2025/04/30 12:06:51 Requesting https://server4:443/baljsnslcb. 2025/04/30 12:06:51 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:51 Increased send buffer size to 14336 kiB 2025/04/30 12:06:51 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:51 Created qlog file: /logs/qlog/1fe1ccdf8f6cd08bf13ff2.sqlog 2025/04/30 12:06:51 client Starting new connection to server4 ([::]:58207 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1fe1ccdf8f6cd08bf13ff2, version v1 2025/04/30 12:06:51 Adding connection ID (empty). 2025/04/30 12:06:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:51 client -> Sending packet 0 (1280 bytes) for connection 1fe1ccdf8f6cd08bf13ff2, Initial 2025/04/30 12:06:51 client Long Header{Type: Initial, DestConnectionID: 1fe1ccdf8f6cd08bf13ff2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:06:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:06:51 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:51 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bbc88a7562f62a3e11, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:51 client Received first packet. Switching destination connection ID to: bbc88a7562f62a3e11 2025/04/30 12:06:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:06:51 client newly acked packets (1): [0] 2025/04/30 12:06:51 client updated RTT: 38.588168ms (σ: 19.294084ms) 2025/04/30 12:06:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:51 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:51 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:51 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:51 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bbc88a7562f62a3e11, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:06:51 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:51 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1fe1ccdf8f6cd08bf13ff2, InitialSourceConnectionID: bbc88a7562f62a3e11, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf8fd1b9572c77c0e46a155723c129d55} 2025/04/30 12:06:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1fe1ccdf8f6cd08bf13ff2 2025/04/30 12:06:51 client Long Header{Type: Initial, DestConnectionID: bbc88a7562f62a3e11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:51 client Long Header{Type: Handshake, DestConnectionID: bbc88a7562f62a3e11, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:51 client Dropping Initial keys. 2025/04/30 12:06:51 client -> Sending packet 1 (88 bytes) for connection 1fe1ccdf8f6cd08bf13ff2, Handshake 2025/04/30 12:06:51 client Long Header{Type: Handshake, DestConnectionID: bbc88a7562f62a3e11, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:51 client Short Header{DestConnectionID: bbc88a7562f62a3e11, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:52 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:52 client -> Sending packet 2 (91 bytes) for connection 1fe1ccdf8f6cd08bf13ff2, Handshake 2025/04/30 12:06:52 client Long Header{Type: Handshake, DestConnectionID: bbc88a7562f62a3e11, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:52 client -> Sending packet 3 (91 bytes) for connection 1fe1ccdf8f6cd08bf13ff2, Handshake 2025/04/30 12:06:52 client Long Header{Type: Handshake, DestConnectionID: bbc88a7562f62a3e11, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:52 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:52 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:52 client <- &wire.PingFrame{} 2025/04/30 12:06:52 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:52 client -> Sending packet 1 (33 bytes) for connection 1fe1ccdf8f6cd08bf13ff2, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: bbc88a7562f62a3e11, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 67.435µs} 2025/04/30 12:06:52 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:52 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:52 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:52 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:52 client -> Sending packet 2 (33 bytes) for connection 1fe1ccdf8f6cd08bf13ff2, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: bbc88a7562f62a3e11, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 68.478µs} 2025/04/30 12:06:52 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:52 client Skipping packet number 3 2025/04/30 12:06:52 client -> Sending packet 4 (71 bytes) for connection 1fe1ccdf8f6cd08bf13ff2, Handshake 2025/04/30 12:06:52 client Long Header{Type: Handshake, DestConnectionID: bbc88a7562f62a3e11, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:06:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:52 client Short Header{DestConnectionID: bbc88a7562f62a3e11, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:52 client Connection 1fe1ccdf8f6cd08bf13ff2 closed. 2025/04/30 12:06:52 Requesting https://server4:443/czovndfqzm. 2025/04/30 12:06:52 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:52 Increased send buffer size to 14336 kiB 2025/04/30 12:06:52 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:52 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:52 Created qlog file: /logs/qlog/60f9a4d854b41806b473553dc2690e.sqlog 2025/04/30 12:06:52 client Starting new connection to server4 ([::]:54534 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 60f9a4d854b41806b473553dc2690e, version v1 2025/04/30 12:06:52 Adding connection ID (empty). 2025/04/30 12:06:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:52 client -> Sending packet 0 (1280 bytes) for connection 60f9a4d854b41806b473553dc2690e, Initial 2025/04/30 12:06:52 client Long Header{Type: Initial, DestConnectionID: 60f9a4d854b41806b473553dc2690e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:06:52 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:52 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c20b28b028279dcc20, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:52 client Received first packet. Switching destination connection ID to: c20b28b028279dcc20 2025/04/30 12:06:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:06:52 client newly acked packets (1): [0] 2025/04/30 12:06:52 client updated RTT: 33.121682ms (σ: 16.560841ms) 2025/04/30 12:06:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:52 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:52 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:52 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:52 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c20b28b028279dcc20, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/04/30 12:06:52 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:52 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 60f9a4d854b41806b473553dc2690e, InitialSourceConnectionID: c20b28b028279dcc20, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x726df264ff078cf3d5b0a5920553ee72} 2025/04/30 12:06:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 60f9a4d854b41806b473553dc2690e 2025/04/30 12:06:52 client Long Header{Type: Initial, DestConnectionID: c20b28b028279dcc20, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:52 client Long Header{Type: Handshake, DestConnectionID: c20b28b028279dcc20, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:52 client Dropping Initial keys. 2025/04/30 12:06:52 client -> Sending packet 1 (41 bytes) for connection 60f9a4d854b41806b473553dc2690e, Handshake 2025/04/30 12:06:52 client Long Header{Type: Handshake, DestConnectionID: c20b28b028279dcc20, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:52 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:52 client -> Sending packet 0 (47 bytes) for connection 60f9a4d854b41806b473553dc2690e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: c20b28b028279dcc20, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:52 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:52 client -> Sending packet 2 (91 bytes) for connection 60f9a4d854b41806b473553dc2690e, Handshake 2025/04/30 12:06:52 client Long Header{Type: Handshake, DestConnectionID: c20b28b028279dcc20, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:52 client -> Sending packet 3 (91 bytes) for connection 60f9a4d854b41806b473553dc2690e, Handshake 2025/04/30 12:06:52 client Long Header{Type: Handshake, DestConnectionID: c20b28b028279dcc20, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:52 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:52 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:52 client <- &wire.PingFrame{} 2025/04/30 12:06:52 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:52 client -> Sending packet 1 (33 bytes) for connection 60f9a4d854b41806b473553dc2690e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: c20b28b028279dcc20, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 73.016µs} 2025/04/30 12:06:52 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:52 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:52 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:52 client -> Sending packet 2 (34 bytes) for connection 60f9a4d854b41806b473553dc2690e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: c20b28b028279dcc20, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.232641ms} 2025/04/30 12:06:52 client <- Reading packet 6 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:52 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 24.064ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:52 client Peer doesn't await address validation any longer. 2025/04/30 12:06:52 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:52 client Dropping Handshake keys. 2025/04/30 12:06:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c20b45ef755ff55b1f, StatelessResetToken: 0x5855bffea2a85f1fd88bd40cbf05fa78} 2025/04/30 12:06:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c20b19b8a6133c2327, StatelessResetToken: 0xdb45b6db63af2d738b96742c62c0a449} 2025/04/30 12:06:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c20b988fb4177e14e0, StatelessResetToken: 0xfb7f015b12544c08094293736bdb9e93} 2025/04/30 12:06:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 01fe3230f29e0eae23, StatelessResetToken: 0x5148c968d0c6b6495e867dc46c538571} 2025/04/30 12:06:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 01fe3e4172e418ca59, StatelessResetToken: 0x323e89118b432ecfc70f2ee18a081278} 2025/04/30 12:06:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 01feba8de7202544b4, StatelessResetToken: 0xa10e7ecbc72e2f234cf9edc321d5444d} 2025/04/30 12:06:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 01fe68cf4d5dde858c, StatelessResetToken: 0xeec48619cff9801778746972e3837745} 2025/04/30 12:06:52 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:52 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:52 client -> Sending packet 4 (62 bytes) for connection 60f9a4d854b41806b473553dc2690e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: 01fe3230f29e0eae23, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 277.194µs} 2025/04/30 12:06:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:52 client -> Sending packet 5 (55 bytes) for connection 60f9a4d854b41806b473553dc2690e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: 01fe3230f29e0eae23, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:52 client <- Reading packet 8 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:52 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:52 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:52 client -> Sending packet 6 (37 bytes) for connection 60f9a4d854b41806b473553dc2690e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: 01fe3230f29e0eae23, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 58.069µs} 2025/04/30 12:06:52 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:52 client -> Sending packet 7 (31 bytes) for connection 60f9a4d854b41806b473553dc2690e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:52 client Short Header{DestConnectionID: 01fe3230f29e0eae23, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:52 client Connection 60f9a4d854b41806b473553dc2690e closed. 2025/04/30 12:06:52 Requesting https://server4:443/prigpwfosx. 2025/04/30 12:06:52 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:52 Increased send buffer size to 14336 kiB 2025/04/30 12:06:52 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:52 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:52 Created qlog file: /logs/qlog/72f439f80d86d57a2217c939db416eed.sqlog 2025/04/30 12:06:52 client Starting new connection to server4 ([::]:59783 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 72f439f80d86d57a2217c939db416eed, version v1 2025/04/30 12:06:52 Adding connection ID (empty). 2025/04/30 12:06:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:52 client -> Sending packet 0 (1280 bytes) for connection 72f439f80d86d57a2217c939db416eed, Initial 2025/04/30 12:06:52 client Long Header{Type: Initial, DestConnectionID: 72f439f80d86d57a2217c939db416eed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:06:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:06:52 client -> Sending packet 1 (1280 bytes) for connection 72f439f80d86d57a2217c939db416eed, Initial 2025/04/30 12:06:52 client Long Header{Type: Initial, DestConnectionID: 72f439f80d86d57a2217c939db416eed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:06:52 client -> Sending packet 2 (1280 bytes) for connection 72f439f80d86d57a2217c939db416eed, Initial 2025/04/30 12:06:52 client Long Header{Type: Initial, DestConnectionID: 72f439f80d86d57a2217c939db416eed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:06:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:06:52 client <- Reading packet 2 (1220 bytes) for connection (empty), Initial 2025/04/30 12:06:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b9772727fa5ac015e, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1201, Version: v1} 2025/04/30 12:06:52 client Received first packet. Switching destination connection ID to: 4b9772727fa5ac015e 2025/04/30 12:06:52 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 12:06:52 client newly acked packets (1): [2] 2025/04/30 12:06:52 client updated RTT: 58.737303ms (σ: 29.368651ms) 2025/04/30 12:06:52 client -> Sending packet 3 (1280 bytes) for connection 72f439f80d86d57a2217c939db416eed, Initial 2025/04/30 12:06:52 client Long Header{Type: Initial, DestConnectionID: 4b9772727fa5ac015e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:06:52 client -> &wire.PingFrame{} 2025/04/30 12:06:53 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1086 bytes. 2025/04/30 12:06:53 client <- Reading packet 6 (134 bytes) for connection (empty), Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b9772727fa5ac015e, Token: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 115, Version: v1} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:53 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client <- &wire.PingFrame{} 2025/04/30 12:06:53 client Parsed a coalesced packet. Part 2: 1086 bytes. Remaining: 0 bytes. 2025/04/30 12:06:53 client <- Reading packet 7 (1086 bytes) for connection (empty), Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b9772727fa5ac015e, PacketNumber: 7, PacketNumberLen: 4, Length: 1068, Version: v1} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/04/30 12:06:53 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 72f439f80d86d57a2217c939db416eed, InitialSourceConnectionID: 4b9772727fa5ac015e, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x1bb13176daa1508613d5e371d96632d6} 2025/04/30 12:06:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 72f439f80d86d57a2217c939db416eed 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: 4b9772727fa5ac015e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 4b9772727fa5ac015e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:53 client Dropping Initial keys. 2025/04/30 12:06:53 client -> Sending packet 1 (88 bytes) for connection 72f439f80d86d57a2217c939db416eed, Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 4b9772727fa5ac015e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s} 2025/04/30 12:06:53 client Short Header{DestConnectionID: 4b9772727fa5ac015e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:53 client -> Sending packet 2 (91 bytes) for connection 72f439f80d86d57a2217c939db416eed, Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 4b9772727fa5ac015e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:53 client -> Sending packet 3 (91 bytes) for connection 72f439f80d86d57a2217c939db416eed, Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 4b9772727fa5ac015e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:53 client <- Reading packet 8 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:53 client Dropping Handshake keys. 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4b979d3c7274bb4e42, StatelessResetToken: 0x91950c7f603c05a33b54d4dec7838bf1} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4b97419b7973984bb7, StatelessResetToken: 0xa1a71b16d1df90c92db644b874599c6e} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4b97bd3e219f94f0f9, StatelessResetToken: 0x9004e987049d183fe5189f43a582604b} 2025/04/30 12:06:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:53 client -> Sending packet 2 (54 bytes) for connection 72f439f80d86d57a2217c939db416eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 4b979d3c7274bb4e42, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 174.405µs} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:53 client -> Sending packet 3 (49 bytes) for connection 72f439f80d86d57a2217c939db416eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 4b979d3c7274bb4e42, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:53 client <- Reading packet 9 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.PingFrame{} 2025/04/30 12:06:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:53 client <- Reading packet 10 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:53 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:53 client -> Sending packet 4 (33 bytes) for connection 72f439f80d86d57a2217c939db416eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 4b979d3c7274bb4e42, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, DelayTime: 53.751µs} 2025/04/30 12:06:53 client <- Reading packet 11 (58 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 4b97289d7e02db0479, StatelessResetToken: 0x50076d63d472e375c355bc8b0afebadd} 2025/04/30 12:06:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:53 client <- Reading packet 12 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:53 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:53 client -> Sending packet 5 (33 bytes) for connection 72f439f80d86d57a2217c939db416eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 4b979d3c7274bb4e42, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 8, DelayTime: 57.408µs} 2025/04/30 12:06:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:53 client -> Sending packet 6 (31 bytes) for connection 72f439f80d86d57a2217c939db416eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 4b979d3c7274bb4e42, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:53 client Connection 72f439f80d86d57a2217c939db416eed closed. 2025/04/30 12:06:53 Requesting https://server4:443/gycwnbhpoa. 2025/04/30 12:06:53 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:53 Increased send buffer size to 14336 kiB 2025/04/30 12:06:53 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:53 Created qlog file: /logs/qlog/1aa54945342ac4e3769e.sqlog 2025/04/30 12:06:53 client Starting new connection to server4 ([::]:42678 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1aa54945342ac4e3769e, version v1 2025/04/30 12:06:53 Adding connection ID (empty). 2025/04/30 12:06:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:53 client -> Sending packet 0 (1280 bytes) for connection 1aa54945342ac4e3769e, Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: 1aa54945342ac4e3769e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 12:06:53 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:53 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a139ca7462f903b6cb, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:53 client Received first packet. Switching destination connection ID to: a139ca7462f903b6cb 2025/04/30 12:06:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 24µs} 2025/04/30 12:06:53 client newly acked packets (1): [0] 2025/04/30 12:06:53 client updated RTT: 33.35176ms (σ: 16.67588ms) 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:53 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:53 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a139ca7462f903b6cb, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:06:53 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1aa54945342ac4e3769e, InitialSourceConnectionID: a139ca7462f903b6cb, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x706391b0246409cd54324e7e04994460} 2025/04/30 12:06:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1aa54945342ac4e3769e 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: a139ca7462f903b6cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: a139ca7462f903b6cb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:53 client Dropping Initial keys. 2025/04/30 12:06:53 client -> Sending packet 1 (41 bytes) for connection 1aa54945342ac4e3769e, Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: a139ca7462f903b6cb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:53 client -> Sending packet 0 (47 bytes) for connection 1aa54945342ac4e3769e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: a139ca7462f903b6cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:53 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:53 client Dropping Handshake keys. 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a139aa868fa2f20147, StatelessResetToken: 0x52dd8b5ad22be0625be02bcd0f6d5511} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a139d65c76ae6da01a, StatelessResetToken: 0xf7f7111bb572dfd7247b57d3e103af19} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a1395e390411fc6b1a, StatelessResetToken: 0xcfd53a49852a77856cbe17becb18d36d} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f0e8e1952612c64b54, StatelessResetToken: 0x97586947705ed593c8e3e9521b6d336a} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: f0e802fa8ff6dcf38a, StatelessResetToken: 0x415a8805df29d9bd42f3798293d85a74} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: f0e8a9277e3b746ac6, StatelessResetToken: 0x1235b42c3a9e6575099d623646681498} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: f0e87ab96801836ab1, StatelessResetToken: 0xc8639be198afa872db8d51d432f69573} 2025/04/30 12:06:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:53 client -> Sending packet 1 (41 bytes) for connection 1aa54945342ac4e3769e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: f0e8e1952612c64b54, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 170.879µs} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:53 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.PingFrame{} 2025/04/30 12:06:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:53 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:53 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:53 client -> Sending packet 2 (33 bytes) for connection 1aa54945342ac4e3769e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: f0e8e1952612c64b54, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 57.447µs} 2025/04/30 12:06:53 client <- Reading packet 5 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:53 client newly acked packets (1): [0] 2025/04/30 12:06:53 client updated RTT: 33.528ms (σ: 12.86ms) 2025/04/30 12:06:53 client ECN capability confirmed. 