2025/12/13 13:31:06 Requesting https://server4:443/warm-endless-pilot. 2025/12/13 13:31:06 Increased receive buffer size to 14336 kiB 2025/12/13 13:31:06 Increased send buffer size to 14336 kiB 2025/12/13 13:31:06 Setting DF for IPv4 and IPv6. 2025/12/13 13:31:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 13:31:06 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 13:31:06 Created qlog file: /logs/qlog/bfcd802b878601c43ab7c3.sqlog 2025/12/13 13:31:06 client Starting new connection to server4 ([::]:32850 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bfcd802b878601c43ab7c3, version v1 2025/12/13 13:31:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 13:31:06 client -> Sending packet 0 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:06 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 13:31:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 13:31:06 client -> Sending packet 1 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:06 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:06 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:06 client <- Reading packet 69 (1260 bytes) for connection (empty), Initial 2025/12/13 13:31:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bfcd802b878601c43ab7c3, Token: (empty), PacketNumber: 69, PacketNumberLen: 4, Length: 1239, Version: v1} 2025/12/13 13:31:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 784µs} 2025/12/13 13:31:06 client newly acked packets (1): [0] 2025/12/13 13:31:06 client updated RTT: 63.364549ms (σ: 31.682274ms) 2025/12/13 13:31:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 13:31:07 client -> Sending packet 2 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:07 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:07 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:07 client -> Sending packet 3 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:07 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:07 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 13:31:07 client -> Sending packet 4 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:07 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:07 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:07 client -> Sending packet 5 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:07 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:07 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/12/13 13:31:08 client -> Sending packet 6 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:08 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:08 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:08 client -> Sending packet 7 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:08 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:08 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:08 client Parsed a coalesced packet. Part 1: 140 bytes. Remaining: 1080 bytes. 2025/12/13 13:31:08 client Dropping Initial packet (140 bytes) with unexpected source connection ID: 8aca4f33ae4a007822 (expected bfcd802b878601c43ab7c3) 2025/12/13 13:31:08 client Parsed a coalesced packet. Part 2: 1080 bytes. Remaining: 0 bytes. 2025/12/13 13:31:08 client Queueing packet (1080 bytes) for later decryption 2025/12/13 13:31:08 client Queueing packet (1220 bytes) for later decryption 2025/12/13 13:31:08 client Queueing packet (1220 bytes) for later decryption 2025/12/13 13:31:08 client Queueing packet (1220 bytes) for later decryption 2025/12/13 13:31:08 client Queueing packet (1220 bytes) for later decryption 2025/12/13 13:31:08 client Queueing packet (1220 bytes) for later decryption 2025/12/13 13:31:08 client Queueing packet (332 bytes) for later decryption 2025/12/13 13:31:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/12/13 13:31:09 client -> Sending packet 8 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:09 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:09 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:09 client -> Sending packet 9 (1280 bytes) for connection bfcd802b878601c43ab7c3, Initial 2025/12/13 13:31:09 client Long Header{Type: Initial, DestConnectionID: bfcd802b878601c43ab7c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 13:31:09 client -> &wire.CryptoFrame{Offset: 1237, Data length: 277, Offset + Data length: 1514} 2025/12/13 13:31:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 13:31:09 client Parsed a coalesced packet. Part 1: 140 bytes. Remaining: 1080 bytes. 2025/12/13 13:31:09 client Dropping Initial packet (140 bytes) with unexpected source connection ID: 8aca4f33ae4a007822 (expected bfcd802b878601c43ab7c3) 2025/12/13 13:31:09 client Parsed a coalesced packet. Part 2: 1080 bytes. Remaining: 0 bytes. 2025/12/13 13:31:09 client Queueing packet (1080 bytes) for later decryption 2025/12/13 13:31:09 client Queueing packet (1220 bytes) for later decryption 2025/12/13 13:31:09 client Queueing packet (1220 bytes) for later decryption 2025/12/13 13:31:09 client Queueing packet (180 bytes) for later decryption 2025/12/13 13:31:09 client Queueing packet (323 bytes) for later decryption 2025/12/13 13:31:09 client Dropping Initial packet (1220 bytes) with unexpected source connection ID: 8aca4f33ae4a007822 (expected bfcd802b878601c43ab7c3) 2025/12/13 13:31:10 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/12/13 13:31:10 client Dropping Initial packet (133 bytes) with unexpected source connection ID: 8aca4f33ae4a007822 (expected bfcd802b878601c43ab7c3) 2025/12/13 13:31:10 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/12/13 13:31:10 client Queueing packet (1087 bytes) for later decryption 2025/12/13 13:31:10 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/12/13 13:31:10 client Dropping Initial packet (133 bytes) with unexpected source connection ID: 8aca4f33ae4a007822 (expected bfcd802b878601c43ab7c3) 2025/12/13 13:31:10 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/12/13 13:31:10 client Queueing packet (1087 bytes) for later decryption 2025/12/13 13:31:11 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 944 bytes. 2025/12/13 13:31:11 client Dropping Initial packet (133 bytes) with unexpected source connection ID: 8aca4f33ae4a007822 (expected bfcd802b878601c43ab7c3) 2025/12/13 13:31:11 client Parsed a coalesced packet. Part 2: 944 bytes. Remaining: 0 bytes. 2025/12/13 13:31:11 client Queueing packet (944 bytes) for later decryption 2025/12/13 13:31:12 client Destroying connection: timeout: no recent network activity 2025/12/13 13:31:12 Removing connection ID (empty). 2025/12/13 13:31:12 client Connection bfcd802b878601c43ab7c3 closed.