2025/09/12 03:14:32 Requesting https://server46:443/vdcpkmnjlz. 2025/09/12 03:14:32 Increased receive buffer size to 14336 kiB 2025/09/12 03:14:32 Increased send buffer size to 14336 kiB 2025/09/12 03:14:32 Setting DF for IPv4 and IPv6. 2025/09/12 03:14:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:14:32 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:14:32 Created qlog file: /logs/qlog/97536bb632a99c0ba803b62ab9c5ed484a0c.sqlog 2025/09/12 03:14:32 client Starting new connection to server46 ([::]:45912 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 97536bb632a99c0ba803b62ab9c5ed484a0c, version v1 2025/09/12 03:14:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:14:32 client -> Sending packet 0 (1280 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Initial 2025/09/12 03:14:32 client Long Header{Type: Initial, DestConnectionID: 97536bb632a99c0ba803b62ab9c5ed484a0c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:14:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 64, Offset + Data length: 64} 2025/09/12 03:14:32 client -> &wire.CryptoFrame{Offset: 68, Data length: 1161, Offset + Data length: 1229} 2025/09/12 03:14:32 client -> Sending packet 1 (1280 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Initial 2025/09/12 03:14:32 client Long Header{Type: Initial, DestConnectionID: 97536bb632a99c0ba803b62ab9c5ed484a0c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:14:32 client -> &wire.CryptoFrame{Offset: 1229, Data length: 284, Offset + Data length: 1513} 2025/09/12 03:14:32 client -> &wire.CryptoFrame{Offset: 64, Data length: 4, Offset + Data length: 68} 2025/09/12 03:14:32 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:14:32 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/09/12 03:14:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b764470bff36926c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/09/12 03:14:32 client Received first packet. Switching destination connection ID to: b764470bff36926c 2025/09/12 03:14:32 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.088ms} 2025/09/12 03:14:32 client newly acked packets (2): [0 1] 2025/09/12 03:14:32 client updated RTT: 39.149972ms (σ: 19.574986ms) 2025/09/12 03:14:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:14:32 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:14:32 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:14:32 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:14:32 client <- Reading packet 1 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:14:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b764470bff36926c, PacketNumber: 1, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:14:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 773, Offset + Data length: 773} 2025/09/12 03:14:32 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:14:32 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:14:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 97536bb632a99c0ba803b62ab9c5ed484a0c, InitialSourceConnectionID: b764470bff36926c, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 12288, InitialMaxData: 1572864, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x0cd9e455edac04f2a2a9f5fec6338cc5, EnableResetStreamAt: false} 2025/09/12 03:14:32 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c 2025/09/12 03:14:32 client Long Header{Type: Initial, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 03:14:32 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:14:32 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:32 client Short Header{DestConnectionID: 037d526a72c2bf92, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:14:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:14:32 client Dropping Initial keys. 2025/09/12 03:14:32 client -> Sending packet 1 (43 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:32 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:14:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:14:32 client -> Sending packet 1 (46 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:14:32 client Short Header{DestConnectionID: 037d526a72c2bf92, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:14:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:14:32 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:14:32 client -> Sending packet 2 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:32 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:32 client -> Sending packet 3 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:32 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:32 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:14:32 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/09/12 03:14:32 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:14:32 client <- Reading packet 3 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:14:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b764470bff36926c, PacketNumber: 3, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:14:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 773, Offset + Data length: 773} 2025/09/12 03:14:32 client -> Sending packet 4 (45 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:32 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:14:32 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:14:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:14:33 client -> Sending packet 5 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:33 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:33 client -> Sending packet 6 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:33 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:33 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:14:33 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/09/12 03:14:33 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:14:33 client <- Reading packet 5 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:14:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b764470bff36926c, PacketNumber: 5, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:14:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 773, Offset + Data length: 773} 2025/09/12 03:14:33 client -> Sending packet 7 (47 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:33 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/12 03:14:33 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:14:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 03:14:33 client -> Sending packet 8 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:33 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:33 client -> Sending packet 9 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:33 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:33 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:14:33 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/09/12 03:14:33 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:14:33 client <- Reading packet 7 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:14:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b764470bff36926c, PacketNumber: 7, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:14:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 773, Offset + Data length: 773} 2025/09/12 03:14:33 client -> Sending packet 10 (49 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:33 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 32, Version: v1} 2025/09/12 03:14:33 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:14:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/09/12 03:14:34 client -> Sending packet 11 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:34 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:34 client -> Sending packet 12 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:34 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:34 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:14:34 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/09/12 03:14:34 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:14:34 client <- Reading packet 9 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:14:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b764470bff36926c, PacketNumber: 9, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:14:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 773, Offset + Data length: 773} 2025/09/12 03:14:34 client -> Sending packet 13 (51 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:34 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 34, Version: v1} 2025/09/12 03:14:34 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:14:35 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:14:35 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/09/12 03:14:35 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:14:35 client <- Reading packet 11 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:14:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b764470bff36926c, PacketNumber: 11, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:14:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 773, Offset + Data length: 773} 2025/09/12 03:14:35 client -> Sending packet 14 (53 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:35 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, Length: 36, Version: v1} 2025/09/12 03:14:35 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:14:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 5 2025/09/12 03:14:36 client -> Sending packet 15 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:36 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:36 client -> Sending packet 16 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:36 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:40 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 6 2025/09/12 03:14:40 client -> Sending packet 17 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:40 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:40 client -> Sending packet 18 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:40 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 7 2025/09/12 03:14:47 client -> Sending packet 19 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:47 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:14:47 client -> Sending packet 20 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:14:47 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:14:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:15:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 8 2025/09/12 03:15:02 client -> Sending packet 21 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:15:02 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:15:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:15:02 client -> Sending packet 22 (74 bytes) for connection 97536bb632a99c0ba803b62ab9c5ed484a0c, Handshake 2025/09/12 03:15:02 client Long Header{Type: Handshake, DestConnectionID: 037d526a72c2bf92, SrcConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:15:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:15:06 client Destroying connection: timeout: no recent network activity 2025/09/12 03:15:06 Removing connection ID (empty). 2025/09/12 03:15:06 client Connection 97536bb632a99c0ba803b62ab9c5ed484a0c closed.