 2: 741 bytes. Remaining: 0 bytes. 2025/04/30 10:43:37 client <- Reading packet 0 (741 bytes) for connection (empty), Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 068475dcd2ee8219, PacketNumber: 0, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:43:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a114a6fcc93f22bfbf224bf2e6b5, InitialSourceConnectionID: 068475dcd2ee8219, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a114a6fcc93f22bfbf224bf2e6b5 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: 068475dcd2ee8219, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: 068475dcd2ee8219, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:37 client Dropping Initial keys. 2025/04/30 10:43:37 client -> Sending packet 1 (40 bytes) for connection a114a6fcc93f22bfbf224bf2e6b5, Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: 068475dcd2ee8219, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client -> Sending packet 0 (46 bytes) for connection a114a6fcc93f22bfbf224bf2e6b5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 068475dcd2ee8219, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:37 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:37 client Dropping Handshake keys. 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 798fcf619f24a3e3, StatelessResetToken: 0xd4958d5727ee49f5a6f1240d60af0ac9} 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3b796965ac539f02, StatelessResetToken: 0x403904ef63ebf9ce2b986d1b8880a68a} 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c0c726262622b59f, StatelessResetToken: 0x49a2ca5cb9b45204b2d29f0f968a31a2} 2025/04/30 10:43:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:37 client -> Sending packet 1 (34 bytes) for connection a114a6fcc93f22bfbf224bf2e6b5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 798fcf619f24a3e3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 153.897µs} 2025/04/30 10:43:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:37 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client newly acked packets (1): [0] 2025/04/30 10:43:37 client updated RTT: 39.815ms (σ: 16.178ms) 2025/04/30 10:43:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:37 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:37 client -> Sending packet 2 (30 bytes) for connection a114a6fcc93f22bfbf224bf2e6b5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 798fcf619f24a3e3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:37 client Connection a114a6fcc93f22bfbf224bf2e6b5 closed. 2025/04/30 10:43:37 Requesting https://server4:443/xwtnjmszif. 2025/04/30 10:43:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:37 Increased send buffer size to 14336 kiB 2025/04/30 10:43:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:37 Created qlog file: /logs/qlog/65c29095518bea3f3a.sqlog 2025/04/30 10:43:37 client Starting new connection to server4 ([::]:40532 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 65c29095518bea3f3a, version v1 2025/04/30 10:43:37 Adding connection ID (empty). 2025/04/30 10:43:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:37 client -> Sending packet 0 (1280 bytes) for connection 65c29095518bea3f3a, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: 65c29095518bea3f3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:43:37 client Parsed a coalesced packet. Part 1: 463 bytes. Remaining: 737 bytes. 2025/04/30 10:43:37 client <- Reading packet 0 (463 bytes) for connection (empty), Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0a826244776e7180, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 445, Version: v1} 2025/04/30 10:43:37 client Received first packet. Switching destination connection ID to: 0a826244776e7180 2025/04/30 10:43:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client newly acked packets (1): [0] 2025/04/30 10:43:37 client updated RTT: 40.395687ms (σ: 20.197843ms) 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Parsed a coalesced packet. Part 2: 737 bytes. Remaining: 0 bytes. 2025/04/30 10:43:37 client <- Reading packet 0 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a826244776e7180, PacketNumber: 0, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 65c29095518bea3f3a, InitialSourceConnectionID: 0a826244776e7180, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 65c29095518bea3f3a 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: 0a826244776e7180, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: 0a826244776e7180, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:37 client Dropping Initial keys. 2025/04/30 10:43:37 client -> Sending packet 1 (40 bytes) for connection 65c29095518bea3f3a, Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: 0a826244776e7180, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client -> Sending packet 0 (46 bytes) for connection 65c29095518bea3f3a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 0a826244776e7180, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:37 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:37 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client Peer doesn't await address validation any longer. 2025/04/30 10:43:37 client newly acked packets (1): [0] 2025/04/30 10:43:37 client updated RTT: 39.832ms (σ: 16.273ms) 2025/04/30 10:43:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:37 client Canceling loss detection timer. 2025/04/30 10:43:37 client Dropping Handshake keys. 2025/04/30 10:43:37 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:37 client -> Sending packet 1 (30 bytes) for connection 65c29095518bea3f3a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: 0a826244776e7180, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:37 client Connection 65c29095518bea3f3a closed. 2025/04/30 10:43:37 Requesting https://server4:443/kiibexpkwc. 2025/04/30 10:43:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:37 Increased send buffer size to 14336 kiB 2025/04/30 10:43:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:37 Created qlog file: /logs/qlog/c43f8b2862486606e97d4556ccc3907056b9bf9a.sqlog 2025/04/30 10:43:37 client Starting new connection to server4 ([::]:52218 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c43f8b2862486606e97d4556ccc3907056b9bf9a, version v1 2025/04/30 10:43:37 Adding connection ID (empty). 2025/04/30 10:43:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:37 client -> Sending packet 0 (1280 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: c43f8b2862486606e97d4556ccc3907056b9bf9a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:43:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:37 client -> Sending packet 1 (1280 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: c43f8b2862486606e97d4556ccc3907056b9bf9a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:43:37 client -> Sending packet 2 (1280 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: c43f8b2862486606e97d4556ccc3907056b9bf9a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:43:37 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb367e19c619c3fd, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:37 client Received first packet. Switching destination connection ID to: eb367e19c619c3fd 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client -> Sending packet 3 (1280 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: eb367e19c619c3fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:37 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb367e19c619c3fd, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:37 client -> Sending packet 4 (1280 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: eb367e19c619c3fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:43:37 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb367e19c619c3fd, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:37 client -> Sending packet 5 (1280 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: eb367e19c619c3fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:43:37 client <- Reading packet 2 (748 bytes) for connection (empty), Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb367e19c619c3fd, PacketNumber: 2, PacketNumberLen: 1, Length: 731, Version: v1} 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 10:43:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c43f8b2862486606e97d4556ccc3907056b9bf9a, InitialSourceConnectionID: eb367e19c619c3fd, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:37 client -> Sending packet 0 (79 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: eb367e19c619c3fd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:37 client Dropping Initial keys. 2025/04/30 10:43:37 client -> Sending packet 0 (46 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:37 client Short Header{DestConnectionID: eb367e19c619c3fd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:37 client <- Reading packet 3 (748 bytes) for connection (empty), Handshake 2025/04/30 10:43:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb367e19c619c3fd, PacketNumber: 3, PacketNumberLen: 1, Length: 731, Version: v1} 2025/04/30 10:43:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 10:43:37 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:37 client Dropping Handshake keys. 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebeaa29ffb3c6628, StatelessResetToken: 0x797e41fcfbe0afb2cc8498fdf73bc67e} 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 11bca2aa3a5dd3a0, StatelessResetToken: 0x23ea78cc9784d95fb0a2aae326dbad0f} 2025/04/30 10:43:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 213278a8c97e9f69, StatelessResetToken: 0x06287e314f1ace2c9a103e1eeccea6e0} 2025/04/30 10:43:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:37 client -> Sending packet 1 (1366 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:37 client Short Header{DestConnectionID: ebeaa29ffb3c6628, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.PingFrame{} 2025/04/30 10:43:37 client -> Sending packet 2 (34 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:37 client Short Header{DestConnectionID: ebeaa29ffb3c6628, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 357.628µs} 2025/04/30 10:43:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:37 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:37 client newly acked packets (1): [0] 2025/04/30 10:43:37 client updated RTT: 34.657134ms (σ: 17.328567ms) 2025/04/30 10:43:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:37 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:37 client -> Sending packet 3 (30 bytes) for connection c43f8b2862486606e97d4556ccc3907056b9bf9a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:37 client Short Header{DestConnectionID: ebeaa29ffb3c6628, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:37 client Connection c43f8b2862486606e97d4556ccc3907056b9bf9a closed. 2025/04/30 10:43:37 Requesting https://server4:443/unjpfjhuew. 2025/04/30 10:43:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:37 Increased send buffer size to 14336 kiB 2025/04/30 10:43:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:37 Created qlog file: /logs/qlog/f7c423836e68a567791a.sqlog 2025/04/30 10:43:37 client Starting new connection to server4 ([::]:43866 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f7c423836e68a567791a, version v1 2025/04/30 10:43:37 Adding connection ID (empty). 2025/04/30 10:43:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:37 client -> Sending packet 0 (1280 bytes) for connection f7c423836e68a567791a, Initial 2025/04/30 10:43:37 client Long Header{Type: Initial, DestConnectionID: f7c423836e68a567791a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:43:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:43:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:38 client -> Sending packet 1 (1280 bytes) for connection f7c423836e68a567791a, Initial 2025/04/30 10:43:38 client Long Header{Type: Initial, DestConnectionID: f7c423836e68a567791a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:43:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:43:38 client -> Sending packet 2 (1280 bytes) for connection f7c423836e68a567791a, Initial 2025/04/30 10:43:38 client Long Header{Type: Initial, DestConnectionID: f7c423836e68a567791a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:43:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:43:38 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a3d038471db01ccf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:38 client Received first packet. Switching destination connection ID to: a3d038471db01ccf 2025/04/30 10:43:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:38 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:38 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:38 client -> Sending packet 3 (1280 bytes) for connection f7c423836e68a567791a, Initial 2025/04/30 10:43:38 client Long Header{Type: Initial, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:38 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:43:38 client -> Sending packet 4 (1280 bytes) for connection f7c423836e68a567791a, Initial 2025/04/30 10:43:38 client Long Header{Type: Initial, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:43:38 client -> Sending packet 5 (1280 bytes) for connection f7c423836e68a567791a, Initial 2025/04/30 10:43:38 client Long Header{Type: Initial, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:43:38 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a3d038471db01ccf, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:38 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:38 client <- Reading packet 1 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3d038471db01ccf, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:38 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:38 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f7c423836e68a567791a, InitialSourceConnectionID: a3d038471db01ccf, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:38 client -> Sending packet 0 (79 bytes) for connection f7c423836e68a567791a, Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:38 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:38 client Dropping Initial keys. 2025/04/30 10:43:38 client -> Sending packet 0 (46 bytes) for connection f7c423836e68a567791a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:38 client Short Header{DestConnectionID: a3d038471db01ccf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:38 client <- Reading packet 2 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3d038471db01ccf, PacketNumber: 2, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:38 client -> Sending packet 1 (40 bytes) for connection f7c423836e68a567791a, Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:38 client <- Reading packet 3 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3d038471db01ccf, PacketNumber: 3, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:38 client -> Sending packet 2 (40 bytes) for connection f7c423836e68a567791a, Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:38 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:38 client <- Reading packet 4 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3d038471db01ccf, PacketNumber: 4, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:38 client -> Sending packet 3 (40 bytes) for connection f7c423836e68a567791a, Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:38 client -> Sending packet 4 (74 bytes) for connection f7c423836e68a567791a, Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:38 client -> Sending packet 5 (74 bytes) for connection f7c423836e68a567791a, Handshake 2025/04/30 10:43:38 client Long Header{Type: Handshake, DestConnectionID: a3d038471db01ccf, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:38 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:38 client Dropping Handshake keys. 2025/04/30 10:43:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:38 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:38 client -> Sending packet 2 (51 bytes) for connection f7c423836e68a567791a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:38 client Short Header{DestConnectionID: a3d038471db01ccf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 121.748µs} 2025/04/30 10:43:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:38 client -> Sending packet 3 (46 bytes) for connection f7c423836e68a567791a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:38 client Short Header{DestConnectionID: a3d038471db01ccf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:38 client -> Sending packet 4 (1366 bytes) for connection f7c423836e68a567791a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:38 client Short Header{DestConnectionID: a3d038471db01ccf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:38 client -> &wire.PingFrame{} 2025/04/30 10:43:38 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:38 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:38 client -> Sending packet 5 (34 bytes) for connection f7c423836e68a567791a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:38 client Short Header{DestConnectionID: a3d038471db01ccf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 150.441µs} 2025/04/30 10:43:38 client <- Reading packet 5 (1139 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:38 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 48d91b73ec2dfa2e, StatelessResetToken: 0x1f10ed0fa7fdcf522dc6d3d6a6537369} 2025/04/30 10:43:38 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:38 client newly acked packets (2): [3 4] 2025/04/30 10:43:38 client updated RTT: 166.737541ms (σ: 83.36877ms) 2025/04/30 10:43:38 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:38 client Canceling loss detection timer. 2025/04/30 10:43:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2f668cdb9c046256, StatelessResetToken: 0xd602b964e11469321dd5ff7ad0f19021} 2025/04/30 10:43:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c4dbc5e726073a5a, StatelessResetToken: 0x60dd47dc91b7a6e5388e83b9bbd84b59} 2025/04/30 10:43:38 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:38 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:38 client -> Sending packet 6 (36 bytes) for connection f7c423836e68a567791a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:38 client Short Header{DestConnectionID: 48d91b73ec2dfa2e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:38 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 222.164µs} 2025/04/30 10:43:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:38 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:38 client -> Sending packet 7 (30 bytes) for connection f7c423836e68a567791a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:38 client Short Header{DestConnectionID: 48d91b73ec2dfa2e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:38 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:38 client Connection f7c423836e68a567791a closed. 2025/04/30 10:43:38 Requesting https://server4:443/tvdgyoagqh. 2025/04/30 10:43:38 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:38 Increased send buffer size to 14336 kiB 2025/04/30 10:43:38 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:38 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:38 Created qlog file: /logs/qlog/4da559707e807113bc9b0e99.sqlog 2025/04/30 10:43:38 client Starting new connection to server4 ([::]:34283 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4da559707e807113bc9b0e99, version v1 2025/04/30 10:43:38 Adding connection ID (empty). 2025/04/30 10:43:38 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:38 client -> Sending packet 0 (1280 bytes) for connection 4da559707e807113bc9b0e99, Initial 2025/04/30 10:43:38 client Long Header{Type: Initial, DestConnectionID: 4da559707e807113bc9b0e99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:43:39 client Parsed a coalesced packet. Part 1: 462 bytes. Remaining: 738 bytes. 2025/04/30 10:43:39 client <- Reading packet 0 (462 bytes) for connection (empty), Initial 2025/04/30 10:43:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b34905b586e00ae, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 444, Version: v1} 2025/04/30 10:43:39 client Received first packet. Switching destination connection ID to: 0b34905b586e00ae 2025/04/30 10:43:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:39 client newly acked packets (1): [0] 2025/04/30 10:43:39 client updated RTT: 38.815925ms (σ: 19.407962ms) 2025/04/30 10:43:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:39 client Parsed a coalesced packet. Part 2: 738 bytes. Remaining: 0 bytes. 2025/04/30 10:43:39 client <- Reading packet 0 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b34905b586e00ae, PacketNumber: 0, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4da559707e807113bc9b0e99, InitialSourceConnectionID: 0b34905b586e00ae, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4da559707e807113bc9b0e99 2025/04/30 10:43:39 client Long Header{Type: Initial, DestConnectionID: 0b34905b586e00ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:39 client Long Header{Type: Handshake, DestConnectionID: 0b34905b586e00ae, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:39 client Dropping Initial keys. 2025/04/30 10:43:39 client -> Sending packet 1 (40 bytes) for connection 4da559707e807113bc9b0e99, Handshake 2025/04/30 10:43:39 client Long Header{Type: Handshake, DestConnectionID: 0b34905b586e00ae, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:39 client -> Sending packet 0 (46 bytes) for connection 4da559707e807113bc9b0e99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:39 client Short Header{DestConnectionID: 0b34905b586e00ae, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:39 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:39 client -> Sending packet 2 (74 bytes) for connection 4da559707e807113bc9b0e99, Handshake 2025/04/30 10:43:39 client Long Header{Type: Handshake, DestConnectionID: 0b34905b586e00ae, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:39 client -> Sending packet 3 (74 bytes) for connection 4da559707e807113bc9b0e99, Handshake 2025/04/30 10:43:39 client Long Header{Type: Handshake, DestConnectionID: 0b34905b586e00ae, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:39 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 314c6ed384c7b3f0, StatelessResetToken: 0xe17c929a710411f27c753661271715f9} 2025/04/30 10:43:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d6a7b5e88f5223ca, StatelessResetToken: 0x4efb6f651211f9555d515cd73d3d7ec1} 2025/04/30 10:43:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a71d3b7fd8ea0e1f, StatelessResetToken: 0x02b1fe54f4833eb0a5f6786862553026} 2025/04/30 10:43:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:39 client -> Sending packet 1 (34 bytes) for connection 4da559707e807113bc9b0e99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:39 client Short Header{DestConnectionID: 314c6ed384c7b3f0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 111.839µs} 2025/04/30 10:43:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:39 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:43:39 client -> Sending packet 4 (74 bytes) for connection 4da559707e807113bc9b0e99, Handshake 2025/04/30 10:43:39 client Long Header{Type: Handshake, DestConnectionID: 314c6ed384c7b3f0, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:39 client -> Sending packet 5 (74 bytes) for connection 4da559707e807113bc9b0e99, Handshake 2025/04/30 10:43:39 client Long Header{Type: Handshake, DestConnectionID: 314c6ed384c7b3f0, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:39 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:39 client Dropping Handshake keys. 2025/04/30 10:43:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:39 client -> Sending packet 3 (53 bytes) for connection 4da559707e807113bc9b0e99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:39 client Short Header{DestConnectionID: 314c6ed384c7b3f0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 167.533µs} 2025/04/30 10:43:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:39 client Skipping packet number 2 2025/04/30 10:43:39 client -> Sending packet 4 (29 bytes) for connection 4da559707e807113bc9b0e99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:39 client Short Header{DestConnectionID: 314c6ed384c7b3f0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:39 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:39 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:39 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:39 client -> Sending packet 5 (35 bytes) for connection 4da559707e807113bc9b0e99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:39 client Short Header{DestConnectionID: 314c6ed384c7b3f0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:39 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.31313ms} 2025/04/30 10:43:39 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:39 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:39 client <- Reading packet 6 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:39 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:39 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:39 client newly acked packets (2): [3 4] 2025/04/30 10:43:39 client updated RTT: 38.088ms (σ: 16.008ms) 2025/04/30 10:43:39 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:39 client Canceling loss detection timer. 2025/04/30 10:43:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f7092f728d7bfd28, StatelessResetToken: 0xd6178625ad11b8c896552d9d53cb8812} 2025/04/30 10:43:39 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:39 client Ignoring all packets below 4. 2025/04/30 10:43:39 client -> Sending packet 6 (32 bytes) for connection 4da559707e807113bc9b0e99, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:39 client Short Header{DestConnectionID: 314c6ed384c7b3f0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:39 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 100.467µs} 2025/04/30 10:43:39 client <- Reading packet 8 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:39 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:39 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:39 client -> Sending packet 7 (34 bytes) for connection 4da559707e807113bc9b0e99, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:39 client Short Header{DestConnectionID: 314c6ed384c7b3f0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:39 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 159.084µs} 2025/04/30 10:43:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:39 client -> Sending packet 8 (30 bytes) for connection 4da559707e807113bc9b0e99, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:39 client Short Header{DestConnectionID: 314c6ed384c7b3f0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:39 client Connection 4da559707e807113bc9b0e99 closed. 2025/04/30 10:43:39 Requesting https://server4:443/jpqwgknyhb. 2025/04/30 10:43:39 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:39 Increased send buffer size to 14336 kiB 2025/04/30 10:43:39 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:39 Created qlog file: /logs/qlog/63d4d1bcda9634d60bc08e2487.sqlog 2025/04/30 10:43:39 client Starting new connection to server4 ([::]:57520 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 63d4d1bcda9634d60bc08e2487, version v1 2025/04/30 10:43:39 Adding connection ID (empty). 2025/04/30 10:43:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:39 client -> Sending packet 0 (1280 bytes) for connection 63d4d1bcda9634d60bc08e2487, Initial 2025/04/30 10:43:39 client Long Header{Type: Initial, DestConnectionID: 63d4d1bcda9634d60bc08e2487, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:43:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:39 client -> Sending packet 1 (1280 bytes) for connection 63d4d1bcda9634d60bc08e2487, Initial 2025/04/30 10:43:39 client Long Header{Type: Initial, DestConnectionID: 63d4d1bcda9634d60bc08e2487, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:43:39 client -> Sending packet 2 (1280 bytes) for connection 63d4d1bcda9634d60bc08e2487, Initial 2025/04/30 10:43:39 client Long Header{Type: Initial, DestConnectionID: 63d4d1bcda9634d60bc08e2487, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:43:39 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b7cffa65cf4f0434, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:39 client Received first packet. Switching destination connection ID to: b7cffa65cf4f0434 2025/04/30 10:43:39 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:39 client newly acked packets (1): [2] 2025/04/30 10:43:39 client updated RTT: 40.298503ms (σ: 20.149251ms) 2025/04/30 10:43:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:40 client -> Sending packet 3 (1280 bytes) for connection 63d4d1bcda9634d60bc08e2487, Initial 2025/04/30 10:43:40 client Long Header{Type: Initial, DestConnectionID: b7cffa65cf4f0434, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:40 client -> &wire.PingFrame{} 2025/04/30 10:43:40 client <- Reading packet 3 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b7cffa65cf4f0434, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:40 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:40 client newly acked packets (1): [3] 2025/04/30 10:43:40 client updated RTT: 39.503ms (σ: 16.7ms) 2025/04/30 10:43:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:40 client Queueing packet (739 bytes) for later decryption 2025/04/30 10:43:40 client Queueing packet (739 bytes) for later decryption 2025/04/30 10:43:40 client -> Sending packet 4 (1280 bytes) for connection 63d4d1bcda9634d60bc08e2487, Initial 2025/04/30 10:43:40 client Long Header{Type: Initial, DestConnectionID: b7cffa65cf4f0434, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:40 client -> &wire.PingFrame{} 2025/04/30 10:43:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:40 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b7cffa65cf4f0434, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:40 client -> Sending packet 5 (1280 bytes) for connection 63d4d1bcda9634d60bc08e2487, Initial 2025/04/30 10:43:40 client Long Header{Type: Initial, DestConnectionID: b7cffa65cf4f0434, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:40 client <- Reading packet 1 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b7cffa65cf4f0434, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 63d4d1bcda9634d60bc08e2487, InitialSourceConnectionID: b7cffa65cf4f0434, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:40 client <- Reading packet 2 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b7cffa65cf4f0434, PacketNumber: 2, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:40 client -> Sending packet 0 (79 bytes) for connection 63d4d1bcda9634d60bc08e2487, Handshake 2025/04/30 10:43:40 client Long Header{Type: Handshake, DestConnectionID: b7cffa65cf4f0434, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:40 client Dropping Initial keys. 2025/04/30 10:43:40 client -> Sending packet 0 (46 bytes) for connection 63d4d1bcda9634d60bc08e2487, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:40 client Short Header{DestConnectionID: b7cffa65cf4f0434, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:40 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:43:40 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:43:40 client <- Reading packet 3 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b7cffa65cf4f0434, PacketNumber: 3, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:40 client -> Sending packet 1 (40 bytes) for connection 63d4d1bcda9634d60bc08e2487, Handshake 2025/04/30 10:43:40 client Long Header{Type: Handshake, DestConnectionID: b7cffa65cf4f0434, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:40 client <- Reading packet 4 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b7cffa65cf4f0434, PacketNumber: 4, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:40 client -> Sending packet 2 (40 bytes) for connection 63d4d1bcda9634d60bc08e2487, Handshake 2025/04/30 10:43:40 client Long Header{Type: Handshake, DestConnectionID: b7cffa65cf4f0434, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:40 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:40 client Peer doesn't await address validation any longer. 