2025/04/30 19:45:03 Requesting https://server4:443/lgjjreanle. 2025/04/30 19:45:03 Increased receive buffer size to 14336 kiB 2025/04/30 19:45:03 Increased send buffer size to 14336 kiB 2025/04/30 19:45:03 Setting DF for IPv4 and IPv6. 2025/04/30 19:45:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 19:45:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 19:45:03 Created qlog file: /logs/qlog/6e8d6bf62fdfd252.sqlog 2025/04/30 19:45:03 client Starting new connection to server4 ([::]:43607 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6e8d6bf62fdfd252, version v1 2025/04/30 19:45:03 Adding connection ID (empty). 2025/04/30 19:45:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 19:45:03 client -> Sending packet 0 (1280 bytes) for connection 6e8d6bf62fdfd252, Initial 2025/04/30 19:45:03 client Long Header{Type: Initial, DestConnectionID: 6e8d6bf62fdfd252, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 19:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:45:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 19:45:03 client -> Sending packet 1 (1280 bytes) for connection 6e8d6bf62fdfd252, Initial 2025/04/30 19:45:03 client Long Header{Type: Initial, DestConnectionID: 6e8d6bf62fdfd252, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 19:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:45:03 client -> Sending packet 2 (1280 bytes) for connection 6e8d6bf62fdfd252, Initial 2025/04/30 19:45:03 client Long Header{Type: Initial, DestConnectionID: 6e8d6bf62fdfd252, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 19:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:45:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 19:45:03 client -> Sending packet 3 (1280 bytes) for connection 6e8d6bf62fdfd252, Initial 2025/04/30 19:45:03 client Long Header{Type: Initial, DestConnectionID: 6e8d6bf62fdfd252, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 19:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:45:03 client -> Sending packet 4 (1280 bytes) for connection 6e8d6bf62fdfd252, Initial 2025/04/30 19:45:03 client Long Header{Type: Initial, DestConnectionID: 6e8d6bf62fdfd252, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 19:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:45:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 19:45:04 client -> Sending packet 5 (1280 bytes) for connection 6e8d6bf62fdfd252, Initial 2025/04/30 19:45:04 client Long Header{Type: Initial, DestConnectionID: 6e8d6bf62fdfd252, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 19:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:45:04 client -> Sending packet 6 (1280 bytes) for connection 6e8d6bf62fdfd252, Initial 2025/04/30 19:45:04 client Long Header{Type: Initial, DestConnectionID: 6e8d6bf62fdfd252, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 19:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:45:04 client Parsed a coalesced packet. Part 1: 463 bytes. Remaining: 737 bytes. 2025/04/30 19:45:04 client <- Reading packet 0 (463 bytes) for connection (empty), Initial 2025/04/30 19:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b5e14a4a930b916b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 445, Version: v1} 2025/04/30 19:45:04 client Received first packet. Switching destination connection ID to: b5e14a4a930b916b 2025/04/30 19:45:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 19:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 19:45:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 19:45:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 19:45:04 client Parsed a coalesced packet. Part 2: 737 bytes. Remaining: 0 bytes. 2025/04/30 19:45:04 client <- Reading packet 0 (737 bytes) for connection (empty), Handshake 2025/04/30 19:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b5e14a4a930b916b, PacketNumber: 0, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 19:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 19:45:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 19:45:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 19:45:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6e8d6bf62fdfd252, InitialSourceConnectionID: b5e14a4a930b916b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 19:45:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6e8d6bf62fdfd252 2025/04/30 19:45:04 client Long Header{Type: Initial, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 19:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 19:45:04 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 19:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 19:45:04 client Dropping Initial keys. 2025/04/30 19:45:04 client -> Sending packet 1 (40 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:04 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 19:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 19:45:04 client -> Sending packet 0 (46 bytes) for connection 6e8d6bf62fdfd252, 1-RTT (ECN: ECT(0)) 2025/04/30 19:45:04 client Short Header{DestConnectionID: b5e14a4a930b916b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 19:45:05 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 19:45:05 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 19:45:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 19:45:05 client -> Sending packet 2 (74 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:05 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 19:45:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 19:45:05 client -> Sending packet 3 (74 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:05 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 19:45:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 19:45:05 