2025/12/13 13:41:33 Requesting https://server4:443/toasty-heavy-microphone. 2025/12/13 13:41:33 Increased receive buffer size to 14336 kiB 2025/12/13 13:41:33 Increased send buffer size to 14336 kiB 2025/12/13 13:41:33 Setting DF for IPv4 and IPv6. 2025/12/13 13:41:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 13:41:33 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 13:41:33 Created qlog file: /logs/qlog/bc1181fe3c28d8f163c617.sqlog 2025/12/13 13:41:33 client Starting new connection to server4 ([::]:60329 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bc1181fe3c28d8f163c617, version v1 2025/12/13 13:41:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 13:41:33 client -> Sending packet 0 (1280 bytes) for connection bc1181fe3c28d8f163c617, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: bc1181fe3c28d8f163c617, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:33 client -> Sending packet 1 (1280 bytes) for connection bc1181fe3c28d8f163c617, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: bc1181fe3c28d8f163c617, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/12/13 13:41:33 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/12/13 13:41:33 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfa739334a827479, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/12/13 13:41:33 client Received first packet. Switching destination connection ID to: dfa739334a827479 2025/12/13 13:41:33 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.136ms} 2025/12/13 13:41:33 client newly acked packets (2): [0 1] 2025/12/13 13:41:33 client updated RTT: 39.234672ms (σ: 19.617336ms) 2025/12/13 13:41:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 13:41:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/12/13 13:41:33 client <- Reading packet 1 (1117 bytes) for connection (empty), Handshake 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dfa739334a827479, PacketNumber: 1, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/12/13 13:41:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/12/13 13:41:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bc1181fe3c28d8f163c617, InitialSourceConnectionID: dfa739334a827479, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 12288, InitialMaxData: 1572864, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x368c3fd9f8fbc5a87cd8dc2bd8050d04, EnableResetStreamAt: false} 2025/12/13 13:41:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bc1181fe3c28d8f163c617 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: dfa739334a827479, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1180, Version: v1} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: dfa739334a827479, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 13:41:33 client Dropping Initial keys. 2025/12/13 13:41:33 client -> Sending packet 0 (59 bytes) for connection bc1181fe3c28d8f163c617, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: dfa739334a827479, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 13:41:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 13:41:33 client -> Sending packet 1 (74 bytes) for connection bc1181fe3c28d8f163c617, Handshake 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: dfa739334a827479, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 13:41:33 client -> Sending packet 2 (74 bytes) for connection bc1181fe3c28d8f163c617, Handshake 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: dfa739334a827479, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 13:41:33 client <- Reading packet 2 (21 bytes) for connection (empty), 1-RTT 2025/12/13 13:41:33 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 13:41:33 client <- &wire.HandshakeDoneFrame{} 2025/12/13 13:41:33 client Dropping Handshake keys. 2025/12/13 13:41:33 client Setting ACK timer to max ack delay: 25ms 2025/12/13 13:41:33 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 13:41:33 client -> Sending packet 2 (67 bytes) for connection bc1181fe3c28d8f163c617, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: dfa739334a827479, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 95.639µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 13:41:33 client -> Sending packet 3 (59 bytes) for connection bc1181fe3c28d8f163c617, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: dfa739334a827479, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 13:41:33 client <- Reading packet 5 (1052 bytes) for connection (empty), 1-RTT 2025/12/13 13:41:33 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 152µs} 2025/12/13 13:41:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 13:41:33 client Queuing ACK because there's a new missing packet to report. 2025/12/13 13:41:33 client -> Sending packet 4 (37 bytes) for connection bc1181fe3c28d8f163c617, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: dfa739334a827479, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 102.412µs, ECT0: 1, ECT1: 1, CE: 0} 2025/12/13 13:41:33 client Closing connection with error: Application error 0x0 (local) 2025/12/13 13:41:33 client -> Sending packet 5 (30 bytes) for connection bc1181fe3c28d8f163c617, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: dfa739334a827479, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 13:41:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 13:41:33 client Connection bc1181fe3c28d8f163c617 closed. 