2025/04/30 12:06:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:53 client -> Sending packet 3 (31 bytes) for connection 1aa54945342ac4e3769e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: f0e8e1952612c64b54, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:53 client Connection 1aa54945342ac4e3769e closed. 2025/04/30 12:06:53 Requesting https://server4:443/nqirbbpflt. 2025/04/30 12:06:53 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:53 Increased send buffer size to 14336 kiB 2025/04/30 12:06:53 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:53 Created qlog file: /logs/qlog/bafcedb87727a712e79fca9e7dda.sqlog 2025/04/30 12:06:53 client Starting new connection to server4 ([::]:59192 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bafcedb87727a712e79fca9e7dda, version v1 2025/04/30 12:06:53 Adding connection ID (empty). 2025/04/30 12:06:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:53 client -> Sending packet 0 (1280 bytes) for connection bafcedb87727a712e79fca9e7dda, Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: bafcedb87727a712e79fca9e7dda, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:06:53 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:53 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40e0308263bc3ce4ad, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:53 client Received first packet. Switching destination connection ID to: 40e0308263bc3ce4ad 2025/04/30 12:06:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:06:53 client newly acked packets (1): [0] 2025/04/30 12:06:53 client updated RTT: 33.162358ms (σ: 16.581179ms) 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:53 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:53 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40e0308263bc3ce4ad, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:06:53 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bafcedb87727a712e79fca9e7dda, InitialSourceConnectionID: 40e0308263bc3ce4ad, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x51d43956b95cca3d5c7ac9b5f85f7ca8} 2025/04/30 12:06:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bafcedb87727a712e79fca9e7dda 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: 40e0308263bc3ce4ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 40e0308263bc3ce4ad, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:53 client Dropping Initial keys. 2025/04/30 12:06:53 client -> Sending packet 1 (41 bytes) for connection bafcedb87727a712e79fca9e7dda, Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 40e0308263bc3ce4ad, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:53 client -> Sending packet 0 (47 bytes) for connection bafcedb87727a712e79fca9e7dda, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 40e0308263bc3ce4ad, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:53 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:53 client Dropping Handshake keys. 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40e0ff706b0a098296, StatelessResetToken: 0x30bce20e96f82612a672762abf99891a} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40e0d67efc558c3ed9, StatelessResetToken: 0x534b45525c56ed7abbb94b3c8bfcb2ec} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40e016887e42b6eaa1, StatelessResetToken: 0x1d6e970f12ebebf509436a2b03b2a4b4} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 7a958eef02accc6434, StatelessResetToken: 0x86f8ffd643c233462560ae504771b40b} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 7a95df7e91cfe6d8f0, StatelessResetToken: 0xa33072834d88cd210ef4c60916ef4a94} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 7a95f27afe304e5503, StatelessResetToken: 0xffb2b9464fa6ee32cc09d5aef4e87c36} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 7a95984ee60fadcf46, StatelessResetToken: 0x0bf8ff09b445f2149b661f6ce0b5f064} 2025/04/30 12:06:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:53 client -> Sending packet 1 (41 bytes) for connection bafcedb87727a712e79fca9e7dda, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 7a958eef02accc6434, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 143.588µs} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:53 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:53 client -> Sending packet 2 (35 bytes) for connection bafcedb87727a712e79fca9e7dda, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 7a958eef02accc6434, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 58.339µs} 2025/04/30 12:06:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:53 client -> Sending packet 3 (31 bytes) for connection bafcedb87727a712e79fca9e7dda, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 7a958eef02accc6434, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:53 client Connection bafcedb87727a712e79fca9e7dda closed. 2025/04/30 12:06:53 Requesting https://server4:443/fhdaopwqtk. 2025/04/30 12:06:53 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:53 Increased send buffer size to 14336 kiB 2025/04/30 12:06:53 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:53 Created qlog file: /logs/qlog/6d997352515d72dd8478fc3e.sqlog 2025/04/30 12:06:53 client Starting new connection to server4 ([::]:47201 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6d997352515d72dd8478fc3e, version v1 2025/04/30 12:06:53 Adding connection ID (empty). 2025/04/30 12:06:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:53 client -> Sending packet 0 (1280 bytes) for connection 6d997352515d72dd8478fc3e, Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: 6d997352515d72dd8478fc3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:06:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:06:53 client -> Sending packet 1 (1280 bytes) for connection 6d997352515d72dd8478fc3e, Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: 6d997352515d72dd8478fc3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:06:53 client -> Sending packet 2 (1280 bytes) for connection 6d997352515d72dd8478fc3e, Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: 6d997352515d72dd8478fc3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:06:53 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:53 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1017e062a44cf62880, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:53 client Received first packet. Switching destination connection ID to: 1017e062a44cf62880 2025/04/30 12:06:53 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 8µs} 2025/04/30 12:06:53 client newly acked packets (1): [2] 2025/04/30 12:06:53 client updated RTT: 34.157575ms (σ: 17.078787ms) 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:53 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:53 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1017e062a44cf62880, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 12:06:53 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6d997352515d72dd8478fc3e, InitialSourceConnectionID: 1017e062a44cf62880, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xab286147927a3728f67705c1ef4bdd78} 2025/04/30 12:06:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d997352515d72dd8478fc3e 2025/04/30 12:06:53 client Long Header{Type: Initial, DestConnectionID: 1017e062a44cf62880, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 1017e062a44cf62880, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:53 client Dropping Initial keys. 2025/04/30 12:06:53 client -> Sending packet 1 (41 bytes) for connection 6d997352515d72dd8478fc3e, Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 1017e062a44cf62880, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:53 client -> Sending packet 0 (47 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 1017e062a44cf62880, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:53 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.PingFrame{} 2025/04/30 12:06:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:53 client -> Sending packet 1 (33 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 1017e062a44cf62880, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 57.257µs} 2025/04/30 12:06:53 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:53 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:53 client -> Sending packet 2 (34 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 1017e062a44cf62880, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.250882ms} 2025/04/30 12:06:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:53 client -> Sending packet 2 (91 bytes) for connection 6d997352515d72dd8478fc3e, Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 1017e062a44cf62880, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:53 client -> Sending packet 3 (91 bytes) for connection 6d997352515d72dd8478fc3e, Handshake 2025/04/30 12:06:53 client Long Header{Type: Handshake, DestConnectionID: 1017e062a44cf62880, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:53 client <- Reading packet 6 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:53 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:53 client Dropping Handshake keys. 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1017e1440bd060464b, StatelessResetToken: 0x99c7cda74bc3a289a260fd0624bc7eec} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1017a50b81fc675949, StatelessResetToken: 0xe16117d79f6797db3c6875df811c46eb} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1017375b834af6404b, StatelessResetToken: 0xd66aef8ae7973cac905a88c0be427a6b} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 62d63be6691ecdb34b, StatelessResetToken: 0xc721f4a0488fe189129f1193c2e75246} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 62d6e937a27b0f3426, StatelessResetToken: 0x9734a2a0f1c7b60ac1b20a33db9e1864} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 62d6ef22ae9ad88a43, StatelessResetToken: 0x9ae917b54c15a6abbb57b67801dd24a1} 2025/04/30 12:06:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 62d6ce5ac5cf5c82b3, StatelessResetToken: 0x577e4ae5bb834db13c781031d7e72ad8} 2025/04/30 12:06:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:53 client -> Sending packet 4 (62 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 62d63be6691ecdb34b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 186.178µs} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:53 client -> Sending packet 5 (55 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:53 client Short Header{DestConnectionID: 62d63be6691ecdb34b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:54 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 12:06:54 client -> Sending packet 7 (55 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 62d63be6691ecdb34b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:54 client -> Sending packet 8 (55 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 62d63be6691ecdb34b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:54 client -> Sending packet 9 (1366 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 62d63be6691ecdb34b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.PingFrame{} 2025/04/30 12:06:54 client <- Reading packet 10 (33 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:54 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:54 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:06:54 client <- Reading packet 11 (33 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:54 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:54 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:06:54 client newly acked packets (2): [8 9] 2025/04/30 12:06:54 client updated RTT: 33.87ms (σ: 13.381ms) 2025/04/30 12:06:54 client ECN capability confirmed. 2025/04/30 12:06:54 client Canceling loss detection timer. 2025/04/30 12:06:54 client <- Reading packet 13 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:54 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:54 client -> Sending packet 10 (1409 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 62d63be6691ecdb34b, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.PingFrame{} 2025/04/30 12:06:54 client -> Sending packet 11 (39 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 62d63be6691ecdb34b, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 3, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 147.976µs} 2025/04/30 12:06:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:54 client -> Sending packet 12 (31 bytes) for connection 6d997352515d72dd8478fc3e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 62d63be6691ecdb34b, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:54 client Connection 6d997352515d72dd8478fc3e closed. 2025/04/30 12:06:54 Requesting https://server4:443/uxeyjwvjzw. 2025/04/30 12:06:54 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:54 Increased send buffer size to 14336 kiB 2025/04/30 12:06:54 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:54 Created qlog file: /logs/qlog/d31253c18a5aaed7db3d.sqlog 2025/04/30 12:06:54 client Starting new connection to server4 ([::]:50220 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d31253c18a5aaed7db3d, version v1 2025/04/30 12:06:54 Adding connection ID (empty). 2025/04/30 12:06:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:54 client -> Sending packet 0 (1280 bytes) for connection d31253c18a5aaed7db3d, Initial 2025/04/30 12:06:54 client Long Header{Type: Initial, DestConnectionID: d31253c18a5aaed7db3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:06:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:06:54 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:54 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 226ca23c00b8e8c1e1, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:54 client Received first packet. Switching destination connection ID to: 226ca23c00b8e8c1e1 2025/04/30 12:06:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:54 client newly acked packets (1): [0] 2025/04/30 12:06:54 client updated RTT: 33.643963ms (σ: 16.821981ms) 2025/04/30 12:06:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:54 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:54 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:54 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:54 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 226ca23c00b8e8c1e1, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:06:54 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:54 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d31253c18a5aaed7db3d, InitialSourceConnectionID: 226ca23c00b8e8c1e1, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x64f2f23f507c3c25a2769e9cb8cd55b7} 2025/04/30 12:06:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d31253c18a5aaed7db3d 2025/04/30 12:06:54 client Long Header{Type: Initial, DestConnectionID: 226ca23c00b8e8c1e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:54 client Long Header{Type: Handshake, DestConnectionID: 226ca23c00b8e8c1e1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:54 client Dropping Initial keys. 2025/04/30 12:06:54 client -> Sending packet 1 (88 bytes) for connection d31253c18a5aaed7db3d, Handshake 2025/04/30 12:06:54 client Long Header{Type: Handshake, DestConnectionID: 226ca23c00b8e8c1e1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:54 client Short Header{DestConnectionID: 226ca23c00b8e8c1e1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:54 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:54 client -> Sending packet 2 (91 bytes) for connection d31253c18a5aaed7db3d, Handshake 2025/04/30 12:06:54 client Long Header{Type: Handshake, DestConnectionID: 226ca23c00b8e8c1e1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:54 client -> Sending packet 3 (91 bytes) for connection d31253c18a5aaed7db3d, Handshake 2025/04/30 12:06:54 client Long Header{Type: Handshake, DestConnectionID: 226ca23c00b8e8c1e1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:54 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:54 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:54 client Dropping Handshake keys. 2025/04/30 12:06:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 226c3c7e580c18a54e, StatelessResetToken: 0x5fa38f5a8bbcc4f251d21fdf3f2e9e77} 2025/04/30 12:06:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 226ce395e68f5b3f7a, StatelessResetToken: 0xf04e7b8ade700dce523704720e1d54c5} 2025/04/30 12:06:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 226cb641c9daae8021, StatelessResetToken: 0xb0aac4bf1078ed3fdea37ab1844bee67} 2025/04/30 12:06:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 8be407c30cf0e0c476, StatelessResetToken: 0x021bbdb29e86febaf3991d77dc4042c5} 2025/04/30 12:06:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 8be484557702cfb98d, StatelessResetToken: 0x47c0fa3266ded7a1a22da2ce6a6e1bf9} 2025/04/30 12:06:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 8be4dc0b8fbb1b8e5c, StatelessResetToken: 0x9ff110a0292adb4967cda861e0db45ea} 2025/04/30 12:06:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 8be4e2c2d81a4cc421, StatelessResetToken: 0x6da22aafd803e904a2178895926f34d7} 2025/04/30 12:06:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:54 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:54 client -> Sending packet 2 (60 bytes) for connection d31253c18a5aaed7db3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 8be407c30cf0e0c476, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 126.576µs} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:54 client -> Sending packet 3 (55 bytes) for connection d31253c18a5aaed7db3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 8be407c30cf0e0c476, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:54 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:54 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:54 client <- &wire.PingFrame{} 2025/04/30 12:06:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:54 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:54 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:54 client -> Sending packet 4 (33 bytes) for connection d31253c18a5aaed7db3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 8be407c30cf0e0c476, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 57.627µs} 2025/04/30 12:06:54 client <- Reading packet 6 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:54 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:54 client <- &wire.PingFrame{} 2025/04/30 12:06:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:54 client -> Sending packet 5 (35 bytes) for connection d31253c18a5aaed7db3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 8be407c30cf0e0c476, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 58.72µs} 2025/04/30 12:06:54 client <- Reading packet 7 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:54 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:54 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 123.136ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:06:54 client newly acked packets (1): [3] 2025/04/30 12:06:54 client ECN capability confirmed. 2025/04/30 12:06:54 client Canceling loss detection timer. 2025/04/30 12:06:54 client <- &wire.PingFrame{} 2025/04/30 12:06:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:54 client -> Sending packet 6 (31 bytes) for connection d31253c18a5aaed7db3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:54 client Short Header{DestConnectionID: 8be407c30cf0e0c476, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:54 client Connection d31253c18a5aaed7db3d closed. 2025/04/30 12:06:54 Requesting https://server4:443/bcmnxssnps. 2025/04/30 12:06:54 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:54 Increased send buffer size to 14336 kiB 2025/04/30 12:06:54 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:54 Created qlog file: /logs/qlog/e3ef7a6d170164934175761eefdad2c50d241f.sqlog 2025/04/30 12:06:54 client Starting new connection to server4 ([::]:58821 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e3ef7a6d170164934175761eefdad2c50d241f, version v1 2025/04/30 12:06:54 Adding connection ID (empty). 2025/04/30 12:06:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:54 client -> Sending packet 0 (1280 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f, Initial 2025/04/30 12:06:54 client Long Header{Type: Initial, DestConnectionID: e3ef7a6d170164934175761eefdad2c50d241f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 12:06:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 12:06:55 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:55 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 839d8446bcdd4644f8, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:55 client Received first packet. Switching destination connection ID to: 839d8446bcdd4644f8 2025/04/30 12:06:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:06:55 client newly acked packets (1): [0] 2025/04/30 12:06:55 client updated RTT: 33.120613ms (σ: 16.560306ms) 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:55 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:55 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 839d8446bcdd4644f8, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/04/30 12:06:55 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e3ef7a6d170164934175761eefdad2c50d241f, InitialSourceConnectionID: 839d8446bcdd4644f8, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x4c22c9fdca8e9c52beed8a734c7d208a} 2025/04/30 12:06:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: 839d8446bcdd4644f8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 839d8446bcdd4644f8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client Dropping Initial keys. 2025/04/30 12:06:55 client -> Sending packet 1 (41 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 839d8446bcdd4644f8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:55 client -> Sending packet 0 (47 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 839d8446bcdd4644f8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:55 client -> Sending packet 2 (91 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 839d8446bcdd4644f8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client -> Sending packet 3 (91 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 839d8446bcdd4644f8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:55 client Peer doesn't await address validation any longer. 