2025-12-13 12:22:13,139 Generated random file: content-wet-soldier of size: 1024 2025-12-13 12:22:13,139 Requests: https://server4:443/content-wet-soldier 2025-12-13 12:22:13,199 2025-12-13 12:22:13,200 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_vl4_dzw7/ TESTCASE_SERVER=v2 TESTCASE_CLIENT=v2 WWW=/tmp/www_tls6h_sd/ DOWNLOADS=/tmp/download_dusiw2ou/ SERVER_LOGS=/tmp/logs_server_ox7scn64 CLIENT_LOGS=/tmp/logs_client_yu_934he SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=ghcr.io/microsoft/msquic/qns:main REQUESTS="https://server4:443/content-wet-soldier" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-12-13 12:22:27,133 Container server Recreate Container client Recreate Container server Recreated Container client Recreated Attaching to client, server, sim sim | waiting 10s for server:443 server | Setting up routes... server | Actual changes: server | tx-checksumming: off server | tx-checksum-ip-generic: off server | tx-checksum-sctp: off server | tcp-segmentation-offload: off server | tx-tcp-segmentation: off [requested on] server | tx-tcp-ecn-segmentation: off [requested on] server | tx-tcp-mangleid-segmentation: off [requested on] server | tx-tcp6-segmentation: off [requested on] server | tx-udp-segmentation: off [requested on] server | Endpoint's IPv4 address is 193.167.100.100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 client | Setting up routes... client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off client | Endpoint's IPv4 address is 193.167.0.100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 server | Waiting forever. server | client | Certificate was added to keystore sim | server:443 is available after 501.282353ms sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | Capturing on 'eth0' sim | Capturing on 'eth1' sim | File: /logs/trace_node_left.pcap sim | File: /logs/trace_node_right.pcap client | wait-for-it.sh: waiting 30 seconds for sim:57832 client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 22:15.311 Creating connection with server4:443 with v1 client | 22:15.393 Original destination connection id: fc3cd429e51dfcea (scid: d0c36048ab96b412) client | >- CryptoStream[I|ClientHello] client | 22:15.547 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,271] Padding(882) client | 22:15.594 Receiving packet with version v2, while connection version is v1 client | 22:15.587 <- (1) Packet I|98|L|179|2 Token=[] AckFrame[0|?0] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 22:15.639 -> Packet I|1|L|1200|2 Token=[] AckFrame[98|?0] Padding(1150) client | 22:15.587 <- (1) Packet H|99|L|1041|2 CryptoFrame[0,765] Padding(226) client | 22:15.646 - unknown transport parameter 0xff04de1b, size 2 client | 22:15.646 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) client | 22:15.647 Version negotiation resulted in changing version from v1 to v2 client | >- CryptoStream[H|Finished] client | 22:15.669 -> Packet H|0|L|81|1 CryptoFrame[0,36] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 22:15.674 -> Packet H|1|L|48|1 AckFrame[99|?0] client | 22:15.684 -> Packet A|0|S0|da1ad010feb6475238|57|1 StreamFrame[0(CIB),0,26,fin] server | [193.167.0.100:37703] GET '/content-wet-soldier' client | 22:15.701 <- (2) Packet A|100|S0|d0c36048ab96b412|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|da1a12d9696eb28be8|836d8966a0ee1831a9b52fd3785ac4c5] Padding(1161) client | 22:15.703 <- (3) Packet A|101|S0|d0c36048ab96b412|1220|2 PingFrame[] Padding(1190) client | 22:15.703 <- (4) Packet A|102|S0|d0c36048ab96b412|338|1 CryptoFrame[0,305] client | 22:15.710 -> Packet A|1|S0|da1ad010feb6475238|34|1 AckFrame[101-100|?1] client | -< CryptoStream[A|NewSessionTicket] client | 22:15.715 <- (5) Packet A|103|S0|d0c36048ab96b412|1062|2 AckFrame[0|?0] StreamFrame[0(CIB),0,1024,fin] client | 22:15.718 -> Packet A|2|S0|da1ad010feb6475238|34|1 AckFrame[103-100|?5] client | Get requested finished in 0.33 sec (0.00 MB/s). client | 22:15.724 Closing ClientConnection[fc3cd429e51dfcea/d0c36048ab96b412(V2) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 22:15.726 -> Packet A|3|S0|da1ad010feb6475238|31|1 ConnectionCloseFrame[0|0|] client | 22:15.742 <- (6) Packet A|104|S0|d0c36048ab96b412|1252|2 PingFrame[] Padding(1222) client | 22:15.744 -> Packet A|4|S0|da1ad010feb6475238|31|1 ConnectionCloseFrame[0|0|] client | 22:15.748 <- (7) Packet A|105|S0|d0c36048ab96b412|95|4 AckFrame[2-1|?0] MaxStreamsFrame[B,101] NewConnectionIdFrame[2,<1|100bea03a3660e5f51|96d7972a405a1fb7a5ef41e6aaa4710e] NewConnectionIdFrame[3,<2|100be34b34aa0cca68|623142b1d062b430a2e2f40a22423e02] client | 22:15.751 -> Packet A|5|S0|da1ad010feb6475238|31|1 ConnectionCloseFrame[0|0|] client | 22:15.756 <- (8) Packet A|106|S0|d0c36048ab96b412|38|2 AckFrame[3-1|?0] ConnectionCloseFrame[0|0|] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container client Stopping Container server Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-12-13 12:22:27,222 Using the client's key log file. 2025-12-13 12:22:27,234 2025-12-13 12:22:27,235 Using the client's key log file. 2025-12-13 12:22:27,235 Using the client's key log file. 2025-12-13 12:22:27,245 2025-12-13 12:22:27,246 Using the client's key log file. 2025-12-13 12:22:28,106 Check of downloaded files succeeded.