2025/12/13 13:41:33 Requesting https://server4:443/polar-ample-television. 2025/12/13 13:41:33 Increased receive buffer size to 14336 kiB 2025/12/13 13:41:33 Increased send buffer size to 14336 kiB 2025/12/13 13:41:33 Setting DF for IPv4 and IPv6. 2025/12/13 13:41:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 13:41:33 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 13:41:33 Created qlog file: /logs/qlog/dfba18b377f9f7735911bae5c334b8bd.sqlog 2025/12/13 13:41:33 client Starting new connection to server4 ([::]:46218 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dfba18b377f9f7735911bae5c334b8bd, version v1 2025/12/13 13:41:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 13:41:33 client -> Sending packet 0 (1280 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: dfba18b377f9f7735911bae5c334b8bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:41:33 client -> Sending packet 1 (1280 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: dfba18b377f9f7735911bae5c334b8bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/12/13 13:41:33 client updated RTT: 31.827615ms (σ: 15.913807ms) 2025/12/13 13:41:33 client <- Received Retry: 2025/12/13 13:41:33 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: bd5c089a9bf3462d, Token: 0x00a2600a358b142fe85e07260accef4f11cf04670b9c4559c6b43516ab9a7a263e4848e547c466c80b868b6500948cdcda9248585bcdeb5166ccd0c4, Version: v1} 2025/12/13 13:41:33 client Switching destination connection ID to: bd5c089a9bf3462d 2025/12/13 13:41:33 client -> Sending packet 2 (1280 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: bd5c089a9bf3462d, SrcConnectionID: (empty), Token: 0x00a2600a358b142fe85e07260accef4f11cf04670b9c4559c6b43516ab9a7a263e4848e547c466c80b868b6500948cdcda9248585bcdeb5166ccd0c4, PacketNumber: 2, PacketNumberLen: 2, Length: 1202, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 11, Offset + Data length: 11} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 13:41:33 client -> Sending packet 3 (1280 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: bd5c089a9bf3462d, SrcConnectionID: (empty), Token: 0x00a2600a358b142fe85e07260accef4f11cf04670b9c4559c6b43516ab9a7a263e4848e547c466c80b868b6500948cdcda9248585bcdeb5166ccd0c4, PacketNumber: 3, PacketNumberLen: 2, Length: 1202, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 11, Data length: 52, Offset + Data length: 63} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/12/13 13:41:33 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ee1e0573dec097b3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 13:41:33 client Received first packet. Switching destination connection ID to: ee1e0573dec097b3 2025/12/13 13:41:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 240µs} 2025/12/13 13:41:33 client newly acked packets (1): [2] 2025/12/13 13:41:33 client updated RTT: 31.841ms (σ: 11.963ms) 2025/12/13 13:41:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 13:41:33 client -> Sending packet 4 (1280 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: ee1e0573dec097b3, SrcConnectionID: (empty), Token: 0x00a2600a358b142fe85e07260accef4f11cf04670b9c4559c6b43516ab9a7a263e4848e547c466c80b868b6500948cdcda9248585bcdeb5166ccd0c4, PacketNumber: 4, PacketNumberLen: 2, Length: 1202, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 11, Data length: 52, Offset + Data length: 63} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/12/13 13:41:33 client -> Sending packet 5 (1280 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: ee1e0573dec097b3, SrcConnectionID: (empty), Token: 0x00a2600a358b142fe85e07260accef4f11cf04670b9c4559c6b43516ab9a7a263e4848e547c466c80b868b6500948cdcda9248585bcdeb5166ccd0c4, PacketNumber: 5, PacketNumberLen: 2, Length: 1202, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 11, Data length: 52, Offset + Data length: 63} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/12/13 13:41:33 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/12/13 13:41:33 client <- Reading packet 1 (137 bytes) for connection (empty), Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ee1e0573dec097b3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 119, Version: v1} 2025/12/13 13:41:33 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 1.224ms} 2025/12/13 13:41:33 client newly acked packets (1): [5] 2025/12/13 13:41:33 client updated RTT: 32.257ms (σ: 9.804ms) 2025/12/13 13:41:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 13:41:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Parsed a coalesced packet. Part 2: 1115 bytes. Remaining: 0 bytes. 