2025/04/30 10:43:40 client newly acked packets (1): [0] 2025/04/30 10:43:40 client updated RTT: 39.037ms (σ: 13.455ms) 2025/04/30 10:43:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:40 client Canceling loss detection timer. 2025/04/30 10:43:40 client Dropping Handshake keys. 2025/04/30 10:43:40 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:40 client -> Sending packet 1 (32 bytes) for connection 63d4d1bcda9634d60bc08e2487, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:40 client Short Header{DestConnectionID: b7cffa65cf4f0434, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 116.638µs} 2025/04/30 10:43:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:40 client -> Sending packet 2 (30 bytes) for connection 63d4d1bcda9634d60bc08e2487, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:40 client Short Header{DestConnectionID: b7cffa65cf4f0434, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:40 client Connection 63d4d1bcda9634d60bc08e2487 closed. 2025/04/30 10:43:40 Requesting https://server4:443/vdyonyjsjv. 2025/04/30 10:43:40 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:40 Increased send buffer size to 14336 kiB 2025/04/30 10:43:40 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:40 Created qlog file: /logs/qlog/3c8e00a27e25cc08969a515d8deedf2b5a8b.sqlog 2025/04/30 10:43:40 client Starting new connection to server4 ([::]:45939 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3c8e00a27e25cc08969a515d8deedf2b5a8b, version v1 2025/04/30 10:43:40 Adding connection ID (empty). 2025/04/30 10:43:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:40 client -> Sending packet 0 (1280 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b, Initial 2025/04/30 10:43:40 client Long Header{Type: Initial, DestConnectionID: 3c8e00a27e25cc08969a515d8deedf2b5a8b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:43:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c0e7f937db370a4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:43:41 client Received first packet. Switching destination connection ID to: 2c0e7f937db370a4 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [0] 2025/04/30 10:43:41 client updated RTT: 38.766084ms (σ: 19.383042ms) 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c0e7f937db370a4, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:43:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3c8e00a27e25cc08969a515d8deedf2b5a8b, InitialSourceConnectionID: 2c0e7f937db370a4, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: 2c0e7f937db370a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 2c0e7f937db370a4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client Dropping Initial keys. 2025/04/30 10:43:41 client -> Sending packet 1 (86 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 2c0e7f937db370a4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client Short Header{DestConnectionID: 2c0e7f937db370a4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:41 client -> Sending packet 2 (74 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 2c0e7f937db370a4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client -> Sending packet 3 (74 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 2c0e7f937db370a4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:41 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:41 client Dropping Handshake keys. 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b868fdcb130b0c63, StatelessResetToken: 0xfcb9a77e8f9992f367783647448c752e} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d11b3abb69a12c35, StatelessResetToken: 0x45e243b3402bd73ffd862aab96b50165} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3f97ba026d77c0f0, StatelessResetToken: 0xd29c1e624a5b80c891053465e43812f6} 2025/04/30 10:43:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:41 client -> Sending packet 2 (53 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: b868fdcb130b0c63, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 155.821µs} 2025/04/30 10:43:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client -> Sending packet 3 (48 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: b868fdcb130b0c63, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b868fdcb130b0c63, StatelessResetToken: 0xfcb9a77e8f9992f367783647448c752e} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d11b3abb69a12c35, StatelessResetToken: 0x45e243b3402bd73ffd862aab96b50165} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3f97ba026d77c0f0, StatelessResetToken: 0xd29c1e624a5b80c891053465e43812f6} 2025/04/30 10:43:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:41 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a0e2e27a57c8a3e7, StatelessResetToken: 0xfacdc05026fd32c24d90d91a3c1d8ce7} 2025/04/30 10:43:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:41 client -> Sending packet 4 (32 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: b868fdcb130b0c63, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 63.448µs} 2025/04/30 10:43:41 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:41 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:41 client -> Sending packet 5 (30 bytes) for connection 3c8e00a27e25cc08969a515d8deedf2b5a8b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: b868fdcb130b0c63, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:41 client Connection 3c8e00a27e25cc08969a515d8deedf2b5a8b closed. 2025/04/30 10:43:41 Requesting https://server4:443/wzmeocnaig. 2025/04/30 10:43:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:41 Increased send buffer size to 14336 kiB 2025/04/30 10:43:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:41 Created qlog file: /logs/qlog/929ec43a0ca79277e3.sqlog 2025/04/30 10:43:41 client Starting new connection to server4 ([::]:58677 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 929ec43a0ca79277e3, version v1 2025/04/30 10:43:41 Adding connection ID (empty). 2025/04/30 10:43:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:41 client -> Sending packet 0 (1280 bytes) for connection 929ec43a0ca79277e3, Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: 929ec43a0ca79277e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:43:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 1: 464 bytes. Remaining: 736 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (464 bytes) for connection (empty), Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5f46bd4152adb8ac, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 446, Version: v1} 2025/04/30 10:43:41 client Received first packet. Switching destination connection ID to: 5f46bd4152adb8ac 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [0] 2025/04/30 10:43:41 client updated RTT: 38.151796ms (σ: 19.075898ms) 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 2: 736 bytes. Remaining: 0 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (736 bytes) for connection (empty), Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5f46bd4152adb8ac, PacketNumber: 0, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:43:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 929ec43a0ca79277e3, InitialSourceConnectionID: 5f46bd4152adb8ac, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 929ec43a0ca79277e3 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: 5f46bd4152adb8ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 5f46bd4152adb8ac, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client Dropping Initial keys. 2025/04/30 10:43:41 client -> Sending packet 1 (40 bytes) for connection 929ec43a0ca79277e3, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 5f46bd4152adb8ac, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client -> Sending packet 0 (46 bytes) for connection 929ec43a0ca79277e3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 5f46bd4152adb8ac, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:41 client Dropping Handshake keys. 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f5e90b3b661658d6, StatelessResetToken: 0xb79cab8be5083906666ee751643f76e3} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 914aabe4bc635f91, StatelessResetToken: 0x8bd239963f47ce0fa0ce1e270daea4b2} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d00eb7d09481378c, StatelessResetToken: 0xa0d55cb2eb2a832117c8fd39481541fe} 2025/04/30 10:43:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:41 client -> Sending packet 1 (34 bytes) for connection 929ec43a0ca79277e3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: f5e90b3b661658d6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 153.096µs} 2025/04/30 10:43:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:41 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 466c2401ad3b8c75, StatelessResetToken: 0x31a12c7f306be3d53b2300cb39eda92d} 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [1] 2025/04/30 10:43:41 client updated RTT: 37.421ms (σ: 15.764ms) 2025/04/30 10:43:41 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:41 client lost packet 0 (time threshold) 2025/04/30 10:43:41 client Canceling loss detection timer. 2025/04/30 10:43:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:41 client Ignoring all packets below 1. 2025/04/30 10:43:41 client -> Sending packet 2 (51 bytes) for connection 929ec43a0ca79277e3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:41 client Short Header{DestConnectionID: f5e90b3b661658d6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 166.41µs} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [2] 2025/04/30 10:43:41 client updated RTT: 36.943ms (σ: 12.778ms) 2025/04/30 10:43:41 client Canceling loss detection timer. 2025/04/30 10:43:41 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:41 client Ignoring all packets below 2. 2025/04/30 10:43:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:41 client -> Sending packet 3 (30 bytes) for connection 929ec43a0ca79277e3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:41 client Short Header{DestConnectionID: f5e90b3b661658d6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:41 client Connection 929ec43a0ca79277e3 closed. 2025/04/30 10:43:41 Requesting https://server4:443/ezoqfsaptf. 2025/04/30 10:43:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:41 Increased send buffer size to 14336 kiB 2025/04/30 10:43:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:41 Created qlog file: /logs/qlog/3e3cb5a10bc9f1c904d4f6efbeeb.sqlog 2025/04/30 10:43:41 client Starting new connection to server4 ([::]:44076 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3e3cb5a10bc9f1c904d4f6efbeeb, version v1 2025/04/30 10:43:41 Adding connection ID (empty). 2025/04/30 10:43:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:41 client -> Sending packet 0 (1280 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: 3e3cb5a10bc9f1c904d4f6efbeeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 1: 458 bytes. Remaining: 742 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (458 bytes) for connection (empty), Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 549b62942ebaa4b0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 440, Version: v1} 2025/04/30 10:43:41 client Received first packet. Switching destination connection ID to: 549b62942ebaa4b0 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [0] 2025/04/30 10:43:41 client updated RTT: 38.973086ms (σ: 19.486543ms) 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 0 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 549b62942ebaa4b0, PacketNumber: 0, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:43:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3e3cb5a10bc9f1c904d4f6efbeeb, InitialSourceConnectionID: 549b62942ebaa4b0, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: 549b62942ebaa4b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 549b62942ebaa4b0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client Dropping Initial keys. 2025/04/30 10:43:41 client -> Sending packet 1 (40 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 549b62942ebaa4b0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client -> Sending packet 0 (46 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 549b62942ebaa4b0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:41 client -> Sending packet 2 (74 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 549b62942ebaa4b0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client -> Sending packet 3 (74 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 549b62942ebaa4b0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:41 client Dropping Handshake keys. 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 340bd418f64ade01, StatelessResetToken: 0x2960d41abb3353eb1c2f3531096089a7} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c9fe3d274473986f, StatelessResetToken: 0x098edb00b3fdeea6e7260787211ba095} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9775e1def75e4074, StatelessResetToken: 0x0ec265930a666712afebd4f0947fcf49} 2025/04/30 10:43:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:41 client -> Sending packet 2 (53 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 340bd418f64ade01, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 147.635µs} 2025/04/30 10:43:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client -> Sending packet 3 (48 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 340bd418f64ade01, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ba09f4fa868a6e02, StatelessResetToken: 0x9288018b1695938e7116c762dce5b1fb} 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:41 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:41 client -> Sending packet 4 (33 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 340bd418f64ade01, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.332604ms} 2025/04/30 10:43:41 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ba09f4fa868a6e02, StatelessResetToken: 0x9288018b1695938e7116c762dce5b1fb} 2025/04/30 10:43:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:41 client -> Sending packet 5 (34 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 340bd418f64ade01, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 111.938µs} 2025/04/30 10:43:41 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [3] 2025/04/30 10:43:41 client updated RTT: 56.947ms (σ: 50.563ms) 2025/04/30 10:43:41 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:41 client Canceling loss detection timer. 2025/04/30 10:43:41 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:41 client -> Sending packet 6 (30 bytes) for connection 3e3cb5a10bc9f1c904d4f6efbeeb, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 340bd418f64ade01, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:41 client Connection 3e3cb5a10bc9f1c904d4f6efbeeb closed. 2025/04/30 10:43:41 Requesting https://server4:443/lpisuyueqf. 2025/04/30 10:43:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:41 Increased send buffer size to 14336 kiB 2025/04/30 10:43:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:41 Created qlog file: /logs/qlog/f95b01105562500f03ae9fd5fb56e7bc.sqlog 2025/04/30 10:43:41 client Starting new connection to server4 ([::]:54757 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f95b01105562500f03ae9fd5fb56e7bc, version v1 2025/04/30 10:43:41 Adding connection ID (empty). 2025/04/30 10:43:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:41 client -> Sending packet 0 (1280 bytes) for connection f95b01105562500f03ae9fd5fb56e7bc, Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: f95b01105562500f03ae9fd5fb56e7bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 1: 458 bytes. Remaining: 742 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (458 bytes) for connection (empty), Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 032b7ecf3aaff7b4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 440, Version: v1} 2025/04/30 10:43:41 client Received first packet. Switching destination connection ID to: 032b7ecf3aaff7b4 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [0] 2025/04/30 10:43:41 client updated RTT: 38.549116ms (σ: 19.274558ms) 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 0 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 032b7ecf3aaff7b4, PacketNumber: 0, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:43:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f95b01105562500f03ae9fd5fb56e7bc, InitialSourceConnectionID: 032b7ecf3aaff7b4, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f95b01105562500f03ae9fd5fb56e7bc 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: 032b7ecf3aaff7b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 032b7ecf3aaff7b4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client Dropping Initial keys. 2025/04/30 10:43:41 client -> Sending packet 1 (40 bytes) for connection f95b01105562500f03ae9fd5fb56e7bc, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 032b7ecf3aaff7b4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client -> Sending packet 0 (46 bytes) for connection f95b01105562500f03ae9fd5fb56e7bc, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 032b7ecf3aaff7b4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:41 client Dropping Handshake keys. 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6ee839b59ab6be27, StatelessResetToken: 0xb2ee40ff5f0b0a7d51a655cac8e8c62f} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9776b2f2cca79e01, StatelessResetToken: 0x30a4dcd0bae7b8f72acf83fbb5eb244f} 2025/04/30 10:43:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 48cdc9a590ffabdf, StatelessResetToken: 0x9bd7cc8e96fa73db45ac2b7efb4f00d8} 2025/04/30 10:43:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:41 client -> Sending packet 1 (34 bytes) for connection f95b01105562500f03ae9fd5fb56e7bc, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 6ee839b59ab6be27, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 149.669µs} 2025/04/30 10:43:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:41 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [0] 2025/04/30 10:43:41 client updated RTT: 38.179ms (σ: 15.194ms) 2025/04/30 10:43:41 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:41 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:41 client -> Sending packet 2 (30 bytes) for connection f95b01105562500f03ae9fd5fb56e7bc, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:41 client Short Header{DestConnectionID: 6ee839b59ab6be27, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:41 client Connection f95b01105562500f03ae9fd5fb56e7bc closed. 2025/04/30 10:43:41 Requesting https://server4:443/ohfqiadkpr. 2025/04/30 10:43:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:41 Increased send buffer size to 14336 kiB 2025/04/30 10:43:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:41 Created qlog file: /logs/qlog/e2c56f678d7f793f4f1a8a43b8010f40.sqlog 2025/04/30 10:43:41 client Starting new connection to server4 ([::]:37410 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e2c56f678d7f793f4f1a8a43b8010f40, version v1 2025/04/30 10:43:41 Adding connection ID (empty). 2025/04/30 10:43:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:41 client -> Sending packet 0 (1280 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: e2c56f678d7f793f4f1a8a43b8010f40, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 1: 456 bytes. Remaining: 744 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (456 bytes) for connection (empty), Initial 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 78008a66ac5d3345, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 438, Version: v1} 2025/04/30 10:43:41 client Received first packet. Switching destination connection ID to: 78008a66ac5d3345 2025/04/30 10:43:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client newly acked packets (1): [0] 2025/04/30 10:43:41 client updated RTT: 38.071737ms (σ: 19.035868ms) 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 0 bytes. 2025/04/30 10:43:41 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 78008a66ac5d3345, PacketNumber: 0, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:43:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:43:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e2c56f678d7f793f4f1a8a43b8010f40, InitialSourceConnectionID: 78008a66ac5d3345, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40 2025/04/30 10:43:41 client Long Header{Type: Initial, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client Dropping Initial keys. 2025/04/30 10:43:41 client -> Sending packet 1 (86 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:41 client Short Header{DestConnectionID: 78008a66ac5d3345, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:41 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:41 client -> Sending packet 2 (74 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:41 client -> Sending packet 3 (74 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, Handshake 2025/04/30 10:43:41 client Long Header{Type: Handshake, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:43:42 client -> Sending packet 4 (74 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, Handshake 2025/04/30 10:43:42 client Long Header{Type: Handshake, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:42 client -> Sending packet 5 (74 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, Handshake 2025/04/30 10:43:42 client Long Header{Type: Handshake, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:43:42 client -> Sending packet 6 (74 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, Handshake 2025/04/30 10:43:42 client Long Header{Type: Handshake, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:42 client -> Sending packet 7 (74 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, Handshake 2025/04/30 10:43:42 client Long Header{Type: Handshake, DestConnectionID: 78008a66ac5d3345, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:42 client <- Reading packet 4 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:42 client Dropping Handshake keys. 2025/04/30 10:43:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b66caa911cd2d2b8, StatelessResetToken: 0xf38c93a55e6e89a81044e5f276a3be12} 2025/04/30 10:43:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 58c0b807afd8b3a4, StatelessResetToken: 0xb3622717b11fe8d4028f1732ef9141ee} 2025/04/30 10:43:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2a7a51b675fed429, StatelessResetToken: 0x09ee6158bb2beb0b00120f5df4d580d6} 2025/04/30 10:43:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:42 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:42 client -> Sending packet 2 (53 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:42 client Short Header{DestConnectionID: b66caa911cd2d2b8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:42 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 139.13µs} 2025/04/30 10:43:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:42 client -> Sending packet 3 (48 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:42 client Short Header{DestConnectionID: b66caa911cd2d2b8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:42 client <- Reading packet 6 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:42 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b66caa911cd2d2b8, StatelessResetToken: 0xf38c93a55e6e89a81044e5f276a3be12} 2025/04/30 10:43:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 58c0b807afd8b3a4, StatelessResetToken: 0xb3622717b11fe8d4028f1732ef9141ee} 2025/04/30 10:43:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2a7a51b675fed429, StatelessResetToken: 0x09ee6158bb2beb0b00120f5df4d580d6} 2025/04/30 10:43:42 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:42 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:42 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 23c78e64bb146e95, StatelessResetToken: 0x528ca526ab843974d733bf716916f33c} 2025/04/30 10:43:42 client -> Sending packet 4 (34 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:42 client Short Header{DestConnectionID: b66caa911cd2d2b8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:42 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 176.098µs} 2025/04/30 10:43:42 client <- Reading packet 9 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:42 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:42 client newly acked packets (1): [3] 2025/04/30 10:43:42 client updated RTT: 37.589ms (σ: 15.238ms) 2025/04/30 10:43:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:42 client Canceling loss detection timer. 2025/04/30 10:43:42 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:42 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:42 client -> Sending packet 5 (36 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:42 client Short Header{DestConnectionID: b66caa911cd2d2b8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:42 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 101.81µs} 2025/04/30 10:43:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:42 client -> Sending packet 6 (30 bytes) for connection e2c56f678d7f793f4f1a8a43b8010f40, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:42 client Short Header{DestConnectionID: b66caa911cd2d2b8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:42 client Connection e2c56f678d7f793f4f1a8a43b8010f40 closed. 2025/04/30 10:43:42 Requesting https://server4:443/wcavguavbc. 2025/04/30 10:43:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:42 Increased send buffer size to 14336 kiB 2025/04/30 10:43:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:42 Created qlog file: /logs/qlog/5a403c62b61160b9d60559.sqlog 2025/04/30 10:43:42 client Starting new connection to server4 ([::]:36503 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5a403c62b61160b9d60559, version v1 2025/04/30 10:43:42 Adding connection ID (empty). 2025/04/30 10:43:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:42 client -> Sending packet 0 (1280 bytes) for connection 5a403c62b61160b9d60559, Initial 2025/04/30 10:43:42 client Long Header{Type: Initial, DestConnectionID: 5a403c62b61160b9d60559, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:42 client -> Sending packet 1 (1280 bytes) for connection 5a403c62b61160b9d60559, Initial 2025/04/30 10:43:42 client Long Header{Type: Initial, DestConnectionID: 5a403c62b61160b9d60559, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:42 client -> Sending packet 2 (1280 bytes) for connection 5a403c62b61160b9d60559, Initial 2025/04/30 10:43:42 client Long Header{Type: Initial, DestConnectionID: 5a403c62b61160b9d60559, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:43 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cfb9eccfb8b7be95, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:43 client Received first packet. Switching destination connection ID to: cfb9eccfb8b7be95 2025/04/30 10:43:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:43 client -> Sending packet 3 (1280 bytes) for connection 5a403c62b61160b9d60559, Initial 2025/04/30 10:43:43 client Long Header{Type: Initial, DestConnectionID: cfb9eccfb8b7be95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:43 client <- Reading packet 1 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cfb9eccfb8b7be95, PacketNumber: 1, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5a403c62b61160b9d60559, InitialSourceConnectionID: cfb9eccfb8b7be95, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:43 client -> Sending packet 0 (79 bytes) for connection 5a403c62b61160b9d60559, Handshake 2025/04/30 10:43:43 client Long Header{Type: Handshake, DestConnectionID: cfb9eccfb8b7be95, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:43 client Dropping Initial keys. 2025/04/30 10:43:43 client -> Sending packet 0 (46 bytes) for connection 5a403c62b61160b9d60559, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:43 client Short Header{DestConnectionID: cfb9eccfb8b7be95, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:43 client <- Reading packet 2 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cfb9eccfb8b7be95, PacketNumber: 2, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:43 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:43 client Dropping Handshake keys. 