2025/04/30 12:06:55 client newly acked packets (1): [0] 2025/04/30 12:06:55 client updated RTT: 45.496ms (σ: 37.172ms) 2025/04/30 12:06:55 client ECN capability confirmed. 2025/04/30 12:06:55 client Canceling loss detection timer. 2025/04/30 12:06:55 client Dropping Handshake keys. 2025/04/30 12:06:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 839d490a9bbb878d6a, StatelessResetToken: 0x8c9b0ecfc51c20184ece2b9f6327caca} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 839d96f8c4710eae68, StatelessResetToken: 0xeab811ea82e944b0a134fa7c27a93cf3} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 839d569ec8670376b9, StatelessResetToken: 0x7f0d1d385de7caa5b422c70cf448eb0c} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 91a38d6717065001c0, StatelessResetToken: 0x982f6c4c8375c72b160644aee69af614} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 91a3c150ad95382e84, StatelessResetToken: 0x6508b1db9130f6f03a7774105d1f000f} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 91a339eac838c66ef7, StatelessResetToken: 0xf26a0ef93d231524160442dd1ab5e766} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 91a33d1960b95dfea8, StatelessResetToken: 0xbc017f7066056bb7e0778e48c454faa4} 2025/04/30 12:06:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:55 client -> Sending packet 1 (41 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 91a38d6717065001c0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 166.811µs} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:55 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.PingFrame{} 2025/04/30 12:06:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:55 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:55 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:55 client -> Sending packet 2 (33 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 91a38d6717065001c0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 54.923µs} 2025/04/30 12:06:55 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:55 client -> Sending packet 3 (31 bytes) for connection e3ef7a6d170164934175761eefdad2c50d241f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 91a38d6717065001c0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:55 client Connection e3ef7a6d170164934175761eefdad2c50d241f closed. 2025/04/30 12:06:55 Requesting https://server4:443/xzopgyjkwi. 2025/04/30 12:06:55 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:55 Increased send buffer size to 14336 kiB 2025/04/30 12:06:55 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:55 Created qlog file: /logs/qlog/b868e6365817edb2472a97b454ff06.sqlog 2025/04/30 12:06:55 client Starting new connection to server4 ([::]:55613 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b868e6365817edb2472a97b454ff06, version v1 2025/04/30 12:06:55 Adding connection ID (empty). 2025/04/30 12:06:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:55 client -> Sending packet 0 (1280 bytes) for connection b868e6365817edb2472a97b454ff06, Initial 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: b868e6365817edb2472a97b454ff06, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:06:55 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:06:55 client <- Reading packet 2 (133 bytes) for connection (empty), Initial 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 53da3e0e234f3b959e, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:06:55 client Received first packet. Switching destination connection ID to: 53da3e0e234f3b959e 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:55 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:06:55 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 53da3e0e234f3b959e, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/04/30 12:06:55 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b868e6365817edb2472a97b454ff06, InitialSourceConnectionID: 53da3e0e234f3b959e, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x8975668a01ad194718fbe3fa12d95bc4} 2025/04/30 12:06:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b868e6365817edb2472a97b454ff06 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: 53da3e0e234f3b959e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 53da3e0e234f3b959e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client Dropping Initial keys. 2025/04/30 12:06:55 client -> Sending packet 1 (88 bytes) for connection b868e6365817edb2472a97b454ff06, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 53da3e0e234f3b959e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 12:06:55 client Short Header{DestConnectionID: 53da3e0e234f3b959e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:55 client <- Reading packet 4 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:55 client Dropping Handshake keys. 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 53dac9e9f94e4976cb, StatelessResetToken: 0x7539252c57d6e66e1eb25092c1e5cf9a} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 53dad974277265fc59, StatelessResetToken: 0xbd3643f16236235502ffab46e3635c6e} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 53dadb1c4d95ff2f64, StatelessResetToken: 0x9b0cad9cf4951b56004156d1aff8120a} 2025/04/30 12:06:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:55 client -> Sending packet 1 (1366 bytes) for connection b868e6365817edb2472a97b454ff06, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 53dac9e9f94e4976cb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.PingFrame{} 2025/04/30 12:06:55 client -> Sending packet 2 (35 bytes) for connection b868e6365817edb2472a97b454ff06, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 53dac9e9f94e4976cb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 199.616µs} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:55 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.PingFrame{} 2025/04/30 12:06:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:55 client <- Reading packet 7 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:55 client newly acked packets (1): [0] 2025/04/30 12:06:55 client updated RTT: 34.808534ms (σ: 17.404267ms) 2025/04/30 12:06:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:55 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:55 client -> Sending packet 3 (35 bytes) for connection b868e6365817edb2472a97b454ff06, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 53dac9e9f94e4976cb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 97.552µs} 2025/04/30 12:06:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:55 client -> Sending packet 4 (31 bytes) for connection b868e6365817edb2472a97b454ff06, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 53dac9e9f94e4976cb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:55 client Connection b868e6365817edb2472a97b454ff06 closed. 2025/04/30 12:06:55 Requesting https://server4:443/qbcemabggx. 2025/04/30 12:06:55 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:55 Increased send buffer size to 14336 kiB 2025/04/30 12:06:55 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:55 Created qlog file: /logs/qlog/b9a8b16aeecfdf0a.sqlog 2025/04/30 12:06:55 client Starting new connection to server4 ([::]:44877 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b9a8b16aeecfdf0a, version v1 2025/04/30 12:06:55 Adding connection ID (empty). 2025/04/30 12:06:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:55 client -> Sending packet 0 (1280 bytes) for connection b9a8b16aeecfdf0a, Initial 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: b9a8b16aeecfdf0a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:06:55 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:55 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 815d689ad25d1b13aa, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:55 client Received first packet. Switching destination connection ID to: 815d689ad25d1b13aa 2025/04/30 12:06:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:06:55 client newly acked packets (1): [0] 2025/04/30 12:06:55 client updated RTT: 33.020382ms (σ: 16.510191ms) 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:55 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:55 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 815d689ad25d1b13aa, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:06:55 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b9a8b16aeecfdf0a, InitialSourceConnectionID: 815d689ad25d1b13aa, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xd70f0e0609d6d10134bf12f9021b1e6d} 2025/04/30 12:06:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b9a8b16aeecfdf0a 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: 815d689ad25d1b13aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 815d689ad25d1b13aa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client Dropping Initial keys. 2025/04/30 12:06:55 client -> Sending packet 1 (41 bytes) for connection b9a8b16aeecfdf0a, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 815d689ad25d1b13aa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:55 client -> Sending packet 0 (47 bytes) for connection b9a8b16aeecfdf0a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 815d689ad25d1b13aa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:55 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.PingFrame{} 2025/04/30 12:06:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:55 client -> Sending packet 1 (33 bytes) for connection b9a8b16aeecfdf0a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 815d689ad25d1b13aa, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 81.723µs} 2025/04/30 12:06:55 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:55 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:55 client -> Sending packet 2 (34 bytes) for connection b9a8b16aeecfdf0a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 815d689ad25d1b13aa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.243838ms} 2025/04/30 12:06:55 client <- Reading packet 5 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.PingFrame{} 2025/04/30 12:06:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:55 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:55 client -> Sending packet 3 (34 bytes) for connection b9a8b16aeecfdf0a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 815d689ad25d1b13aa, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 25.226644ms} 2025/04/30 12:06:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:55 client -> Sending packet 2 (91 bytes) for connection b9a8b16aeecfdf0a, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 815d689ad25d1b13aa, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client -> Sending packet 3 (91 bytes) for connection b9a8b16aeecfdf0a, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 815d689ad25d1b13aa, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:06:55 client -> Sending packet 4 (91 bytes) for connection b9a8b16aeecfdf0a, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 815d689ad25d1b13aa, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client -> Sending packet 5 (91 bytes) for connection b9a8b16aeecfdf0a, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 815d689ad25d1b13aa, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client <- Reading packet 8 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:55 client Dropping Handshake keys. 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 815d3b34df7af06d6b, StatelessResetToken: 0x1cdfacf46a547b32a6512a2cfcbb6941} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 815dfe7128df74fb7c, StatelessResetToken: 0xf8250a352331534131ef548727575484} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 815d8d050024312d1d, StatelessResetToken: 0xa649871a6064f2394551f731e18daa50} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 28103d315356197b7e, StatelessResetToken: 0x9bff702b441201acd0b4362f2e58411e} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 2810f80e5fcce1226c, StatelessResetToken: 0x9379f8779eae149abaec8ea4da9d2d84} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 281004bdc7fd2abf98, StatelessResetToken: 0xc7dadac00be3d366e95d014fcc81c8e9} 2025/04/30 12:06:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 2810b685dd0e7be43c, StatelessResetToken: 0xf3c21354630eace533e87194455688a9} 2025/04/30 12:06:55 client <- &wire.PingFrame{} 2025/04/30 12:06:55 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:55 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:55 client -> Sending packet 5 (62 bytes) for connection b9a8b16aeecfdf0a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 28103d315356197b7e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 3}}, DelayTime: 181.879µs} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:55 client -> Sending packet 6 (55 bytes) for connection b9a8b16aeecfdf0a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 28103d315356197b7e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:55 client <- Reading packet 9 (36 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:06:55 client newly acked packets (1): [6] 2025/04/30 12:06:55 client updated RTT: 32.755ms (σ: 12.91ms) 2025/04/30 12:06:55 client ECN capability confirmed. 2025/04/30 12:06:55 client Canceling loss detection timer. 2025/04/30 12:06:55 client <- &wire.MaxDataFrame{MaximumData: 16777233} 2025/04/30 12:06:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:55 client <- Reading packet 10 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:55 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:55 client -> Sending packet 7 (35 bytes) for connection b9a8b16aeecfdf0a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 28103d315356197b7e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 5, Smallest: 3}}, DelayTime: 48.761µs} 2025/04/30 12:06:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:55 client -> Sending packet 8 (31 bytes) for connection b9a8b16aeecfdf0a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 28103d315356197b7e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:55 client Connection b9a8b16aeecfdf0a closed. 2025/04/30 12:06:55 Requesting https://server4:443/zpuzfbesmj. 2025/04/30 12:06:55 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:55 Increased send buffer size to 14336 kiB 2025/04/30 12:06:55 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:55 Created qlog file: /logs/qlog/b42ad724d7ccef1f876b5176c9.sqlog 2025/04/30 12:06:55 client Starting new connection to server4 ([::]:35558 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b42ad724d7ccef1f876b5176c9, version v1 2025/04/30 12:06:55 Adding connection ID (empty). 2025/04/30 12:06:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:55 client -> Sending packet 0 (1280 bytes) for connection b42ad724d7ccef1f876b5176c9, Initial 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: b42ad724d7ccef1f876b5176c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 12:06:55 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:55 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 205d574a44f085ef07, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:55 client Received first packet. Switching destination connection ID to: 205d574a44f085ef07 2025/04/30 12:06:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:55 client newly acked packets (1): [0] 2025/04/30 12:06:55 client updated RTT: 33.138473ms (σ: 16.569236ms) 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:55 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:55 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 205d574a44f085ef07, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 12:06:55 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b42ad724d7ccef1f876b5176c9, InitialSourceConnectionID: 205d574a44f085ef07, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xa4e9a778e65bc0440824514270a05bbe} 2025/04/30 12:06:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b42ad724d7ccef1f876b5176c9 2025/04/30 12:06:55 client Long Header{Type: Initial, DestConnectionID: 205d574a44f085ef07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 205d574a44f085ef07, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client Dropping Initial keys. 2025/04/30 12:06:55 client -> Sending packet 1 (41 bytes) for connection b42ad724d7ccef1f876b5176c9, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 205d574a44f085ef07, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:55 client -> Sending packet 0 (47 bytes) for connection b42ad724d7ccef1f876b5176c9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 205d574a44f085ef07, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:55 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.PingFrame{} 2025/04/30 12:06:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:55 client -> Sending packet 1 (33 bytes) for connection b42ad724d7ccef1f876b5176c9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 205d574a44f085ef07, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 60.693µs} 2025/04/30 12:06:55 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:55 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:55 client -> Sending packet 2 (34 bytes) for connection b42ad724d7ccef1f876b5176c9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 205d574a44f085ef07, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.204254ms} 2025/04/30 12:06:55 client <- Reading packet 6 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:55 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:55 client <- &wire.PingFrame{} 2025/04/30 12:06:55 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:55 client -> Sending packet 3 (35 bytes) for connection b42ad724d7ccef1f876b5176c9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:55 client Short Header{DestConnectionID: 205d574a44f085ef07, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:55 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 58.269µs} 2025/04/30 12:06:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:55 client -> Sending packet 2 (91 bytes) for connection b42ad724d7ccef1f876b5176c9, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 205d574a44f085ef07, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:55 client -> Sending packet 3 (91 bytes) for connection b42ad724d7ccef1f876b5176c9, Handshake 2025/04/30 12:06:55 client Long Header{Type: Handshake, DestConnectionID: 205d574a44f085ef07, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:56 client <- Reading packet 10 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:56 client Dropping Handshake keys. 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 205dd654395b1b9917, StatelessResetToken: 0xb24a2599a29133b9b8ef0064230ec417} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 205dc133f752006294, StatelessResetToken: 0x350aef145a656fd0155a8770185b872a} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 205d851eda9162e618, StatelessResetToken: 0x38e16f72e8ff0932fc6f1edfa25b9267} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 439977a08b8c183d3d, StatelessResetToken: 0x39a63c9de698f614eb985fe29e4287f6} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 4399485a1209a2b875, StatelessResetToken: 0x0ad7eddca996883c6d470c6bdb42fab8} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 4399280e4f01f0a4a6, StatelessResetToken: 0xadeb2f4f708bca49488d4e21f2e22e07} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 439977b1d79ba6a734, StatelessResetToken: 0x6a1ffda10671539adce4b2b358fb3778} 2025/04/30 12:06:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:56 client -> Sending packet 5 (64 bytes) for connection b42ad724d7ccef1f876b5176c9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 439977a08b8c183d3d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 170.178µs} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client -> Sending packet 6 (55 bytes) for connection b42ad724d7ccef1f876b5176c9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 439977a08b8c183d3d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client <- Reading packet 11 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:06:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:56 client -> Sending packet 7 (31 bytes) for connection b42ad724d7ccef1f876b5176c9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 439977a08b8c183d3d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:56 client Connection b42ad724d7ccef1f876b5176c9 closed. 2025/04/30 12:06:56 Requesting https://server4:443/kcfxkpwimq. 2025/04/30 12:06:56 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:56 Increased send buffer size to 14336 kiB 2025/04/30 12:06:56 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:56 Created qlog file: /logs/qlog/03eecd68c016f69492da2a8f5c8035f637426a.sqlog 2025/04/30 12:06:56 client Starting new connection to server4 ([::]:47494 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 03eecd68c016f69492da2a8f5c8035f637426a, version v1 2025/04/30 12:06:56 Adding connection ID (empty). 2025/04/30 12:06:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:56 client -> Sending packet 0 (1280 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a, Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: 03eecd68c016f69492da2a8f5c8035f637426a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:06:56 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:56 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 58348b18aa4a803250, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:56 client Received first packet. Switching destination connection ID to: 58348b18aa4a803250 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:06:56 client newly acked packets (1): [0] 2025/04/30 12:06:56 client updated RTT: 33.14229ms (σ: 16.571145ms) 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:56 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:56 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 58348b18aa4a803250, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/04/30 12:06:56 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 03eecd68c016f69492da2a8f5c8035f637426a, InitialSourceConnectionID: 58348b18aa4a803250, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xd1f5b652da9fdb4a5ac961e1395c3295} 2025/04/30 12:06:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: 58348b18aa4a803250, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: 58348b18aa4a803250, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:56 client Dropping Initial keys. 2025/04/30 12:06:56 client -> Sending packet 1 (41 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a, Handshake 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: 58348b18aa4a803250, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:56 client -> Sending packet 0 (47 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 58348b18aa4a803250, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:56 client Peer doesn't await address validation any longer. 