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 19:45:05 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 19:45:05 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 19:45:05 client <- Reading packet 1 (737 bytes) for connection (empty), Handshake 2025/04/30 19:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b5e14a4a930b916b, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 19:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 19:45:05 client -> Sending packet 4 (40 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:05 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 19:45:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 19:45:05 client <- Reading packet 2 (737 bytes) for connection (empty), Handshake 2025/04/30 19:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b5e14a4a930b916b, PacketNumber: 2, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 19:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 19:45:05 client -> Sending packet 5 (40 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:05 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 19:45:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 19:45:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 19:45:05 client -> Sending packet 6 (74 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:05 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 19:45:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 19:45:05 client -> Sending packet 7 (74 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:05 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 19:45:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 19:45:05 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 19:45:06 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 19:45:06 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 19:45:06 client Dropping %!s(logging.PacketType=0) packet (1201 bytes) because we already dropped the keys. 2025/04/30 19:45:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 19:45:06 client -> Sending packet 8 (74 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:06 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 19:45:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 19:45:06 client -> Sending packet 9 (74 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:06 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 19:45:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 19:45:06 client <- Reading packet 3 (737 bytes) for connection (empty), Handshake 2025/04/30 19:45:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b5e14a4a930b916b, PacketNumber: 3, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 19:45:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 19:45:06 client -> Sending packet 10 (40 bytes) for connection 6e8d6bf62fdfd252, Handshake 2025/04/30 19:45:06 client Long Header{Type: Handshake, DestConnectionID: b5e14a4a930b916b, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 19:45:06 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 19:45:06 client <- Reading packet 0 (103 bytes) for connection (empty), 1-RTT 2025/04/30 19:45:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 19:45:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 19:45:06 client Dropping Handshake keys. 2025/04/30 19:45:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 059d3369ed8495fb, StatelessResetToken: 0x0067f18efb653c14651c5e57305c0936} 2025/04/30 19:45:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: afabb4a2713be75a, StatelessResetToken: 0xe8cca94a876d9a1feeff4dc36b9196e9} 2025/04/30 19:45:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22af497269256783, StatelessResetToken: 0xab110c40b9a26fec0c675d9d8dac84a0} 2025/04/30 19:45:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 19:45:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 19:45:06 client -> Sending packet 2 (53 bytes) for connection 6e8d6bf62fdfd252, 1-RTT (ECN: ECT(0)) 2025/04/30 19:45:06 client Short Header{DestConnectionID: 059d3369ed8495fb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:45:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 135.724µs} 2025/04/30 19:45:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 19:45:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 19:45:06 client -> Sending packet 3 (48 bytes) for connection 6e8d6bf62fdfd252, 1-RTT (ECN: ECT(0)) 2025/04/30 19:45:06 client Short Header{DestConnectionID: 059d3369ed8495fb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:45:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 19:45:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 19:45:06 client -> Sending packet 4 (1366 bytes) for connection 6e8d6bf62fdfd252, 1-RTT (ECN: ECT(0)) 2025/04/30 19:45:06 client Short Header{DestConnectionID: 059d3369ed8495fb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:45:06 client -> &wire.PingFrame{} 2025/04/30 19:45:06 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 19:45:06 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 19:45:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 19:45:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 19:45:06 client <- &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 19:45:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 19:45:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 19:45:06 client -> Sending packet 5 (30 bytes) for connection 6e8d6bf62fdfd252, 1-RTT (ECN: ECT(0)) 2025/04/30 19:45:06 client Short Header{DestConnectionID: 059d3369ed8495fb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:45:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 19:45:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 19:45:06 client Connection 6e8d6bf62fdfd252 closed.