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4eea6b5e9ce25d42, StatelessResetToken: 0xcee97c6084f895b5a18c904427790aff} 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c4f5cc6ea60c3ccb, StatelessResetToken: 0x80e508883411980a4846da0f345349fb} 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dedab42a6c659966, StatelessResetToken: 0x594f0e5be6618ad8498172f83328f519} 2025/04/30 10:43:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:43 client -> Sending packet 1 (1366 bytes) for connection 5a403c62b61160b9d60559, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 4eea6b5e9ce25d42, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.PingFrame{} 2025/04/30 10:43:43 client -> Sending packet 2 (34 bytes) for connection 5a403c62b61160b9d60559, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 4eea6b5e9ce25d42, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 221.734µs} 2025/04/30 10:43:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:43 client <- Reading packet 2 (53 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 54825da128ad5856, StatelessResetToken: 0x95e49e6f94d54f9abac159de1eadb521} 2025/04/30 10:43:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:43:43 client newly acked packets (2): [0 2] 2025/04/30 10:43:43 client updated RTT: 33.279064ms (σ: 16.639532ms) 2025/04/30 10:43:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:43 client setting loss timer for packet 1 (1-RTT) to 37.438947ms (in 2025-04-30 10:43:43.303338079 +0000 UTC m=+8.965133862) 2025/04/30 10:43:43 client Canceling loss detection timer. 2025/04/30 10:43:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:43 client Ignoring all packets below 1. 2025/04/30 10:43:43 client -> Sending packet 3 (32 bytes) for connection 5a403c62b61160b9d60559, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 4eea6b5e9ce25d42, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 186.879µs} 2025/04/30 10:43:43 client <- Reading packet 3 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:43 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:43 client -> Sending packet 4 (30 bytes) for connection 5a403c62b61160b9d60559, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 4eea6b5e9ce25d42, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:43 client Connection 5a403c62b61160b9d60559 closed. 2025/04/30 10:43:43 Requesting https://server4:443/xdxluqevfj. 2025/04/30 10:43:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:43 Increased send buffer size to 14336 kiB 2025/04/30 10:43:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:43 Created qlog file: /logs/qlog/2964bf5225190f072041f8.sqlog 2025/04/30 10:43:43 client Starting new connection to server4 ([::]:51147 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2964bf5225190f072041f8, version v1 2025/04/30 10:43:43 Adding connection ID (empty). 2025/04/30 10:43:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:43 client -> Sending packet 0 (1280 bytes) for connection 2964bf5225190f072041f8, Initial 2025/04/30 10:43:43 client Long Header{Type: Initial, DestConnectionID: 2964bf5225190f072041f8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:43:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:43 client -> Sending packet 1 (1280 bytes) for connection 2964bf5225190f072041f8, Initial 2025/04/30 10:43:43 client Long Header{Type: Initial, DestConnectionID: 2964bf5225190f072041f8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:43:43 client -> Sending packet 2 (1280 bytes) for connection 2964bf5225190f072041f8, Initial 2025/04/30 10:43:43 client Long Header{Type: Initial, DestConnectionID: 2964bf5225190f072041f8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:43:43 client Parsed a coalesced packet. Part 1: 462 bytes. Remaining: 738 bytes. 2025/04/30 10:43:43 client <- Reading packet 0 (462 bytes) for connection (empty), Initial 2025/04/30 10:43:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e60053e25f359f30, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 444, Version: v1} 2025/04/30 10:43:43 client Received first packet. Switching destination connection ID to: e60053e25f359f30 2025/04/30 10:43:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:43 client Parsed a coalesced packet. Part 2: 738 bytes. Remaining: 0 bytes. 2025/04/30 10:43:43 client <- Reading packet 0 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e60053e25f359f30, PacketNumber: 0, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2964bf5225190f072041f8, InitialSourceConnectionID: e60053e25f359f30, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2964bf5225190f072041f8 2025/04/30 10:43:43 client Long Header{Type: Initial, DestConnectionID: e60053e25f359f30, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:43 client Long Header{Type: Handshake, DestConnectionID: e60053e25f359f30, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:43 client Dropping Initial keys. 2025/04/30 10:43:43 client -> Sending packet 1 (86 bytes) for connection 2964bf5225190f072041f8, Handshake 2025/04/30 10:43:43 client Long Header{Type: Handshake, DestConnectionID: e60053e25f359f30, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:43 client Short Header{DestConnectionID: e60053e25f359f30, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:43 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:43 client Dropping Handshake keys. 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8014e8d83a29b37e, StatelessResetToken: 0x632e2b2edfd236df8da8416e31c214fb} 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 069a6be82921674b, StatelessResetToken: 0xcb26818e2249ba45167defbd2998af0b} 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 60e396fe01f84ef2, StatelessResetToken: 0xccc71577c4fa9d51ca4a7f3eae743812} 2025/04/30 10:43:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:43 client -> Sending packet 1 (1366 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.PingFrame{} 2025/04/30 10:43:43 client -> Sending packet 2 (34 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312.692µs} 2025/04/30 10:43:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:43 client <- Reading packet 1 (24 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 19ms} 2025/04/30 10:43:43 client newly acked packets (1): [1] 2025/04/30 10:43:43 client updated RTT: 52.336317ms (σ: 26.168158ms) 2025/04/30 10:43:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:43 client lost packet 0 (time threshold) 2025/04/30 10:43:43 client -> Sending packet 3 (46 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:43 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8014e8d83a29b37e, StatelessResetToken: 0x632e2b2edfd236df8da8416e31c214fb} 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 069a6be82921674b, StatelessResetToken: 0xcb26818e2249ba45167defbd2998af0b} 2025/04/30 10:43:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 60e396fe01f84ef2, StatelessResetToken: 0xccc71577c4fa9d51ca4a7f3eae743812} 2025/04/30 10:43:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:43 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:43 client -> Sending packet 4 (33 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.38872ms} 2025/04/30 10:43:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:43 client -> Sending packet 6 (29 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:43 client Skipping packet number 5 2025/04/30 10:43:43 client -> Sending packet 7 (46 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:43 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:44 client <- Reading packet 4 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8014e8d83a29b37e, StatelessResetToken: 0x632e2b2edfd236df8da8416e31c214fb} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 069a6be82921674b, StatelessResetToken: 0xcb26818e2249ba45167defbd2998af0b} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 60e396fe01f84ef2, StatelessResetToken: 0xccc71577c4fa9d51ca4a7f3eae743812} 2025/04/30 10:43:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:44 client -> Sending packet 8 (1409 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.PingFrame{} 2025/04/30 10:43:44 client -> Sending packet 9 (34 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 196.647µs} 2025/04/30 10:43:44 client <- Reading packet 5 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8014e8d83a29b37e, StatelessResetToken: 0x632e2b2edfd236df8da8416e31c214fb} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 069a6be82921674b, StatelessResetToken: 0xcb26818e2249ba45167defbd2998af0b} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 60e396fe01f84ef2, StatelessResetToken: 0xccc71577c4fa9d51ca4a7f3eae743812} 2025/04/30 10:43:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:44 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:44 client -> Sending packet 10 (35 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 25.281897ms} 2025/04/30 10:43:44 client <- Reading packet 6 (53 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 154c6c1f64e720d5, StatelessResetToken: 0xc4e835b3cd98d4f5489794f40dca6b1a} 2025/04/30 10:43:44 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 0s} 2025/04/30 10:43:44 client newly acked packets (2): [6 8] 2025/04/30 10:43:44 client updated RTT: 49.906ms (σ: 24.484ms) 2025/04/30 10:43:44 client lost packet 7 (time threshold) 2025/04/30 10:43:44 client Canceling loss detection timer. 2025/04/30 10:43:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:44 client -> Sending packet 11 (53 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 173.864µs} 2025/04/30 10:43:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:44 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 154c6c1f64e720d5, StatelessResetToken: 0xc4e835b3cd98d4f5489794f40dca6b1a} 2025/04/30 10:43:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:44 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:44 client -> Sending packet 12 (35 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 25.328357ms} 2025/04/30 10:43:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:44 client -> Sending packet 14 (46 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:44 client -> Sending packet 15 (46 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:44 client <- Reading packet 9 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:44 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:44 client -> Sending packet 16 (1430 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.PingFrame{} 2025/04/30 10:43:44 client -> Sending packet 17 (36 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 200.043µs} 2025/04/30 10:43:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:44 client -> Sending packet 18 (30 bytes) for connection 2964bf5225190f072041f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: 8014e8d83a29b37e, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:44 client Connection 2964bf5225190f072041f8 closed. 2025/04/30 10:43:44 Requesting https://server4:443/roxrpnvguu. 2025/04/30 10:43:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:44 Increased send buffer size to 14336 kiB 2025/04/30 10:43:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:44 Created qlog file: /logs/qlog/211922e8a024be1de7519a.sqlog 2025/04/30 10:43:44 client Starting new connection to server4 ([::]:46407 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 211922e8a024be1de7519a, version v1 2025/04/30 10:43:44 Adding connection ID (empty). 2025/04/30 10:43:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:44 client -> Sending packet 0 (1280 bytes) for connection 211922e8a024be1de7519a, Initial 2025/04/30 10:43:44 client Long Header{Type: Initial, DestConnectionID: 211922e8a024be1de7519a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:43:44 client Parsed a coalesced packet. Part 1: 462 bytes. Remaining: 738 bytes. 2025/04/30 10:43:44 client <- Reading packet 0 (462 bytes) for connection (empty), Initial 2025/04/30 10:43:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 22076771814f50eb, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 444, Version: v1} 2025/04/30 10:43:44 client Received first packet. Switching destination connection ID to: 22076771814f50eb 2025/04/30 10:43:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:44 client newly acked packets (1): [0] 2025/04/30 10:43:44 client updated RTT: 38.716621ms (σ: 19.35831ms) 2025/04/30 10:43:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:44 client Parsed a coalesced packet. Part 2: 738 bytes. Remaining: 0 bytes. 2025/04/30 10:43:44 client <- Reading packet 0 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 22076771814f50eb, PacketNumber: 0, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 211922e8a024be1de7519a, InitialSourceConnectionID: 22076771814f50eb, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 211922e8a024be1de7519a 2025/04/30 10:43:44 client Long Header{Type: Initial, DestConnectionID: 22076771814f50eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:44 client Long Header{Type: Handshake, DestConnectionID: 22076771814f50eb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:44 client Dropping Initial keys. 2025/04/30 10:43:44 client -> Sending packet 1 (86 bytes) for connection 211922e8a024be1de7519a, Handshake 2025/04/30 10:43:44 client Long Header{Type: Handshake, DestConnectionID: 22076771814f50eb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:44 client Short Header{DestConnectionID: 22076771814f50eb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:44 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:44 client Dropping Handshake keys. 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b93f87f3dcf87e88, StatelessResetToken: 0x140e9df7bb8373aa9df4d16b29961263} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 982fffb375e165a7, StatelessResetToken: 0x030fb7139645e106c3f3c000b33c5743} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fa93a3e9bdaa49f7, StatelessResetToken: 0xe2b5bb124219a9856b3be8e69850518f} 2025/04/30 10:43:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:44 client -> Sending packet 1 (34 bytes) for connection 211922e8a024be1de7519a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:44 client Short Header{DestConnectionID: b93f87f3dcf87e88, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 162.623µs} 2025/04/30 10:43:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:44 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b93f87f3dcf87e88, StatelessResetToken: 0x140e9df7bb8373aa9df4d16b29961263} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 982fffb375e165a7, StatelessResetToken: 0x030fb7139645e106c3f3c000b33c5743} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fa93a3e9bdaa49f7, StatelessResetToken: 0xe2b5bb124219a9856b3be8e69850518f} 2025/04/30 10:43:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:44 client -> Sending packet 3 (52 bytes) for connection 211922e8a024be1de7519a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:44 client Short Header{DestConnectionID: b93f87f3dcf87e88, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19.377138ms} 2025/04/30 10:43:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:44 client Skipping packet number 2 2025/04/30 10:43:44 client -> Sending packet 4 (29 bytes) for connection 211922e8a024be1de7519a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:44 client Short Header{DestConnectionID: b93f87f3dcf87e88, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:44 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:44 client newly acked packets (2): [3 4] 2025/04/30 10:43:44 client updated RTT: 38.002ms (σ: 15.946ms) 2025/04/30 10:43:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:44 client Canceling loss detection timer. 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d726764537d89349, StatelessResetToken: 0x71be21f113132f53fcc665c8bb0000b1} 2025/04/30 10:43:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:44 client Ignoring all packets below 2. 2025/04/30 10:43:44 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:44 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:44 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:44 client -> Sending packet 5 (32 bytes) for connection 211922e8a024be1de7519a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: b93f87f3dcf87e88, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 91.821µs} 2025/04/30 10:43:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:44 client -> Sending packet 6 (30 bytes) for connection 211922e8a024be1de7519a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: b93f87f3dcf87e88, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:44 client Connection 211922e8a024be1de7519a closed. 2025/04/30 10:43:44 Requesting https://server4:443/hhpdphplht. 2025/04/30 10:43:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:44 Increased send buffer size to 14336 kiB 2025/04/30 10:43:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:44 Created qlog file: /logs/qlog/731fb748466a289f4d.sqlog 2025/04/30 10:43:44 client Starting new connection to server4 ([::]:40709 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 731fb748466a289f4d, version v1 2025/04/30 10:43:44 Adding connection ID (empty). 2025/04/30 10:43:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:44 client -> Sending packet 0 (1280 bytes) for connection 731fb748466a289f4d, Initial 2025/04/30 10:43:44 client Long Header{Type: Initial, DestConnectionID: 731fb748466a289f4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:43:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:44 client Parsed a coalesced packet. Part 1: 464 bytes. Remaining: 736 bytes. 2025/04/30 10:43:44 client <- Reading packet 0 (464 bytes) for connection (empty), Initial 2025/04/30 10:43:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a27d1532ff923c69, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 446, Version: v1} 2025/04/30 10:43:44 client Received first packet. Switching destination connection ID to: a27d1532ff923c69 2025/04/30 10:43:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:44 client newly acked packets (1): [0] 2025/04/30 10:43:44 client updated RTT: 38.186611ms (σ: 19.093305ms) 2025/04/30 10:43:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:44 client Parsed a coalesced packet. Part 2: 736 bytes. Remaining: 0 bytes. 2025/04/30 10:43:44 client <- Reading packet 0 (736 bytes) for connection (empty), Handshake 2025/04/30 10:43:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a27d1532ff923c69, PacketNumber: 0, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:43:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:43:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 731fb748466a289f4d, InitialSourceConnectionID: a27d1532ff923c69, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 731fb748466a289f4d 2025/04/30 10:43:44 client Long Header{Type: Initial, DestConnectionID: a27d1532ff923c69, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1142, Version: v1} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:44 client Long Header{Type: Handshake, DestConnectionID: a27d1532ff923c69, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:44 client Short Header{DestConnectionID: a27d1532ff923c69, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:44 client Dropping Initial keys. 2025/04/30 10:43:44 client -> Sending packet 1 (40 bytes) for connection 731fb748466a289f4d, Handshake 2025/04/30 10:43:44 client Long Header{Type: Handshake, DestConnectionID: a27d1532ff923c69, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:44 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:44 client Dropping Handshake keys. 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e8502855ea3dd352, StatelessResetToken: 0x81d6d88aa6be25a8da913f4de41b329a} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 681cfb0281d7d54a, StatelessResetToken: 0xda84904bee455f1deb32fd12f7df5508} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 92b09beedc6e1f07, StatelessResetToken: 0x5e1a4cde8d75a1dd562c413568081aec} 2025/04/30 10:43:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:44 client -> Sending packet 1 (34 bytes) for connection 731fb748466a289f4d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:44 client Short Header{DestConnectionID: e8502855ea3dd352, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 152.775µs} 2025/04/30 10:43:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:44 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 91c939e50823e879, StatelessResetToken: 0x6e11e2ea6432c56c8df34016eecf6c77} 2025/04/30 10:43:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:44 client newly acked packets (2): [0 1] 2025/04/30 10:43:44 client updated RTT: 37.405ms (σ: 15.88ms) 2025/04/30 10:43:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:44 client Canceling loss detection timer. 2025/04/30 10:43:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:44 client Ignoring all packets below 1. 2025/04/30 10:43:44 client -> Sending packet 2 (32 bytes) for connection 731fb748466a289f4d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: e8502855ea3dd352, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 167.894µs} 2025/04/30 10:43:44 client <- Reading packet 3 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:44 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:44 client -> Sending packet 3 (30 bytes) for connection 731fb748466a289f4d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:44 client Short Header{DestConnectionID: e8502855ea3dd352, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:44 client Connection 731fb748466a289f4d closed. 2025/04/30 10:43:44 Requesting https://server4:443/frxnqehcjw. 2025/04/30 10:43:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:44 Increased send buffer size to 14336 kiB 2025/04/30 10:43:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:44 Created qlog file: /logs/qlog/5436335b486864f15471e343.sqlog 2025/04/30 10:43:44 client Starting new connection to server4 ([::]:41326 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5436335b486864f15471e343, version v1 2025/04/30 10:43:44 Adding connection ID (empty). 2025/04/30 10:43:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:44 client -> Sending packet 0 (1280 bytes) for connection 5436335b486864f15471e343, Initial 2025/04/30 10:43:44 client Long Header{Type: Initial, DestConnectionID: 5436335b486864f15471e343, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:43:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:45 client -> Sending packet 1 (1280 bytes) for connection 5436335b486864f15471e343, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 5436335b486864f15471e343, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:43:45 client -> Sending packet 2 (1280 bytes) for connection 5436335b486864f15471e343, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 5436335b486864f15471e343, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:43:45 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4975a2f784c180df, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:45 client Received first packet. Switching destination connection ID to: 4975a2f784c180df 2025/04/30 10:43:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client -> Sending packet 3 (1280 bytes) for connection 5436335b486864f15471e343, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 4975a2f784c180df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:45 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4975a2f784c180df, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:45 client -> Sending packet 4 (1280 bytes) for connection 5436335b486864f15471e343, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 4975a2f784c180df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:45 client <- Reading packet 1 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4975a2f784c180df, PacketNumber: 1, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5436335b486864f15471e343, InitialSourceConnectionID: 4975a2f784c180df, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:45 client -> Sending packet 0 (79 bytes) for connection 5436335b486864f15471e343, Handshake 2025/04/30 10:43:45 client Long Header{Type: Handshake, DestConnectionID: 4975a2f784c180df, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:45 client Dropping Initial keys. 2025/04/30 10:43:45 client -> Sending packet 0 (46 bytes) for connection 5436335b486864f15471e343, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:45 client Short Header{DestConnectionID: 4975a2f784c180df, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:45 client <- Reading packet 2 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4975a2f784c180df, PacketNumber: 2, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:45 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:45 client Dropping Handshake keys. 2025/04/30 10:43:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f8e60d2a98be0d84, StatelessResetToken: 0x8b7f07d16d34df8e8df5667676d9fca3} 2025/04/30 10:43:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f2b506c365a523e, StatelessResetToken: 0x407d6e17c71ab967641b5a7d5a342b6e} 2025/04/30 10:43:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 47b4ab4a9670967c, StatelessResetToken: 0x40a888ec122dbf3ff3925a40d2ef9c73} 2025/04/30 10:43:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:45 client -> Sending packet 1 (1366 bytes) for connection 5436335b486864f15471e343, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:45 client Short Header{DestConnectionID: f8e60d2a98be0d84, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.PingFrame{} 2025/04/30 10:43:45 client -> Sending packet 2 (34 bytes) for connection 5436335b486864f15471e343, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:45 client Short Header{DestConnectionID: f8e60d2a98be0d84, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 287.326µs} 2025/04/30 10:43:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:45 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:45 client newly acked packets (1): [0] 2025/04/30 10:43:45 client updated RTT: 34.391969ms (σ: 17.195984ms) 2025/04/30 10:43:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:45 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:45 client -> Sending packet 3 (30 bytes) for connection 5436335b486864f15471e343, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:45 client Short Header{DestConnectionID: f8e60d2a98be0d84, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:45 client Connection 5436335b486864f15471e343 closed. 2025/04/30 10:43:45 Requesting https://server4:443/ysownkpcbw. 2025/04/30 10:43:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:45 Increased send buffer size to 14336 kiB 2025/04/30 10:43:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:45 Created qlog file: /logs/qlog/4f5e74cf0780fed3.sqlog 2025/04/30 10:43:45 client Starting new connection to server4 ([::]:44298 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4f5e74cf0780fed3, version v1 2025/04/30 10:43:45 Adding connection ID (empty). 2025/04/30 10:43:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:45 client -> Sending packet 0 (1280 bytes) for connection 4f5e74cf0780fed3, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 4f5e74cf0780fed3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:43:45 client Parsed a coalesced packet. Part 1: 465 bytes. Remaining: 735 bytes. 2025/04/30 10:43:45 client <- Reading packet 0 (465 bytes) for connection (empty), Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 68fc7d0022e0b4b8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 447, Version: v1} 2025/04/30 10:43:45 client Received first packet. Switching destination connection ID to: 68fc7d0022e0b4b8 2025/04/30 10:43:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:45 client newly acked packets (1): [0] 2025/04/30 10:43:45 client updated RTT: 37.808464ms (σ: 18.904232ms) 2025/04/30 10:43:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client Parsed a coalesced packet. Part 2: 735 bytes. Remaining: 0 bytes. 2025/04/30 10:43:45 client <- Reading packet 0 (735 bytes) for connection (empty), Handshake 2025/04/30 10:43:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 68fc7d0022e0b4b8, PacketNumber: 0, PacketNumberLen: 1, Length: 718, Version: v1} 2025/04/30 10:43:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 10:43:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4f5e74cf0780fed3, InitialSourceConnectionID: 68fc7d0022e0b4b8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4f5e74cf0780fed3 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 68fc7d0022e0b4b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:45 client Long Header{Type: Handshake, DestConnectionID: 68fc7d0022e0b4b8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:45 client Dropping Initial keys. 2025/04/30 10:43:45 client -> Sending packet 1 (86 bytes) for connection 4f5e74cf0780fed3, Handshake 2025/04/30 10:43:45 client Long Header{Type: Handshake, DestConnectionID: 68fc7d0022e0b4b8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:45 client Short Header{DestConnectionID: 68fc7d0022e0b4b8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:45 client -> Sending packet 2 (74 bytes) for connection 4f5e74cf0780fed3, Handshake 2025/04/30 10:43:45 client Long Header{Type: Handshake, DestConnectionID: 68fc7d0022e0b4b8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:45 client -> Sending packet 3 (74 bytes) for connection 4f5e74cf0780fed3, Handshake 2025/04/30 10:43:45 client Long Header{Type: Handshake, DestConnectionID: 68fc7d0022e0b4b8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:45 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:45 client Dropping Handshake keys. 2025/04/30 10:43:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f556ff9974e187a, StatelessResetToken: 0x54bb73011c63e3d93f7940803504ee1a} 2025/04/30 10:43:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6df9027f01f67e6b, StatelessResetToken: 0x670b0dd0fef56cd649761ba4814f6c1d} 2025/04/30 10:43:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3282793fb82dba42, StatelessResetToken: 0xc8d479007e92e0c5ec10a107cbb12416} 2025/04/30 10:43:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:45 client -> Sending packet 2 (53 bytes) for connection 4f5e74cf0780fed3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:45 client Short Header{DestConnectionID: 5f556ff9974e187a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 147.555µs} 2025/04/30 10:43:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:45 client -> Sending packet 3 (48 bytes) for connection 4f5e74cf0780fed3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:45 client Short Header{DestConnectionID: 5f556ff9974e187a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:45 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ef6bdb448c2a6b77, StatelessResetToken: 0xd8dd81995946f6306dffb65335abe587} 2025/04/30 10:43:45 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:45 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:45 client -> Sending packet 4 (33 bytes) for connection 4f5e74cf0780fed3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:45 client Short Header{DestConnectionID: 5f556ff9974e187a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.30679ms} 2025/04/30 10:43:45 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ef6bdb448c2a6b77, StatelessResetToken: 0xd8dd81995946f6306dffb65335abe587} 2025/04/30 10:43:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:45 client -> Sending packet 5 (34 bytes) for connection 4f5e74cf0780fed3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:45 client Short Header{DestConnectionID: 5f556ff9974e187a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 129.812µs} 2025/04/30 10:43:45 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:45 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:45 client newly acked packets (1): [3] 2025/04/30 10:43:45 client updated RTT: 55.165ms (σ: 48.893ms) 2025/04/30 10:43:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:45 client Canceling loss detection timer. 