2025/04/30 12:06:56 client newly acked packets (1): [0] 2025/04/30 12:06:56 client updated RTT: 33.09ms (σ: 12.531ms) 2025/04/30 12:06:56 client ECN capability confirmed. 2025/04/30 12:06:56 client Canceling loss detection timer. 2025/04/30 12:06:56 client Dropping Handshake keys. 2025/04/30 12:06:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5834bfb0049eeb077c, StatelessResetToken: 0x6036f4b32eef56b0329fe810ed5c3a8b} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 583459c9d52fa9660d, StatelessResetToken: 0xd3ef6cdab17d342302b3643e2a2080c4} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5834c332377258802d, StatelessResetToken: 0xf3498597485209637d166f96a656e638} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f3d4fdfc314db2fcb5, StatelessResetToken: 0x12558343f994632d9f36f50478597cea} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: f3d4345a97e6fb3dfd, StatelessResetToken: 0xcca9b1659f4d67bbff2e835923e3309f} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: f3d477a7e98bf56064, StatelessResetToken: 0xf03106ffae51f0a59a3bca4794afc8fc} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: f3d469d9c195e918b6, StatelessResetToken: 0x79471bf51cd1ab8a441852ad12dcd20d} 2025/04/30 12:06:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:56 client -> Sending packet 1 (41 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: f3d4fdfc314db2fcb5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 174.756µs} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:56 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.PingFrame{} 2025/04/30 12:06:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:56 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:56 client -> Sending packet 2 (33 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: f3d4fdfc314db2fcb5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 125.965µs} 2025/04/30 12:06:56 client <- Reading packet 6 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.PingFrame{} 2025/04/30 12:06:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:56 client -> Sending packet 3 (35 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: f3d4fdfc314db2fcb5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 67.776µs} 2025/04/30 12:06:56 client <- Reading packet 8 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.PingFrame{} 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:06:56 client newly acked packets (1): [1] 2025/04/30 12:06:56 client Canceling loss detection timer. 2025/04/30 12:06:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:56 client Ignoring all packets below 3. 2025/04/30 12:06:56 client -> Sending packet 4 (37 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: f3d4fdfc314db2fcb5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 109.845µs} 2025/04/30 12:06:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:56 client -> Sending packet 5 (31 bytes) for connection 03eecd68c016f69492da2a8f5c8035f637426a, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: f3d4fdfc314db2fcb5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:56 client Connection 03eecd68c016f69492da2a8f5c8035f637426a closed. 2025/04/30 12:06:56 Requesting https://server4:443/bofvufxesk. 2025/04/30 12:06:56 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:56 Increased send buffer size to 14336 kiB 2025/04/30 12:06:56 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:56 Created qlog file: /logs/qlog/87bdfc7584ae6a6e806b18e9d310f4.sqlog 2025/04/30 12:06:56 client Starting new connection to server4 ([::]:46174 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 87bdfc7584ae6a6e806b18e9d310f4, version v1 2025/04/30 12:06:56 Adding connection ID (empty). 2025/04/30 12:06:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:56 client -> Sending packet 0 (1280 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: 87bdfc7584ae6a6e806b18e9d310f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:06:56 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:56 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cad68aa08df89c9895, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:56 client Received first packet. Switching destination connection ID to: cad68aa08df89c9895 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:56 client newly acked packets (1): [0] 2025/04/30 12:06:56 client updated RTT: 33.012944ms (σ: 16.506472ms) 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:56 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:56 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cad68aa08df89c9895, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/04/30 12:06:56 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 87bdfc7584ae6a6e806b18e9d310f4, InitialSourceConnectionID: cad68aa08df89c9895, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xb4555bfc2c6631e49cb6e20461ec454c} 2025/04/30 12:06:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: cad68aa08df89c9895, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: cad68aa08df89c9895, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:56 client Dropping Initial keys. 2025/04/30 12:06:56 client -> Sending packet 1 (41 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, Handshake 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: cad68aa08df89c9895, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:56 client -> Sending packet 0 (47 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: cad68aa08df89c9895, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:56 client Dropping Handshake keys. 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cad6b091e3e9c51e41, StatelessResetToken: 0x52c62ccafa5d3507a275f41b9d646113} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cad6b5c630782b39bd, StatelessResetToken: 0x16c19ea5f0e7e7c621823c15758e6fc8} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cad6b0772a8c84694a, StatelessResetToken: 0xb3547e21b56e7baa436c2afac52f84be} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 11c23e7b426e99e79b, StatelessResetToken: 0x827eee18e241dc5a316bc1de7e3643b2} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 11c28dbc5da536badc, StatelessResetToken: 0x1298478fcdc08df8367ecae8d86d998e} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 11c276db012a03538f, StatelessResetToken: 0x295748c67fd4615d6e79fffe0fed8c83} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 11c2338c53fad09612, StatelessResetToken: 0x9f2e1917362bb6feaec65c1a43213eae} 2025/04/30 12:06:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:56 client -> Sending packet 1 (41 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 11c23e7b426e99e79b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 157.384µs} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:56 client <- Reading packet 5 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:56 client newly acked packets (1): [1] 2025/04/30 12:06:56 client updated RTT: 35.858ms (σ: 18.073ms) 2025/04/30 12:06:56 client ECN capability confirmed. 2025/04/30 12:06:56 client lost packet 0 (time threshold) 2025/04/30 12:06:56 client Canceling loss detection timer. 2025/04/30 12:06:56 client Ignoring all packets below 3. 2025/04/30 12:06:56 client -> Sending packet 2 (47 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 11c23e7b426e99e79b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:56 client -> Sending packet 4 (47 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 11c23e7b426e99e79b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client -> Sending packet 5 (47 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 11c23e7b426e99e79b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client -> Sending packet 6 (1366 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 11c23e7b426e99e79b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.PingFrame{} 2025/04/30 12:06:56 client <- Reading packet 7 (36 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:06:56 client <- &wire.MaxDataFrame{MaximumData: 16777233} 2025/04/30 12:06:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:56 client -> Sending packet 7 (35 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 11c23e7b426e99e79b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 85.439µs} 2025/04/30 12:06:56 client <- Reading packet 8 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:56 client -> Sending packet 8 (31 bytes) for connection 87bdfc7584ae6a6e806b18e9d310f4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 11c23e7b426e99e79b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:56 client Connection 87bdfc7584ae6a6e806b18e9d310f4 closed. 2025/04/30 12:06:56 Requesting https://server4:443/dicpearxwa. 2025/04/30 12:06:56 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:56 Increased send buffer size to 14336 kiB 2025/04/30 12:06:56 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:56 Created qlog file: /logs/qlog/5ce2a94664d08d94248d18b49375.sqlog 2025/04/30 12:06:56 client Starting new connection to server4 ([::]:53443 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5ce2a94664d08d94248d18b49375, version v1 2025/04/30 12:06:56 Adding connection ID (empty). 2025/04/30 12:06:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:56 client -> Sending packet 0 (1280 bytes) for connection 5ce2a94664d08d94248d18b49375, Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: 5ce2a94664d08d94248d18b49375, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:06:56 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:56 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 42823c3031f3325ae1, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:56 client Received first packet. Switching destination connection ID to: 42823c3031f3325ae1 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:56 client newly acked packets (1): [0] 2025/04/30 12:06:56 client updated RTT: 33.071226ms (σ: 16.535613ms) 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:56 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:56 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 42823c3031f3325ae1, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/04/30 12:06:56 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5ce2a94664d08d94248d18b49375, InitialSourceConnectionID: 42823c3031f3325ae1, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe2bc768915e9563d2ad88e1171f7c7c0} 2025/04/30 12:06:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5ce2a94664d08d94248d18b49375 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: 42823c3031f3325ae1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: 42823c3031f3325ae1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:56 client Dropping Initial keys. 2025/04/30 12:06:56 client -> Sending packet 1 (88 bytes) for connection 5ce2a94664d08d94248d18b49375, Handshake 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: 42823c3031f3325ae1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:56 client Short Header{DestConnectionID: 42823c3031f3325ae1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.PingFrame{} 2025/04/30 12:06:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:56 client -> Sending packet 1 (33 bytes) for connection 5ce2a94664d08d94248d18b49375, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 42823c3031f3325ae1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 65.493µs} 2025/04/30 12:06:56 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:56 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:56 client -> Sending packet 2 (34 bytes) for connection 5ce2a94664d08d94248d18b49375, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 42823c3031f3325ae1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.251833ms} 2025/04/30 12:06:56 client <- Reading packet 6 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:56 client Peer doesn't await address validation any longer. 2025/04/30 12:06:56 client newly acked packets (1): [0] 2025/04/30 12:06:56 client Canceling loss detection timer. 2025/04/30 12:06:56 client Dropping Handshake keys. 2025/04/30 12:06:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4282f747a5f4a8b3b8, StatelessResetToken: 0xfe0422a9a29b258defbd28839ea4e607} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 42827b859b6cff73f0, StatelessResetToken: 0xe681d9135a2e4f30f2fe7630b78f7517} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4282f8b4fae6172828, StatelessResetToken: 0x4affbdee0267f216beb8f2baa8e0586d} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 79f9385b4452c3576d, StatelessResetToken: 0xcee0acca4768914126d284279b74c84d} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 79f9ef8d68190262f6, StatelessResetToken: 0xc02f14feee2ffec0d31492eef6e7059d} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 79f9d93d6f53d91609, StatelessResetToken: 0xf7d4de864844fb93350e6535dc7fb7bb} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 79f92f1f3ce81a6c76, StatelessResetToken: 0xdaa8251e3312892581b5f3c4670c4165} 2025/04/30 12:06:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:56 client -> Sending packet 3 (43 bytes) for connection 5ce2a94664d08d94248d18b49375, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 79f9385b4452c3576d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 152.525µs} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:56 client <- Reading packet 7 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.PingFrame{} 2025/04/30 12:06:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:56 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:56 client -> Sending packet 4 (36 bytes) for connection 5ce2a94664d08d94248d18b49375, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 79f9385b4452c3576d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 25.289141ms} 2025/04/30 12:06:56 client <- Reading packet 8 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:06:56 client newly acked packets (1): [3] 2025/04/30 12:06:56 client updated RTT: 32.869ms (σ: 12.804ms) 2025/04/30 12:06:56 client ECN capability confirmed. 2025/04/30 12:06:56 client Canceling loss detection timer. 2025/04/30 12:06:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:56 client Ignoring all packets below 7. 2025/04/30 12:06:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:56 client -> Sending packet 5 (31 bytes) for connection 5ce2a94664d08d94248d18b49375, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 79f9385b4452c3576d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:56 client Connection 5ce2a94664d08d94248d18b49375 closed. 2025/04/30 12:06:56 Requesting https://server4:443/gjmjnjgbra. 2025/04/30 12:06:56 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:56 Increased send buffer size to 14336 kiB 2025/04/30 12:06:56 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:56 Created qlog file: /logs/qlog/a75bec682706e4fe78574332acff.sqlog 2025/04/30 12:06:56 client Starting new connection to server4 ([::]:56649 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a75bec682706e4fe78574332acff, version v1 2025/04/30 12:06:56 Adding connection ID (empty). 2025/04/30 12:06:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:56 client -> Sending packet 0 (1280 bytes) for connection a75bec682706e4fe78574332acff, Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: a75bec682706e4fe78574332acff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:06:56 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:56 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cb06a2f4470938590b, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:56 client Received first packet. Switching destination connection ID to: cb06a2f4470938590b 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:56 client newly acked packets (1): [0] 2025/04/30 12:06:56 client updated RTT: 33.056073ms (σ: 16.528036ms) 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:56 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:56 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cb06a2f4470938590b, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:06:56 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a75bec682706e4fe78574332acff, InitialSourceConnectionID: cb06a2f4470938590b, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x7c2a119905728e41ca3a35d8399fde08} 2025/04/30 12:06:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a75bec682706e4fe78574332acff 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: cb06a2f4470938590b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: cb06a2f4470938590b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:56 client Dropping Initial keys. 2025/04/30 12:06:56 client -> Sending packet 1 (88 bytes) for connection a75bec682706e4fe78574332acff, Handshake 2025/04/30 12:06:56 client Long Header{Type: Handshake, DestConnectionID: cb06a2f4470938590b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:56 client Short Header{DestConnectionID: cb06a2f4470938590b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:56 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:56 client Peer doesn't await address validation any longer. 2025/04/30 12:06:56 client newly acked packets (1): [0] 2025/04/30 12:06:56 client updated RTT: 33.011ms (σ: 12.484ms) 2025/04/30 12:06:56 client Canceling loss detection timer. 2025/04/30 12:06:56 client Dropping Handshake keys. 2025/04/30 12:06:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb06024860e2ee091b, StatelessResetToken: 0xeefcec114b6ace5063c0b653eb933b69} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cb0636292b2479e037, StatelessResetToken: 0xa80ef633545c415adf0de76427557a34} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb0657110c34698fa0, StatelessResetToken: 0xa761772d195beefb1be295cfc8dbe220} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 21a60a45353e143065, StatelessResetToken: 0xcfadddcd1b9a821e2eb8d453225da4a8} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 21a6b2a019cd948cc5, StatelessResetToken: 0x49fcd7c407ca1d738f1155764350106d} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 21a6d805fa1b863e04, StatelessResetToken: 0x01321a5815d58fbdb42ddeed5576552f} 2025/04/30 12:06:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 21a6dc720df3b53817, StatelessResetToken: 0xe00474a22b26af3c48d641cc6c031117} 2025/04/30 12:06:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:56 client -> Sending packet 1 (41 bytes) for connection a75bec682706e4fe78574332acff, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 21a60a45353e143065, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 182.661µs} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:56 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.PingFrame{} 2025/04/30 12:06:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:56 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:56 client -> Sending packet 2 (33 bytes) for connection a75bec682706e4fe78574332acff, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 21a60a45353e143065, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 47.269µs} 2025/04/30 12:06:56 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:56 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:56 client -> Sending packet 3 (31 bytes) for connection a75bec682706e4fe78574332acff, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:56 client Short Header{DestConnectionID: 21a60a45353e143065, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:56 client Connection a75bec682706e4fe78574332acff closed. 2025/04/30 12:06:56 Requesting https://server4:443/hxwdgwuapk. 2025/04/30 12:06:56 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:56 Increased send buffer size to 14336 kiB 2025/04/30 12:06:56 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:56 Created qlog file: /logs/qlog/c0f2e17f627381a7602098d8.sqlog 2025/04/30 12:06:56 client Starting new connection to server4 ([::]:46653 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c0f2e17f627381a7602098d8, version v1 2025/04/30 12:06:56 Adding connection ID (empty). 2025/04/30 12:06:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:56 client -> Sending packet 0 (1280 bytes) for connection c0f2e17f627381a7602098d8, Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: c0f2e17f627381a7602098d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:06:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:06:56 client -> Sending packet 1 (1280 bytes) for connection c0f2e17f627381a7602098d8, Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: c0f2e17f627381a7602098d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:06:56 client -> Sending packet 2 (1280 bytes) for connection c0f2e17f627381a7602098d8, Initial 2025/04/30 12:06:56 client Long Header{Type: Initial, DestConnectionID: c0f2e17f627381a7602098d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:06:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:06:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:06:57 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:06:57 client <- Reading packet 2 (133 bytes) for connection (empty), Initial 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40052be645818ec1da, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:06:57 client Received first packet. Switching destination connection ID to: 40052be645818ec1da 2025/04/30 12:06:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:57 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:06:57 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40052be645818ec1da, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:06:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 12:06:57 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c0f2e17f627381a7602098d8, InitialSourceConnectionID: 40052be645818ec1da, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x58f028eafdcfe5c5018a4551a03a824e} 2025/04/30 12:06:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c0f2e17f627381a7602098d8 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: 40052be645818ec1da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: 40052be645818ec1da, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:57 client Dropping Initial keys. 2025/04/30 12:06:57 client -> Sending packet 1 (41 bytes) for connection c0f2e17f627381a7602098d8, Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: 40052be645818ec1da, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 12:06:57 client -> Sending packet 0 (47 bytes) for connection c0f2e17f627381a7602098d8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 40052be645818ec1da, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:57 client -> Sending packet 2 (91 bytes) for connection c0f2e17f627381a7602098d8, Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: 40052be645818ec1da, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:57 client -> Sending packet 3 (91 bytes) for connection c0f2e17f627381a7602098d8, Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: 40052be645818ec1da, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:57 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.PingFrame{} 2025/04/30 12:06:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:57 client -> Sending packet 1 (33 bytes) for connection c0f2e17f627381a7602098d8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 40052be645818ec1da, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 65.903µs} 2025/04/30 12:06:57 client <- Reading packet 7 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:57 client -> Sending packet 2 (35 bytes) for connection c0f2e17f627381a7602098d8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 40052be645818ec1da, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 53.65µs} 2025/04/30 12:06:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:57 client -> Sending packet 4 (71 bytes) for connection c0f2e17f627381a7602098d8, Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: 40052be645818ec1da, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:06:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:57 client Short Header{DestConnectionID: 40052be645818ec1da, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:57 client Connection c0f2e17f627381a7602098d8 closed. 