2025/12/13 13:41:33 client <- Reading packet 2 (1115 bytes) for connection (empty), Handshake 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ee1e0573dec097b3, PacketNumber: 2, PacketNumberLen: 1, Length: 1098, Version: v1} 2025/12/13 13:41:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/12/13 13:41:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dfba18b377f9f7735911bae5c334b8bd, InitialSourceConnectionID: ee1e0573dec097b3, RetrySourceConnectionID: bd5c089a9bf3462d, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 12288, InitialMaxData: 1572864, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xfe2dcd025fbea2008ead93393f8d7bcd, EnableResetStreamAt: false} 2025/12/13 13:41:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dfba18b377f9f7735911bae5c334b8bd 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: ee1e0573dec097b3, SrcConnectionID: (empty), Token: 0x00a2600a358b142fe85e07260accef4f11cf04670b9c4559c6b43516ab9a7a263e4848e547c466c80b868b6500948cdcda9248585bcdeb5166ccd0c4, PacketNumber: 6, PacketNumberLen: 2, Length: 1120, Version: v1} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: ee1e0573dec097b3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 13:41:33 client Dropping Initial keys. 2025/12/13 13:41:33 client -> Sending packet 0 (58 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: ee1e0573dec097b3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 13:41:33 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/12/13 13:41:33 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 13:41:33 client <- &wire.HandshakeDoneFrame{} 2025/12/13 13:41:33 client Dropping Handshake keys. 2025/12/13 13:41:33 client Setting ACK timer to max ack delay: 25ms 2025/12/13 13:41:33 client Sending ACK because the ACK timer expired. 2025/12/13 13:41:33 client -> Sending packet 1 (36 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: ee1e0573dec097b3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 25.335745ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 13:41:33 client -> Sending packet 3 (58 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: ee1e0573dec097b3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 13:41:33 client -> Sending packet 4 (58 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: ee1e0573dec097b3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 13:41:33 client <- Reading packet 6 (146 bytes) for connection (empty), 1-RTT 2025/12/13 13:41:33 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 13:41:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 61bc1ffffa0d6e7a, StatelessResetToken: 0x2a8235f5bc6f6c7a93cf3bd687620fec} 2025/12/13 13:41:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9c5816be65daae6f, StatelessResetToken: 0xa6c8223b4152ea6ff87367ee2864d20f} 2025/12/13 13:41:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8bec1b6f40ea4b59, StatelessResetToken: 0x4f31f9f9fef23585684af2f7be6d820b} 2025/12/13 13:41:33 client <- &wire.NewTokenFrame{Token: 0x0149988b8a176525d1abd6193545595685a98ed62f5230ab17b05dff05463a880f1a8894179998c10355} 2025/12/13 13:41:33 client Queuing ACK because there's a new missing packet to report. 2025/12/13 13:41:33 client -> Sending packet 5 (39 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: 61bc1ffffa0d6e7a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 145.682µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 13:41:33 client <- Reading packet 7 (1054 bytes) for connection (empty), 1-RTT 2025/12/13 13:41:33 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 13:41:33 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 136µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 13:41:33 client Setting ACK timer to max ack delay: 25ms 2025/12/13 13:41:33 client Closing connection with error: Application error 0x0 (local) 2025/12/13 13:41:33 client -> Sending packet 6 (30 bytes) for connection dfba18b377f9f7735911bae5c334b8bd, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: 61bc1ffffa0d6e7a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 13:41:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 13:41:33 client Connection dfba18b377f9f7735911bae5c334b8bd closed. 2025/12/13 13:41:33 Requesting https://server4:443/medium-turquoise-chef. 2025/12/13 13:41:33 Increased receive buffer size to 14336 kiB 2025/12/13 13:41:33 Increased send buffer size to 14336 kiB 2025/12/13 13:41:33 Setting DF for IPv4 and IPv6. 2025/12/13 13:41:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 13:41:33 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 13:41:33 Created qlog file: /logs/qlog/df6a0928feb369dd63724b.sqlog 2025/12/13 13:41:33 client Starting new connection to server4 ([::]:51242 -> 193.167.100.100:443), source connection ID (empty), destination connection ID df6a0928feb369dd63724b, version v1 2025/12/13 13:41:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 13:41:33 client -> Sending packet 0 (1280 bytes) for connection df6a0928feb369dd63724b, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: df6a0928feb369dd63724b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:41:33 client -> Sending packet 1 (1280 bytes) for connection df6a0928feb369dd63724b, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: df6a0928feb369dd63724b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:41:33 client updated RTT: 32.814757ms (σ: 16.407378ms) 2025/12/13 13:41:33 client <- Received Retry: 2025/12/13 13:41:33 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 18b4630101780d95, Token: 0x0017d23b56f36af2c05df7d49b530e981bc3d31236accee123857b12373e12fae2cffa008648eca636b9d08eaf5f39e6b2750db2b97c2a, Version: v1} 2025/12/13 13:41:33 client Switching destination connection ID to: 18b4630101780d95 2025/12/13 13:41:33 client -> Sending packet 2 (1280 bytes) for connection df6a0928feb369dd63724b, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: 