2025/04/30 10:43:45 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:45 client -> Sending packet 6 (30 bytes) for connection 4f5e74cf0780fed3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:45 client Short Header{DestConnectionID: 5f556ff9974e187a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:45 client Connection 4f5e74cf0780fed3 closed. 2025/04/30 10:43:45 Requesting https://server4:443/iokoxtwlsz. 2025/04/30 10:43:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:45 Increased send buffer size to 14336 kiB 2025/04/30 10:43:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:45 Created qlog file: /logs/qlog/7471f400f403ac9e4d57a0.sqlog 2025/04/30 10:43:45 client Starting new connection to server4 ([::]:45842 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7471f400f403ac9e4d57a0, version v1 2025/04/30 10:43:45 Adding connection ID (empty). 2025/04/30 10:43:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:45 client -> Sending packet 0 (1280 bytes) for connection 7471f400f403ac9e4d57a0, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 7471f400f403ac9e4d57a0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:43:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:45 client -> Sending packet 1 (1280 bytes) for connection 7471f400f403ac9e4d57a0, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 7471f400f403ac9e4d57a0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:43:45 client -> Sending packet 2 (1280 bytes) for connection 7471f400f403ac9e4d57a0, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 7471f400f403ac9e4d57a0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:43:45 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d36b53c67763266, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:45 client Received first packet. Switching destination connection ID to: 6d36b53c67763266 2025/04/30 10:43:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:45 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d36b53c67763266, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:45 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:45 client newly acked packets (1): [2] 2025/04/30 10:43:45 client updated RTT: 34.886075ms (σ: 17.443037ms) 2025/04/30 10:43:45 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d36b53c67763266, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:45 client -> Sending packet 3 (1280 bytes) for connection 7471f400f403ac9e4d57a0, Initial 2025/04/30 10:43:45 client Long Header{Type: Initial, DestConnectionID: 6d36b53c67763266, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:46 client <- Reading packet 1 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d36b53c67763266, PacketNumber: 1, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7471f400f403ac9e4d57a0, InitialSourceConnectionID: 6d36b53c67763266, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:46 client -> Sending packet 0 (79 bytes) for connection 7471f400f403ac9e4d57a0, Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: 6d36b53c67763266, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:46 client Dropping Initial keys. 2025/04/30 10:43:46 client -> Sending packet 0 (46 bytes) for connection 7471f400f403ac9e4d57a0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: 6d36b53c67763266, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:46 client <- Reading packet 3 (738 bytes) for connection (empty), Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d36b53c67763266, PacketNumber: 3, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:43:46 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:46 client Dropping Handshake keys. 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fce5380a4403ecfd, StatelessResetToken: 0x3d066dd20066355ab9eaa124b5d03c39} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7c0c2e5cac017160, StatelessResetToken: 0xc0708787b03a0deef2845d0350fae2bc} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6ccd789680a49d04, StatelessResetToken: 0x78e7a331befd81142a0481df88a000c3} 2025/04/30 10:43:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:46 client -> Sending packet 1 (34 bytes) for connection 7471f400f403ac9e4d57a0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: fce5380a4403ecfd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 196.958µs} 2025/04/30 10:43:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:46 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client newly acked packets (1): [0] 2025/04/30 10:43:46 client updated RTT: 34.827ms (σ: 13.199ms) 2025/04/30 10:43:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:46 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:46 client -> Sending packet 2 (30 bytes) for connection 7471f400f403ac9e4d57a0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:46 client Short Header{DestConnectionID: fce5380a4403ecfd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:46 client Connection 7471f400f403ac9e4d57a0 closed. 2025/04/30 10:43:46 Requesting https://server4:443/scyixkqchm. 2025/04/30 10:43:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:46 Increased send buffer size to 14336 kiB 2025/04/30 10:43:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:46 Created qlog file: /logs/qlog/b9096f50abba9338.sqlog 2025/04/30 10:43:46 client Starting new connection to server4 ([::]:40595 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b9096f50abba9338, version v1 2025/04/30 10:43:46 Adding connection ID (empty). 2025/04/30 10:43:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:46 client -> Sending packet 0 (1280 bytes) for connection b9096f50abba9338, Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: b9096f50abba9338, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:43:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:46 client -> Sending packet 1 (1280 bytes) for connection b9096f50abba9338, Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: b9096f50abba9338, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:43:46 client -> Sending packet 2 (1280 bytes) for connection b9096f50abba9338, Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: b9096f50abba9338, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:43:46 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d313d9d124f0613d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:46 client Received first packet. Switching destination connection ID to: d313d9d124f0613d 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client -> Sending packet 3 (1280 bytes) for connection b9096f50abba9338, Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: d313d9d124f0613d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:46 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d313d9d124f0613d, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:43:46 client newly acked packets (1): [2] 2025/04/30 10:43:46 client updated RTT: 71.266743ms (σ: 35.633371ms) 2025/04/30 10:43:46 client -> Sending packet 4 (1280 bytes) for connection b9096f50abba9338, Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: d313d9d124f0613d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:46 client <- Reading packet 1 (736 bytes) for connection (empty), Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d313d9d124f0613d, PacketNumber: 1, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:43:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b9096f50abba9338, InitialSourceConnectionID: d313d9d124f0613d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:46 client -> Sending packet 0 (79 bytes) for connection b9096f50abba9338, Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: d313d9d124f0613d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:46 client Dropping Initial keys. 2025/04/30 10:43:46 client -> Sending packet 0 (46 bytes) for connection b9096f50abba9338, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: d313d9d124f0613d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:46 client <- Reading packet 2 (736 bytes) for connection (empty), Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d313d9d124f0613d, PacketNumber: 2, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:43:46 client -> Sending packet 1 (40 bytes) for connection b9096f50abba9338, Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: d313d9d124f0613d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:46 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:46 client Dropping Handshake keys. 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb7e966edcfb7fdb, StatelessResetToken: 0xe5b60ee9a8c5b966041c84ddcdc2dae8} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d808ba4a49853b9c, StatelessResetToken: 0xfc2c8014394daf45f8902353ee002121} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c357a608badc7f4, StatelessResetToken: 0x110aa047009c499fd516cefd7f05fdfb} 2025/04/30 10:43:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:46 client -> Sending packet 1 (34 bytes) for connection b9096f50abba9338, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: cb7e966edcfb7fdb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 172.131µs} 2025/04/30 10:43:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:46 client <- Reading packet 3 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb7e966edcfb7fdb, StatelessResetToken: 0xe5b60ee9a8c5b966041c84ddcdc2dae8} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d808ba4a49853b9c, StatelessResetToken: 0xfc2c8014394daf45f8902353ee002121} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c357a608badc7f4, StatelessResetToken: 0x110aa047009c499fd516cefd7f05fdfb} 2025/04/30 10:43:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:46 client <- Reading packet 4 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb7e966edcfb7fdb, StatelessResetToken: 0xe5b60ee9a8c5b966041c84ddcdc2dae8} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d808ba4a49853b9c, StatelessResetToken: 0xfc2c8014394daf45f8902353ee002121} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c357a608badc7f4, StatelessResetToken: 0x110aa047009c499fd516cefd7f05fdfb} 2025/04/30 10:43:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:46 client -> Sending packet 2 (32 bytes) for connection b9096f50abba9338, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: cb7e966edcfb7fdb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 77.194µs} 2025/04/30 10:43:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:46 client -> Sending packet 4 (46 bytes) for connection b9096f50abba9338, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: cb7e966edcfb7fdb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:46 client Skipping packet number 3 2025/04/30 10:43:46 client -> Sending packet 5 (29 bytes) for connection b9096f50abba9338, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: cb7e966edcfb7fdb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:46 client <- Reading packet 5 (1140 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb7e966edcfb7fdb, StatelessResetToken: 0xe5b60ee9a8c5b966041c84ddcdc2dae8} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d808ba4a49853b9c, StatelessResetToken: 0xfc2c8014394daf45f8902353ee002121} 2025/04/30 10:43:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c357a608badc7f4, StatelessResetToken: 0x110aa047009c499fd516cefd7f05fdfb} 2025/04/30 10:43:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:46 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:46 client -> Sending packet 6 (30 bytes) for connection b9096f50abba9338, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: cb7e966edcfb7fdb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:46 client Connection b9096f50abba9338 closed. 2025/04/30 10:43:46 Requesting https://server4:443/lxsbzqofja. 2025/04/30 10:43:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:46 Increased send buffer size to 14336 kiB 2025/04/30 10:43:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:46 Created qlog file: /logs/qlog/42290dc31a67e9ce297b29dfacb2ee3f70.sqlog 2025/04/30 10:43:46 client Starting new connection to server4 ([::]:53789 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 42290dc31a67e9ce297b29dfacb2ee3f70, version v1 2025/04/30 10:43:46 Adding connection ID (empty). 2025/04/30 10:43:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:46 client -> Sending packet 0 (1280 bytes) for connection 42290dc31a67e9ce297b29dfacb2ee3f70, Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: 42290dc31a67e9ce297b29dfacb2ee3f70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:43:46 client Parsed a coalesced packet. Part 1: 456 bytes. Remaining: 744 bytes. 2025/04/30 10:43:46 client <- Reading packet 0 (456 bytes) for connection (empty), Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c37b6ff1280c6d61, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 438, Version: v1} 2025/04/30 10:43:46 client Received first packet. Switching destination connection ID to: c37b6ff1280c6d61 2025/04/30 10:43:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client newly acked packets (1): [0] 2025/04/30 10:43:46 client updated RTT: 37.986159ms (σ: 18.993079ms) 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 0 bytes. 2025/04/30 10:43:46 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c37b6ff1280c6d61, PacketNumber: 0, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:43:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 42290dc31a67e9ce297b29dfacb2ee3f70, InitialSourceConnectionID: c37b6ff1280c6d61, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 42290dc31a67e9ce297b29dfacb2ee3f70 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: c37b6ff1280c6d61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: c37b6ff1280c6d61, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:46 client Dropping Initial keys. 2025/04/30 10:43:46 client -> Sending packet 1 (40 bytes) for connection 42290dc31a67e9ce297b29dfacb2ee3f70, Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: c37b6ff1280c6d61, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client -> Sending packet 0 (46 bytes) for connection 42290dc31a67e9ce297b29dfacb2ee3f70, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: c37b6ff1280c6d61, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:46 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client Peer doesn't await address validation any longer. 2025/04/30 10:43:46 client newly acked packets (1): [0] 2025/04/30 10:43:46 client updated RTT: 37.706ms (σ: 14.804ms) 2025/04/30 10:43:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:46 client Canceling loss detection timer. 2025/04/30 10:43:46 client Dropping Handshake keys. 2025/04/30 10:43:46 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:46 client -> Sending packet 1 (32 bytes) for connection 42290dc31a67e9ce297b29dfacb2ee3f70, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:46 client Short Header{DestConnectionID: c37b6ff1280c6d61, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 168.043µs} 2025/04/30 10:43:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:46 client -> Sending packet 2 (30 bytes) for connection 42290dc31a67e9ce297b29dfacb2ee3f70, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:46 client Short Header{DestConnectionID: c37b6ff1280c6d61, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:46 client Connection 42290dc31a67e9ce297b29dfacb2ee3f70 closed. 2025/04/30 10:43:46 Requesting https://server4:443/qcuohknsoq. 2025/04/30 10:43:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:46 Increased send buffer size to 14336 kiB 2025/04/30 10:43:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:46 Created qlog file: /logs/qlog/329c623c6b401243cd.sqlog 2025/04/30 10:43:46 client Starting new connection to server4 ([::]:52459 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 329c623c6b401243cd, version v1 2025/04/30 10:43:46 Adding connection ID (empty). 2025/04/30 10:43:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:46 client -> Sending packet 0 (1280 bytes) for connection 329c623c6b401243cd, Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: 329c623c6b401243cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:43:46 client Parsed a coalesced packet. Part 1: 463 bytes. Remaining: 737 bytes. 2025/04/30 10:43:46 client <- Reading packet 0 (463 bytes) for connection (empty), Initial 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 476dc2392820b833, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 445, Version: v1} 2025/04/30 10:43:46 client Received first packet. Switching destination connection ID to: 476dc2392820b833 2025/04/30 10:43:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client newly acked packets (1): [0] 2025/04/30 10:43:46 client updated RTT: 37.391056ms (σ: 18.695528ms) 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Parsed a coalesced packet. Part 2: 737 bytes. Remaining: 0 bytes. 2025/04/30 10:43:46 client <- Reading packet 0 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 476dc2392820b833, PacketNumber: 0, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 329c623c6b401243cd, InitialSourceConnectionID: 476dc2392820b833, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 329c623c6b401243cd 2025/04/30 10:43:46 client Long Header{Type: Initial, DestConnectionID: 476dc2392820b833, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: 476dc2392820b833, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:46 client Dropping Initial keys. 2025/04/30 10:43:46 client -> Sending packet 1 (40 bytes) for connection 329c623c6b401243cd, Handshake 2025/04/30 10:43:46 client Long Header{Type: Handshake, DestConnectionID: 476dc2392820b833, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:46 client -> Sending packet 0 (46 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:46 client Short Header{DestConnectionID: 476dc2392820b833, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:47 client -> Sending packet 2 (74 bytes) for connection 329c623c6b401243cd, Handshake 2025/04/30 10:43:47 client Long Header{Type: Handshake, DestConnectionID: 476dc2392820b833, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:47 client -> Sending packet 3 (74 bytes) for connection 329c623c6b401243cd, Handshake 2025/04/30 10:43:47 client Long Header{Type: Handshake, DestConnectionID: 476dc2392820b833, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:47 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:47 client Dropping Handshake keys. 2025/04/30 10:43:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a21358d21d27d431, StatelessResetToken: 0x121bdccaababc21f2c34d20d1dd4ec39} 2025/04/30 10:43:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bacfb6a653f7f605, StatelessResetToken: 0x3c479ac4b2bfa93f717b9a615393cf8c} 2025/04/30 10:43:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a902f86ae9bd91f0, StatelessResetToken: 0x1e40076b8753c272c0507f066842c261} 2025/04/30 10:43:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:47 client -> Sending packet 2 (53 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:47 client Short Header{DestConnectionID: a21358d21d27d431, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 136.655µs} 2025/04/30 10:43:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:47 client -> Sending packet 3 (48 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:47 client Short Header{DestConnectionID: a21358d21d27d431, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:43:47 client -> Sending packet 5 (48 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:47 client Short Header{DestConnectionID: a21358d21d27d431, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:47 client -> Sending packet 6 (48 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:47 client Short Header{DestConnectionID: a21358d21d27d431, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:47 client -> Sending packet 7 (1366 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:47 client Short Header{DestConnectionID: a21358d21d27d431, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:47 client -> &wire.PingFrame{} 2025/04/30 10:43:47 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:47 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:43:47 client newly acked packets (1): [6] 2025/04/30 10:43:47 client updated RTT: 36.728ms (σ: 15.345ms) 2025/04/30 10:43:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:47 client Canceling loss detection timer. 2025/04/30 10:43:47 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:47 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea1c798afb85f8b1, StatelessResetToken: 0x42f12d227a30080657208cfe2c0cb7e6} 2025/04/30 10:43:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:47 client <- Reading packet 6 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:47 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea1c798afb85f8b1, StatelessResetToken: 0x42f12d227a30080657208cfe2c0cb7e6} 2025/04/30 10:43:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:47 client -> Sending packet 8 (34 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:47 client Short Header{DestConnectionID: a21358d21d27d431, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:47 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 59.23µs} 2025/04/30 10:43:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:47 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:47 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea1c798afb85f8b1, StatelessResetToken: 0x42f12d227a30080657208cfe2c0cb7e6} 2025/04/30 10:43:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:47 client <- Reading packet 8 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:47 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea1c798afb85f8b1, StatelessResetToken: 0x42f12d227a30080657208cfe2c0cb7e6} 2025/04/30 10:43:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:47 client -> Sending packet 9 (34 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:47 client Short Header{DestConnectionID: a21358d21d27d431, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:47 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 53.61µs} 2025/04/30 10:43:48 client <- Reading packet 9 (1078 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:48 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea1c798afb85f8b1, StatelessResetToken: 0x42f12d227a30080657208cfe2c0cb7e6} 2025/04/30 10:43:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:48 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:48 client -> Sending packet 10 (30 bytes) for connection 329c623c6b401243cd, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:48 client Short Header{DestConnectionID: a21358d21d27d431, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:48 client Connection 329c623c6b401243cd closed. 2025/04/30 10:43:48 Requesting https://server4:443/xsujlmggwa. 2025/04/30 10:43:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:48 Increased send buffer size to 14336 kiB 2025/04/30 10:43:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:48 Created qlog file: /logs/qlog/9342964262810603d0.sqlog 2025/04/30 10:43:48 client Starting new connection to server4 ([::]:42991 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9342964262810603d0, version v1 2025/04/30 10:43:48 Adding connection ID (empty). 2025/04/30 10:43:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:48 client -> Sending packet 0 (1280 bytes) for connection 9342964262810603d0, Initial 2025/04/30 10:43:48 client Long Header{Type: Initial, DestConnectionID: 9342964262810603d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:48 client -> Sending packet 1 (1280 bytes) for connection 9342964262810603d0, Initial 2025/04/30 10:43:48 client Long Header{Type: Initial, DestConnectionID: 9342964262810603d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:48 client -> Sending packet 2 (1280 bytes) for connection 9342964262810603d0, Initial 2025/04/30 10:43:48 client Long Header{Type: Initial, DestConnectionID: 9342964262810603d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:48 client Parsed a coalesced packet. Part 1: 463 bytes. Remaining: 737 bytes. 2025/04/30 10:43:48 client <- Reading packet 0 (463 bytes) for connection (empty), Initial 2025/04/30 10:43:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d06d5347eaa00ec3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 445, Version: v1} 2025/04/30 10:43:48 client Received first packet. Switching destination connection ID to: d06d5347eaa00ec3 2025/04/30 10:43:48 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:48 client newly acked packets (1): [2] 2025/04/30 10:43:48 client updated RTT: 38.553219ms (σ: 19.276609ms) 2025/04/30 10:43:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:48 client Parsed a coalesced packet. Part 2: 737 bytes. Remaining: 0 bytes. 2025/04/30 10:43:48 client <- Reading packet 0 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d06d5347eaa00ec3, PacketNumber: 0, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9342964262810603d0, InitialSourceConnectionID: d06d5347eaa00ec3, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9342964262810603d0 2025/04/30 10:43:48 client Long Header{Type: Initial, DestConnectionID: d06d5347eaa00ec3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:48 client Long Header{Type: Handshake, DestConnectionID: d06d5347eaa00ec3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:48 client Dropping Initial keys. 2025/04/30 10:43:48 client -> Sending packet 1 (86 bytes) for connection 9342964262810603d0, Handshake 2025/04/30 10:43:48 client Long Header{Type: Handshake, DestConnectionID: d06d5347eaa00ec3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:48 client Short Header{DestConnectionID: d06d5347eaa00ec3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:48 client -> Sending packet 2 (74 bytes) for connection 9342964262810603d0, Handshake 2025/04/30 10:43:48 client Long Header{Type: Handshake, DestConnectionID: d06d5347eaa00ec3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:48 client -> Sending packet 3 (74 bytes) for connection 9342964262810603d0, Handshake 2025/04/30 10:43:48 client Long Header{Type: Handshake, DestConnectionID: d06d5347eaa00ec3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:43:48 client -> Sending packet 4 (74 bytes) for connection 9342964262810603d0, Handshake 2025/04/30 10:43:48 client Long Header{Type: Handshake, DestConnectionID: d06d5347eaa00ec3, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:48 client -> Sending packet 5 (74 bytes) for connection 9342964262810603d0, Handshake 2025/04/30 10:43:48 client Long Header{Type: Handshake, DestConnectionID: d06d5347eaa00ec3, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:48 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:48 client Dropping Handshake keys. 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebbaf27f761d5ae9, StatelessResetToken: 0x0fb4516cfb94961b1d15945d9472923b} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: af493fe6c72e3894, StatelessResetToken: 0x6ba72db06fdd8dffe6721940add5759c} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8822a93fad0dc6fb, StatelessResetToken: 0xa85ddf3046666a95f4d0d92acdf5b676} 2025/04/30 10:43:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:48 client -> Sending packet 2 (53 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 197.048µs} 2025/04/30 10:43:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:48 client -> Sending packet 3 (48 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:48 client <- Reading packet 3 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebbaf27f761d5ae9, StatelessResetToken: 0x0fb4516cfb94961b1d15945d9472923b} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: af493fe6c72e3894, StatelessResetToken: 0x6ba72db06fdd8dffe6721940add5759c} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8822a93fad0dc6fb, StatelessResetToken: 0xa85ddf3046666a95f4d0d92acdf5b676} 2025/04/30 10:43:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:48 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:48 client -> Sending packet 4 (33 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.281879ms} 2025/04/30 10:43:48 client <- Reading packet 4 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebbaf27f761d5ae9, StatelessResetToken: 0x0fb4516cfb94961b1d15945d9472923b} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: af493fe6c72e3894, StatelessResetToken: 0x6ba72db06fdd8dffe6721940add5759c} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8822a93fad0dc6fb, StatelessResetToken: 0xa85ddf3046666a95f4d0d92acdf5b676} 2025/04/30 10:43:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:48 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:48 client -> Sending packet 5 (33 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 25.328435ms} 2025/04/30 10:43:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:43:48 client -> Sending packet 7 (48 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:48 client -> Sending packet 8 (48 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:48 client -> Sending packet 9 (1366 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.PingFrame{} 2025/04/30 10:43:48 client <- Reading packet 5 (53 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:48 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fa737ca5f150d218, StatelessResetToken: 0x9c04347a4dfb1e00c0f884d70ce59033} 2025/04/30 10:43:48 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 0s} 2025/04/30 10:43:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:48 client <- Reading packet 6 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:48 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:48 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 0s} 2025/04/30 10:43:48 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:48 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:48 client -> Sending packet 10 (32 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 96.22µs} 2025/04/30 10:43:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:48 client -> Sending packet 11 (30 bytes) for connection 9342964262810603d0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:48 client Short Header{DestConnectionID: ebbaf27f761d5ae9, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:48 client Connection 9342964262810603d0 closed. 