2025/04/30 12:06:57 Requesting https://server4:443/zhgupjjprs. 2025/04/30 12:06:57 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:57 Increased send buffer size to 14336 kiB 2025/04/30 12:06:57 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:57 Created qlog file: /logs/qlog/bcbd9448bc6d6bbfc7b535edc9.sqlog 2025/04/30 12:06:57 client Starting new connection to server4 ([::]:51167 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bcbd9448bc6d6bbfc7b535edc9, version v1 2025/04/30 12:06:57 Adding connection ID (empty). 2025/04/30 12:06:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:57 client -> Sending packet 0 (1280 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, Initial 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: bcbd9448bc6d6bbfc7b535edc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 12:06:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:06:57 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:57 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c0faa68325d9c6d00e, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:57 client Received first packet. Switching destination connection ID to: c0faa68325d9c6d00e 2025/04/30 12:06:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:06:57 client newly acked packets (1): [0] 2025/04/30 12:06:57 client updated RTT: 33.037879ms (σ: 16.518939ms) 2025/04/30 12:06:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:57 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:57 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c0faa68325d9c6d00e, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 12:06:57 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bcbd9448bc6d6bbfc7b535edc9, InitialSourceConnectionID: c0faa68325d9c6d00e, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf334c1ce1527316486ad2852af63f6ec} 2025/04/30 12:06:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bcbd9448bc6d6bbfc7b535edc9 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: c0faa68325d9c6d00e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: c0faa68325d9c6d00e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:57 client Dropping Initial keys. 2025/04/30 12:06:57 client -> Sending packet 1 (41 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: c0faa68325d9c6d00e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:57 client -> Sending packet 0 (47 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: c0faa68325d9c6d00e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:57 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.PingFrame{} 2025/04/30 12:06:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:57 client -> Sending packet 1 (33 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: c0faa68325d9c6d00e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 66.484µs} 2025/04/30 12:06:57 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:57 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:57 client -> Sending packet 2 (34 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: c0faa68325d9c6d00e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.223455ms} 2025/04/30 12:06:57 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:57 client Peer doesn't await address validation any longer. 2025/04/30 12:06:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:57 client Dropping Handshake keys. 2025/04/30 12:06:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c0fa3accd07ab11da3, StatelessResetToken: 0x17677a8087123d820c03305786c74a50} 2025/04/30 12:06:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c0fa9b0abba81ba322, StatelessResetToken: 0xd36e18609a314e702e786ba1620bc2ac} 2025/04/30 12:06:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c0fa9b0c5e65b66ea4, StatelessResetToken: 0xe8df4ff3e80d4b4c3b27c01d660b3026} 2025/04/30 12:06:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 69115f336250306135, StatelessResetToken: 0x1d5203ae41019b2b6c98212ee62f7f8c} 2025/04/30 12:06:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 691180c4038b0080eb, StatelessResetToken: 0xfa1c89fff199ea7566b792107ce294b9} 2025/04/30 12:06:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 6911b8cb8ea1640a72, StatelessResetToken: 0x80768f1e1dacf82a32e3822bfa5426ed} 2025/04/30 12:06:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 6911baea6bbfb95f67, StatelessResetToken: 0xaf9dfb06c1de5f4cfe474302f258d05a} 2025/04/30 12:06:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:57 client -> Sending packet 3 (41 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 157.364µs} 2025/04/30 12:06:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:57 client <- Reading packet 6 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.PingFrame{} 2025/04/30 12:06:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:57 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:57 client -> Sending packet 4 (34 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 25.331814ms} 2025/04/30 12:06:57 client <- Reading packet 7 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 25.088ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:06:57 client newly acked packets (1): [3] 2025/04/30 12:06:57 client updated RTT: 35.896ms (σ: 18.106ms) 2025/04/30 12:06:57 client ECN capability confirmed. 2025/04/30 12:06:57 client lost packet 0 (time threshold) 2025/04/30 12:06:57 client Canceling loss detection timer. 2025/04/30 12:06:57 client Ignoring all packets below 6. 2025/04/30 12:06:57 client -> Sending packet 5 (47 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:57 client <- Reading packet 8 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.PingFrame{} 2025/04/30 12:06:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:57 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:57 client -> Sending packet 6 (34 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 25.228697ms} 2025/04/30 12:06:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:57 client -> Sending packet 8 (47 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:57 client -> Sending packet 9 (47 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:57 client -> Sending packet 10 (1366 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.PingFrame{} 2025/04/30 12:06:57 client <- Reading packet 9 (36 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:06:57 client <- &wire.MaxDataFrame{MaximumData: 16777233} 2025/04/30 12:06:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:57 client <- Reading packet 10 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:57 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:57 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 4, Smallest: 3}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:06:57 client newly acked packets (1): [9] 2025/04/30 12:06:57 client updated RTT: 35.374ms (σ: 14.623ms) 2025/04/30 12:06:57 client Canceling loss detection timer. 2025/04/30 12:06:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:57 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:57 client -> Sending packet 11 (33 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, DelayTime: 81.331µs} 2025/04/30 12:06:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:57 client -> Sending packet 12 (31 bytes) for connection bcbd9448bc6d6bbfc7b535edc9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:57 client Short Header{DestConnectionID: 69115f336250306135, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:57 client Connection bcbd9448bc6d6bbfc7b535edc9 closed. 2025/04/30 12:06:57 Requesting https://server4:443/hggfazmgnh. 2025/04/30 12:06:57 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:57 Increased send buffer size to 14336 kiB 2025/04/30 12:06:57 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:57 Created qlog file: /logs/qlog/ab5c8b3fa108d75066d38cd626.sqlog 2025/04/30 12:06:57 client Starting new connection to server4 ([::]:54834 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ab5c8b3fa108d75066d38cd626, version v1 2025/04/30 12:06:57 Adding connection ID (empty). 2025/04/30 12:06:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:57 client -> Sending packet 0 (1280 bytes) for connection ab5c8b3fa108d75066d38cd626, Initial 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: ab5c8b3fa108d75066d38cd626, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:06:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:06:57 client -> Sending packet 1 (1280 bytes) for connection ab5c8b3fa108d75066d38cd626, Initial 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: ab5c8b3fa108d75066d38cd626, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:06:57 client -> Sending packet 2 (1280 bytes) for connection ab5c8b3fa108d75066d38cd626, Initial 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: ab5c8b3fa108d75066d38cd626, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:06:57 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:57 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3156a43e7783fa6870, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:57 client Received first packet. Switching destination connection ID to: 3156a43e7783fa6870 2025/04/30 12:06:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 12:06:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:57 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:57 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3156a43e7783fa6870, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:06:57 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ab5c8b3fa108d75066d38cd626, InitialSourceConnectionID: 3156a43e7783fa6870, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x84fc401a2ec631641b30dda5dcf255e6} 2025/04/30 12:06:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ab5c8b3fa108d75066d38cd626 2025/04/30 12:06:57 client Long Header{Type: Initial, DestConnectionID: 3156a43e7783fa6870, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: 3156a43e7783fa6870, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:57 client Dropping Initial keys. 2025/04/30 12:06:57 client -> Sending packet 1 (88 bytes) for connection ab5c8b3fa108d75066d38cd626, Handshake 2025/04/30 12:06:57 client Long Header{Type: Handshake, DestConnectionID: 3156a43e7783fa6870, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:57 client Short Header{DestConnectionID: 3156a43e7783fa6870, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:57 client Dropping %!s(logging.PacketType=0) packet (1220 bytes) because we already dropped the keys. 2025/04/30 12:06:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:58 client -> Sending packet 2 (91 bytes) for connection ab5c8b3fa108d75066d38cd626, Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 3156a43e7783fa6870, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:58 client -> Sending packet 3 (91 bytes) for connection ab5c8b3fa108d75066d38cd626, Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 3156a43e7783fa6870, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:58 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:58 client Dropping Handshake keys. 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 31566a8779e9f57534, StatelessResetToken: 0xb24dd4bec80cc0693c521327bb7270d7} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3156fec32edc3d8f9e, StatelessResetToken: 0xe146a4ea862109f78a76929cd126560c} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3156160093e162eb3b, StatelessResetToken: 0xde21f282e875459028f58520ceed4184} 2025/04/30 12:06:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:58 client -> Sending packet 2 (54 bytes) for connection ab5c8b3fa108d75066d38cd626, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 31566a8779e9f57534, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 116.848µs} 2025/04/30 12:06:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:58 client -> Sending packet 3 (49 bytes) for connection ab5c8b3fa108d75066d38cd626, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 31566a8779e9f57534, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:58 client -> Sending packet 4 (1366 bytes) for connection ab5c8b3fa108d75066d38cd626, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 31566a8779e9f57534, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.PingFrame{} 2025/04/30 12:06:58 client <- Reading packet 6 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.PingFrame{} 2025/04/30 12:06:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:58 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:58 client -> Sending packet 5 (34 bytes) for connection ab5c8b3fa108d75066d38cd626, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 31566a8779e9f57534, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 25.275443ms} 2025/04/30 12:06:58 client <- Reading packet 8 (58 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:58 client newly acked packets (1): [3] 2025/04/30 12:06:58 client updated RTT: 30.762726ms (σ: 15.381363ms) 2025/04/30 12:06:58 client ECN capability confirmed. 2025/04/30 12:06:58 client Canceling loss detection timer. 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 3156e6e9561c1e49be, StatelessResetToken: 0x97fd4d9b282a4b3f1e471fcd040ae0a6} 2025/04/30 12:06:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:58 client -> Sending packet 6 (35 bytes) for connection ab5c8b3fa108d75066d38cd626, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 31566a8779e9f57534, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 151.75µs} 2025/04/30 12:06:58 client <- Reading packet 9 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:58 client -> Sending packet 7 (31 bytes) for connection ab5c8b3fa108d75066d38cd626, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 31566a8779e9f57534, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:58 client Connection ab5c8b3fa108d75066d38cd626 closed. 2025/04/30 12:06:58 Requesting https://server4:443/hwbbanioxx. 2025/04/30 12:06:58 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:58 Increased send buffer size to 14336 kiB 2025/04/30 12:06:58 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:58 Created qlog file: /logs/qlog/cda969b98e33eb9581177d0d.sqlog 2025/04/30 12:06:58 client Starting new connection to server4 ([::]:45177 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cda969b98e33eb9581177d0d, version v1 2025/04/30 12:06:58 Adding connection ID (empty). 2025/04/30 12:06:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:58 client -> Sending packet 0 (1280 bytes) for connection cda969b98e33eb9581177d0d, Initial 2025/04/30 12:06:58 client Long Header{Type: Initial, DestConnectionID: cda969b98e33eb9581177d0d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:06:58 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:58 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6a177c3cc3ab6bcedb, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:58 client Received first packet. Switching destination connection ID to: 6a177c3cc3ab6bcedb 2025/04/30 12:06:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:58 client newly acked packets (1): [0] 2025/04/30 12:06:58 client updated RTT: 32.994728ms (σ: 16.497364ms) 2025/04/30 12:06:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:58 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:58 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:58 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:58 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6a177c3cc3ab6bcedb, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 12:06:58 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:58 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cda969b98e33eb9581177d0d, InitialSourceConnectionID: 6a177c3cc3ab6bcedb, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x16dbc49016de3ece567460551a2b7492} 2025/04/30 12:06:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cda969b98e33eb9581177d0d 2025/04/30 12:06:58 client Long Header{Type: Initial, DestConnectionID: 6a177c3cc3ab6bcedb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 6a177c3cc3ab6bcedb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:58 client Dropping Initial keys. 2025/04/30 12:06:58 client -> Sending packet 1 (41 bytes) for connection cda969b98e33eb9581177d0d, Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 6a177c3cc3ab6bcedb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:58 client -> Sending packet 0 (47 bytes) for connection cda969b98e33eb9581177d0d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 6a177c3cc3ab6bcedb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:58 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:58 client Dropping Handshake keys. 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6a17558a952d1025e8, StatelessResetToken: 0x1fecac95adf3594d440c83e20b963d28} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a171930ddc1344f6d, StatelessResetToken: 0xa5eb16b0befb9b93ea1149511a046f0a} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a171fffbcdc46cbc2, StatelessResetToken: 0x281010c22f7f2645db71d475ddbf6341} 2025/04/30 12:06:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:58 client -> Sending packet 1 (35 bytes) for connection cda969b98e33eb9581177d0d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 6a17558a952d1025e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 100.357µs} 2025/04/30 12:06:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:58 client <- Reading packet 5 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:58 client newly acked packets (1): [0] 2025/04/30 12:06:58 client updated RTT: 33.222ms (σ: 12.83ms) 2025/04/30 12:06:58 client ECN capability confirmed. 2025/04/30 12:06:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:58 client -> Sending packet 2 (35 bytes) for connection cda969b98e33eb9581177d0d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 6a17558a952d1025e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 96.471µs} 2025/04/30 12:06:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:58 client -> Sending packet 3 (31 bytes) for connection cda969b98e33eb9581177d0d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 6a17558a952d1025e8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:58 client Connection cda969b98e33eb9581177d0d closed. 2025/04/30 12:06:58 Requesting https://server4:443/pzvauosazb. 2025/04/30 12:06:58 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:58 Increased send buffer size to 14336 kiB 2025/04/30 12:06:58 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:58 Created qlog file: /logs/qlog/2acd8f98801dd3e6be.sqlog 2025/04/30 12:06:58 client Starting new connection to server4 ([::]:46393 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2acd8f98801dd3e6be, version v1 2025/04/30 12:06:58 Adding connection ID (empty). 2025/04/30 12:06:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:58 client -> Sending packet 0 (1280 bytes) for connection 2acd8f98801dd3e6be, Initial 2025/04/30 12:06:58 client Long Header{Type: Initial, DestConnectionID: 2acd8f98801dd3e6be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 12:06:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:06:58 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:58 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000b7a92e0e08bd8f8, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:58 client Received first packet. Switching destination connection ID to: 000b7a92e0e08bd8f8 2025/04/30 12:06:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:58 client newly acked packets (1): [0] 2025/04/30 12:06:58 client updated RTT: 33.011688ms (σ: 16.505844ms) 2025/04/30 12:06:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:58 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:58 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:58 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:58 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000b7a92e0e08bd8f8, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:06:58 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:58 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2acd8f98801dd3e6be, InitialSourceConnectionID: 000b7a92e0e08bd8f8, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x3fac206a450ff18750ebe3db6393a80b} 2025/04/30 12:06:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2acd8f98801dd3e6be 2025/04/30 12:06:58 client Long Header{Type: Initial, DestConnectionID: 000b7a92e0e08bd8f8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 000b7a92e0e08bd8f8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:58 client Dropping Initial keys. 2025/04/30 12:06:58 client -> Sending packet 1 (41 bytes) for connection 2acd8f98801dd3e6be, Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 000b7a92e0e08bd8f8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:58 client -> Sending packet 0 (47 bytes) for connection 2acd8f98801dd3e6be, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: 000b7a92e0e08bd8f8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:06:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:58 client -> Sending packet 2 (91 bytes) for connection 2acd8f98801dd3e6be, Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 000b7a92e0e08bd8f8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:58 client -> Sending packet 3 (91 bytes) for connection 2acd8f98801dd3e6be, Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 000b7a92e0e08bd8f8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:06:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:06:58 client -> Sending packet 4 (91 bytes) for connection 2acd8f98801dd3e6be, Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 000b7a92e0e08bd8f8, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:58 client -> Sending packet 5 (91 bytes) for connection 2acd8f98801dd3e6be, Handshake 2025/04/30 12:06:58 client Long Header{Type: Handshake, DestConnectionID: 000b7a92e0e08bd8f8, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:58 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:58 client Peer doesn't await address validation any longer. 