18b4630101780d95, SrcConnectionID: (empty), Token: 0x0017d23b56f36af2c05df7d49b530e981bc3d31236accee123857b12373e12fae2cffa008648eca636b9d08eaf5f39e6b2750db2b97c2a, PacketNumber: 2, PacketNumberLen: 2, Length: 1207, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 11, Offset + Data length: 11} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:33 client -> Sending packet 3 (1280 bytes) for connection df6a0928feb369dd63724b, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: 18b4630101780d95, SrcConnectionID: (empty), Token: 0x0017d23b56f36af2c05df7d49b530e981bc3d31236accee123857b12373e12fae2cffa008648eca636b9d08eaf5f39e6b2750db2b97c2a, PacketNumber: 3, PacketNumberLen: 2, Length: 1207, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 11, Data length: 52, Offset + Data length: 63} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 13:41:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 13:41:33 client -> Sending packet 4 (1280 bytes) for connection df6a0928feb369dd63724b, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: 18b4630101780d95, SrcConnectionID: (empty), Token: 0x0017d23b56f36af2c05df7d49b530e981bc3d31236accee123857b12373e12fae2cffa008648eca636b9d08eaf5f39e6b2750db2b97c2a, PacketNumber: 4, PacketNumberLen: 2, Length: 1207, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 11, Offset + Data length: 11} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:33 client -> Sending packet 5 (1280 bytes) for connection df6a0928feb369dd63724b, Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: 18b4630101780d95, SrcConnectionID: (empty), Token: 0x0017d23b56f36af2c05df7d49b530e981bc3d31236accee123857b12373e12fae2cffa008648eca636b9d08eaf5f39e6b2750db2b97c2a, PacketNumber: 5, PacketNumberLen: 2, Length: 1207, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 11, Data length: 52, Offset + Data length: 63} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:33 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e599aa6f1baf670d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 13:41:33 client Received first packet. Switching destination connection ID to: e599aa6f1baf670d 2025/12/13 13:41:33 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 256µs} 2025/12/13 13:41:33 client newly acked packets (1): [4] 2025/12/13 13:41:33 client updated RTT: 32.702ms (σ: 12.528ms) 2025/12/13 13:41:33 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/12/13 13:41:33 client <- Reading packet 1 (135 bytes) for connection (empty), Initial 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e599aa6f1baf670d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 117, Version: v1} 2025/12/13 13:41:33 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 1.112ms} 2025/12/13 13:41:33 client newly acked packets (1): [5] 2025/12/13 13:41:33 client updated RTT: 32.976ms (σ: 9.944ms) 2025/12/13 13:41:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 13:41:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/12/13 13:41:33 client <- Reading packet 2 (1117 bytes) for connection (empty), Handshake 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e599aa6f1baf670d, PacketNumber: 2, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/12/13 13:41:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/12/13 13:41:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 13:41:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: df6a0928feb369dd63724b, InitialSourceConnectionID: e599aa6f1baf670d, RetrySourceConnectionID: 18b4630101780d95, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 12288, InitialMaxData: 1572864, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7ac8ec9dacf0afcb23a1589059744d8a, EnableResetStreamAt: false} 2025/12/13 13:41:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection df6a0928feb369dd63724b 2025/12/13 13:41:33 client Long Header{Type: Initial, DestConnectionID: e599aa6f1baf670d, SrcConnectionID: (empty), Token: 0x0017d23b56f36af2c05df7d49b530e981bc3d31236accee123857b12373e12fae2cffa008648eca636b9d08eaf5f39e6b2750db2b97c2a, PacketNumber: 6, PacketNumberLen: 2, Length: 1125, Version: v1} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: e599aa6f1baf670d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/12/13 13:41:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 13:41:33 client Dropping Initial keys. 2025/12/13 13:41:33 client -> Sending packet 0 (57 bytes) for connection df6a0928feb369dd63724b, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:33 client Short Header{DestConnectionID: e599aa6f1baf670d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 13:41:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 13:41:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 13:41:33 client -> Sending packet 1 (74 bytes) for connection df6a0928feb369dd63724b, Handshake 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: e599aa6f1baf670d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 13:41:33 client -> Sending packet 2 (74 bytes) for connection df6a0928feb369dd63724b, Handshake 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: e599aa6f1baf670d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 13:41:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 13:41:33 client <- Reading packet 6 (42 bytes) for connection (empty), Handshake 2025/12/13 13:41:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e599aa6f1baf670d, PacketNumber: 6, PacketNumberLen: 1, Length: 25, Version: v1} 2025/12/13 13:41:33 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs} 2025/12/13 13:41:33 client Peer doesn't await address validation any longer. 