2025/04/30 10:43:48 Requesting https://server4:443/xjrxhqhytm. 2025/04/30 10:43:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:48 Increased send buffer size to 14336 kiB 2025/04/30 10:43:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:48 Created qlog file: /logs/qlog/4d2e2a32cb6733e10124686b.sqlog 2025/04/30 10:43:48 client Starting new connection to server4 ([::]:43504 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4d2e2a32cb6733e10124686b, version v1 2025/04/30 10:43:48 Adding connection ID (empty). 2025/04/30 10:43:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:48 client -> Sending packet 0 (1280 bytes) for connection 4d2e2a32cb6733e10124686b, Initial 2025/04/30 10:43:48 client Long Header{Type: Initial, DestConnectionID: 4d2e2a32cb6733e10124686b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:43:49 client Parsed a coalesced packet. Part 1: 460 bytes. Remaining: 740 bytes. 2025/04/30 10:43:49 client <- Reading packet 0 (460 bytes) for connection (empty), Initial 2025/04/30 10:43:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 15292c8764e323de, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 442, Version: v1} 2025/04/30 10:43:49 client Received first packet. Switching destination connection ID to: 15292c8764e323de 2025/04/30 10:43:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:49 client newly acked packets (1): [0] 2025/04/30 10:43:49 client updated RTT: 37.928652ms (σ: 18.964326ms) 2025/04/30 10:43:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:49 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 0 bytes. 2025/04/30 10:43:49 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 15292c8764e323de, PacketNumber: 0, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:43:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:43:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4d2e2a32cb6733e10124686b, InitialSourceConnectionID: 15292c8764e323de, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4d2e2a32cb6733e10124686b 2025/04/30 10:43:49 client Long Header{Type: Initial, DestConnectionID: 15292c8764e323de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: 15292c8764e323de, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:49 client Dropping Initial keys. 2025/04/30 10:43:49 client -> Sending packet 1 (40 bytes) for connection 4d2e2a32cb6733e10124686b, Handshake 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: 15292c8764e323de, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:49 client -> Sending packet 0 (46 bytes) for connection 4d2e2a32cb6733e10124686b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:49 client Short Header{DestConnectionID: 15292c8764e323de, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:49 client -> Sending packet 2 (74 bytes) for connection 4d2e2a32cb6733e10124686b, Handshake 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: 15292c8764e323de, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:49 client -> Sending packet 3 (74 bytes) for connection 4d2e2a32cb6733e10124686b, Handshake 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: 15292c8764e323de, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:49 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:49 client Dropping Handshake keys. 2025/04/30 10:43:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a5b91cfc9e003a74, StatelessResetToken: 0x116cddd5406896c9fa6c3c0ff21b6ec3} 2025/04/30 10:43:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 87923433dfd96548, StatelessResetToken: 0x608e8656a3fe643ccfdcd59071a57296} 2025/04/30 10:43:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0e57d8e675e49d95, StatelessResetToken: 0x577f15ebd124acc56907bb6f1596e85d} 2025/04/30 10:43:49 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:49 client -> Sending packet 2 (53 bytes) for connection 4d2e2a32cb6733e10124686b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:49 client Short Header{DestConnectionID: a5b91cfc9e003a74, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 156.452µs} 2025/04/30 10:43:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:49 client -> Sending packet 3 (48 bytes) for connection 4d2e2a32cb6733e10124686b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:49 client Short Header{DestConnectionID: a5b91cfc9e003a74, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:43:49 client -> Sending packet 5 (48 bytes) for connection 4d2e2a32cb6733e10124686b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:49 client Short Header{DestConnectionID: a5b91cfc9e003a74, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:49 client -> Sending packet 6 (48 bytes) for connection 4d2e2a32cb6733e10124686b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:49 client Short Header{DestConnectionID: a5b91cfc9e003a74, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:49 client -> Sending packet 7 (1366 bytes) for connection 4d2e2a32cb6733e10124686b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:49 client Short Header{DestConnectionID: a5b91cfc9e003a74, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.PingFrame{} 2025/04/30 10:43:49 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a6bd7f448ac90ea4, StatelessResetToken: 0x63e5e2285442bfcabbd3e5ec7942a0cd} 2025/04/30 10:43:49 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/04/30 10:43:49 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:49 client -> Sending packet 8 (34 bytes) for connection 4d2e2a32cb6733e10124686b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:49 client Short Header{DestConnectionID: a5b91cfc9e003a74, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 126.977µs} 2025/04/30 10:43:49 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:49 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 0s} 2025/04/30 10:43:49 client newly acked packets (2): [6 7] 2025/04/30 10:43:49 client updated RTT: 37.28ms (σ: 15.518ms) 2025/04/30 10:43:49 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:49 client Canceling loss detection timer. 2025/04/30 10:43:49 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:49 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:49 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 0s} 2025/04/30 10:43:49 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:49 client -> Sending packet 9 (30 bytes) for connection 4d2e2a32cb6733e10124686b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:49 client Short Header{DestConnectionID: a5b91cfc9e003a74, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:49 client Connection 4d2e2a32cb6733e10124686b closed. 2025/04/30 10:43:49 Requesting https://server4:443/nvvmwjehwt. 2025/04/30 10:43:49 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:49 Increased send buffer size to 14336 kiB 2025/04/30 10:43:49 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:49 Created qlog file: /logs/qlog/01eb65d606a863f9f926a4f9.sqlog 2025/04/30 10:43:49 client Starting new connection to server4 ([::]:40339 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 01eb65d606a863f9f926a4f9, version v1 2025/04/30 10:43:49 Adding connection ID (empty). 2025/04/30 10:43:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:49 client -> Sending packet 0 (1280 bytes) for connection 01eb65d606a863f9f926a4f9, Initial 2025/04/30 10:43:49 client Long Header{Type: Initial, DestConnectionID: 01eb65d606a863f9f926a4f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:49 client -> Sending packet 1 (1280 bytes) for connection 01eb65d606a863f9f926a4f9, Initial 2025/04/30 10:43:49 client Long Header{Type: Initial, DestConnectionID: 01eb65d606a863f9f926a4f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:49 client -> Sending packet 2 (1280 bytes) for connection 01eb65d606a863f9f926a4f9, Initial 2025/04/30 10:43:49 client Long Header{Type: Initial, DestConnectionID: 01eb65d606a863f9f926a4f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:49 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 72675b9f986a3636, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:49 client Received first packet. Switching destination connection ID to: 72675b9f986a3636 2025/04/30 10:43:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:49 client newly acked packets (1): [2] 2025/04/30 10:43:49 client updated RTT: 35.258129ms (σ: 17.629064ms) 2025/04/30 10:43:49 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 72675b9f986a3636, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:49 client -> Sending packet 3 (1280 bytes) for connection 01eb65d606a863f9f926a4f9, Initial 2025/04/30 10:43:49 client Long Header{Type: Initial, DestConnectionID: 72675b9f986a3636, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:49 client <- Reading packet 1 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 72675b9f986a3636, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 01eb65d606a863f9f926a4f9, InitialSourceConnectionID: 72675b9f986a3636, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:49 client -> Sending packet 0 (79 bytes) for connection 01eb65d606a863f9f926a4f9, Handshake 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: 72675b9f986a3636, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:49 client Dropping Initial keys. 2025/04/30 10:43:49 client -> Sending packet 0 (46 bytes) for connection 01eb65d606a863f9f926a4f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:49 client Short Header{DestConnectionID: 72675b9f986a3636, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:49 client <- Reading packet 2 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 72675b9f986a3636, PacketNumber: 2, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:49 client -> Sending packet 1 (40 bytes) for connection 01eb65d606a863f9f926a4f9, Handshake 2025/04/30 10:43:49 client Long Header{Type: Handshake, DestConnectionID: 72675b9f986a3636, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:50 client -> Sending packet 2 (74 bytes) for connection 01eb65d606a863f9f926a4f9, Handshake 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: 72675b9f986a3636, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:50 client -> Sending packet 3 (74 bytes) for connection 01eb65d606a863f9f926a4f9, Handshake 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: 72675b9f986a3636, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:50 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:50 client Dropping Handshake keys. 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9e5ff33bff50a706, StatelessResetToken: 0xeb608ddd779d3ab77ea01f9efce8786f} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ff32fff52f359ffa, StatelessResetToken: 0xf98591721afe314a76109724b5c25d3d} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 26ac5d1c17a032b1, StatelessResetToken: 0x1f4c3514c429268df9d64f9ba3af4e1a} 2025/04/30 10:43:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:50 client -> Sending packet 2 (53 bytes) for connection 01eb65d606a863f9f926a4f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 9e5ff33bff50a706, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 131.225µs} 2025/04/30 10:43:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:50 client -> Sending packet 3 (48 bytes) for connection 01eb65d606a863f9f926a4f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 9e5ff33bff50a706, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:50 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 05d994dfc1cb0512, StatelessResetToken: 0x9818e0dcfe8ccdf2b14824ec29f2cad8} 2025/04/30 10:43:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:50 client -> Sending packet 4 (34 bytes) for connection 01eb65d606a863f9f926a4f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 9e5ff33bff50a706, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 94.216µs} 2025/04/30 10:43:50 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:50 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:50 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:50 client newly acked packets (1): [3] 2025/04/30 10:43:50 client updated RTT: 34.914ms (σ: 13.909ms) 2025/04/30 10:43:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:50 client Canceling loss detection timer. 2025/04/30 10:43:50 client <- Reading packet 6 (108 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:50 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:50 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9e5ff33bff50a706, StatelessResetToken: 0xeb608ddd779d3ab77ea01f9efce8786f} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ff32fff52f359ffa, StatelessResetToken: 0xf98591721afe314a76109724b5c25d3d} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 26ac5d1c17a032b1, StatelessResetToken: 0x1f4c3514c429268df9d64f9ba3af4e1a} 2025/04/30 10:43:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:50 client -> Sending packet 5 (36 bytes) for connection 01eb65d606a863f9f926a4f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 9e5ff33bff50a706, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 197.709µs} 2025/04/30 10:43:50 client <- Reading packet 7 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:50 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:50 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:50 client -> Sending packet 6 (30 bytes) for connection 01eb65d606a863f9f926a4f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 9e5ff33bff50a706, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:50 client Connection 01eb65d606a863f9f926a4f9 closed. 2025/04/30 10:43:50 Requesting https://server4:443/vfghgdkxrq. 2025/04/30 10:43:50 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:50 Increased send buffer size to 14336 kiB 2025/04/30 10:43:50 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:50 Created qlog file: /logs/qlog/4245b0cedcb7b5342e2e62bea86a5d52b01131.sqlog 2025/04/30 10:43:50 client Starting new connection to server4 ([::]:35710 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4245b0cedcb7b5342e2e62bea86a5d52b01131, version v1 2025/04/30 10:43:50 Adding connection ID (empty). 2025/04/30 10:43:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:50 client -> Sending packet 0 (1280 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: 4245b0cedcb7b5342e2e62bea86a5d52b01131, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:43:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:43:50 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 746 bytes. 2025/04/30 10:43:50 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 91e3a6ef5f8c3aa5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 436, Version: v1} 2025/04/30 10:43:50 client Received first packet. Switching destination connection ID to: 91e3a6ef5f8c3aa5 2025/04/30 10:43:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:50 client newly acked packets (1): [0] 2025/04/30 10:43:50 client updated RTT: 38.246041ms (σ: 19.12302ms) 2025/04/30 10:43:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:50 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 0 bytes. 2025/04/30 10:43:50 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 91e3a6ef5f8c3aa5, PacketNumber: 0, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:43:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:43:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4245b0cedcb7b5342e2e62bea86a5d52b01131, InitialSourceConnectionID: 91e3a6ef5f8c3aa5, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: 91e3a6ef5f8c3aa5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: 91e3a6ef5f8c3aa5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:50 client Dropping Initial keys. 2025/04/30 10:43:50 client -> Sending packet 1 (40 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, Handshake 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: 91e3a6ef5f8c3aa5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:50 client -> Sending packet 0 (46 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 91e3a6ef5f8c3aa5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:50 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:50 client Dropping Handshake keys. 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01886e630ad2bbfc, StatelessResetToken: 0xacc6e6dbdea5adffa0b44807b8ad6767} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c07e9c85e04c0c2e, StatelessResetToken: 0x5952652de103488864c9bc79cd1cc312} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: be127a7e6455cdd9, StatelessResetToken: 0x2f0936e6fef07609bc8a17831eb2a0d9} 2025/04/30 10:43:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:50 client -> Sending packet 1 (34 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 01886e630ad2bbfc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 164.537µs} 2025/04/30 10:43:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:50 client -> Sending packet 3 (46 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 01886e630ad2bbfc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:50 client Skipping packet number 2 2025/04/30 10:43:50 client -> Sending packet 4 (29 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 01886e630ad2bbfc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:50 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:50 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b39175bd8c6d467b, StatelessResetToken: 0x7b65b0ddf717c3444a9bdec60f990954} 2025/04/30 10:43:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:50 client -> Sending packet 5 (34 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 01886e630ad2bbfc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72.375µs} 2025/04/30 10:43:50 client <- Reading packet 4 (1085 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:50 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:50 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:50 client newly acked packets (2): [3 4] 2025/04/30 10:43:50 client updated RTT: 37.667ms (σ: 15.499ms) 2025/04/30 10:43:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:50 client Canceling loss detection timer. 2025/04/30 10:43:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b39175bd8c6d467b, StatelessResetToken: 0x7b65b0ddf717c3444a9bdec60f990954} 2025/04/30 10:43:50 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:50 client -> Sending packet 6 (36 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 01886e630ad2bbfc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 184.675µs} 2025/04/30 10:43:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:50 client -> Sending packet 7 (30 bytes) for connection 4245b0cedcb7b5342e2e62bea86a5d52b01131, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:50 client Short Header{DestConnectionID: 01886e630ad2bbfc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:50 client Connection 4245b0cedcb7b5342e2e62bea86a5d52b01131 closed. 2025/04/30 10:43:50 Requesting https://server4:443/slswmdzrcp. 2025/04/30 10:43:50 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:50 Increased send buffer size to 14336 kiB 2025/04/30 10:43:50 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:50 Created qlog file: /logs/qlog/b6b8ed7fb695490aa683c1e450eaf1561d.sqlog 2025/04/30 10:43:50 client Starting new connection to server4 ([::]:60537 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b6b8ed7fb695490aa683c1e450eaf1561d, version v1 2025/04/30 10:43:50 Adding connection ID (empty). 2025/04/30 10:43:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:50 client -> Sending packet 0 (1280 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: b6b8ed7fb695490aa683c1e450eaf1561d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:43:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:50 client -> Sending packet 1 (1280 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: b6b8ed7fb695490aa683c1e450eaf1561d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:43:50 client -> Sending packet 2 (1280 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: b6b8ed7fb695490aa683c1e450eaf1561d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:43:50 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af1a471e2d089f25, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:50 client Received first packet. Switching destination connection ID to: af1a471e2d089f25 2025/04/30 10:43:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:50 client -> Sending packet 3 (1280 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: af1a471e2d089f25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:50 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af1a471e2d089f25, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:50 client -> Sending packet 4 (1280 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: af1a471e2d089f25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:43:50 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af1a471e2d089f25, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:50 client -> Sending packet 5 (1280 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: af1a471e2d089f25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:43:50 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af1a471e2d089f25, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:50 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:43:50 client -> Sending packet 6 (1280 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Initial 2025/04/30 10:43:50 client Long Header{Type: Initial, DestConnectionID: af1a471e2d089f25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:43:50 client <- Reading packet 2 (745 bytes) for connection (empty), Handshake 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af1a471e2d089f25, PacketNumber: 2, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:43:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:43:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b6b8ed7fb695490aa683c1e450eaf1561d, InitialSourceConnectionID: af1a471e2d089f25, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:50 client -> Sending packet 0 (79 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Handshake 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: af1a471e2d089f25, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:50 client Dropping Initial keys. 2025/04/30 10:43:50 client -> Sending packet 0 (46 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:50 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:50 client <- Reading packet 3 (745 bytes) for connection (empty), Handshake 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af1a471e2d089f25, PacketNumber: 3, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:43:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:43:50 client -> Sending packet 1 (40 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, Handshake 2025/04/30 10:43:50 client Long Header{Type: Handshake, DestConnectionID: af1a471e2d089f25, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:51 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:51 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:51 client Dropping Handshake keys. 2025/04/30 10:43:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:51 client -> Sending packet 1 (1366 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.PingFrame{} 2025/04/30 10:43:51 client -> Sending packet 2 (32 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 188.912µs} 2025/04/30 10:43:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:51 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:51 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:51 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:51 client -> Sending packet 3 (34 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 123.31µs} 2025/04/30 10:43:51 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:51 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:51 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:51 client -> Sending packet 4 (35 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.251849ms} 2025/04/30 10:43:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:51 client -> Sending packet 6 (46 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:51 client -> Sending packet 7 (46 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:51 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:51 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:51 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:51 client -> Sending packet 8 (36 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 115.746µs} 2025/04/30 10:43:51 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:51 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:51 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:51 client -> Sending packet 9 (37 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.324608ms} 2025/04/30 10:43:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:43:51 client -> Sending packet 11 (46 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:51 client -> Sending packet 12 (46 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:51 client <- Reading packet 12 (29 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:51 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:51 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:43:51 client newly acked packets (2): [1 12] 2025/04/30 10:43:51 client updated RTT: 32.125197ms (σ: 16.062598ms) 2025/04/30 10:43:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:51 client Canceling loss detection timer. 2025/04/30 10:43:51 client -> Sending packet 13 (1409 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.PingFrame{} 2025/04/30 10:43:51 client <- Reading packet 13 (30 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:51 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:51 client <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:43:51 client newly acked packets (1): [13] 2025/04/30 10:43:51 client updated RTT: 32.2ms (σ: 12.197ms) 2025/04/30 10:43:51 client <- Reading packet 14 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:51 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:51 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:51 client -> Sending packet 14 (39 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:51 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:51 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 3, AckRanges: {{Largest: 14, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.364159ms} 2025/04/30 10:43:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:52 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:43:52 client <- Reading packet 17 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:52 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:52 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:52 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:52 client -> Sending packet 15 (1430 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:52 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:52 client -> &wire.PingFrame{} 2025/04/30 10:43:52 client -> Sending packet 16 (40 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:52 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:52 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 3, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 14, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 144.48µs} 2025/04/30 10:43:52 client <- Reading packet 18 (32 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:52 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:52 client <- &wire.AckFrame{LargestAcked: 15, LowestAcked: 0, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:43:52 client newly acked packets (1): [15] 2025/04/30 10:43:52 client updated RTT: 32.288ms (σ: 9.324ms) 2025/04/30 10:43:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:53 client <- Reading packet 19 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:53 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:53 client -> Sending packet 17 (1441 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:53 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:53 client -> &wire.PingFrame{} 2025/04/30 10:43:53 client <- Reading packet 20 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:53 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:53 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:53 client -> Sending packet 18 (40 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:53 client Short Header{DestConnectionID: af1a471e2d089f25, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:53 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 3, AckRanges: {{Largest: 20, Smallest: 17}, {Largest: 14, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 87.193µs} 2025/04/30 10:43:53 client <- Reading packet 22 (1135 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:53 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e7df25dfc84cfcc, StatelessResetToken: 0xa7f7d74cf1bb3c0d9ade61416b49101c} 2025/04/30 10:43:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b81a7aaf89b56b5, StatelessResetToken: 0xe00146624755f8d662b720c04f228d65} 2025/04/30 10:43:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 884141dd56306278, StatelessResetToken: 0xf9a99ec19aa7f7fc0b664ec26940151d} 2025/04/30 10:43:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:53 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:53 client -> Sending packet 19 (44 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:53 client Short Header{DestConnectionID: 7e7df25dfc84cfcc, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:53 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 3, AckRanges: {{Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 17}, {Largest: 14, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 203.41µs} 2025/04/30 10:43:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:53 client -> Sending packet 20 (30 bytes) for connection b6b8ed7fb695490aa683c1e450eaf1561d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:53 client Short Header{DestConnectionID: 7e7df25dfc84cfcc, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:53 client Connection b6b8ed7fb695490aa683c1e450eaf1561d closed. 