2025/04/30 12:06:58 client newly acked packets (1): [0] 2025/04/30 12:06:58 client updated RTT: 70.155ms (σ: 86.667ms) 2025/04/30 12:06:58 client ECN capability confirmed. 2025/04/30 12:06:58 client Canceling loss detection timer. 2025/04/30 12:06:58 client Dropping Handshake keys. 2025/04/30 12:06:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000b09e100b9005550, StatelessResetToken: 0xa5fe9fbe8f797ba29c956b2ba0bed77c} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000b653ae438f27bfc, StatelessResetToken: 0x652165bbc79a190c933abcee483c3681} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000b34d9b5622a91c3, StatelessResetToken: 0xec0d9cc59138f6955daa162c8a2f62f7} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: ca2f79b2084dbfd73a, StatelessResetToken: 0x8432f8df614cddb37f34ba920849e9c8} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: ca2f08cf78ce06206c, StatelessResetToken: 0x57a468a04824ec9fa3bb17eb002df814} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: ca2f9f2bf8c2d9520c, StatelessResetToken: 0xb277cacc58637671705759d893bb7142} 2025/04/30 12:06:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: ca2f4dd21ec572892b, StatelessResetToken: 0xc7ff92b0e9715da6ba83c180e5e55b35} 2025/04/30 12:06:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:58 client -> Sending packet 1 (41 bytes) for connection 2acd8f98801dd3e6be, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: ca2f79b2084dbfd73a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 158.406µs} 2025/04/30 12:06:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:58 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.PingFrame{} 2025/04/30 12:06:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:58 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:58 client -> Sending packet 2 (34 bytes) for connection 2acd8f98801dd3e6be, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: ca2f79b2084dbfd73a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.234133ms} 2025/04/30 12:06:58 client <- Reading packet 6 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.088ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:06:58 client newly acked packets (1): [1] 2025/04/30 12:06:58 client updated RTT: 68.366ms (σ: 68.577ms) 2025/04/30 12:06:58 client Canceling loss detection timer. 2025/04/30 12:06:58 client Ignoring all packets below 3. 2025/04/30 12:06:58 client <- Reading packet 7 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.PingFrame{} 2025/04/30 12:06:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:58 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:58 client -> Sending packet 3 (36 bytes) for connection 2acd8f98801dd3e6be, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: ca2f79b2084dbfd73a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 25.248105ms} 2025/04/30 12:06:58 client <- Reading packet 8 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 54.016ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:06:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:58 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/04/30 12:06:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:58 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:58 client -> Sending packet 4 (36 bytes) for connection 2acd8f98801dd3e6be, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: ca2f79b2084dbfd73a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 25.324453ms} 2025/04/30 12:06:58 client <- Reading packet 11 (181 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:58 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 870, Data length: 154, Offset + Data length: 1024} 2025/04/30 12:06:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:58 client -> Sending packet 5 (37 bytes) for connection 2acd8f98801dd3e6be, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:58 client Short Header{DestConnectionID: ca2f79b2084dbfd73a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:58 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 3, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 73.387µs} 2025/04/30 12:06:59 client <- Reading packet 12 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.PingFrame{} 2025/04/30 12:06:59 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:06:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 861, Data length: 9, Offset + Data length: 870} 2025/04/30 12:06:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:59 client -> Sending packet 6 (1366 bytes) for connection 2acd8f98801dd3e6be, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: ca2f79b2084dbfd73a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.PingFrame{} 2025/04/30 12:06:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:59 client -> Sending packet 7 (31 bytes) for connection 2acd8f98801dd3e6be, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: ca2f79b2084dbfd73a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:59 client Connection 2acd8f98801dd3e6be closed. 2025/04/30 12:06:59 Requesting https://server4:443/nzhxkmnjjk. 2025/04/30 12:06:59 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:59 Increased send buffer size to 14336 kiB 2025/04/30 12:06:59 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:59 Created qlog file: /logs/qlog/06145b88b5a93c02.sqlog 2025/04/30 12:06:59 client Starting new connection to server4 ([::]:45532 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 06145b88b5a93c02, version v1 2025/04/30 12:06:59 Adding connection ID (empty). 2025/04/30 12:06:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:59 client -> Sending packet 0 (1280 bytes) for connection 06145b88b5a93c02, Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 06145b88b5a93c02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:06:59 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:59 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 684a7cd5dfab01019a, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:59 client Received first packet. Switching destination connection ID to: 684a7cd5dfab01019a 2025/04/30 12:06:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:59 client newly acked packets (1): [0] 2025/04/30 12:06:59 client updated RTT: 33.818104ms (σ: 16.909052ms) 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:59 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:59 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 684a7cd5dfab01019a, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 12:06:59 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 06145b88b5a93c02, InitialSourceConnectionID: 684a7cd5dfab01019a, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x0a236e9a7abc290c367334f5f12b12c8} 2025/04/30 12:06:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 06145b88b5a93c02 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 684a7cd5dfab01019a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: 684a7cd5dfab01019a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:59 client Dropping Initial keys. 2025/04/30 12:06:59 client -> Sending packet 1 (88 bytes) for connection 06145b88b5a93c02, Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: 684a7cd5dfab01019a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:59 client Short Header{DestConnectionID: 684a7cd5dfab01019a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:59 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:59 client Dropping Handshake keys. 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 684a1ecca0ac372d8b, StatelessResetToken: 0xc2ddb356702d343a6726d6297c9d0b1e} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 684a5b5854bee88fd5, StatelessResetToken: 0xc05e0c0e7f8d77664e99c6895ed0021c} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 684a0b57e32c032d8f, StatelessResetToken: 0xd4278bf0a426137757797a857f8f35b6} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: c231670156aadf6fa1, StatelessResetToken: 0xd405040423612f3446ce04b2b005f319} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: c231154088c77748db, StatelessResetToken: 0xd66a5ce3e51783ab2f7f469ec6c373cf} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: c2319c4a8bceee9c6d, StatelessResetToken: 0xb52789c672414087c1229a30a379d6fa} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: c2313b991f859193c1, StatelessResetToken: 0x846fcb682137022e86088a720e69f500} 2025/04/30 12:06:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:59 client -> Sending packet 1 (41 bytes) for connection 06145b88b5a93c02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: c231670156aadf6fa1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 189.454µs} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:59 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.PingFrame{} 2025/04/30 12:06:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:59 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:59 client -> Sending packet 2 (35 bytes) for connection 06145b88b5a93c02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: c231670156aadf6fa1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 75.991µs} 2025/04/30 12:06:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:59 client -> Sending packet 3 (31 bytes) for connection 06145b88b5a93c02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: c231670156aadf6fa1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:59 client Connection 06145b88b5a93c02 closed. 2025/04/30 12:06:59 Requesting https://server4:443/nhdfvdsvcc. 2025/04/30 12:06:59 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:59 Increased send buffer size to 14336 kiB 2025/04/30 12:06:59 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:59 Created qlog file: /logs/qlog/502419c9c43531ccfb15e9c1df9975.sqlog 2025/04/30 12:06:59 client Starting new connection to server4 ([::]:35120 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 502419c9c43531ccfb15e9c1df9975, version v1 2025/04/30 12:06:59 Adding connection ID (empty). 2025/04/30 12:06:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:59 client -> Sending packet 0 (1280 bytes) for connection 502419c9c43531ccfb15e9c1df9975, Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 502419c9c43531ccfb15e9c1df9975, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:06:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:06:59 client -> Sending packet 1 (1280 bytes) for connection 502419c9c43531ccfb15e9c1df9975, Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 502419c9c43531ccfb15e9c1df9975, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:06:59 client -> Sending packet 2 (1280 bytes) for connection 502419c9c43531ccfb15e9c1df9975, Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 502419c9c43531ccfb15e9c1df9975, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:06:59 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:59 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9288f189a05b32a1da, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:59 client Received first packet. Switching destination connection ID to: 9288f189a05b32a1da 2025/04/30 12:06:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 8µs} 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:59 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:59 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9288f189a05b32a1da, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/04/30 12:06:59 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 502419c9c43531ccfb15e9c1df9975, InitialSourceConnectionID: 9288f189a05b32a1da, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xd84bd78978ca97ddf5127c045cf1500a} 2025/04/30 12:06:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 502419c9c43531ccfb15e9c1df9975 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 9288f189a05b32a1da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: 9288f189a05b32a1da, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:59 client Dropping Initial keys. 2025/04/30 12:06:59 client -> Sending packet 1 (41 bytes) for connection 502419c9c43531ccfb15e9c1df9975, Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: 9288f189a05b32a1da, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:59 client -> Sending packet 0 (47 bytes) for connection 502419c9c43531ccfb15e9c1df9975, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: 9288f189a05b32a1da, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:59 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:59 client Dropping Handshake keys. 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92889fc3b89008bb2e, StatelessResetToken: 0xe97824c80713273f5d1c567293f72a82} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9288628a4dc24b310a, StatelessResetToken: 0x31f5b9df7f40340f651b2db8a637bdc1} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 92883112821c1cbf1e, StatelessResetToken: 0x08929d3c3d05abbd3c5a8613a54df440} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 58a44ac5267d266138, StatelessResetToken: 0x2270d8765c11d2d42d86d8c4c63800d5} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 58a4caf2c2b38634c7, StatelessResetToken: 0x88f3a45b383f9b2f678b64a1a15a0a3f} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 58a4d1d83b14f45349, StatelessResetToken: 0xecb8b1d40d616ea72b35dab8d757c2ef} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 58a4ee0958cc83b81e, StatelessResetToken: 0x8b90724914ec583120d6051b0ac24c35} 2025/04/30 12:06:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:59 client -> Sending packet 1 (1366 bytes) for connection 502419c9c43531ccfb15e9c1df9975, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: 58a44ac5267d266138, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.PingFrame{} 2025/04/30 12:06:59 client -> Sending packet 2 (41 bytes) for connection 502419c9c43531ccfb15e9c1df9975, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: 58a44ac5267d266138, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 163.786µs} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:59 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.PingFrame{} 2025/04/30 12:06:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:59 client <- Reading packet 4 (354 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:06:59 client newly acked packets (1): [0] 2025/04/30 12:06:59 client updated RTT: 33.845076ms (σ: 16.922538ms) 2025/04/30 12:06:59 client ECN capability confirmed. 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:59 client -> Sending packet 3 (33 bytes) for connection 502419c9c43531ccfb15e9c1df9975, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: 58a44ac5267d266138, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 77.344µs} 2025/04/30 12:06:59 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:59 client -> Sending packet 4 (31 bytes) for connection 502419c9c43531ccfb15e9c1df9975, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: 58a44ac5267d266138, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:59 client Connection 502419c9c43531ccfb15e9c1df9975 closed. 2025/04/30 12:06:59 Requesting https://server4:443/kkakudfdqe. 2025/04/30 12:06:59 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:59 Increased send buffer size to 14336 kiB 2025/04/30 12:06:59 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:59 Created qlog file: /logs/qlog/2fdfcbbf5525c0276ecc1f3054ab87.sqlog 2025/04/30 12:06:59 client Starting new connection to server4 ([::]:53111 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2fdfcbbf5525c0276ecc1f3054ab87, version v1 2025/04/30 12:06:59 Adding connection ID (empty). 2025/04/30 12:06:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:59 client -> Sending packet 0 (1280 bytes) for connection 2fdfcbbf5525c0276ecc1f3054ab87, Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 2fdfcbbf5525c0276ecc1f3054ab87, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:06:59 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:06:59 client <- Reading packet 2 (133 bytes) for connection (empty), Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 494ae6f267e40e7662, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:06:59 client Received first packet. Switching destination connection ID to: 494ae6f267e40e7662 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:59 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:06:59 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 494ae6f267e40e7662, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/04/30 12:06:59 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2fdfcbbf5525c0276ecc1f3054ab87, InitialSourceConnectionID: 494ae6f267e40e7662, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x793a79ea763809f5df4acb02972218a2} 2025/04/30 12:06:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2fdfcbbf5525c0276ecc1f3054ab87 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 494ae6f267e40e7662, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: 494ae6f267e40e7662, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:59 client Dropping Initial keys. 2025/04/30 12:06:59 client -> Sending packet 1 (88 bytes) for connection 2fdfcbbf5525c0276ecc1f3054ab87, Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: 494ae6f267e40e7662, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 12:06:59 client Short Header{DestConnectionID: 494ae6f267e40e7662, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:59 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.PingFrame{} 2025/04/30 12:06:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:59 client -> Sending packet 1 (33 bytes) for connection 2fdfcbbf5525c0276ecc1f3054ab87, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: 494ae6f267e40e7662, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 61.274µs} 2025/04/30 12:06:59 client <- Reading packet 6 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:59 client <- Reading packet 7 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:06:59 client -> Sending packet 2 (33 bytes) for connection 2fdfcbbf5525c0276ecc1f3054ab87, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: 494ae6f267e40e7662, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 54.712µs} 2025/04/30 12:06:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:59 client -> Sending packet 2 (71 bytes) for connection 2fdfcbbf5525c0276ecc1f3054ab87, Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: 494ae6f267e40e7662, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:06:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:59 client Short Header{DestConnectionID: 494ae6f267e40e7662, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:59 client Connection 2fdfcbbf5525c0276ecc1f3054ab87 closed. 2025/04/30 12:06:59 Requesting https://server4:443/nhopvhnduh. 2025/04/30 12:06:59 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:59 Increased send buffer size to 14336 kiB 2025/04/30 12:06:59 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:59 Created qlog file: /logs/qlog/323a026aafab4672d3101cd4.sqlog 2025/04/30 12:06:59 client Starting new connection to server4 ([::]:60044 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 323a026aafab4672d3101cd4, version v1 2025/04/30 12:06:59 Adding connection ID (empty). 2025/04/30 12:06:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:59 client -> Sending packet 0 (1280 bytes) for connection 323a026aafab4672d3101cd4, Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: 323a026aafab4672d3101cd4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 12:06:59 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:06:59 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f20d733c3542144b41, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:06:59 client Received first packet. Switching destination connection ID to: f20d733c3542144b41 2025/04/30 12:06:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:06:59 client newly acked packets (1): [0] 2025/04/30 12:06:59 client updated RTT: 32.979703ms (σ: 16.489851ms) 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:06:59 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:06:59 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f20d733c3542144b41, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 12:06:59 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:06:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 323a026aafab4672d3101cd4, InitialSourceConnectionID: f20d733c3542144b41, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x4d17cb07b595872f97262570005e9851} 2025/04/30 12:06:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 323a026aafab4672d3101cd4 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: f20d733c3542144b41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: f20d733c3542144b41, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:59 client Dropping Initial keys. 2025/04/30 12:06:59 client -> Sending packet 1 (88 bytes) for connection 323a026aafab4672d3101cd4, Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: f20d733c3542144b41, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:06:59 client Short Header{DestConnectionID: f20d733c3542144b41, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:59 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.PingFrame{} 2025/04/30 12:06:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:06:59 client -> Sending packet 1 (33 bytes) for connection 323a026aafab4672d3101cd4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: f20d733c3542144b41, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 57.608µs} 2025/04/30 12:06:59 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:06:59 client Sending ACK because the ACK timer expired. 2025/04/30 12:06:59 client -> Sending packet 2 (34 bytes) for connection 323a026aafab4672d3101cd4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: f20d733c3542144b41, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.322655ms} 2025/04/30 12:06:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:06:59 client -> Sending packet 2 (91 bytes) for connection 323a026aafab4672d3101cd4, Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: f20d733c3542144b41, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:59 client -> Sending packet 3 (91 bytes) for connection 323a026aafab4672d3101cd4, Handshake 2025/04/30 12:06:59 client Long Header{Type: Handshake, DestConnectionID: f20d733c3542144b41, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:06:59 client <- Reading packet 6 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:06:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:59 client Dropping Handshake keys. 