2025-04-30 12:43:57,683 Generated random file: ainpwdidhw of size: 10240 2025-04-30 12:43:57,684 Requests: https://server4:443/ainpwdidhw 2025-04-30 12:43:57,742 2025-04-30 12:43:57,743 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_kugrrem5/ TESTCASE_SERVER=retry TESTCASE_CLIENT=retry WWW=/tmp/www_p82idfxh/ DOWNLOADS=/tmp/download_m1z3bwk1/ SERVER_LOGS=/tmp/logs_server_8b827qv0 CLIENT_LOGS=/tmp/logs_client__0cln8mk SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=ghcr.io/microsoft/msquic/qns:main REQUESTS="https://server4:443/ainpwdidhw" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-04-30 12:44:11,744 Container sim Created Container client Recreate Container server Recreate Container server Recreated Container client Recreated Attaching to client, server, sim sim | waiting 10s for server:443 server | Setting up routes... server | Actual changes: server | tx-checksumming: off server | tx-checksum-ip-generic: off server | tx-checksum-sctp: off server | tcp-segmentation-offload: off server | tx-tcp-segmentation: off [requested on] server | tx-tcp-ecn-segmentation: off [requested on] server | tx-tcp-mangleid-segmentation: off [requested on] server | tx-tcp6-segmentation: off [requested on] server | tx-udp-segmentation: off [requested on] server | Endpoint's IPv4 address is 193.167.100.100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 server | Enabling forced RETRY on server. client | Setting up routes... server | Waiting forever. server | client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off client | Endpoint's IPv4 address is 193.167.0.100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 client | Certificate was added to keystore client | wait-for-it.sh: waiting 30 seconds for sim:57832 sim | server:443 is available after 1.01212396s sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes sim | tcpdump: listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 43:59.980 Creating connection with server4:443 with v1 client | 44:00.057 Original destination connection id: 32afff9e48b73098 (scid: d7663fd65e226bd0) client | >- CryptoStream[I|ClientHello] client | 44:00.176 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) client | 44:00.214 <- (1) Packet I|-|R|120| Retry Token (80): 8c6e730d2d03000038240670911821d48fc0796fbfafcfe031feff66b15a8afb1af28fabadc1f3fbd3ebc565b7ee2ea82a09132f65d7ca3d75d6b50e7c58c35454f56d544631df8150355c6100000000 client | 44:00.241 -> Packet I|1|L|1201|2 Token=8c6e730d2d03000038240670911821d48fc0796fbfafcfe031feff66b15a8afb1af28fabadc1f3fbd3ebc565b7ee2ea82a09132f65d7ca3d75d6b50e7c58c35454f56d544631df8150355c6100000000 CryptoFrame[0,257] Padding(815) client | 44:00.274 <- (2) Packet I|0|L|179|2 Token=[] AckFrame[1|?0] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 44:00.304 -> Packet I|2|L|1202|2 Token=8c6e730d2d03000038240670911821d48fc0796fbfafcfe031feff66b15a8afb1af28fabadc1f3fbd3ebc565b7ee2ea82a09132f65d7ca3d75d6b50e7c58c35454f56d544631df8150355c6100000000 AckFrame[0|?0] Padding(1072) client | 44:00.274 <- (2) Packet H|1|L|1041|2 CryptoFrame[0,754] Padding(237) client | 44:00.319 - unknown transport parameter 0xff04de1b, size 2 client | 44:00.319 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) client | >- CryptoStream[H|Finished] client | 44:00.344 -> Packet H|0|L|81|1 CryptoFrame[0,36] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 