2025/04/30 20:57:31 Requesting https://server4:443/ootkvugwne. 2025/04/30 20:57:31 Increased receive buffer size to 14336 kiB 2025/04/30 20:57:31 Increased send buffer size to 14336 kiB 2025/04/30 20:57:31 Setting DF for IPv4 and IPv6. 2025/04/30 20:57:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 20:57:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 20:57:31 Created qlog file: /logs/qlog/26969ba817af7b205f7d.sqlog 2025/04/30 20:57:31 client Starting new connection to server4 ([::]:51732 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 26969ba817af7b205f7d, version v1 2025/04/30 20:57:31 Adding connection ID (empty). 2025/04/30 20:57:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 20:57:31 client -> Sending packet 0 (1280 bytes) for connection 26969ba817af7b205f7d, Initial 2025/04/30 20:57:31 client Long Header{Type: Initial, DestConnectionID: 26969ba817af7b205f7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 20:57:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 20:57:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 20:57:32 client -> Sending packet 1 (1280 bytes) for connection 26969ba817af7b205f7d, Initial 2025/04/30 20:57:32 client Long Header{Type: Initial, DestConnectionID: 26969ba817af7b205f7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 20:57:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 20:57:32 client -> Sending packet 2 (1280 bytes) for connection 26969ba817af7b205f7d, Initial 2025/04/30 20:57:32 client Long Header{Type: Initial, DestConnectionID: 26969ba817af7b205f7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 20:57:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 20:57:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 20:57:32 client -> Sending packet 3 (1280 bytes) for connection 26969ba817af7b205f7d, Initial 2025/04/30 20:57:32 client Long Header{Type: Initial, DestConnectionID: 26969ba817af7b205f7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 20:57:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 20:57:32 client -> Sending packet 4 (1280 bytes) for connection 26969ba817af7b205f7d, Initial 2025/04/30 20:57:32 client Long Header{Type: Initial, DestConnectionID: 26969ba817af7b205f7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 20:57:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 20:57:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 20:57:33 client -> Sending packet 5 (1280 bytes) for connection 26969ba817af7b205f7d, Initial 2025/04/30 20:57:33 client Long Header{Type: Initial, DestConnectionID: 26969ba817af7b205f7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 20:57:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 20:57:33 client -> Sending packet 6 (1280 bytes) for connection 26969ba817af7b205f7d, Initial 2025/04/30 20:57:33 client Long Header{Type: Initial, DestConnectionID: 26969ba817af7b205f7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 20:57:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 20:57:33 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/04/30 20:57:33 client <- Reading packet 0 (135 bytes) for connection (empty), Initial 2025/04/30 20:57:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f7271fa1550d577f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 20:57:33 client Received first packet. Switching destination connection ID to: f7271fa1550d577f 2025/04/30 20:57:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.232ms} 2025/04/30 20:57:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 20:57:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 20:57:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 20:57:33 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/04/30 20:57:33 client <- Reading packet 1 (1117 bytes) for connection (empty), Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7271fa1550d577f, PacketNumber: 1, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/04/30 20:57:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 20:57:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 20:57:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 20:57:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 26969ba817af7b205f7d, InitialSourceConnectionID: f7271fa1550d577f, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 12288, InitialMaxData: 1572864, MaxBidiStreamNum: 100, MaxUniStreamNum: 3, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xfed4a78f416ef29369f5e04e22d954e5} 2025/04/30 20:57:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 26969ba817af7b205f7d 2025/04/30 20:57:33 client Long Header{Type: Initial, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 20:57:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 20:57:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 20:57:33 client Dropping Initial keys. 2025/04/30 20:57:33 client -> Sending packet 1 (43 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 20:57:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 20:57:33 client -> Sending packet 0 (46 bytes) for connection 26969ba817af7b205f7d, 1-RTT (ECN: ECT(0)) 2025/04/30 20:57:33 client Short Header{DestConnectionID: f7271fa1550d577f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 20:57:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 20:57:33 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 20:57:33 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 20:57:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 20:57:33 client -> Sending packet 2 (74 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 20:57:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 20:57:33 client -> Sending packet 3 (74 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 20:57:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 20:57:33 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/04/30 20:57:33 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/04/30 20:57:33 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/04/30 20:57:33 client <- Reading packet 5 (1117 bytes) for connection (empty), Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7271fa1550d577f, PacketNumber: 5, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/04/30 20:57:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 20:57:33 client -> Sending packet 4 (45 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 20:57:33 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 20:57:33 