2025/12/13 13:41:34 client <- Reading packet 10 (1174 bytes) for connection (empty), 1-RTT 2025/12/13 13:41:34 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 13:41:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e47aed5e6ab1651, StatelessResetToken: 0xf6ba30cf2753f57a8fe5cc9b3f32d31d} 2025/12/13 13:41:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 204cd941740d67fe, StatelessResetToken: 0x75439aaebb02e7d90996d944416a1b6b} 2025/12/13 13:41:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3dca53733e9ccb99, StatelessResetToken: 0xaaedfe8e8a370005f5e01103808a0e9e} 2025/12/13 13:41:34 client <- &wire.NewTokenFrame{Token: 0x01df6b65c54374ee42653ac9d3232b4b6e50cc302cf96f1e05968c5fe7bc2493b9958760e021252f4f12} 2025/12/13 13:41:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 13:41:34 client Setting ACK timer to max ack delay: 25ms 2025/12/13 13:41:34 client -> Sending packet 1 (37 bytes) for connection df6a0928feb369dd63724b, 1-RTT (ECN: ECT(0)) 2025/12/13 13:41:34 client Short Header{DestConnectionID: 3e47aed5e6ab1651, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:34 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 130.113µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 13:41:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 13:41:34 client Closing connection with error: Application error 0x0 (local) 2025/12/13 13:41:34 client -> Sending packet 3 (69 bytes) for connection df6a0928feb369dd63724b, Handshake 2025/12/13 13:41:34 client Long Header{Type: Handshake, DestConnectionID: 3e47aed5e6ab1651, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 22, Version: v1} 2025/12/13 13:41:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/12/13 13:41:34 client Short Header{DestConnectionID: 3e47aed5e6ab1651, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 13:41:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 13:41:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 13:41:34 client Connection df6a0928feb369dd63724b closed. 2025/12/13 13:41:34 Requesting https://server4:443/euphoric-noisy-meerkat. 2025/12/13 13:41:34 Increased receive buffer size to 14336 kiB 2025/12/13 13:41:34 Increased send buffer size to 14336 kiB 2025/12/13 13:41:34 Setting DF for IPv4 and IPv6. 2025/12/13 13:41:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 13:41:34 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 13:41:34 Created qlog file: /logs/qlog/a1871abd0125f317d23185.sqlog 2025/12/13 13:41:34 client Starting new connection to server4 ([::]:48963 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a1871abd0125f317d23185, version v1 2025/12/13 13:41:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 13:41:34 client -> Sending packet 0 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:34 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:34 client -> Sending packet 1 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:34 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 13:41:34 client -> Sending packet 2 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:34 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:34 client -> Sending packet 3 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:34 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:34 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 13:41:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 13:41:34 client -> Sending packet 4 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:34 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:34 client -> Sending packet 5 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:34 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/12/13 13:41:34 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/12/13 13:41:35 client -> Sending packet 6 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:35 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:41:35 client -> Sending packet 7 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:35 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:35 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/12/13 13:41:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/12/13 13:41:37 client -> Sending packet 8 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:37 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:41:37 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:41:37 client -> Sending packet 9 (1280 bytes) for connection a1871abd0125f317d23185, Initial 2025/12/13 13:41:37 client Long Header{Type: Initial, DestConnectionID: a1871abd0125f317d23185, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:41:37 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:41:37 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/12/13 13:41:39 client Destroying connection: timeout: no recent network activity 2025/12/13 13:41:39 Removing connection ID (empty). 2025/12/13 13:41:39 client Connection a1871abd0125f317d23185 closed.