2025/09/12 03:10:21 Requesting https://server4:443/nkazfjyozn. 2025/09/12 03:10:21 Increased receive buffer size to 14336 kiB 2025/09/12 03:10:21 Increased send buffer size to 14336 kiB 2025/09/12 03:10:21 Setting DF for IPv4 and IPv6. 2025/09/12 03:10:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:10:21 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:10:21 Created qlog file: /logs/qlog/6216bf41833f14223ef8f5978ed93133bf5166.sqlog 2025/09/12 03:10:21 client Starting new connection to server4 ([::]:42703 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6216bf41833f14223ef8f5978ed93133bf5166, version v1 2025/09/12 03:10:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:10:21 client -> Sending packet 0 (1280 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: 6216bf41833f14223ef8f5978ed93133bf5166, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:10:21 client -> Sending packet 1 (1280 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: 6216bf41833f14223ef8f5978ed93133bf5166, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 1229, Data length: 289, Offset + Data length: 1518} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:10:21 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:10:21 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a373dd6209acb590, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/09/12 03:10:21 client Received first packet. Switching destination connection ID to: a373dd6209acb590 2025/09/12 03:10:21 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.04ms} 2025/09/12 03:10:21 client newly acked packets (2): [0 1] 2025/09/12 03:10:21 client updated RTT: 39.067459ms (σ: 19.533729ms) 2025/09/12 03:10:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:10:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:10:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:10:21 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:10:21 client <- Reading packet 1 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a373dd6209acb590, PacketNumber: 1, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:10:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/09/12 03:10:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:10:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:10:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6216bf41833f14223ef8f5978ed93133bf5166, InitialSourceConnectionID: a373dd6209acb590, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 12288, InitialMaxData: 1572864, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1695fc6a3aeb1c324d116818ee66db72, EnableResetStreamAt: false} 2025/09/12 03:10:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: a373dd6209acb590, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: a373dd6209acb590, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:10:21 client Dropping Initial keys. 2025/09/12 03:10:21 client -> Sending packet 1 (43 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: a373dd6209acb590, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client -> Sending packet 0 (46 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a373dd6209acb590, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:10:21 client -> Sending packet 2 (74 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: a373dd6209acb590, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:10:21 client -> Sending packet 3 (74 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: a373dd6209acb590, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:10:21 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:10:21 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/09/12 03:10:21 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:10:21 client <- Reading packet 3 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a373dd6209acb590, PacketNumber: 3, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:10:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/09/12 03:10:21 client -> Sending packet 4 (45 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: a373dd6209acb590, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:10:21 client -> Sending packet 5 (74 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: a373dd6209acb590, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:10:21 client -> Sending packet 6 (74 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: a373dd6209acb590, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:10:21 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:10:21 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:10:21 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:10:21 client Dropping Handshake keys. 2025/09/12 03:10:21 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:10:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:10:21 client -> Sending packet 2 (54 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a373dd6209acb590, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 68.027µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:21 client -> Sending packet 3 (46 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a373dd6209acb590, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:21 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 146 bytes. 2025/09/12 03:10:21 client Dropping %!s(logging.PacketType=1) packet (41 bytes) because we already dropped the keys. 2025/09/12 03:10:21 client <- Reading packet 7 (146 bytes) for connection (empty), 1-RTT 2025/09/12 03:10:21 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:10:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a1c35e8cd1a50df4, StatelessResetToken: 0xdbcf74f1e1e668dd16a8d3a2376ff028} 2025/09/12 03:10:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3da8e7c944a1f8f0, StatelessResetToken: 0x652a016f2042c43ce6a1713d8a4344cc} 2025/09/12 03:10:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4fb35a3a10012f2e, StatelessResetToken: 0x49ae9a90ae7a910091901c95f02cf764} 2025/09/12 03:10:21 client <- &wire.NewTokenFrame{Token: 0x01690c872866d30585d5a2805191c6bdc00d6cea0982a9ea30e39dfd648006c597147a0651eb2684d9a1} 2025/09/12 03:10:21 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:10:21 client -> Sending packet 4 (39 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a1c35e8cd1a50df4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 94.838µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:10:21 client <- Reading packet 9 (28 bytes) for connection (empty), 1-RTT 2025/09/12 03:10:21 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 74.576ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client newly acked packets (1): [4] 2025/09/12 03:10:21 client updated RTT: 44.231ms (σ: 24.978ms) 2025/09/12 03:10:21 client ECN capability confirmed. 