2025/04/30 12:03:21 Requesting https://server4:443/ztpdaixywg. 2025/04/30 12:03:21 Increased receive buffer size to 14336 kiB 2025/04/30 12:03:21 Increased send buffer size to 14336 kiB 2025/04/30 12:03:21 Setting DF for IPv4 and IPv6. 2025/04/30 12:03:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:03:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:03:21 Created qlog file: /logs/qlog/449771696c8f27620c.sqlog 2025/04/30 12:03:21 client Starting new connection to server4 ([::]:47389 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 449771696c8f27620c, version v1 2025/04/30 12:03:21 Adding connection ID (empty). 2025/04/30 12:03:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:03:21 client -> Sending packet 0 (1280 bytes) for connection 449771696c8f27620c, Initial 2025/04/30 12:03:21 client Long Header{Type: Initial, DestConnectionID: 449771696c8f27620c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:03:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:03:21 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:03:21 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:03:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12eec4498393474fb3, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:03:21 client Received first packet. Switching destination connection ID to: 12eec4498393474fb3 2025/04/30 12:03:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 24µs} 2025/04/30 12:03:21 client newly acked packets (1): [0] 2025/04/30 12:03:21 client updated RTT: 38.632603ms (σ: 19.316301ms) 2025/04/30 12:03:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:03:21 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:03:21 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:03:21 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:03:21 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:03:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12eec4498393474fb3, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:03:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:03:21 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:03:21 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:03:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 449771696c8f27620c, InitialSourceConnectionID: 12eec4498393474fb3, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x36b0a696476b23e7a339fd07675f0500} 2025/04/30 12:03:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 449771696c8f27620c 2025/04/30 12:03:21 client Long Header{Type: Initial, DestConnectionID: 12eec4498393474fb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:03:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:03:21 client Long Header{Type: Handshake, DestConnectionID: 12eec4498393474fb3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:03:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:03:21 client Dropping Initial keys. 2025/04/30 12:03:21 client -> Sending packet 1 (41 bytes) for connection 449771696c8f27620c, Handshake 2025/04/30 12:03:21 client Long Header{Type: Handshake, DestConnectionID: 12eec4498393474fb3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:03:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:03:21 client -> Sending packet 0 (47 bytes) for connection 449771696c8f27620c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:03:21 client Short Header{DestConnectionID: 12eec4498393474fb3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:03:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:03:21 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:03:21 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:03:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:03:21 client Peer doesn't await address validation any longer. 2025/04/30 12:03:21 client newly acked packets (1): [0] 2025/04/30 12:03:21 client updated RTT: 37.873ms (σ: 16.003ms) 2025/04/30 12:03:21 client ECN capability confirmed. 2025/04/30 12:03:21 client Canceling loss detection timer. 2025/04/30 12:03:21 client Dropping Handshake keys. 2025/04/30 12:03:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:03:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12eec6b7d53a113ef8, StatelessResetToken: 0xd31f8d3f0e2f1f24d9bb6686b3c43bd6} 2025/04/30 12:03:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 12eeaca12039d4476d, StatelessResetToken: 0x5d27ae1ba762256b420cae9fd77fc0f0} 2025/04/30 12:03:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12ee164cbfc83df413, StatelessResetToken: 0x0b0f4f2f0bcfb09fd6b6191a8157e7b0} 2025/04/30 12:03:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 23452a93aadfef55f3, StatelessResetToken: 0x8ec374552490d68080f29ebf8f529795} 2025/04/30 12:03:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 234575a6f7f5aa9f85, StatelessResetToken: 0xe711cd2b5df188da21918a3fb504d5e8} 2025/04/30 12:03:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 2345c2d6e17c2e178e, StatelessResetToken: 0xa1b0bc47c5b665465d5adfb618d8ecd6} 2025/04/30 12:03:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 2345b33d1812323805, StatelessResetToken: 0x99ea4eb438bae1a96b114bd3b4b91a4b} 2025/04/30 12:03:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:03:21 client -> Sending packet 1 (41 bytes) for connection 449771696c8f27620c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:03:21 client Short Header{DestConnectionID: 23452a93aadfef55f3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:03:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 171.089µs} 2025/04/30 12:03:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:03:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:03:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:03:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:03:21 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:03:21 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:03:21 client <- &wire.PingFrame{} 2025/04/30 12:03:21 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:03:21 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:03:21 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:03:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:03:21 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:03:21 client -> Sending packet 2 (33 bytes) for connection 449771696c8f27620c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:03:21 client Short Header{DestConnectionID: 23452a93aadfef55f3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:03:21 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 67.165µs} 2025/04/30 12:03:21 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:03:21 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:03:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:03:21 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:03:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:03:21 client -> Sending packet 3 (31 bytes) for connection 449771696c8f27620c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:03:21 client Short Header{DestConnectionID: 23452a93aadfef55f3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:03:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:03:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:03:21 client Connection 449771696c8f27620c closed.