2025/04/30 10:43:53 Requesting https://server4:443/qaogrendua. 2025/04/30 10:43:53 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:53 Increased send buffer size to 14336 kiB 2025/04/30 10:43:53 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:53 Created qlog file: /logs/qlog/77be3ffd8cd2f9a2.sqlog 2025/04/30 10:43:53 client Starting new connection to server4 ([::]:58103 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 77be3ffd8cd2f9a2, version v1 2025/04/30 10:43:53 Adding connection ID (empty). 2025/04/30 10:43:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:53 client -> Sending packet 0 (1280 bytes) for connection 77be3ffd8cd2f9a2, Initial 2025/04/30 10:43:53 client Long Header{Type: Initial, DestConnectionID: 77be3ffd8cd2f9a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:43:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:54 client -> Sending packet 1 (1280 bytes) for connection 77be3ffd8cd2f9a2, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 77be3ffd8cd2f9a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:43:54 client -> Sending packet 2 (1280 bytes) for connection 77be3ffd8cd2f9a2, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 77be3ffd8cd2f9a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:43:54 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8f3f628bd2616a07, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:54 client Received first packet. Switching destination connection ID to: 8f3f628bd2616a07 2025/04/30 10:43:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:54 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8f3f628bd2616a07, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client -> Sending packet 3 (1280 bytes) for connection 77be3ffd8cd2f9a2, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 8f3f628bd2616a07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:54 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8f3f628bd2616a07, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:54 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:54 client newly acked packets (1): [2] 2025/04/30 10:43:54 client updated RTT: 70.712724ms (σ: 35.356362ms) 2025/04/30 10:43:54 client -> Sending packet 4 (1280 bytes) for connection 77be3ffd8cd2f9a2, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 8f3f628bd2616a07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:54 client <- Reading packet 2 (735 bytes) for connection (empty), Handshake 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8f3f628bd2616a07, PacketNumber: 2, PacketNumberLen: 1, Length: 718, Version: v1} 2025/04/30 10:43:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 10:43:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 77be3ffd8cd2f9a2, InitialSourceConnectionID: 8f3f628bd2616a07, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:54 client -> Sending packet 0 (79 bytes) for connection 77be3ffd8cd2f9a2, Handshake 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: 8f3f628bd2616a07, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:54 client Dropping Initial keys. 2025/04/30 10:43:54 client -> Sending packet 0 (46 bytes) for connection 77be3ffd8cd2f9a2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:54 client Short Header{DestConnectionID: 8f3f628bd2616a07, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:54 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:54 client Peer doesn't await address validation any longer. 2025/04/30 10:43:54 client newly acked packets (1): [0] 2025/04/30 10:43:54 client updated RTT: 66.182ms (σ: 35.575ms) 2025/04/30 10:43:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:54 client Canceling loss detection timer. 2025/04/30 10:43:54 client Dropping Handshake keys. 2025/04/30 10:43:54 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:54 client -> Sending packet 1 (32 bytes) for connection 77be3ffd8cd2f9a2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:54 client Short Header{DestConnectionID: 8f3f628bd2616a07, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 199.733µs} 2025/04/30 10:43:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:54 client -> Sending packet 2 (30 bytes) for connection 77be3ffd8cd2f9a2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:54 client Short Header{DestConnectionID: 8f3f628bd2616a07, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:54 client Connection 77be3ffd8cd2f9a2 closed. 2025/04/30 10:43:54 Requesting https://server4:443/ixiumsgwtz. 2025/04/30 10:43:54 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:54 Increased send buffer size to 14336 kiB 2025/04/30 10:43:54 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:54 Created qlog file: /logs/qlog/a7b8cdce49eab796a1028c.sqlog 2025/04/30 10:43:54 client Starting new connection to server4 ([::]:37741 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a7b8cdce49eab796a1028c, version v1 2025/04/30 10:43:54 Adding connection ID (empty). 2025/04/30 10:43:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:54 client -> Sending packet 0 (1280 bytes) for connection a7b8cdce49eab796a1028c, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: a7b8cdce49eab796a1028c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:43:54 client Parsed a coalesced packet. Part 1: 463 bytes. Remaining: 737 bytes. 2025/04/30 10:43:54 client <- Reading packet 0 (463 bytes) for connection (empty), Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1bbb59fb312d426c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 445, Version: v1} 2025/04/30 10:43:54 client Received first packet. Switching destination connection ID to: 1bbb59fb312d426c 2025/04/30 10:43:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:54 client newly acked packets (1): [0] 2025/04/30 10:43:54 client updated RTT: 37.708762ms (σ: 18.854381ms) 2025/04/30 10:43:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Parsed a coalesced packet. Part 2: 737 bytes. Remaining: 0 bytes. 2025/04/30 10:43:54 client <- Reading packet 0 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1bbb59fb312d426c, PacketNumber: 0, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a7b8cdce49eab796a1028c, InitialSourceConnectionID: 1bbb59fb312d426c, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a7b8cdce49eab796a1028c 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 1bbb59fb312d426c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: 1bbb59fb312d426c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:54 client Dropping Initial keys. 2025/04/30 10:43:54 client -> Sending packet 1 (86 bytes) for connection a7b8cdce49eab796a1028c, Handshake 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: 1bbb59fb312d426c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:54 client Short Header{DestConnectionID: 1bbb59fb312d426c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:54 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:54 client -> Sending packet 2 (74 bytes) for connection a7b8cdce49eab796a1028c, Handshake 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: 1bbb59fb312d426c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:54 client -> Sending packet 3 (74 bytes) for connection a7b8cdce49eab796a1028c, Handshake 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: 1bbb59fb312d426c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:54 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:54 client Dropping Handshake keys. 2025/04/30 10:43:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 83b3b8ec61cc7d39, StatelessResetToken: 0x2ee0cde5f6fbcac37f341c20ab8095d0} 2025/04/30 10:43:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 537a4d7468b4041f, StatelessResetToken: 0x93149c83ca4b53494aa5240596741174} 2025/04/30 10:43:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c6b31e0a694692c, StatelessResetToken: 0xcd43710251c902c3399a785a079b9789} 2025/04/30 10:43:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:54 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:54 client -> Sending packet 2 (53 bytes) for connection a7b8cdce49eab796a1028c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:54 client Short Header{DestConnectionID: 83b3b8ec61cc7d39, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 145.572µs} 2025/04/30 10:43:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:54 client -> Sending packet 3 (48 bytes) for connection a7b8cdce49eab796a1028c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:54 client Short Header{DestConnectionID: 83b3b8ec61cc7d39, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:54 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:54 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 13de56fe258dc21c, StatelessResetToken: 0x29176f2b5e62028df21651382546bb17} 2025/04/30 10:43:54 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:54 client newly acked packets (1): [3] 2025/04/30 10:43:54 client updated RTT: 37.038ms (σ: 15.48ms) 2025/04/30 10:43:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:54 client Canceling loss detection timer. 2025/04/30 10:43:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:54 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:54 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:54 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:54 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:54 client -> Sending packet 4 (32 bytes) for connection a7b8cdce49eab796a1028c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:54 client Short Header{DestConnectionID: 83b3b8ec61cc7d39, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 78.928µs} 2025/04/30 10:43:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:54 client -> Sending packet 5 (30 bytes) for connection a7b8cdce49eab796a1028c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:54 client Short Header{DestConnectionID: 83b3b8ec61cc7d39, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:54 client Connection a7b8cdce49eab796a1028c closed. 2025/04/30 10:43:54 Requesting https://server4:443/tjlxlplvyl. 2025/04/30 10:43:54 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:54 Increased send buffer size to 14336 kiB 2025/04/30 10:43:54 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:54 Created qlog file: /logs/qlog/99d93b4965a3a910f94d8db7c96cbeeca5.sqlog 2025/04/30 10:43:54 client Starting new connection to server4 ([::]:49319 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 99d93b4965a3a910f94d8db7c96cbeeca5, version v1 2025/04/30 10:43:54 Adding connection ID (empty). 2025/04/30 10:43:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:54 client -> Sending packet 0 (1280 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 99d93b4965a3a910f94d8db7c96cbeeca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:43:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:54 client -> Sending packet 1 (1280 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 99d93b4965a3a910f94d8db7c96cbeeca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:43:54 client -> Sending packet 2 (1280 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 99d93b4965a3a910f94d8db7c96cbeeca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:43:54 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 785eb9aff3367884, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:54 client Received first packet. Switching destination connection ID to: 785eb9aff3367884 2025/04/30 10:43:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:54 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 785eb9aff3367884, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:54 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:54 client newly acked packets (1): [2] 2025/04/30 10:43:54 client updated RTT: 34.873349ms (σ: 17.436674ms) 2025/04/30 10:43:54 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 785eb9aff3367884, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client -> Sending packet 3 (1280 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 785eb9aff3367884, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:54 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 785eb9aff3367884, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:54 client -> Sending packet 4 (1280 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, Initial 2025/04/30 10:43:54 client Long Header{Type: Initial, DestConnectionID: 785eb9aff3367884, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:54 client <- Reading packet 1 (745 bytes) for connection (empty), Handshake 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 785eb9aff3367884, PacketNumber: 1, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:43:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:43:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 99d93b4965a3a910f94d8db7c96cbeeca5, InitialSourceConnectionID: 785eb9aff3367884, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:54 client -> Sending packet 0 (79 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, Handshake 2025/04/30 10:43:54 client Long Header{Type: Handshake, DestConnectionID: 785eb9aff3367884, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:54 client Dropping Initial keys. 2025/04/30 10:43:54 client -> Sending packet 0 (46 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:54 client Short Header{DestConnectionID: 785eb9aff3367884, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:55 client -> Sending packet 1 (74 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: 785eb9aff3367884, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:55 client -> Sending packet 2 (74 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: 785eb9aff3367884, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:55 client <- Reading packet 2 (745 bytes) for connection (empty), Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 785eb9aff3367884, PacketNumber: 2, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:43:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:43:55 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:55 client Dropping Handshake keys. 2025/04/30 10:43:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:55 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:55 client -> Sending packet 2 (51 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: 785eb9aff3367884, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 148.036µs} 2025/04/30 10:43:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:55 client -> Sending packet 3 (46 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: 785eb9aff3367884, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:55 client <- Reading packet 2 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:55 client newly acked packets (1): [3] 2025/04/30 10:43:55 client updated RTT: 34.528ms (σ: 13.766ms) 2025/04/30 10:43:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:55 client Canceling loss detection timer. 2025/04/30 10:43:55 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:55 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:55 client -> Sending packet 4 (30 bytes) for connection 99d93b4965a3a910f94d8db7c96cbeeca5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:55 client Short Header{DestConnectionID: 785eb9aff3367884, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:55 client Connection 99d93b4965a3a910f94d8db7c96cbeeca5 closed. 2025/04/30 10:43:55 Requesting https://server4:443/dgiukuradk. 2025/04/30 10:43:55 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:55 Increased send buffer size to 14336 kiB 2025/04/30 10:43:55 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:55 Created qlog file: /logs/qlog/a3bd202703a820fe.sqlog 2025/04/30 10:43:55 client Starting new connection to server4 ([::]:48579 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a3bd202703a820fe, version v1 2025/04/30 10:43:55 Adding connection ID (empty). 2025/04/30 10:43:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:55 client -> Sending packet 0 (1280 bytes) for connection a3bd202703a820fe, Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: a3bd202703a820fe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:43:55 client Parsed a coalesced packet. Part 1: 466 bytes. Remaining: 734 bytes. 2025/04/30 10:43:55 client <- Reading packet 0 (466 bytes) for connection (empty), Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c11b13387254ae4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 448, Version: v1} 2025/04/30 10:43:55 client Received first packet. Switching destination connection ID to: 1c11b13387254ae4 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client newly acked packets (1): [0] 2025/04/30 10:43:55 client updated RTT: 37.310199ms (σ: 18.655099ms) 2025/04/30 10:43:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Parsed a coalesced packet. Part 2: 734 bytes. Remaining: 0 bytes. 2025/04/30 10:43:55 client <- Reading packet 0 (734 bytes) for connection (empty), Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1c11b13387254ae4, PacketNumber: 0, PacketNumberLen: 1, Length: 717, Version: v1} 2025/04/30 10:43:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 10:43:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a3bd202703a820fe, InitialSourceConnectionID: 1c11b13387254ae4, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a3bd202703a820fe 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: 1c11b13387254ae4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: 1c11b13387254ae4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:55 client Dropping Initial keys. 2025/04/30 10:43:55 client -> Sending packet 1 (40 bytes) for connection a3bd202703a820fe, Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: 1c11b13387254ae4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client -> Sending packet 0 (46 bytes) for connection a3bd202703a820fe, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: 1c11b13387254ae4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:55 client -> Sending packet 2 (74 bytes) for connection a3bd202703a820fe, Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: 1c11b13387254ae4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:55 client -> Sending packet 3 (74 bytes) for connection a3bd202703a820fe, Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: 1c11b13387254ae4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:55 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:55 client Dropping Handshake keys. 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f48c74113479079d, StatelessResetToken: 0xed9cb57bea8a298e57bd58dbe28d61ac} 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e614a32e60259e3, StatelessResetToken: 0xdaeaddb1a29d88617ce2286be31f3ac5} 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1eb40725866198e3, StatelessResetToken: 0xb2b9a18f35ccd44705e4c2bbb6ad6d56} 2025/04/30 10:43:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:55 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:55 client -> Sending packet 2 (53 bytes) for connection a3bd202703a820fe, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: f48c74113479079d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.935µs} 2025/04/30 10:43:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:55 client -> Sending packet 3 (48 bytes) for connection a3bd202703a820fe, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: f48c74113479079d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:55 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 77fde1321ee7cd60, StatelessResetToken: 0xe2744d1f7d32990422a2666af898683c} 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:55 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:55 client newly acked packets (1): [3] 2025/04/30 10:43:55 client updated RTT: 36.844ms (σ: 14.922ms) 2025/04/30 10:43:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:55 client Canceling loss detection timer. 2025/04/30 10:43:55 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:55 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:55 client -> Sending packet 4 (32 bytes) for connection a3bd202703a820fe, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:55 client Short Header{DestConnectionID: f48c74113479079d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 101.399µs} 2025/04/30 10:43:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:55 client -> Sending packet 5 (30 bytes) for connection a3bd202703a820fe, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:55 client Short Header{DestConnectionID: f48c74113479079d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:55 client Connection a3bd202703a820fe closed. 2025/04/30 10:43:55 Requesting https://server4:443/ycgqbpheex. 2025/04/30 10:43:55 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:55 Increased send buffer size to 14336 kiB 2025/04/30 10:43:55 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:55 Created qlog file: /logs/qlog/44f6e7f3e67d610a4265ff0b.sqlog 2025/04/30 10:43:55 client Starting new connection to server4 ([::]:57438 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 44f6e7f3e67d610a4265ff0b, version v1 2025/04/30 10:43:55 Adding connection ID (empty). 2025/04/30 10:43:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:55 client -> Sending packet 0 (1280 bytes) for connection 44f6e7f3e67d610a4265ff0b, Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: 44f6e7f3e67d610a4265ff0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:43:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:55 client -> Sending packet 1 (1280 bytes) for connection 44f6e7f3e67d610a4265ff0b, Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: 44f6e7f3e67d610a4265ff0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:43:55 client -> Sending packet 2 (1280 bytes) for connection 44f6e7f3e67d610a4265ff0b, Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: 44f6e7f3e67d610a4265ff0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:43:55 client Parsed a coalesced packet. Part 1: 461 bytes. Remaining: 739 bytes. 2025/04/30 10:43:55 client <- Reading packet 0 (461 bytes) for connection (empty), Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dd18db99cc5723fa, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 443, Version: v1} 2025/04/30 10:43:55 client Received first packet. Switching destination connection ID to: dd18db99cc5723fa 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 0 bytes. 2025/04/30 10:43:55 client <- Reading packet 0 (739 bytes) for connection (empty), Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dd18db99cc5723fa, PacketNumber: 0, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:43:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:43:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 44f6e7f3e67d610a4265ff0b, InitialSourceConnectionID: dd18db99cc5723fa, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 44f6e7f3e67d610a4265ff0b 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: dd18db99cc5723fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: dd18db99cc5723fa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:55 client Dropping Initial keys. 2025/04/30 10:43:55 client -> Sending packet 1 (40 bytes) for connection 44f6e7f3e67d610a4265ff0b, Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: dd18db99cc5723fa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client -> Sending packet 0 (46 bytes) for connection 44f6e7f3e67d610a4265ff0b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: dd18db99cc5723fa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:55 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:55 client Dropping Handshake keys. 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 117ae11a67c4db8e, StatelessResetToken: 0xdc6547ffc8786d856f2274abdd73312d} 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 998fcf931d2f97d3, StatelessResetToken: 0xf5693331eb1dc58f7612ac2a642bd3f2} 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5eceb70b77574148, StatelessResetToken: 0x8fa2015b9dcea03f776e97aacc20031f} 2025/04/30 10:43:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:55 client -> Sending packet 1 (1366 bytes) for connection 44f6e7f3e67d610a4265ff0b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: 117ae11a67c4db8e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.PingFrame{} 2025/04/30 10:43:55 client -> Sending packet 2 (34 bytes) for connection 44f6e7f3e67d610a4265ff0b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: 117ae11a67c4db8e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 206.205µs} 2025/04/30 10:43:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:55 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client newly acked packets (1): [0] 2025/04/30 10:43:55 client updated RTT: 35.076582ms (σ: 17.538291ms) 2025/04/30 10:43:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:55 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:55 client -> Sending packet 3 (30 bytes) for connection 44f6e7f3e67d610a4265ff0b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:55 client Short Header{DestConnectionID: 117ae11a67c4db8e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:55 client Connection 44f6e7f3e67d610a4265ff0b closed. 2025/04/30 10:43:55 Requesting https://server4:443/qtepmrrcad. 2025/04/30 10:43:55 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:55 Increased send buffer size to 14336 kiB 2025/04/30 10:43:55 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:55 Created qlog file: /logs/qlog/e1a3cfcbb9c0d5ab9d902ba8ac.sqlog 2025/04/30 10:43:55 client Starting new connection to server4 ([::]:38986 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e1a3cfcbb9c0d5ab9d902ba8ac, version v1 2025/04/30 10:43:55 Adding connection ID (empty). 2025/04/30 10:43:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:55 client -> Sending packet 0 (1280 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac, Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: e1a3cfcbb9c0d5ab9d902ba8ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:43:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:55 client -> Sending packet 1 (1280 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac, Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: e1a3cfcbb9c0d5ab9d902ba8ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:43:55 client -> Sending packet 2 (1280 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac, Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: e1a3cfcbb9c0d5ab9d902ba8ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:43:55 client Parsed a coalesced packet. Part 1: 460 bytes. Remaining: 740 bytes. 2025/04/30 10:43:55 client <- Reading packet 0 (460 bytes) for connection (empty), Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 59a94d5ec39c7447, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 442, Version: v1} 2025/04/30 10:43:55 client Received first packet. Switching destination connection ID to: 59a94d5ec39c7447 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 0 bytes. 2025/04/30 10:43:55 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 59a94d5ec39c7447, PacketNumber: 0, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:43:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:43:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e1a3cfcbb9c0d5ab9d902ba8ac, InitialSourceConnectionID: 59a94d5ec39c7447, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: 59a94d5ec39c7447, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: 59a94d5ec39c7447, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:55 client Dropping Initial keys. 2025/04/30 10:43:55 client -> Sending packet 1 (40 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac, Handshake 2025/04/30 10:43:55 client Long Header{Type: Handshake, DestConnectionID: 59a94d5ec39c7447, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client -> Sending packet 0 (46 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: 59a94d5ec39c7447, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:55 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 10:43:55 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:55 client Dropping Handshake keys. 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f887b697ec0b7bc4, StatelessResetToken: 0x97e3a49c8433015c442b2208eb924437} 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 421d0277ec2e2a94, StatelessResetToken: 0xbef3c4e0e94162b879f60758f0e1f3ec} 2025/04/30 10:43:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 33300f5834d46fd8, StatelessResetToken: 0xe13f9532a1db0b0bc20dd3fb179135d7} 2025/04/30 10:43:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:55 client -> Sending packet 1 (1366 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: f887b697ec0b7bc4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.PingFrame{} 2025/04/30 10:43:55 client -> Sending packet 2 (34 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:55 client Short Header{DestConnectionID: f887b697ec0b7bc4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 215.272µs} 2025/04/30 10:43:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:55 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:55 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:55 client newly acked packets (1): [0] 2025/04/30 10:43:55 client updated RTT: 35.334216ms (σ: 17.667108ms) 2025/04/30 10:43:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:55 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:55 client -> Sending packet 3 (30 bytes) for connection e1a3cfcbb9c0d5ab9d902ba8ac, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:55 client Short Header{DestConnectionID: f887b697ec0b7bc4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:55 client Connection e1a3cfcbb9c0d5ab9d902ba8ac closed. 2025/04/30 10:43:55 Requesting https://server4:443/yzxlfovqjx. 2025/04/30 10:43:55 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:55 Increased send buffer size to 14336 kiB 2025/04/30 10:43:55 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:55 Created qlog file: /logs/qlog/9ad3de5ecf959b6911e37e75c6a45ccec665.sqlog 2025/04/30 10:43:55 client Starting new connection to server4 ([::]:46820 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9ad3de5ecf959b6911e37e75c6a45ccec665, version v1 2025/04/30 10:43:55 Adding connection ID (empty). 