2025-04-30 11:17:57,206 Generated random file: nflktxqlzj of size: 10240 2025-04-30 11:17:57,206 Requests: https://server4:443/nflktxqlzj 2025-04-30 11:17:57,263 2025-04-30 11:17:57,264 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_wnf3ldc_/ TESTCASE_SERVER=retry TESTCASE_CLIENT=retry WWW=/tmp/www_1odgntzd/ DOWNLOADS=/tmp/download_elqwz_tj/ SERVER_LOGS=/tmp/logs_server_edcax82i CLIENT_LOGS=/tmp/logs_client_ayvx1uka SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=litespeedtech/lsquic-qir:latest REQUESTS="https://server4:443/nflktxqlzj" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-04-30 11:18:11,194 Container sim Created Container server Recreate Container client Recreate Container client Recreated Container server Recreated Attaching to client, server, sim sim | waiting 10s for server:443 client | Setting up routes... client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off server | Setting up routes... server | Actual changes: server | tx-checksumming: off server | tx-checksum-ip-generic: off server | tx-checksum-sctp: off server | tcp-segmentation-offload: off server | tx-tcp-segmentation: off [requested on] server | tx-tcp-ecn-segmentation: off [requested on] server | tx-tcp-mangleid-segmentation: off [requested on] server | tx-tcp6-segmentation: off [requested on] server | tx-udp-segmentation: off [requested on] client | Endpoint's IPv4 address is 193.167.0.100 server | Endpoint's IPv4 address is 193.167.100.100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 server | TEST_PARAMS: server | REQUESTS: '' server | paths: server | server: server | port: server | SERVER_PARAMS: client | Certificate was added to keystore client | wait-for-it.sh: waiting 30 seconds for sim:57832 sim | server:443 is available after 1.017114275s sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes sim | tcpdump: listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 17:59.398 Creating connection with server4:443 with v1 client | 17:59.484 Original destination connection id: 1fb458827007f045 (scid: 11be1541958ef1a5) client | >- CryptoStream[I|ClientHello] client | 17:59.631 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) client | 17:59.668 <- (1) Packet I|-|R|91| Retry Token (52): 0064ac977bd56e9cb74aeecbfa77091da4f686f657bcd680c2f65bfacd6beb918f24a4eb11e8a7fa59fbe1470f5071d2c6f118fa client | 17:59.695 -> Packet I|1|L|1200|2 Token=0064ac977bd56e9cb74aeecbfa77091da4f686f657bcd680c2f65bfacd6beb918f24a4eb11e8a7fa59fbe1470f5071d2c6f118fa CryptoFrame[0,257] Padding(844) client | 17:59.728 <- (2) Packet I|0|L|175|2 Token=[] AckFrame[1|?0] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 17:59.759 -> Packet I|2|L|1201|2 Token=0064ac977bd56e9cb74aeecbfa77091da4f686f657bcd680c2f65bfacd6beb918f24a4eb11e8a7fa59fbe1470f5071d2c6f118fa AckFrame[0|?0] Padding(1101) client | 17:59.728 <- (2) Packet H|1|L|1077|2 CryptoFrame[0,719] Padding(312) client | 17:59.774 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) client | 17:59.774 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) client | 17:59.775 - unsupported transport parameter 0x7158, size 1 (timestamp) client | 17:59.775 - unsupported transport parameter 0x1057, size 1 (loss-bits) client | >- CryptoStream[H|Finished] client | 17:59.798 -> Packet H|0|L|80|1 CryptoFrame[0,36] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 17:59.802 -> Packet H|1|L|46|1 AckFrame[1|?0] client | 17:59.803 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) client | 17:59.810 -> Packet A|0|S0|4dafe19ce539c8e7|47|1 StreamFrame[0(CIB),0,17,fin] client | 17:59.824 <- (4) Packet H|3|L|1077|2 CryptoFrame[0,719] Padding(312) client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 17:59.828 -> Packet H|2|L|48|1 AckFrame[3,1|?0] client | 17:59.830 <- (5) Packet A|4|S0|11be1541958ef1a5|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] client | -< CryptoStream[A|NewSessionTicket,NewSessionTicket] client | 17:59.834 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) client | 17:59.842 <- (7) Packet A|7|S0|11be1541958ef1a5|1252|2 AckFrame[0|?0] StreamFrame[0(CIB),0,1219] client | 17:59.843 <- (8) Packet A|8|S0|11be1541958ef1a5|1252|1 StreamFrame[0(CIB),1219,1222] client | 17:59.845 -> Packet A|1|S0|4dafe19ce539c8e7|34|1 AckFrame[7,4|?10] client | 17:59.845 <- (9) Packet A|9|S0|11be1541958ef1a5|1252|1 StreamFrame[0(CIB),2441,1222] client | 17:59.845 <- (10) Packet A|10|S0|11be1541958ef1a5|1252|1 StreamFrame[0(CIB),3663,1222] client | 17:59.846 <- (11) Packet A|11|S0|11be1541958ef1a5|1252|1 StreamFrame[0(CIB),4885,1222] client | 17:59.847 <- (12) Packet A|12|S0|11be1541958ef1a5|1252|1 StreamFrame[0(CIB),6107,1222] client | 17:59.847 -> Packet A|2|S0|4dafe19ce539c8e7|34|1 AckFrame[9-7,4|?1] client | 17:59.851 -> Packet A|3|S0|4dafe19ce539c8e7|34|1 AckFrame[12-7,4|?2] client | 17:59.848 <- (13) Packet A|13|S0|11be1541958ef1a5|1252|1 StreamFrame[0(CIB),7329,1222] client | 17:59.850 <- (14) Packet A|14|S0|11be1541958ef1a5|1252|1 StreamFrame[0(CIB),8551,1222] client | 17:59.850 <- (15) Packet A|15|S0|11be1541958ef1a5|499|1 StreamFrame[0(CIB),9773,467,fin] client | 17:59.853 -> Packet A|4|S0|4dafe19ce539c8e7|34|1 AckFrame[14-7,4|?1] client | Get requested finished in 0.37 sec (0.03 MB/s) : tech.kwik.h09.client.HttpResponseImpl@2ddc8ecb client | 17:59.859 Closing ClientConnection[1fb458827007f045/11be1541958ef1a5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 17:59.861 -> Packet A|5|S0|4dafe19ce539c8e7|38|2 ConnectionCloseFrame[0|0|] AckFrame[15-7,4|?7] client | 17:59.882 <- (16) Packet A|16|S0|11be1541958ef1a5|98|2 NewConnectionIdFrame[1,<0|3f3d25fb0f766c04|df5723b3c34b4868042020445eadec2a] NewTokenFrame[0155c51c9fc2857807ca6e91a3d3d7aade7d4597dd720bdd465c0aa4cb292e05f05b7abbd2946b8ab280] client | 17:59.888 -> Packet A|6|S0|4dafe19ce539c8e7|37|2 ConnectionCloseFrame[0|0|] AckFrame[15-7,4|?0] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container client Stopping Container server Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-04-30 11:18:11,285 No key log file found. 2025-04-30 11:18:11,286 No key log file found. 2025-04-30 11:18:11,286 No key log file found. 2025-04-30 11:18:11,286 No key log file found. 2025-04-30 11:18:11,845 Check of downloaded files succeeded. 2025-04-30 11:18:12,404 Check of Retry succeeded. Token used: 0064ac977bd56e9cb74aeecbfa77091da4f686f657bcd680c2f65bfacd6beb918f24a4eb11e8a7fa59fbe1470f5071d2c6f118fa