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 20:57:33 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/04/30 20:57:33 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/04/30 20:57:33 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/04/30 20:57:33 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/04/30 20:57:33 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/04/30 20:57:33 client <- Reading packet 9 (1117 bytes) for connection (empty), Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7271fa1550d577f, PacketNumber: 9, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/04/30 20:57:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 20:57:33 client -> Sending packet 5 (47 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 20:57:33 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 20:57:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 20:57:33 client -> Sending packet 6 (74 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 20:57:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 20:57:33 client -> Sending packet 7 (74 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:33 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 20:57:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 20:57:34 client Parsed a coalesced packet. Part 1: 135 bytes. Remaining: 1117 bytes. 2025/04/30 20:57:34 client Dropping %!s(logging.PacketType=0) packet (135 bytes) because we already dropped the keys. 2025/04/30 20:57:34 client Parsed a coalesced packet. Part 2: 1117 bytes. Remaining: 0 bytes. 2025/04/30 20:57:34 client <- Reading packet 11 (1117 bytes) for connection (empty), Handshake 2025/04/30 20:57:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7271fa1550d577f, PacketNumber: 11, PacketNumberLen: 1, Length: 1100, Version: v1} 2025/04/30 20:57:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 20:57:34 client -> Sending packet 8 (49 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:34 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 32, Version: v1} 2025/04/30 20:57:34 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 20:57:34 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/04/30 20:57:34 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/04/30 20:57:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 20:57:34 client -> Sending packet 9 (74 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:34 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 20:57:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 20:57:34 client -> Sending packet 10 (74 bytes) for connection 26969ba817af7b205f7d, Handshake 2025/04/30 20:57:34 client Long Header{Type: Handshake, DestConnectionID: f7271fa1550d577f, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 20:57:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 20:57:34 client <- Reading packet 14 (21 bytes) for connection (empty), 1-RTT 2025/04/30 20:57:34 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 20:57:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 20:57:34 client Dropping Handshake keys. 2025/04/30 20:57:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 20:57:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 20:57:34 client -> Sending packet 2 (54 bytes) for connection 26969ba817af7b205f7d, 1-RTT (ECN: ECT(0)) 2025/04/30 20:57:34 client Short Header{DestConnectionID: f7271fa1550d577f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 20:57:34 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 98.444µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 20:57:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 20:57:34 client -> Sending packet 3 (46 bytes) for connection 26969ba817af7b205f7d, 1-RTT (ECN: ECT(0)) 2025/04/30 20:57:34 client Short Header{DestConnectionID: f7271fa1550d577f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 20:57:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 20:57:34 client -> Sending packet 4 (1366 bytes) for connection 26969ba817af7b205f7d, 1-RTT (ECN: ECT(0)) 2025/04/30 20:57:34 client Short Header{DestConnectionID: f7271fa1550d577f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 20:57:34 client -> &wire.PingFrame{} 2025/04/30 20:57:34 client Parsed a coalesced packet. Part 1: 39 bytes. Remaining: 146 bytes. 2025/04/30 20:57:34 client Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 20:57:34 client <- Reading packet 16 (146 bytes) for connection (empty), 1-RTT 2025/04/30 20:57:34 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 20:57:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e66689c6bfafd8dd, StatelessResetToken: 0x9b94678133534f124bfd9c4d82ef278a} 2025/04/30 20:57:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2c7d8685cb3f7ec, StatelessResetToken: 0x08f35c66eb6cc11760b930299e5281b4} 2025/04/30 20:57:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a938949bf914948d, StatelessResetToken: 0x50c257109b12a9147bffc81b843e40a1} 2025/04/30 20:57:34 client <- &wire.NewTokenFrame{Token: 0x0197d5cfe5516b8c15bb1360596dee934f57fca051888f17678c67a929c9e193ac4fe551e3c49594243f} 2025/04/30 20:57:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 20:57:34 client -> Sending packet 5 (39 bytes) for connection 26969ba817af7b205f7d, 1-RTT (ECN: ECT(0)) 2025/04/30 20:57:34 client Short Header{DestConnectionID: e66689c6bfafd8dd, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 20:57:34 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 14, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}}, DelayTime: 211.411µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 20:57:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 20:57:34 client <- Reading packet 17 (1051 bytes) for connection (empty), 1-RTT 2025/04/30 20:57:34 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 20:57:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 20:57:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 20:57:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 20:57:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 20:57:34 client -> Sending packet 6 (30 bytes) for connection 26969ba817af7b205f7d, 1-RTT (ECN: ECT(0)) 2025/04/30 20:57:34 client Short Header{DestConnectionID: e66689c6bfafd8dd, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 20:57:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 20:57:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 20:57:34 client Connection 26969ba817af7b205f7d closed.