2025/04/30 10:43:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:55 client -> Sending packet 0 (1280 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, Initial 2025/04/30 10:43:55 client Long Header{Type: Initial, DestConnectionID: 9ad3de5ecf959b6911e37e75c6a45ccec665, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:43:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:43:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:56 client -> Sending packet 1 (1280 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: 9ad3de5ecf959b6911e37e75c6a45ccec665, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:43:56 client -> Sending packet 2 (1280 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: 9ad3de5ecf959b6911e37e75c6a45ccec665, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:43:56 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 447d4bf6c0b5d6c2, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:56 client Received first packet. Switching destination connection ID to: 447d4bf6c0b5d6c2 2025/04/30 10:43:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:56 client newly acked packets (1): [2] 2025/04/30 10:43:56 client updated RTT: 34.890895ms (σ: 17.445447ms) 2025/04/30 10:43:56 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 447d4bf6c0b5d6c2, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client -> Sending packet 3 (1280 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: 447d4bf6c0b5d6c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:56 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 447d4bf6c0b5d6c2, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:56 client -> Sending packet 4 (1280 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: 447d4bf6c0b5d6c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:56 client <- Reading packet 2 (745 bytes) for connection (empty), Handshake 2025/04/30 10:43:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 447d4bf6c0b5d6c2, PacketNumber: 2, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:43:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:43:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9ad3de5ecf959b6911e37e75c6a45ccec665, InitialSourceConnectionID: 447d4bf6c0b5d6c2, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:56 client -> Sending packet 0 (79 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, Handshake 2025/04/30 10:43:56 client Long Header{Type: Handshake, DestConnectionID: 447d4bf6c0b5d6c2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:56 client Dropping Initial keys. 2025/04/30 10:43:56 client -> Sending packet 0 (46 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:56 client Short Header{DestConnectionID: 447d4bf6c0b5d6c2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:56 client -> Sending packet 1 (74 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, Handshake 2025/04/30 10:43:56 client Long Header{Type: Handshake, DestConnectionID: 447d4bf6c0b5d6c2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:56 client -> Sending packet 2 (74 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, Handshake 2025/04/30 10:43:56 client Long Header{Type: Handshake, DestConnectionID: 447d4bf6c0b5d6c2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:56 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:56 client Dropping Handshake keys. 2025/04/30 10:43:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b3133cb591dcad0a, StatelessResetToken: 0x003242b8ecbfccf91f11795621e5d4e9} 2025/04/30 10:43:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 41762f56ca68941e, StatelessResetToken: 0x27e14ce4376ecc795f7384b0eaa9df08} 2025/04/30 10:43:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dc693abc0cf60c3d, StatelessResetToken: 0xa9e829edafe49aae4f7b74234c46dab7} 2025/04/30 10:43:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:56 client -> Sending packet 2 (53 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:56 client Short Header{DestConnectionID: b3133cb591dcad0a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 159.617µs} 2025/04/30 10:43:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:56 client -> Sending packet 3 (48 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:56 client Short Header{DestConnectionID: b3133cb591dcad0a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:56 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: becedf3a3a6da16a, StatelessResetToken: 0xd86b4a3fd57cdf813c53e78d64ebce19} 2025/04/30 10:43:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:56 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:56 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:56 client newly acked packets (1): [3] 2025/04/30 10:43:56 client updated RTT: 34.721ms (σ: 13.421ms) 2025/04/30 10:43:56 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:56 client Canceling loss detection timer. 2025/04/30 10:43:56 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:43:56 client -> Sending packet 4 (32 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:56 client Short Header{DestConnectionID: b3133cb591dcad0a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 113.171µs} 2025/04/30 10:43:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:56 client -> Sending packet 5 (30 bytes) for connection 9ad3de5ecf959b6911e37e75c6a45ccec665, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:56 client Short Header{DestConnectionID: b3133cb591dcad0a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:56 client Connection 9ad3de5ecf959b6911e37e75c6a45ccec665 closed. 2025/04/30 10:43:56 Requesting https://server4:443/kejouqwnyl. 2025/04/30 10:43:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:56 Increased send buffer size to 14336 kiB 2025/04/30 10:43:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:56 Created qlog file: /logs/qlog/e2fe87d18da9072cc1a1f9.sqlog 2025/04/30 10:43:56 client Starting new connection to server4 ([::]:51376 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e2fe87d18da9072cc1a1f9, version v1 2025/04/30 10:43:56 Adding connection ID (empty). 2025/04/30 10:43:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:56 client -> Sending packet 0 (1280 bytes) for connection e2fe87d18da9072cc1a1f9, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: e2fe87d18da9072cc1a1f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:43:56 client Parsed a coalesced packet. Part 1: 463 bytes. Remaining: 737 bytes. 2025/04/30 10:43:56 client <- Reading packet 0 (463 bytes) for connection (empty), Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6e98f398e983b3d8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 445, Version: v1} 2025/04/30 10:43:56 client Received first packet. Switching destination connection ID to: 6e98f398e983b3d8 2025/04/30 10:43:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:56 client newly acked packets (1): [0] 2025/04/30 10:43:56 client updated RTT: 37.187249ms (σ: 18.593624ms) 2025/04/30 10:43:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client Parsed a coalesced packet. Part 2: 737 bytes. Remaining: 0 bytes. 2025/04/30 10:43:56 client <- Reading packet 0 (737 bytes) for connection (empty), Handshake 2025/04/30 10:43:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6e98f398e983b3d8, PacketNumber: 0, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:43:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:43:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e2fe87d18da9072cc1a1f9, InitialSourceConnectionID: 6e98f398e983b3d8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e2fe87d18da9072cc1a1f9 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: 6e98f398e983b3d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:56 client Long Header{Type: Handshake, DestConnectionID: 6e98f398e983b3d8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:56 client Dropping Initial keys. 2025/04/30 10:43:56 client -> Sending packet 1 (86 bytes) for connection e2fe87d18da9072cc1a1f9, Handshake 2025/04/30 10:43:56 client Long Header{Type: Handshake, DestConnectionID: 6e98f398e983b3d8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:56 client Short Header{DestConnectionID: 6e98f398e983b3d8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:56 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:56 client Dropping Handshake keys. 2025/04/30 10:43:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1338baf82cccc483, StatelessResetToken: 0x3727c6bd0cf0a61d8af1a3c2d31313d8} 2025/04/30 10:43:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 478abaa7896def5e, StatelessResetToken: 0x60a90170b368765d405680e5f84c44b9} 2025/04/30 10:43:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7901416348330288, StatelessResetToken: 0x27b6047c7510569fc99c2ff661dfab37} 2025/04/30 10:43:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:56 client -> Sending packet 1 (34 bytes) for connection e2fe87d18da9072cc1a1f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:56 client Short Header{DestConnectionID: 1338baf82cccc483, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 153.667µs} 2025/04/30 10:43:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:56 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c366cb9954a607d8, StatelessResetToken: 0x0038319bdfafc512f8e538aa7d0a5059} 2025/04/30 10:43:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:56 client newly acked packets (1): [1] 2025/04/30 10:43:56 client updated RTT: 36.481ms (σ: 15.355ms) 2025/04/30 10:43:56 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:56 client lost packet 0 (time threshold) 2025/04/30 10:43:56 client Canceling loss detection timer. 2025/04/30 10:43:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:56 client Ignoring all packets below 1. 2025/04/30 10:43:56 client -> Sending packet 2 (51 bytes) for connection e2fe87d18da9072cc1a1f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:56 client Short Header{DestConnectionID: 1338baf82cccc483, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 171.57µs} 2025/04/30 10:43:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:56 client -> Sending packet 4 (46 bytes) for connection e2fe87d18da9072cc1a1f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:56 client Short Header{DestConnectionID: 1338baf82cccc483, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:56 client -> Sending packet 5 (46 bytes) for connection e2fe87d18da9072cc1a1f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:56 client Short Header{DestConnectionID: 1338baf82cccc483, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:56 client <- Reading packet 3 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:56 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:56 client -> Sending packet 6 (34 bytes) for connection e2fe87d18da9072cc1a1f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:56 client Short Header{DestConnectionID: 1338baf82cccc483, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 130.174µs} 2025/04/30 10:43:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:56 client -> Sending packet 7 (30 bytes) for connection e2fe87d18da9072cc1a1f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:56 client Short Header{DestConnectionID: 1338baf82cccc483, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:56 client Connection e2fe87d18da9072cc1a1f9 closed. 2025/04/30 10:43:56 Requesting https://server4:443/ngzofnbivv. 2025/04/30 10:43:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:56 Increased send buffer size to 14336 kiB 2025/04/30 10:43:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:56 Created qlog file: /logs/qlog/edeecc981033b0474c7711dcdb.sqlog 2025/04/30 10:43:56 client Starting new connection to server4 ([::]:40711 -> 193.167.100.100:443), source connection ID (empty), destination connection ID edeecc981033b0474c7711dcdb, version v1 2025/04/30 10:43:56 Adding connection ID (empty). 2025/04/30 10:43:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:56 client -> Sending packet 0 (1280 bytes) for connection edeecc981033b0474c7711dcdb, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: edeecc981033b0474c7711dcdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:43:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:56 client -> Sending packet 1 (1280 bytes) for connection edeecc981033b0474c7711dcdb, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: edeecc981033b0474c7711dcdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:43:56 client -> Sending packet 2 (1280 bytes) for connection edeecc981033b0474c7711dcdb, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: edeecc981033b0474c7711dcdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:43:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:43:56 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b87daad7f98ebb2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:56 client Received first packet. Switching destination connection ID to: 5b87daad7f98ebb2 2025/04/30 10:43:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:43:56 client newly acked packets (1): [2] 2025/04/30 10:43:56 client updated RTT: 34.702333ms (σ: 17.351166ms) 2025/04/30 10:43:56 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b87daad7f98ebb2, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:56 client -> Sending packet 3 (1280 bytes) for connection edeecc981033b0474c7711dcdb, Initial 2025/04/30 10:43:56 client Long Header{Type: Initial, DestConnectionID: 5b87daad7f98ebb2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:57 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b87daad7f98ebb2, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:57 client -> Sending packet 4 (1280 bytes) for connection edeecc981033b0474c7711dcdb, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: 5b87daad7f98ebb2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:57 client <- Reading packet 1 (740 bytes) for connection (empty), Handshake 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5b87daad7f98ebb2, PacketNumber: 1, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:43:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: edeecc981033b0474c7711dcdb, InitialSourceConnectionID: 5b87daad7f98ebb2, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:57 client -> Sending packet 0 (79 bytes) for connection edeecc981033b0474c7711dcdb, Handshake 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: 5b87daad7f98ebb2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:57 client Dropping Initial keys. 2025/04/30 10:43:57 client -> Sending packet 0 (46 bytes) for connection edeecc981033b0474c7711dcdb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 5b87daad7f98ebb2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:57 client <- Reading packet 2 (740 bytes) for connection (empty), Handshake 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5b87daad7f98ebb2, PacketNumber: 2, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:43:57 client -> Sending packet 1 (40 bytes) for connection edeecc981033b0474c7711dcdb, Handshake 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: 5b87daad7f98ebb2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:57 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:57 client Dropping Handshake keys. 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff5a36582e52ee22, StatelessResetToken: 0x9d632db73233a3f74c5ee49b97c7305d} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 946e2b40dc789575, StatelessResetToken: 0xdbf1d9947a2834b775e4fb0cff4799b6} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ee735b3d1f93704, StatelessResetToken: 0xde93577dde8a000b1614114e89a24ed8} 2025/04/30 10:43:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:57 client -> Sending packet 1 (34 bytes) for connection edeecc981033b0474c7711dcdb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:57 client Short Header{DestConnectionID: ff5a36582e52ee22, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 170.098µs} 2025/04/30 10:43:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:57 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:57 client newly acked packets (1): [0] 2025/04/30 10:43:57 client updated RTT: 34.665ms (σ: 13.086ms) 2025/04/30 10:43:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:57 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:57 client -> Sending packet 2 (30 bytes) for connection edeecc981033b0474c7711dcdb, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:57 client Short Header{DestConnectionID: ff5a36582e52ee22, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:57 client Connection edeecc981033b0474c7711dcdb closed. 2025/04/30 10:43:57 Requesting https://server4:443/eiwmbfxlfw. 2025/04/30 10:43:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:57 Increased send buffer size to 14336 kiB 2025/04/30 10:43:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:57 Created qlog file: /logs/qlog/873fdbc2b4df6a130d6034c16bb9a8d3e186.sqlog 2025/04/30 10:43:57 client Starting new connection to server4 ([::]:48731 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 873fdbc2b4df6a130d6034c16bb9a8d3e186, version v1 2025/04/30 10:43:57 Adding connection ID (empty). 2025/04/30 10:43:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:57 client -> Sending packet 0 (1280 bytes) for connection 873fdbc2b4df6a130d6034c16bb9a8d3e186, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: 873fdbc2b4df6a130d6034c16bb9a8d3e186, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:43:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:43:57 client Parsed a coalesced packet. Part 1: 455 bytes. Remaining: 745 bytes. 2025/04/30 10:43:57 client <- Reading packet 0 (455 bytes) for connection (empty), Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 10199c564dbb94ef, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 437, Version: v1} 2025/04/30 10:43:57 client Received first packet. Switching destination connection ID to: 10199c564dbb94ef 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:57 client newly acked packets (1): [0] 2025/04/30 10:43:57 client updated RTT: 36.970599ms (σ: 18.485299ms) 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Parsed a coalesced packet. Part 2: 745 bytes. Remaining: 0 bytes. 2025/04/30 10:43:57 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 10199c564dbb94ef, PacketNumber: 0, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:43:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 873fdbc2b4df6a130d6034c16bb9a8d3e186, InitialSourceConnectionID: 10199c564dbb94ef, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 873fdbc2b4df6a130d6034c16bb9a8d3e186 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: 10199c564dbb94ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: 10199c564dbb94ef, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:57 client Dropping Initial keys. 2025/04/30 10:43:57 client -> Sending packet 1 (40 bytes) for connection 873fdbc2b4df6a130d6034c16bb9a8d3e186, Handshake 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: 10199c564dbb94ef, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:57 client -> Sending packet 0 (46 bytes) for connection 873fdbc2b4df6a130d6034c16bb9a8d3e186, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 10199c564dbb94ef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:57 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:57 client Dropping Handshake keys. 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5dbf699b41272054, StatelessResetToken: 0x7a05ad2f3a6f3ec1ccb8d28d3b64f7c0} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 19388062449e8d18, StatelessResetToken: 0xd461d132ea6573326fed17f441f89e47} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0e5452a0ec9e4fac, StatelessResetToken: 0x499ef4e5e8a5e950976be789241bf33d} 2025/04/30 10:43:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:57 client -> Sending packet 1 (34 bytes) for connection 873fdbc2b4df6a130d6034c16bb9a8d3e186, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 5dbf699b41272054, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 140.662µs} 2025/04/30 10:43:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:57 client <- Reading packet 1 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2d73e08605bf1847, StatelessResetToken: 0x8d4f1a961955e4dd61cf255f3bcd087d} 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:57 client newly acked packets (1): [1] 2025/04/30 10:43:57 client updated RTT: 36.319ms (σ: 15.164ms) 2025/04/30 10:43:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:57 client lost packet 0 (time threshold) 2025/04/30 10:43:57 client Canceling loss detection timer. 2025/04/30 10:43:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:57 client Ignoring all packets below 1. 2025/04/30 10:43:57 client -> Sending packet 2 (51 bytes) for connection 873fdbc2b4df6a130d6034c16bb9a8d3e186, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 5dbf699b41272054, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 180.477µs} 2025/04/30 10:43:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:57 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:57 client newly acked packets (1): [2] 2025/04/30 10:43:57 client updated RTT: 35.932ms (σ: 12.146ms) 2025/04/30 10:43:57 client Canceling loss detection timer. 2025/04/30 10:43:57 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:57 client Ignoring all packets below 2. 2025/04/30 10:43:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:57 client -> Sending packet 3 (30 bytes) for connection 873fdbc2b4df6a130d6034c16bb9a8d3e186, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 5dbf699b41272054, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:57 client Connection 873fdbc2b4df6a130d6034c16bb9a8d3e186 closed. 2025/04/30 10:43:57 Requesting https://server4:443/bdvslejkmp. 2025/04/30 10:43:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:57 Increased send buffer size to 14336 kiB 2025/04/30 10:43:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:57 Created qlog file: /logs/qlog/bd46361a1721b52c2e0c946b4e67a2a6.sqlog 2025/04/30 10:43:57 client Starting new connection to server4 ([::]:42257 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bd46361a1721b52c2e0c946b4e67a2a6, version v1 2025/04/30 10:43:57 Adding connection ID (empty). 2025/04/30 10:43:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:57 client -> Sending packet 0 (1280 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: bd46361a1721b52c2e0c946b4e67a2a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:43:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:43:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:57 client -> Sending packet 1 (1280 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: bd46361a1721b52c2e0c946b4e67a2a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:43:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:43:57 client -> Sending packet 2 (1280 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: bd46361a1721b52c2e0c946b4e67a2a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:43:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:43:57 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2555f0ecb9b3d883, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:57 client Received first packet. Switching destination connection ID to: 2555f0ecb9b3d883 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:57 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2555f0ecb9b3d883, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client -> Sending packet 3 (1280 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: 2555f0ecb9b3d883, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:57 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2555f0ecb9b3d883, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:57 client -> Sending packet 4 (1280 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: 2555f0ecb9b3d883, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:57 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2555f0ecb9b3d883, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:57 client -> Sending packet 5 (1280 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: 2555f0ecb9b3d883, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:57 client <- Reading packet 3 (743 bytes) for connection (empty), Handshake 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2555f0ecb9b3d883, PacketNumber: 3, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:43:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:43:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bd46361a1721b52c2e0c946b4e67a2a6, InitialSourceConnectionID: 2555f0ecb9b3d883, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:57 client -> Sending packet 0 (79 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, Handshake 2025/04/30 10:43:57 client Long Header{Type: Handshake, DestConnectionID: 2555f0ecb9b3d883, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:43:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:57 client Dropping Initial keys. 2025/04/30 10:43:57 client -> Sending packet 0 (46 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 2555f0ecb9b3d883, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:57 client <- Reading packet 1 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:57 client Dropping Handshake keys. 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 340ca037f1922fe4, StatelessResetToken: 0x171db9fae3815fd373d3fd776178596c} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5c656ceeccbf29fd, StatelessResetToken: 0xbc8653f902a2dd583cc9c16be73c8010} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0cfc1071ebb066c6, StatelessResetToken: 0x9ae024889caa8d9f80d135e5cc994aeb} 2025/04/30 10:43:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:57 client -> Sending packet 1 (1366 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 340ca037f1922fe4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.PingFrame{} 2025/04/30 10:43:57 client -> Sending packet 2 (34 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 340ca037f1922fe4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 189.113µs} 2025/04/30 10:43:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:57 client <- Reading packet 2 (108 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:57 client newly acked packets (1): [1] 2025/04/30 10:43:57 client updated RTT: 33.205609ms (σ: 16.602804ms) 2025/04/30 10:43:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:57 client lost packet 0 (time threshold) 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 340ca037f1922fe4, StatelessResetToken: 0x171db9fae3815fd373d3fd776178596c} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5c656ceeccbf29fd, StatelessResetToken: 0xbc8653f902a2dd583cc9c16be73c8010} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0cfc1071ebb066c6, StatelessResetToken: 0x9ae024889caa8d9f80d135e5cc994aeb} 2025/04/30 10:43:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:57 client -> Sending packet 3 (51 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 340ca037f1922fe4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 155.54µs} 2025/04/30 10:43:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:57 client <- Reading packet 3 (51 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 51d25eff564ecebe, StatelessResetToken: 0x37a9473492153213139926c52be42e20} 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:57 client newly acked packets (1): [2] 2025/04/30 10:43:57 client updated RTT: 33.254ms (σ: 12.55ms) 2025/04/30 10:43:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:57 client Ignoring all packets below 2. 2025/04/30 10:43:57 client Sending ACK because the ACK timer expired. 2025/04/30 10:43:57 client -> Sending packet 4 (33 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 340ca037f1922fe4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.289898ms} 2025/04/30 10:43:57 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:57 client newly acked packets (1): [3] 2025/04/30 10:43:57 client updated RTT: 33.246ms (σ: 9.428ms) 2025/04/30 10:43:57 client Canceling loss detection timer. 2025/04/30 10:43:57 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:57 client Ignoring all packets below 3. 2025/04/30 10:43:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:57 client -> Sending packet 5 (30 bytes) for connection bd46361a1721b52c2e0c946b4e67a2a6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:57 client Short Header{DestConnectionID: 340ca037f1922fe4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:57 client Connection bd46361a1721b52c2e0c946b4e67a2a6 closed. 2025/04/30 10:43:57 Requesting https://server4:443/okpewsanjo. 2025/04/30 10:43:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:57 Increased send buffer size to 14336 kiB 2025/04/30 10:43:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:57 Created qlog file: /logs/qlog/93ca9b69ffcd901040d936ccf229f29f2292.sqlog 2025/04/30 10:43:57 client Starting new connection to server4 ([::]:39401 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 93ca9b69ffcd901040d936ccf229f29f2292, version v1 2025/04/30 10:43:57 Adding connection ID (empty). 