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f20dce57a0678f890e, StatelessResetToken: 0x360ce4447c8f194771ac8e0a3b9bc8a0} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f20db710ce23c4ae2e, StatelessResetToken: 0xdd2c424a99d276bd5774e39973b59e89} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f20d57d4323a4d4a72, StatelessResetToken: 0x8e7fcda1984c75eeb91109017ba1d4da} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: a1fc07ec9ee52686b4, StatelessResetToken: 0x782329d428b75a556356773fc76fa89e} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: a1fc335a8d11f00629, StatelessResetToken: 0x097d65e494da1b70ae46fb3432cbd823} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: a1fcd8c6b83fd79ab8, StatelessResetToken: 0x3d1fa5af081812f32ab3432371ac806f} 2025/04/30 12:06:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: a1fc86cf52d2d0db2c, StatelessResetToken: 0x4b451209b6ec0b0c0cb6500728b7c4c5} 2025/04/30 12:06:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:06:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:06:59 client -> Sending packet 4 (62 bytes) for connection 323a026aafab4672d3101cd4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: a1fc07ec9ee52686b4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 226.754µs} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:59 client -> Sending packet 5 (55 bytes) for connection 323a026aafab4672d3101cd4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: a1fc07ec9ee52686b4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:06:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:06:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:06:59 client <- Reading packet 9 (32 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:06:59 client newly acked packets (1): [5] 2025/04/30 12:06:59 client updated RTT: 35.852ms (σ: 18.113ms) 2025/04/30 12:06:59 client ECN capability confirmed. 2025/04/30 12:06:59 client Canceling loss detection timer. 2025/04/30 12:06:59 client <- Reading packet 10 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:06:59 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:06:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:06:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:06:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:06:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:06:59 client -> Sending packet 6 (31 bytes) for connection 323a026aafab4672d3101cd4, 1-RTT (ECN: ECT(0)) 2025/04/30 12:06:59 client Short Header{DestConnectionID: a1fc07ec9ee52686b4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:06:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:06:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:06:59 client Connection 323a026aafab4672d3101cd4 closed. 2025/04/30 12:06:59 Requesting https://server4:443/xzimjfseqr. 2025/04/30 12:06:59 Increased receive buffer size to 14336 kiB 2025/04/30 12:06:59 Increased send buffer size to 14336 kiB 2025/04/30 12:06:59 Setting DF for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:06:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:06:59 Created qlog file: /logs/qlog/d38fce9b79c2a9ae3d.sqlog 2025/04/30 12:06:59 client Starting new connection to server4 ([::]:58174 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d38fce9b79c2a9ae3d, version v1 2025/04/30 12:06:59 Adding connection ID (empty). 2025/04/30 12:06:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:06:59 client -> Sending packet 0 (1280 bytes) for connection d38fce9b79c2a9ae3d, Initial 2025/04/30 12:06:59 client Long Header{Type: Initial, DestConnectionID: d38fce9b79c2a9ae3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:06:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:06:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:00 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:07:00 client <- Reading packet 2 (133 bytes) for connection (empty), Initial 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ade2a3ce5baba34ab, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:07:00 client Received first packet. Switching destination connection ID to: 3ade2a3ce5baba34ab 2025/04/30 12:07:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:00 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:07:00 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:07:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ade2a3ce5baba34ab, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:07:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:07:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d38fce9b79c2a9ae3d, InitialSourceConnectionID: 3ade2a3ce5baba34ab, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x0e5b7b52d31a7dec3c73d7085ae30e0b} 2025/04/30 12:07:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d38fce9b79c2a9ae3d 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: 3ade2a3ce5baba34ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:07:00 client Long Header{Type: Handshake, DestConnectionID: 3ade2a3ce5baba34ab, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:00 client Dropping Initial keys. 2025/04/30 12:07:00 client -> Sending packet 1 (41 bytes) for connection d38fce9b79c2a9ae3d, Handshake 2025/04/30 12:07:00 client Long Header{Type: Handshake, DestConnectionID: 3ade2a3ce5baba34ab, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 12:07:00 client -> Sending packet 0 (47 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 3ade2a3ce5baba34ab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:00 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.PingFrame{} 2025/04/30 12:07:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:00 client -> Sending packet 1 (33 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 3ade2a3ce5baba34ab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 79.618µs} 2025/04/30 12:07:00 client <- Reading packet 6 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:00 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:00 client -> Sending packet 2 (34 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 3ade2a3ce5baba34ab, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 25.311953ms} 2025/04/30 12:07:00 client <- Reading packet 9 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 5.12ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:07:00 client Peer doesn't await address validation any longer. 2025/04/30 12:07:00 client newly acked packets (1): [0] 2025/04/30 12:07:00 client ECN capability confirmed. 2025/04/30 12:07:00 client Canceling loss detection timer. 2025/04/30 12:07:00 client Dropping Handshake keys. 2025/04/30 12:07:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3ade4cbe7cf3478203, StatelessResetToken: 0xfde766974d271345f8acb86344dd01fb} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3ade0a59b4f8b21811, StatelessResetToken: 0x6cd4a88eece1495f15013626e59838fc} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ade2c4550f0e480cc, StatelessResetToken: 0xaadb0e4d1df9828e1499e5b5ab83a644} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 1b973350ca34263ee5, StatelessResetToken: 0xdb8a67dbc39d5bd07b1bab084a1044ee} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 1b972bdb497358b55d, StatelessResetToken: 0xfc9dc874339d2457f5ab1840bc56eca2} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 1b97aa6ad1ba749457, StatelessResetToken: 0xe787627ae494508c264129b6db8ed47e} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 1b97a7fb59c3b22655, StatelessResetToken: 0x09f5295be337d2470b2635c125cc2edf} 2025/04/30 12:07:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:00 client -> Sending packet 3 (1366 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 1b973350ca34263ee5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.PingFrame{} 2025/04/30 12:07:00 client -> Sending packet 4 (43 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 1b973350ca34263ee5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}}, DelayTime: 275.014µs} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:07:00 client -> Sending packet 6 (36 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 1b973350ca34263ee5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:00 client -> Sending packet 7 (36 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 1b973350ca34263ee5, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:00 client <- Reading packet 12 (31 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:07:00 client newly acked packets (1): [3] 2025/04/30 12:07:00 client -> Sending packet 8 (1409 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 1b973350ca34263ee5, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.PingFrame{} 2025/04/30 12:07:00 client <- Reading packet 13 (32 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 25.088ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:07:00 client newly acked packets (1): [7] 2025/04/30 12:07:00 client updated RTT: 55.929394ms (σ: 27.964697ms) 2025/04/30 12:07:00 client Canceling loss detection timer. 2025/04/30 12:07:00 client <- Reading packet 14 (32 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 25.088ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 12:07:00 client newly acked packets (1): [8] 2025/04/30 12:07:00 client updated RTT: 56.05ms (σ: 21.216ms) 2025/04/30 12:07:00 client <- Reading packet 15 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.PingFrame{} 2025/04/30 12:07:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:00 client <- Reading packet 16 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.PingFrame{} 2025/04/30 12:07:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:00 client -> Sending packet 9 (37 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 1b973350ca34263ee5, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 5, AckRanges: {{Largest: 16, Smallest: 12}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}}, DelayTime: 75.14µs} 2025/04/30 12:07:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:00 client -> Sending packet 10 (31 bytes) for connection d38fce9b79c2a9ae3d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: 1b973350ca34263ee5, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:00 client Connection d38fce9b79c2a9ae3d closed. 2025/04/30 12:07:00 Requesting https://server4:443/qfqmdkniqe. 2025/04/30 12:07:00 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:00 Increased send buffer size to 14336 kiB 2025/04/30 12:07:00 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:00 Created qlog file: /logs/qlog/2f6d8244415a1565e5c993289d5c8b3ff0a68d.sqlog 2025/04/30 12:07:00 client Starting new connection to server4 ([::]:49790 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2f6d8244415a1565e5c993289d5c8b3ff0a68d, version v1 2025/04/30 12:07:00 Adding connection ID (empty). 2025/04/30 12:07:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:00 client -> Sending packet 0 (1280 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d, Initial 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: 2f6d8244415a1565e5c993289d5c8b3ff0a68d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 12:07:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 12:07:00 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:00 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a198f189306b38511d, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:00 client Received first packet. Switching destination connection ID to: a198f189306b38511d 2025/04/30 12:07:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:00 client newly acked packets (1): [0] 2025/04/30 12:07:00 client updated RTT: 33.065326ms (σ: 16.532663ms) 2025/04/30 12:07:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:00 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:00 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:00 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:00 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a198f189306b38511d, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/04/30 12:07:00 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:00 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2f6d8244415a1565e5c993289d5c8b3ff0a68d, InitialSourceConnectionID: a198f189306b38511d, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xdf1091f25897200a0b16597233155c4c} 2025/04/30 12:07:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: a198f189306b38511d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:00 client Long Header{Type: Handshake, DestConnectionID: a198f189306b38511d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:00 client Dropping Initial keys. 2025/04/30 12:07:00 client -> Sending packet 1 (41 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d, Handshake 2025/04/30 12:07:00 client Long Header{Type: Handshake, DestConnectionID: a198f189306b38511d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:00 client -> Sending packet 0 (47 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: a198f189306b38511d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:00 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:00 client Dropping Handshake keys. 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a198e99f5361ed1481, StatelessResetToken: 0x3b7c60a475debbce2e2d9bfa448685f6} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a1981c9a84a7008e90, StatelessResetToken: 0x1bdaf85f6954c0f8280eb941fc5707d5} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a198344922e3d41109, StatelessResetToken: 0xea32570f03d33803857218776a3601cd} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: aa464d8f69b54ebab3, StatelessResetToken: 0xb4a6e9d44d665bdbffc7e0a7d2fa283d} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: aa468057ae9bd55958, StatelessResetToken: 0x3dc29179ee0794de1802a422abfff7af} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: aa4661be0a13aa6d8a, StatelessResetToken: 0xe358d9820e55d051bb948218f489dc0e} 2025/04/30 12:07:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: aa46da8c0c24f50b15, StatelessResetToken: 0xa2b568af8468d436dfdce9ff3c5470cc} 2025/04/30 12:07:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:00 client -> Sending packet 1 (41 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: aa464d8f69b54ebab3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 168.455µs} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:00 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.PingFrame{} 2025/04/30 12:07:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:00 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:00 client -> Sending packet 2 (33 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: aa464d8f69b54ebab3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 56.305µs} 2025/04/30 12:07:00 client <- Reading packet 5 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:00 client newly acked packets (1): [1] 2025/04/30 12:07:00 client updated RTT: 35.911ms (σ: 18.092ms) 2025/04/30 12:07:00 client ECN capability confirmed. 2025/04/30 12:07:00 client lost packet 0 (time threshold) 2025/04/30 12:07:00 client Canceling loss detection timer. 2025/04/30 12:07:00 client Ignoring all packets below 3. 2025/04/30 12:07:00 client -> Sending packet 3 (47 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: aa464d8f69b54ebab3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:00 client <- Reading packet 6 (36 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:07:00 client newly acked packets (1): [3] 2025/04/30 12:07:00 client updated RTT: 35.267ms (σ: 14.856ms) 2025/04/30 12:07:00 client Canceling loss detection timer. 2025/04/30 12:07:00 client <- &wire.MaxDataFrame{MaximumData: 16777233} 2025/04/30 12:07:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:00 client <- Reading packet 7 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:00 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:00 client -> Sending packet 4 (33 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: aa464d8f69b54ebab3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 55.523µs} 2025/04/30 12:07:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:00 client -> Sending packet 5 (31 bytes) for connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:00 client Short Header{DestConnectionID: aa464d8f69b54ebab3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:00 client Connection 2f6d8244415a1565e5c993289d5c8b3ff0a68d closed. 2025/04/30 12:07:00 Requesting https://server4:443/nsqechrygs. 2025/04/30 12:07:00 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:00 Increased send buffer size to 14336 kiB 2025/04/30 12:07:00 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:00 Created qlog file: /logs/qlog/7f548c87dd2db3e9b2b154d53a96b45fb7e54b65.sqlog 2025/04/30 12:07:00 client Starting new connection to server4 ([::]:57628 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, version v1 2025/04/30 12:07:00 Adding connection ID (empty). 2025/04/30 12:07:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:00 client -> Sending packet 0 (1280 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, Initial 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:07:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 12:07:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:07:00 client -> Sending packet 1 (1280 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, Initial 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:07:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 12:07:00 client -> Sending packet 2 (1280 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, Initial 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:07:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 12:07:00 client <- Reading packet 2 (1220 bytes) for connection (empty), Initial 2025/04/30 12:07:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d03de9ef1489ed550f, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1201, Version: v1} 2025/04/30 12:07:00 client Received first packet. Switching destination connection ID to: d03de9ef1489ed550f 2025/04/30 12:07:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 12:07:00 client newly acked packets (1): [2] 2025/04/30 12:07:00 client updated RTT: 58.810619ms (σ: 29.405309ms) 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:07:01 client <- Reading packet 3 (133 bytes) for connection (empty), Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d03de9ef1489ed550f, Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:07:01 client <- Reading packet 4 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d03de9ef1489ed550f, PacketNumber: 4, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/04/30 12:07:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, InitialSourceConnectionID: d03de9ef1489ed550f, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xbf7b29d45e89b929beb7950b6163d040} 2025/04/30 12:07:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: d03de9ef1489ed550f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: d03de9ef1489ed550f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:01 client Dropping Initial keys. 2025/04/30 12:07:01 client -> Sending packet 1 (41 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: d03de9ef1489ed550f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 12:07:01 client -> Sending packet 0 (47 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: d03de9ef1489ed550f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:01 client <- Reading packet 6 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.PingFrame{} 2025/04/30 12:07:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:01 client -> Sending packet 1 (33 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: d03de9ef1489ed550f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 90.138µs} 2025/04/30 12:07:01 client <- Reading packet 7 (470 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:01 client Peer doesn't await address validation any longer. 2025/04/30 12:07:01 client newly acked packets (1): [0] 2025/04/30 12:07:01 client updated RTT: 55.707ms (σ: 28.259ms) 2025/04/30 12:07:01 client ECN capability confirmed. 2025/04/30 12:07:01 client Canceling loss detection timer. 2025/04/30 12:07:01 client Dropping Handshake keys. 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: d9e2d022461f539486, StatelessResetToken: 0x4bdf88aaac0aa9b2cae356edb249b32d} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: d9e2bfe97eeabf22ed, StatelessResetToken: 0xe281f69b46ee2a25e903850a143b8c38} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: d9e25aeca27074714c, StatelessResetToken: 0x80f67eb22bb2689d4940eea6d2590993} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: d9e2a5c602b28853fa, StatelessResetToken: 0x79658617578fb9a9cb941c1b4f4a11dc} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client -> Sending packet 2 (35 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: d9e2d022461f539486, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 120.725µs} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:01 client <- Reading packet 8 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:01 client -> Sending packet 3 (31 bytes) for connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: d9e2d022461f539486, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:01 client Connection 7f548c87dd2db3e9b2b154d53a96b45fb7e54b65 closed. 2025/04/30 12:07:01 Requesting https://server4:443/exzdxtveon. 2025/04/30 12:07:01 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:01 Increased send buffer size to 14336 kiB 2025/04/30 12:07:01 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:01 Created qlog file: /logs/qlog/46219311ab897d642c2ee7.sqlog 2025/04/30 12:07:01 client Starting new connection to server4 ([::]:48471 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 46219311ab897d642c2ee7, version v1 2025/04/30 12:07:01 Adding connection ID (empty). 