2025/09/12 03:10:21 client lost packet 3 (time threshold) 2025/09/12 03:10:21 client Canceling loss detection timer. 2025/09/12 03:10:21 client Ignoring all packets below 8. 2025/09/12 03:10:21 client -> Sending packet 5 (46 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a1c35e8cd1a50df4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:10:21 client -> Sending packet 7 (46 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a1c35e8cd1a50df4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:21 client -> Sending packet 8 (46 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a1c35e8cd1a50df4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:21 client -> Sending packet 9 (1366 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a1c35e8cd1a50df4, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.PingFrame{} 2025/09/12 03:10:21 client <- Reading packet 12 (1057 bytes) for connection (empty), 1-RTT 2025/09/12 03:10:21 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 168µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:10:21 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:10:21 client -> Sending packet 10 (37 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a1c35e8cd1a50df4, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 9, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 9}}, DelayTime: 130.234µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:10:21 client -> Sending packet 11 (30 bytes) for connection 6216bf41833f14223ef8f5978ed93133bf5166, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: a1c35e8cd1a50df4, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:10:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:10:21 client Connection 6216bf41833f14223ef8f5978ed93133bf5166 closed. 2025/09/12 03:10:21 Requesting https://server4:443/ozqnlhrpmr. 2025/09/12 03:10:21 Increased receive buffer size to 14336 kiB 2025/09/12 03:10:21 Increased send buffer size to 14336 kiB 2025/09/12 03:10:21 Setting DF for IPv4 and IPv6. 2025/09/12 03:10:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:10:21 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:10:21 Created qlog file: /logs/qlog/1b4d1cc67d000f3ba2479c31cd456695.sqlog 2025/09/12 03:10:21 client Starting new connection to server4 ([::]:45390 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1b4d1cc67d000f3ba2479c31cd456695, version v1 2025/09/12 03:10:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:10:21 client -> Sending packet 0 (1280 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: 1b4d1cc67d000f3ba2479c31cd456695, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:10:21 client -> Sending packet 1 (1280 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: 1b4d1cc67d000f3ba2479c31cd456695, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 1232, Data length: 272, Offset + Data length: 1504} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:10:21 client updated RTT: 31.841453ms (σ: 15.920726ms) 2025/09/12 03:10:21 client <- Received Retry: 2025/09/12 03:10:21 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 98b2d94cda93bca8, Token: 0x00da06cf1a06c0e5b28b2deb13d95c7d578a5d52317a333567c6c5d97411daa780597c58157a31744a9b587175f3cfd3ea7c84fdaadf25498a73ba10, Version: v1} 2025/09/12 03:10:21 client Switching destination connection ID to: 98b2d94cda93bca8 2025/09/12 03:10:21 client -> Sending packet 2 (1280 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: 98b2d94cda93bca8, SrcConnectionID: (empty), Token: 0x00da06cf1a06c0e5b28b2deb13d95c7d578a5d52317a333567c6c5d97411daa780597c58157a31744a9b587175f3cfd3ea7c84fdaadf25498a73ba10, PacketNumber: 2, PacketNumberLen: 2, Length: 1202, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 11, Offset + Data length: 11} 2025/09/12 03:10:21 client -> Sending packet 3 (1280 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: 98b2d94cda93bca8, SrcConnectionID: (empty), Token: 0x00da06cf1a06c0e5b28b2deb13d95c7d578a5d52317a333567c6c5d97411daa780597c58157a31744a9b587175f3cfd3ea7c84fdaadf25498a73ba10, PacketNumber: 3, PacketNumberLen: 2, Length: 1202, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 11, Data length: 52, Offset + Data length: 63} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 1232, Data length: 272, Offset + Data length: 1504} 2025/09/12 03:10:21 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9930129fa7988c9a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 03:10:21 client Received first packet. Switching destination connection ID to: 9930129fa7988c9a 2025/09/12 03:10:21 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 176µs} 2025/09/12 03:10:21 client newly acked packets (1): [3] 2025/09/12 03:10:21 client updated RTT: 31.957ms (σ: 12.173ms) 2025/09/12 03:10:21 client setting loss timer for packet 2 (Initial) to 36.87253ms (in 2025-09-12 03:10:21.879841922 +0000 UTC m=+0.802059105) 2025/09/12 03:10:21 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:10:21.879841922 +0000 UTC m=+0.802059105 2025/09/12 03:10:21 client lost packet 2 (time threshold) 2025/09/12 03:10:21 client -> Sending packet 4 (1280 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: 9930129fa7988c9a, SrcConnectionID: (empty), Token: 0x00da06cf1a06c0e5b28b2deb13d95c7d578a5d52317a333567c6c5d97411daa780597c58157a31744a9b587175f3cfd3ea7c84fdaadf25498a73ba10, PacketNumber: 4, PacketNumberLen: 2, Length: 1202, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 11, Offset + Data length: 11} 2025/09/12 03:10:21 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/09/12 03:10:21 client <- Reading packet 1 (135 bytes) for connection (empty), Initial 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9930129fa7988c9a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 117, Version: v1} 2025/09/12 03:10:21 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 1.36ms} 2025/09/12 03:10:21 client newly acked packets (1): [4] 2025/09/12 03:10:21 client updated RTT: 32.229ms (σ: 9.674ms) 2025/09/12 03:10:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:10:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:10:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:10:21 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/09/12 03:10:21 client <- Reading packet 2 (1117 bytes) for connection (empty), Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9930129fa7988c9a, PacketNumber: 2, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/09/12 03:10:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/09/12 03:10:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:10:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:10:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1b4d1cc67d000f3ba2479c31cd456695, InitialSourceConnectionID: 