2025/04/30 10:43:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:57 client -> Sending packet 0 (1280 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, Initial 2025/04/30 10:43:57 client Long Header{Type: Initial, DestConnectionID: 93ca9b69ffcd901040d936ccf229f29f2292, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:43:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:43:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:58 client -> Sending packet 1 (1280 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: 93ca9b69ffcd901040d936ccf229f29f2292, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:43:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:43:58 client -> Sending packet 2 (1280 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: 93ca9b69ffcd901040d936ccf229f29f2292, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:43:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:43:58 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8f23e177b724efc, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:58 client Received first packet. Switching destination connection ID to: f8f23e177b724efc 2025/04/30 10:43:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:58 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8f23e177b724efc, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:58 client newly acked packets (1): [2] 2025/04/30 10:43:58 client updated RTT: 34.601902ms (σ: 17.300951ms) 2025/04/30 10:43:58 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8f23e177b724efc, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:58 client -> Sending packet 3 (1280 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: f8f23e177b724efc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:58 client <- Reading packet 1 (745 bytes) for connection (empty), Handshake 2025/04/30 10:43:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8f23e177b724efc, PacketNumber: 1, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:43:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:43:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 93ca9b69ffcd901040d936ccf229f29f2292, InitialSourceConnectionID: f8f23e177b724efc, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:58 client -> Sending packet 0 (79 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, Handshake 2025/04/30 10:43:58 client Long Header{Type: Handshake, DestConnectionID: f8f23e177b724efc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:58 client Dropping Initial keys. 2025/04/30 10:43:58 client -> Sending packet 0 (46 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:58 client Short Header{DestConnectionID: f8f23e177b724efc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:58 client <- Reading packet 2 (745 bytes) for connection (empty), Handshake 2025/04/30 10:43:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8f23e177b724efc, PacketNumber: 2, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:43:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:43:58 client -> Sending packet 1 (40 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, Handshake 2025/04/30 10:43:58 client Long Header{Type: Handshake, DestConnectionID: f8f23e177b724efc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:58 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:58 client Dropping Handshake keys. 2025/04/30 10:43:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 348b7f3db05c262d, StatelessResetToken: 0xe99d68ce1868e24ae49d28ecf4416e4a} 2025/04/30 10:43:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 31e2acba50e30660, StatelessResetToken: 0x77316c54870e46c43d409853de1b4f14} 2025/04/30 10:43:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1197d6bfc182db42, StatelessResetToken: 0x0049a27c71a1807e4824b3509c3a38f4} 2025/04/30 10:43:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:58 client -> Sending packet 1 (34 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:58 client Short Header{DestConnectionID: 348b7f3db05c262d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 132.086µs} 2025/04/30 10:43:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:58 client -> Sending packet 3 (46 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:58 client Short Header{DestConnectionID: 348b7f3db05c262d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:58 client Skipping packet number 2 2025/04/30 10:43:58 client -> Sending packet 4 (29 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:58 client Short Header{DestConnectionID: 348b7f3db05c262d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:58 client <- Reading packet 3 (53 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 28bfcc6cc1a139db, StatelessResetToken: 0x1b637e9af6e7f41cd4a727934e0344fc} 2025/04/30 10:43:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:43:58 client newly acked packets (1): [4] 2025/04/30 10:43:58 client updated RTT: 34.234ms (σ: 13.709ms) 2025/04/30 10:43:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:58 client setting loss timer for packet 3 (1-RTT) to 38.51325ms (in 2025-04-30 10:43:58.586716146 +0000 UTC m=+24.248511919) 2025/04/30 10:43:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:58 client -> Sending packet 5 (34 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:58 client Short Header{DestConnectionID: 348b7f3db05c262d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 190.055µs} 2025/04/30 10:43:58 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:43:58.586716146 +0000 UTC m=+24.248511919 2025/04/30 10:43:58 client lost packet 3 (time threshold) 2025/04/30 10:43:58 client Canceling loss detection timer. 2025/04/30 10:43:58 client -> Sending packet 6 (46 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:58 client Short Header{DestConnectionID: 348b7f3db05c262d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:58 client <- Reading packet 4 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:58 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:58 client -> Sending packet 7 (1366 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:58 client Short Header{DestConnectionID: 348b7f3db05c262d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:58 client -> &wire.PingFrame{} 2025/04/30 10:43:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:58 client -> Sending packet 8 (30 bytes) for connection 93ca9b69ffcd901040d936ccf229f29f2292, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:58 client Short Header{DestConnectionID: 348b7f3db05c262d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:58 client Connection 93ca9b69ffcd901040d936ccf229f29f2292 closed. 2025/04/30 10:43:58 Requesting https://server4:443/eumtgecpcm. 2025/04/30 10:43:58 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:58 Increased send buffer size to 14336 kiB 2025/04/30 10:43:58 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:58 Created qlog file: /logs/qlog/0095d3d485b5b0df19578d1d4a7c2b7dcf.sqlog 2025/04/30 10:43:58 client Starting new connection to server4 ([::]:42084 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0095d3d485b5b0df19578d1d4a7c2b7dcf, version v1 2025/04/30 10:43:58 Adding connection ID (empty). 2025/04/30 10:43:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:58 client -> Sending packet 0 (1280 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: 0095d3d485b5b0df19578d1d4a7c2b7dcf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:43:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:43:58 client -> Sending packet 1 (1280 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: 0095d3d485b5b0df19578d1d4a7c2b7dcf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:43:58 client -> Sending packet 2 (1280 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: 0095d3d485b5b0df19578d1d4a7c2b7dcf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:43:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:43:58 client <- Reading packet 1 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5960ae5005e870c5, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:58 client Received first packet. Switching destination connection ID to: 5960ae5005e870c5 2025/04/30 10:43:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:58 client <- Reading packet 2 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5960ae5005e870c5, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:58 client newly acked packets (1): [2] 2025/04/30 10:43:58 client updated RTT: 34.74429ms (σ: 17.372145ms) 2025/04/30 10:43:59 client Queueing packet (743 bytes) for later decryption 2025/04/30 10:43:59 client Queueing packet (743 bytes) for later decryption 2025/04/30 10:43:59 client -> Sending packet 3 (1280 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: 5960ae5005e870c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:59 client -> &wire.PingFrame{} 2025/04/30 10:43:59 client <- Reading packet 4 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5960ae5005e870c5, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client newly acked packets (1): [3] 2025/04/30 10:43:59 client updated RTT: 34.568ms (σ: 13.379ms) 2025/04/30 10:43:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:59 client -> Sending packet 4 (1280 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: 5960ae5005e870c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:59 client -> &wire.PingFrame{} 2025/04/30 10:43:59 client <- Reading packet 5 (1201 bytes) for connection (empty), Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5960ae5005e870c5, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1183, Version: v1} 2025/04/30 10:43:59 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client newly acked packets (1): [4] 2025/04/30 10:43:59 client updated RTT: 34.432ms (σ: 10.305ms) 2025/04/30 10:43:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:43:59 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5960ae5005e870c5, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 10:43:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client -> Sending packet 5 (1280 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: 5960ae5005e870c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:43:59 client <- Reading packet 1 (743 bytes) for connection (empty), Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5960ae5005e870c5, PacketNumber: 1, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:43:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:43:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0095d3d485b5b0df19578d1d4a7c2b7dcf, InitialSourceConnectionID: 5960ae5005e870c5, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:59 client <- Reading packet 2 (743 bytes) for connection (empty), Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5960ae5005e870c5, PacketNumber: 2, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:43:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:43:59 client -> Sending packet 0 (79 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: 5960ae5005e870c5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:43:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:59 client Dropping Initial keys. 2025/04/30 10:43:59 client -> Sending packet 0 (46 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 5960ae5005e870c5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:59 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 10:43:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:43:59 client -> Sending packet 1 (74 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: 5960ae5005e870c5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:59 client -> Sending packet 2 (74 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: 5960ae5005e870c5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:59 client <- Reading packet 3 (743 bytes) for connection (empty), Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5960ae5005e870c5, PacketNumber: 3, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:43:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:43:59 client <- Reading packet 0 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:59 client Dropping Handshake keys. 2025/04/30 10:43:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:43:59 client -> Sending packet 2 (51 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 5960ae5005e870c5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 125.684µs} 2025/04/30 10:43:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:59 client -> Sending packet 3 (46 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 5960ae5005e870c5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:59 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:43:59 client newly acked packets (1): [3] 2025/04/30 10:43:59 client updated RTT: 34.312ms (σ: 7.968ms) 2025/04/30 10:43:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:59 client Canceling loss detection timer. 2025/04/30 10:43:59 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:43:59 client -> Sending packet 4 (34 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 5960ae5005e870c5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 157.294µs} 2025/04/30 10:43:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:59 client -> Sending packet 5 (30 bytes) for connection 0095d3d485b5b0df19578d1d4a7c2b7dcf, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 5960ae5005e870c5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:59 client Connection 0095d3d485b5b0df19578d1d4a7c2b7dcf closed. 2025/04/30 10:43:59 Requesting https://server4:443/lalalmccrw. 2025/04/30 10:43:59 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:59 Increased send buffer size to 14336 kiB 2025/04/30 10:43:59 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:59 Created qlog file: /logs/qlog/ae60d3ffa262bf73.sqlog 2025/04/30 10:43:59 client Starting new connection to server4 ([::]:39007 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ae60d3ffa262bf73, version v1 2025/04/30 10:43:59 Adding connection ID (empty). 2025/04/30 10:43:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:59 client -> Sending packet 0 (1280 bytes) for connection ae60d3ffa262bf73, Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: ae60d3ffa262bf73, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:43:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:43:59 client Parsed a coalesced packet. Part 1: 464 bytes. Remaining: 736 bytes. 2025/04/30 10:43:59 client <- Reading packet 0 (464 bytes) for connection (empty), Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4dd67c24bc2a4ca7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 446, Version: v1} 2025/04/30 10:43:59 client Received first packet. Switching destination connection ID to: 4dd67c24bc2a4ca7 2025/04/30 10:43:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client newly acked packets (1): [0] 2025/04/30 10:43:59 client updated RTT: 37.262557ms (σ: 18.631278ms) 2025/04/30 10:43:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Parsed a coalesced packet. Part 2: 736 bytes. Remaining: 0 bytes. 2025/04/30 10:43:59 client <- Reading packet 0 (736 bytes) for connection (empty), Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4dd67c24bc2a4ca7, PacketNumber: 0, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:43:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:43:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ae60d3ffa262bf73, InitialSourceConnectionID: 4dd67c24bc2a4ca7, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ae60d3ffa262bf73 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: 4dd67c24bc2a4ca7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: 4dd67c24bc2a4ca7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:59 client Dropping Initial keys. 2025/04/30 10:43:59 client -> Sending packet 1 (40 bytes) for connection ae60d3ffa262bf73, Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: 4dd67c24bc2a4ca7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client -> Sending packet 0 (46 bytes) for connection ae60d3ffa262bf73, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 4dd67c24bc2a4ca7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:59 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:59 client Dropping Handshake keys. 2025/04/30 10:43:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 95fffa9ac8ffda99, StatelessResetToken: 0xbb510656322d9a708e2e4ceed92dce7d} 2025/04/30 10:43:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 21094ac37244ff94, StatelessResetToken: 0xace6e5e8582e3f3d4b23c932b7297570} 2025/04/30 10:43:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 49871c41c0c0b5d0, StatelessResetToken: 0x27d8cb5b4a377fd73a4f91cf524ea9f3} 2025/04/30 10:43:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:59 client -> Sending packet 1 (34 bytes) for connection ae60d3ffa262bf73, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 95fffa9ac8ffda99, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 138.408µs} 2025/04/30 10:43:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:43:59 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:43:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client newly acked packets (1): [0] 2025/04/30 10:43:59 client updated RTT: 36.999ms (σ: 14.497ms) 2025/04/30 10:43:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:43:59 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:43:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:43:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:43:59 client -> Sending packet 2 (30 bytes) for connection ae60d3ffa262bf73, 1-RTT (ECN: Not-ECT) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 95fffa9ac8ffda99, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:43:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:43:59 client Connection ae60d3ffa262bf73 closed. 2025/04/30 10:43:59 Requesting https://server4:443/rfwrnsecuq. 2025/04/30 10:43:59 Increased receive buffer size to 14336 kiB 2025/04/30 10:43:59 Increased send buffer size to 14336 kiB 2025/04/30 10:43:59 Setting DF for IPv4 and IPv6. 2025/04/30 10:43:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:43:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:43:59 Created qlog file: /logs/qlog/f4c58ee73338942f4a2f4df501fa.sqlog 2025/04/30 10:43:59 client Starting new connection to server4 ([::]:42713 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f4c58ee73338942f4a2f4df501fa, version v1 2025/04/30 10:43:59 Adding connection ID (empty). 2025/04/30 10:43:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:43:59 client -> Sending packet 0 (1280 bytes) for connection f4c58ee73338942f4a2f4df501fa, Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: f4c58ee73338942f4a2f4df501fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:43:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:43:59 client Parsed a coalesced packet. Part 1: 458 bytes. Remaining: 742 bytes. 2025/04/30 10:43:59 client <- Reading packet 0 (458 bytes) for connection (empty), Initial 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 67be386093026b8f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 440, Version: v1} 2025/04/30 10:43:59 client Received first packet. Switching destination connection ID to: 67be386093026b8f 2025/04/30 10:43:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client newly acked packets (1): [0] 2025/04/30 10:43:59 client updated RTT: 36.801146ms (σ: 18.400573ms) 2025/04/30 10:43:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:43:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 0 bytes. 2025/04/30 10:43:59 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 67be386093026b8f, PacketNumber: 0, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:43:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:43:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:43:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f4c58ee73338942f4a2f4df501fa, InitialSourceConnectionID: 67be386093026b8f, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:43:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f4c58ee73338942f4a2f4df501fa 2025/04/30 10:43:59 client Long Header{Type: Initial, DestConnectionID: 67be386093026b8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: 67be386093026b8f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:43:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:43:59 client Dropping Initial keys. 2025/04/30 10:43:59 client -> Sending packet 1 (40 bytes) for connection f4c58ee73338942f4a2f4df501fa, Handshake 2025/04/30 10:43:59 client Long Header{Type: Handshake, DestConnectionID: 67be386093026b8f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:43:59 client -> Sending packet 0 (46 bytes) for connection f4c58ee73338942f4a2f4df501fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 67be386093026b8f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:43:59 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:43:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:43:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:43:59 client Dropping Handshake keys. 2025/04/30 10:43:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4b00fd527dd32945, StatelessResetToken: 0xd86b3980735b0d8569ec7dfc429ede92} 2025/04/30 10:43:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e7a983bff3f4a59, StatelessResetToken: 0x00ac37e81cfd4970729f07c831768c7b} 2025/04/30 10:43:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 06034d7134857f7a, StatelessResetToken: 0x9f05b65ee3d31e618a495245b92a92eb} 2025/04/30 10:43:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:43:59 client -> Sending packet 1 (34 bytes) for connection f4c58ee73338942f4a2f4df501fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:43:59 client Short Header{DestConnectionID: 4b00fd527dd32945, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:43:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144.71µs} 2025/04/30 10:43:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:00 client <- Reading packet 2 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4b00fd527dd32945, StatelessResetToken: 0xd86b3980735b0d8569ec7dfc429ede92} 2025/04/30 10:44:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e7a983bff3f4a59, StatelessResetToken: 0x00ac37e81cfd4970729f07c831768c7b} 2025/04/30 10:44:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 06034d7134857f7a, StatelessResetToken: 0x9f05b65ee3d31e618a495245b92a92eb} 2025/04/30 10:44:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:00 client -> Sending packet 2 (34 bytes) for connection f4c58ee73338942f4a2f4df501fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 4b00fd527dd32945, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 150.12µs} 2025/04/30 10:44:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:00 client -> Sending packet 4 (46 bytes) for connection f4c58ee73338942f4a2f4df501fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 4b00fd527dd32945, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:00 client Skipping packet number 3 2025/04/30 10:44:00 client -> Sending packet 5 (29 bytes) for connection f4c58ee73338942f4a2f4df501fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 4b00fd527dd32945, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:00 client <- Reading packet 5 (1050 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:00 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:00 client -> Sending packet 6 (1366 bytes) for connection f4c58ee73338942f4a2f4df501fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 4b00fd527dd32945, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.PingFrame{} 2025/04/30 10:44:00 client -> Sending packet 7 (36 bytes) for connection f4c58ee73338942f4a2f4df501fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 4b00fd527dd32945, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 207.036µs} 2025/04/30 10:44:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:00 client -> Sending packet 8 (30 bytes) for connection f4c58ee73338942f4a2f4df501fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 4b00fd527dd32945, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:00 client Connection f4c58ee73338942f4a2f4df501fa closed. 2025/04/30 10:44:00 Requesting https://server4:443/symvbectfk. 2025/04/30 10:44:00 Increased receive buffer size to 14336 kiB 2025/04/30 10:44:00 Increased send buffer size to 14336 kiB 2025/04/30 10:44:00 Setting DF for IPv4 and IPv6. 2025/04/30 10:44:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:44:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:44:00 Created qlog file: /logs/qlog/5515ca1f8cd65f7419148536.sqlog 2025/04/30 10:44:00 client Starting new connection to server4 ([::]:53830 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5515ca1f8cd65f7419148536, version v1 2025/04/30 10:44:00 Adding connection ID (empty). 2025/04/30 10:44:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:44:00 client -> Sending packet 0 (1280 bytes) for connection 5515ca1f8cd65f7419148536, Initial 2025/04/30 10:44:00 client Long Header{Type: Initial, DestConnectionID: 5515ca1f8cd65f7419148536, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:44:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:44:00 client Parsed a coalesced packet. Part 1: 461 bytes. Remaining: 739 bytes. 2025/04/30 10:44:00 client <- Reading packet 0 (461 bytes) for connection (empty), Initial 2025/04/30 10:44:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8f36988f6524fb28, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 443, Version: v1} 2025/04/30 10:44:00 client Received first packet. Switching destination connection ID to: 8f36988f6524fb28 2025/04/30 10:44:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:00 client newly acked packets (1): [0] 2025/04/30 10:44:00 client updated RTT: 37.308828ms (σ: 18.654414ms) 2025/04/30 10:44:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:44:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:00 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 0 bytes. 2025/04/30 10:44:00 client <- Reading packet 0 (739 bytes) for connection (empty), Handshake 2025/04/30 10:44:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8f36988f6524fb28, PacketNumber: 0, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:44:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:44:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:44:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5515ca1f8cd65f7419148536, InitialSourceConnectionID: 8f36988f6524fb28, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 10:44:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5515ca1f8cd65f7419148536 2025/04/30 10:44:00 client Long Header{Type: Initial, DestConnectionID: 8f36988f6524fb28, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 10:44:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:00 client Long Header{Type: Handshake, DestConnectionID: 8f36988f6524fb28, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:44:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:44:00 client Dropping Initial keys. 2025/04/30 10:44:00 client -> Sending packet 1 (40 bytes) for connection 5515ca1f8cd65f7419148536, Handshake 2025/04/30 10:44:00 client Long Header{Type: Handshake, DestConnectionID: 8f36988f6524fb28, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:44:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:44:00 client -> Sending packet 0 (46 bytes) for connection 5515ca1f8cd65f7419148536, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 8f36988f6524fb28, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:00 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:44:00 client Dropping Handshake keys. 2025/04/30 10:44:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3387a8d394987da8, StatelessResetToken: 0x73da506c26ce67cfcfbc28303d164e2d} 2025/04/30 10:44:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1add35f8913468ec, StatelessResetToken: 0x4cf5acd9e01cfe30c96d5c87ac740fa5} 2025/04/30 10:44:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f55df055d119bf1b, StatelessResetToken: 0xed3b57b79b01fadfb0c333984553dca0} 2025/04/30 10:44:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:44:00 client -> Sending packet 1 (34 bytes) for connection 5515ca1f8cd65f7419148536, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 3387a8d394987da8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 148.748µs} 2025/04/30 10:44:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:44:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:44:00 client -> Sending packet 3 (46 bytes) for connection 5515ca1f8cd65f7419148536, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 3387a8d394987da8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:00 client Skipping packet number 2 2025/04/30 10:44:00 client -> Sending packet 4 (29 bytes) for connection 5515ca1f8cd65f7419148536, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 3387a8d394987da8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:44:00 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7a3683713ce404ca, StatelessResetToken: 0xfa0dffb51dd7e8a7d5ca5ee50f2a92f3} 2025/04/30 10:44:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:44:00 client -> Sending packet 5 (34 bytes) for connection 5515ca1f8cd65f7419148536, 1-RTT (ECN: ECT(0)) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 3387a8d394987da8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 94.036µs} 2025/04/30 10:44:00 client <- Reading packet 3 (54 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7a3683713ce404ca, StatelessResetToken: 0xfa0dffb51dd7e8a7d5ca5ee50f2a92f3} 2025/04/30 10:44:00 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 4ms} 2025/04/30 10:44:00 client newly acked packets (1): [4] 2025/04/30 10:44:00 client updated RTT: 37.169ms (σ: 14.267ms) 2025/04/30 10:44:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:44:00 client setting loss timer for packet 3 (1-RTT) to 41.815125ms (in 2025-04-30 10:44:00.471107435 +0000 UTC m=+26.132903208) 2025/04/30 10:44:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:00 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:44:00.471107435 +0000 UTC m=+26.132903208 2025/04/30 10:44:00 client lost packet 3 (time threshold) 2025/04/30 10:44:00 client Canceling loss detection timer. 2025/04/30 10:44:00 client -> Sending packet 6 (54 bytes) for connection 5515ca1f8cd65f7419148536, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 3387a8d394987da8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 6.314862ms} 2025/04/30 10:44:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:44:00 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:44:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:44:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:44:00 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s} 2025/04/30 10:44:00 client newly acked packets (1): [6] 2025/04/30 10:44:00 client updated RTT: 36.671ms (σ: 11.695ms) 2025/04/30 10:44:00 client Canceling loss detection timer. 2025/04/30 10:44:00 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:44:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:44:00 client Ignoring all packets below 4. 2025/04/30 10:44:00 client -> Sending packet 7 (1366 bytes) for connection 5515ca1f8cd65f7419148536, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 3387a8d394987da8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.PingFrame{} 2025/04/30 10:44:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:44:00 client -> Sending packet 8 (30 bytes) for connection 5515ca1f8cd65f7419148536, 1-RTT (ECN: Not-ECT) 2025/04/30 10:44:00 client Short Header{DestConnectionID: 3387a8d394987da8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:44:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:44:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:44:00 client Connection 5515ca1f8cd65f7419148536 closed.