44:00.347 -> Packet H|1|L|47|1 AckFrame[1|?0] client | 44:00.354 -> Packet A|0|S0|22816d9addafb94e6a|48|1 StreamFrame[0(CIB),0,17,fin] server | [193.167.0.100:54698] GET '/ainpwdidhw' client | 44:00.376 <- (3) Packet A|2|S0|d7663fd65e226bd0|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2281224ba1ae374215|1f7d735504cd17593b542a83a63d3938] NewConnectionIdFrame[2,<1|0191e44a647d1951b7|b1a3d831df9f250cc81bd8ee6f079f19] NewConnectionIdFrame[3,<2|01913244880a9b96fb|86817e41408031d4afd3004f73d5a14c] Padding(1103) client | 44:00.387 -> Packet A|1|S0|0191e44a647d1951b7|36|3 RetireConnectionIdFrame[0] AckFrame[2|?0] RetireConnectionIdFrame[1] client | 44:00.379 <- (4) Packet A|3|S0|d7663fd65e226bd0|1220|2 PingFrame[] Padding(1190) client | 44:00.379 <- (5) Packet A|4|S0|d7663fd65e226bd0|338|1 CryptoFrame[0,305] client | -< CryptoStream[A|NewSessionTicket] client | 44:00.386 <- (6) Packet A|5|S0|d7663fd65e226bd0|1220|2 AckFrame[0|?0] StreamFrame[0(CIB),0,1182] client | 44:00.390 -> Packet A|2|S0|0191e44a647d1951b7|33|1 AckFrame[4-2|?2] client | 44:00.387 <- (7) Packet A|6|S0|d7663fd65e226bd0|1220|1 StreamFrame[0(CIB),1182,1185] client | 44:00.392 -> Packet A|3|S0|0191e44a647d1951b7|32|1 AckFrame[6-2|?0] client | 44:00.388 <- (8) Packet A|7|S0|d7663fd65e226bd0|1220|1 StreamFrame[0(CIB),2367,1185] client | 44:00.389 <- (9) Packet A|8|S0|d7663fd65e226bd0|1220|1 StreamFrame[0(CIB),3552,1185] client | 44:00.395 -> Packet A|4|S0|0191e44a647d1951b7|33|1 AckFrame[8-2|?1] client | 44:00.393 <- (10) Packet A|9|S0|d7663fd65e226bd0|1220|1 StreamFrame[0(CIB),4737,1185] client | 44:00.394 <- (11) Packet A|10|S0|d7663fd65e226bd0|1220|1 StreamFrame[0(CIB),5922,1185] client | 44:00.394 <- (12) Packet A|11|S0|d7663fd65e226bd0|1220|1 StreamFrame[0(CIB),7107,1185] client | 44:00.398 -> Packet A|5|S0|0191e44a647d1951b7|33|1 AckFrame[10-2|?1] client | 44:00.394 <- (13) Packet A|12|S0|d7663fd65e226bd0|1220|1 StreamFrame[0(CIB),8292,1185] client | 44:00.394 <- (14) Packet A|13|S0|d7663fd65e226bd0|798|1 StreamFrame[0(CIB),9477,763,fin] client | 44:00.401 -> Packet A|6|S0|0191e44a647d1951b7|33|1 AckFrame[12-2|?2] client | Get requested finished in 0.35 sec (0.03 MB/s) : tech.kwik.h09.client.HttpResponseImpl@2ddc8ecb client | 44:00.409 Closing ClientConnection[32afff9e48b73098/d7663fd65e226bd0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 44:00.412 -> Packet A|7|S0|0191e44a647d1951b7|37|2 ConnectionCloseFrame[0|0|] AckFrame[13-2|?10] client | 44:00.422 <- (15) Packet A|14|S0|d7663fd65e226bd0|1252|2 PingFrame[] Padding(1222) client | 44:00.424 -> Packet A|8|S0|0191e44a647d1951b7|36|2 ConnectionCloseFrame[0|0|] AckFrame[13-2|?0] client | 44:00.442 <- (16) Packet A|15|S0|d7663fd65e226bd0|38|2 AckFrame[7-1|?0] ConnectionCloseFrame[0|0|] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container client Stopping Container server Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-04-30 12:44:11,836 No key log file found. 2025-04-30 12:44:11,837 No key log file found. 2025-04-30 12:44:11,837 No key log file found. 2025-04-30 12:44:11,837 No key log file found. 2025-04-30 12:44:12,397 Check of downloaded files succeeded. 2025-04-30 12:44:12,969 Check of Retry succeeded. Token used: 8c6e730d2d03000038240670911821d48fc0796fbfafcfe031feff66b15a8afb1af28fabadc1f3fbd3ebc565b7ee2ea82a09132f65d7ca3d75d6b50e7c58c35454f56d544631df8150355c6100000000