9930129fa7988c9a, RetrySourceConnectionID: 98b2d94cda93bca8, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 12288, InitialMaxData: 1572864, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x8bd2f6164725bd681a90428ca94b7e3a, EnableResetStreamAt: false} 2025/09/12 03:10:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695 2025/09/12 03:10:21 client Long Header{Type: Initial, DestConnectionID: 9930129fa7988c9a, SrcConnectionID: (empty), Token: 0x00da06cf1a06c0e5b28b2deb13d95c7d578a5d52317a333567c6c5d97411daa780597c58157a31744a9b587175f3cfd3ea7c84fdaadf25498a73ba10, PacketNumber: 5, PacketNumberLen: 2, Length: 1128, Version: v1} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: 9930129fa7988c9a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:10:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:10:21 client Dropping Initial keys. 2025/09/12 03:10:21 client -> Sending packet 1 (89 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, Handshake 2025/09/12 03:10:21 client Long Header{Type: Handshake, DestConnectionID: 9930129fa7988c9a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:10:21 client Short Header{DestConnectionID: 9930129fa7988c9a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:21 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/09/12 03:10:21 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:10:21 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:10:21 client Dropping Handshake keys. 2025/09/12 03:10:21 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:10:21 client -> Sending packet 1 (35 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:21 client Short Header{DestConnectionID: 9930129fa7988c9a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:21 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 58.158µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:10:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:10:22 client -> Sending packet 3 (46 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:22 client Short Header{DestConnectionID: 9930129fa7988c9a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:22 client -> Sending packet 4 (46 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:22 client Short Header{DestConnectionID: 9930129fa7988c9a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:10:22 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 03:10:22 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:10:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:10:22 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:10:22 client -> Sending packet 5 (37 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:22 client Short Header{DestConnectionID: 9930129fa7988c9a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:22 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 3, Smallest: 3}}, DelayTime: 80.791µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:10:22 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:10:22 client -> Sending packet 6 (30 bytes) for connection 1b4d1cc67d000f3ba2479c31cd456695, 1-RTT (ECN: ECT(0)) 2025/09/12 03:10:22 client Short Header{DestConnectionID: 9930129fa7988c9a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:10:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:10:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:10:22 client Connection 1b4d1cc67d000f3ba2479c31cd456695 closed. 2025/09/12 03:10:22 Requesting https://server4:443/znrvgubxgw. 2025/09/12 03:10:22 Increased receive buffer size to 14336 kiB 2025/09/12 03:10:22 Increased send buffer size to 14336 kiB 2025/09/12 03:10:22 Setting DF for IPv4 and IPv6. 2025/09/12 03:10:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:10:22 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:10:22 Created qlog file: /logs/qlog/8e210bd1597b415671df83a9475d7412.sqlog 2025/09/12 03:10:22 client Starting new connection to server4 ([::]:57299 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8e210bd1597b415671df83a9475d7412, version v1 2025/09/12 03:10:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:10:22 client -> Sending packet 0 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:22 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:10:22 client -> Sending packet 1 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:22 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 03:10:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:10:22 client -> Sending packet 2 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:22 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:10:22 client -> Sending packet 3 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:22 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 03:10:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:10:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:10:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:10:22 client -> Sending packet 4 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:22 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:10:22 client -> Sending packet 5 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:22 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 03:10:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:10:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:10:23 client -> Sending packet 6 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:23 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:10:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:10:23 client -> Sending packet 7 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:23 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:23 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 03:10:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:10:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 03:10:25 client -> Sending packet 8 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:25 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:10:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:10:25 client -> Sending packet 9 (1280 bytes) for connection 8e210bd1597b415671df83a9475d7412, Initial 2025/09/12 03:10:25 client Long Header{Type: Initial, DestConnectionID: 8e210bd1597b415671df83a9475d7412, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:10:25 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 03:10:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:10:27 client Destroying connection: timeout: no recent network activity 2025/09/12 03:10:27 Removing connection ID (empty). 2025/09/12 03:10:27 client Connection 8e210bd1597b415671df83a9475d7412 closed.