2025/04/30 12:07:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:01 client -> Sending packet 0 (1280 bytes) for connection 46219311ab897d642c2ee7, Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: 46219311ab897d642c2ee7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:07:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:01 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 006672e0c9f9ba8160, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:01 client Received first packet. Switching destination connection ID to: 006672e0c9f9ba8160 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:01 client newly acked packets (1): [0] 2025/04/30 12:07:01 client updated RTT: 33.034259ms (σ: 16.517129ms) 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:01 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 006672e0c9f9ba8160, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:07:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 46219311ab897d642c2ee7, InitialSourceConnectionID: 006672e0c9f9ba8160, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf57ed15aee31faa69aea7063c9233fe9} 2025/04/30 12:07:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 46219311ab897d642c2ee7 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: 006672e0c9f9ba8160, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: 006672e0c9f9ba8160, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:01 client Dropping Initial keys. 2025/04/30 12:07:01 client -> Sending packet 1 (41 bytes) for connection 46219311ab897d642c2ee7, Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: 006672e0c9f9ba8160, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:01 client -> Sending packet 0 (47 bytes) for connection 46219311ab897d642c2ee7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 006672e0c9f9ba8160, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:01 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:01 client Dropping Handshake keys. 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00664d934f68da5b5c, StatelessResetToken: 0x13113f6193a40c5cf8a37507710a429e} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00669cc38978407f20, StatelessResetToken: 0x3b14f4408dbb4e58255fd874ca504393} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00664192fccc3762e2, StatelessResetToken: 0x2069d032b4ab360d99ad6a67b25d2d47} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 927f4eecc0a60013b2, StatelessResetToken: 0x8d319766f760cd46e474dc2bb97e9e18} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 927f627f1ad115da11, StatelessResetToken: 0x81e5acb943aadcf4585b6260fec098ef} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 927f1a65fe743fc69b, StatelessResetToken: 0x9665c172f51ddabf1adcb3d3cd505788} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 927fd8b4979daaa949, StatelessResetToken: 0x7481f750a12a0f2ac52d1665bb17f425} 2025/04/30 12:07:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:01 client -> Sending packet 1 (41 bytes) for connection 46219311ab897d642c2ee7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 927f4eecc0a60013b2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 161.391µs} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:01 client <- Reading packet 4 (354 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:01 client newly acked packets (1): [0] 2025/04/30 12:07:01 client updated RTT: 33.158ms (σ: 12.637ms) 2025/04/30 12:07:01 client ECN capability confirmed. 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:01 client -> Sending packet 2 (35 bytes) for connection 46219311ab897d642c2ee7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 927f4eecc0a60013b2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 87.063µs} 2025/04/30 12:07:01 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:01 client -> Sending packet 3 (31 bytes) for connection 46219311ab897d642c2ee7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 927f4eecc0a60013b2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:01 client Connection 46219311ab897d642c2ee7 closed. 2025/04/30 12:07:01 Requesting https://server4:443/emzlwualwt. 2025/04/30 12:07:01 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:01 Increased send buffer size to 14336 kiB 2025/04/30 12:07:01 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:01 Created qlog file: /logs/qlog/d8eb310d62a6b7b002d39770e2609d06.sqlog 2025/04/30 12:07:01 client Starting new connection to server4 ([::]:34630 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d8eb310d62a6b7b002d39770e2609d06, version v1 2025/04/30 12:07:01 Adding connection ID (empty). 2025/04/30 12:07:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:01 client -> Sending packet 0 (1280 bytes) for connection d8eb310d62a6b7b002d39770e2609d06, Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: d8eb310d62a6b7b002d39770e2609d06, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:01 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f9f6a6079924603459, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:01 client Received first packet. Switching destination connection ID to: f9f6a6079924603459 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:01 client newly acked packets (1): [0] 2025/04/30 12:07:01 client updated RTT: 33.00817ms (σ: 16.504085ms) 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:01 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f9f6a6079924603459, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/04/30 12:07:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d8eb310d62a6b7b002d39770e2609d06, InitialSourceConnectionID: f9f6a6079924603459, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x9ccb4e185702fe587fba2b77a2fe3269} 2025/04/30 12:07:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d8eb310d62a6b7b002d39770e2609d06 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: f9f6a6079924603459, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: f9f6a6079924603459, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:01 client Dropping Initial keys. 2025/04/30 12:07:01 client -> Sending packet 1 (88 bytes) for connection d8eb310d62a6b7b002d39770e2609d06, Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: f9f6a6079924603459, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:01 client Short Header{DestConnectionID: f9f6a6079924603459, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:07:01 client -> Sending packet 2 (91 bytes) for connection d8eb310d62a6b7b002d39770e2609d06, Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: f9f6a6079924603459, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:01 client -> Sending packet 3 (91 bytes) for connection d8eb310d62a6b7b002d39770e2609d06, Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: f9f6a6079924603459, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:01 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.PingFrame{} 2025/04/30 12:07:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:01 client -> Sending packet 1 (33 bytes) for connection d8eb310d62a6b7b002d39770e2609d06, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: f9f6a6079924603459, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 63.849µs} 2025/04/30 12:07:01 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:01 client -> Sending packet 2 (34 bytes) for connection d8eb310d62a6b7b002d39770e2609d06, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: f9f6a6079924603459, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.25212ms} 2025/04/30 12:07:01 client <- Reading packet 7 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 5.12ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:01 client Peer doesn't await address validation any longer. 2025/04/30 12:07:01 client newly acked packets (1): [0] 2025/04/30 12:07:01 client Canceling loss detection timer. 2025/04/30 12:07:01 client Dropping Handshake keys. 2025/04/30 12:07:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9f6244fffa227cc24, StatelessResetToken: 0x3c105c827cb5cc0624dd5c6ee18cd1e0} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f9f6180f52204ad7d4, StatelessResetToken: 0xe065a5709630216d4dd456bc5d89d628} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f9f6cc206499ad35a1, StatelessResetToken: 0x86521fafc23bdf36fca14c94522d10e4} 2025/04/30 12:07:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:01 client -> Sending packet 3 (37 bytes) for connection d8eb310d62a6b7b002d39770e2609d06, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: f9f6244fffa227cc24, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 116.196µs} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:01 client <- Reading packet 8 (1086 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:07:01 client newly acked packets (1): [3] 2025/04/30 12:07:01 client updated RTT: 32.818ms (σ: 12.758ms) 2025/04/30 12:07:01 client ECN capability confirmed. 2025/04/30 12:07:01 client Canceling loss detection timer. 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f9f6a6d55acbe271cc, StatelessResetToken: 0xe94ae7f27cd6ebf71ab341d44f2ded3f} 2025/04/30 12:07:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Ignoring all packets below 8. 2025/04/30 12:07:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:01 client -> Sending packet 4 (31 bytes) for connection d8eb310d62a6b7b002d39770e2609d06, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: f9f6244fffa227cc24, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:01 client Connection d8eb310d62a6b7b002d39770e2609d06 closed. 2025/04/30 12:07:01 Requesting https://server4:443/ltyuvsqxyj. 2025/04/30 12:07:01 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:01 Increased send buffer size to 14336 kiB 2025/04/30 12:07:01 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:01 Created qlog file: /logs/qlog/001e0835468d849025ed2c676f5093.sqlog 2025/04/30 12:07:01 client Starting new connection to server4 ([::]:58980 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 001e0835468d849025ed2c676f5093, version v1 2025/04/30 12:07:01 Adding connection ID (empty). 2025/04/30 12:07:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:01 client -> Sending packet 0 (1280 bytes) for connection 001e0835468d849025ed2c676f5093, Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: 001e0835468d849025ed2c676f5093, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:07:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:07:01 client -> Sending packet 1 (1280 bytes) for connection 001e0835468d849025ed2c676f5093, Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: 001e0835468d849025ed2c676f5093, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:07:01 client -> Sending packet 2 (1280 bytes) for connection 001e0835468d849025ed2c676f5093, Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: 001e0835468d849025ed2c676f5093, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:01 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9974f7702cfe3ad5ec, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:01 client Received first packet. Switching destination connection ID to: 9974f7702cfe3ad5ec 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:01 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9974f7702cfe3ad5ec, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:07:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 001e0835468d849025ed2c676f5093, InitialSourceConnectionID: 9974f7702cfe3ad5ec, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x98fb39ac3b8e40ffd0dec5ba3c1877e1} 2025/04/30 12:07:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 001e0835468d849025ed2c676f5093 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: 9974f7702cfe3ad5ec, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: 9974f7702cfe3ad5ec, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:01 client Dropping Initial keys. 2025/04/30 12:07:01 client -> Sending packet 1 (41 bytes) for connection 001e0835468d849025ed2c676f5093, Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: 9974f7702cfe3ad5ec, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:01 client -> Sending packet 0 (47 bytes) for connection 001e0835468d849025ed2c676f5093, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 9974f7702cfe3ad5ec, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:01 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:01 client Peer doesn't await address validation any longer. 2025/04/30 12:07:01 client newly acked packets (1): [0] 2025/04/30 12:07:01 client updated RTT: 32.704333ms (σ: 16.352166ms) 2025/04/30 12:07:01 client ECN capability confirmed. 2025/04/30 12:07:01 client Canceling loss detection timer. 2025/04/30 12:07:01 client Dropping Handshake keys. 2025/04/30 12:07:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 99743d6a96ca3cf2a1, StatelessResetToken: 0xcf783f958f6d3d24327071692fefb862} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99747cc8e97cc1366d, StatelessResetToken: 0x0a97b8a7e586fce36abe0f8ac75fc241} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9974b47013f8bc755a, StatelessResetToken: 0xe1dcf2c19d0120688f68be9c41941ecd} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 485073b4902f9b1aa9, StatelessResetToken: 0x57d0e1c9b7a7dd6327cf1df37f6a0c1e} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 485058f97b92a400e9, StatelessResetToken: 0x907210dd1f3258531f4e94cd73782eeb} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 4850e1b99c465149c3, StatelessResetToken: 0x2d76ae3e7287f6aec3512689c289b6b2} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 48503f27efbacb5d44, StatelessResetToken: 0xea7dfa9bec15fc7ad2b398f19e6ad269} 2025/04/30 12:07:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:01 client -> Sending packet 1 (41 bytes) for connection 001e0835468d849025ed2c676f5093, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 485073b4902f9b1aa9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 136.655µs} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:01 client <- Reading packet 4 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.PingFrame{} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client <- Reading packet 5 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:01 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:01 client -> Sending packet 2 (33 bytes) for connection 001e0835468d849025ed2c676f5093, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 485073b4902f9b1aa9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 49.482µs} 2025/04/30 12:07:01 client <- Reading packet 6 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:01 client -> Sending packet 3 (31 bytes) for connection 001e0835468d849025ed2c676f5093, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 485073b4902f9b1aa9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:01 client Connection 001e0835468d849025ed2c676f5093 closed. 2025/04/30 12:07:01 Requesting https://server4:443/dtpqyayyyj. 2025/04/30 12:07:01 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:01 Increased send buffer size to 14336 kiB 2025/04/30 12:07:01 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:01 Created qlog file: /logs/qlog/fcc78ca9fcc41041.sqlog 2025/04/30 12:07:01 client Starting new connection to server4 ([::]:56706 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fcc78ca9fcc41041, version v1 2025/04/30 12:07:01 Adding connection ID (empty). 2025/04/30 12:07:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:01 client -> Sending packet 0 (1280 bytes) for connection fcc78ca9fcc41041, Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: fcc78ca9fcc41041, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:07:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:01 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f27e375da2d1d851ff, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:01 client Received first packet. Switching destination connection ID to: f27e375da2d1d851ff 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:01 client newly acked packets (1): [0] 2025/04/30 12:07:01 client updated RTT: 32.984548ms (σ: 16.492274ms) 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:01 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f27e375da2d1d851ff, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:07:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fcc78ca9fcc41041, InitialSourceConnectionID: f27e375da2d1d851ff, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x902488cdf4e4bd8b238ec9c25454edcd} 2025/04/30 12:07:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fcc78ca9fcc41041 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: f27e375da2d1d851ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: f27e375da2d1d851ff, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:01 client Dropping Initial keys. 2025/04/30 12:07:01 client -> Sending packet 1 (88 bytes) for connection fcc78ca9fcc41041, Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: f27e375da2d1d851ff, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:01 client Short Header{DestConnectionID: f27e375da2d1d851ff, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:01 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:01 client Dropping Handshake keys. 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f27ee17fa7613b1591, StatelessResetToken: 0xd34ae214d3ea1a8545b0c0386ca4c735} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f27e2746cf52759328, StatelessResetToken: 0x4c7c2409db5003918c8383bf669ff806} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f27e204ab38b89c442, StatelessResetToken: 0x33c11e225fd197501e28aa8a53e38aba} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 636cbee7989d193425, StatelessResetToken: 0xecba16e09383cb2ac22e85728e81d99b} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 636cb98416f0b24de9, StatelessResetToken: 0xff3910ff393f2652c16b84c71ca2b89f} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 636cbcda067acb7b1c, StatelessResetToken: 0xaef92a0d32208d787d4dd21b2dbe0818} 2025/04/30 12:07:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 636c2f586dfdfb24f9, StatelessResetToken: 0x4e19077c7008d215e442eddd555ec369} 2025/04/30 12:07:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:01 client -> Sending packet 1 (41 bytes) for connection fcc78ca9fcc41041, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 636cbee7989d193425, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 133.198µs} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:01 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.PingFrame{} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:01 client -> Sending packet 2 (34 bytes) for connection fcc78ca9fcc41041, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 636cbee7989d193425, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.231028ms} 2025/04/30 12:07:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:01 client <- Reading packet 5 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:01 client newly acked packets (1): [1] 2025/04/30 12:07:01 client updated RTT: 35.825ms (σ: 18.051ms) 2025/04/30 12:07:01 client ECN capability confirmed. 2025/04/30 12:07:01 client lost packet 0 (time threshold) 2025/04/30 12:07:01 client Canceling loss detection timer. 2025/04/30 12:07:01 client Ignoring all packets below 3. 2025/04/30 12:07:01 client -> Sending packet 3 (47 bytes) for connection fcc78ca9fcc41041, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 636cbee7989d193425, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:01 client <- Reading packet 6 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.PingFrame{} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:01 client -> Sending packet 4 (36 bytes) for connection fcc78ca9fcc41041, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 636cbee7989d193425, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.283971ms} 2025/04/30 12:07:01 client <- Reading packet 8 (354 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:07:01 client newly acked packets (1): [3] 2025/04/30 12:07:01 client Canceling loss detection timer. 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:01 client -> Sending packet 5 (37 bytes) for connection fcc78ca9fcc41041, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 636cbee7989d193425, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 89.997µs} 2025/04/30 12:07:01 client <- Reading packet 9 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.PingFrame{} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:01 client -> Sending packet 6 (38 bytes) for connection fcc78ca9fcc41041, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 636cbee7989d193425, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.26523ms} 2025/04/30 12:07:01 client <- Reading packet 10 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:01 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:07:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:01 client -> Sending packet 7 (31 bytes) for connection fcc78ca9fcc41041, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: 636cbee7989d193425, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:01 client Connection fcc78ca9fcc41041 closed. 2025/04/30 12:07:01 Requesting https://server4:443/njjdxmsbch. 2025/04/30 12:07:01 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:01 Increased send buffer size to 14336 kiB 2025/04/30 12:07:01 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:01 Created qlog file: /logs/qlog/0688be74367c61dc88d7d6f0.sqlog 2025/04/30 12:07:01 client Starting new connection to server4 ([::]:51846 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0688be74367c61dc88d7d6f0, version v1 2025/04/30 12:07:01 Adding connection ID (empty). 2025/04/30 12:07:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:01 client -> Sending packet 0 (1280 bytes) for connection 0688be74367c61dc88d7d6f0, Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: 0688be74367c61dc88d7d6f0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:01 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d281275df3916290ef, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:01 client Received first packet. Switching destination connection ID to: d281275df3916290ef 2025/04/30 12:07:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:07:01 client newly acked packets (1): [0] 2025/04/30 12:07:01 client updated RTT: 33.14439ms (σ: 16.572195ms) 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:01 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:01 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d281275df3916290ef, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 12:07:01 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0688be74367c61dc88d7d6f0, InitialSourceConnectionID: d281275df3916290ef, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xdd4a8cf668916f4a84a6ebe0fc0a9005} 2025/04/30 12:07:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0688be74367c61dc88d7d6f0 2025/04/30 12:07:01 client Long Header{Type: Initial, DestConnectionID: d281275df3916290ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: d281275df3916290ef, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:01 client Dropping Initial keys. 2025/04/30 12:07:01 client -> Sending packet 1 (41 bytes) for connection 0688be74367c61dc88d7d6f0, Handshake 2025/04/30 12:07:01 client Long Header{Type: Handshake, DestConnectionID: d281275df3916290ef, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:01 client -> Sending packet 0 (47 bytes) for connection 0688be74367c61dc88d7d6f0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:01 client Short Header{DestConnectionID: d281275df3916290ef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:07:02 client -> Sending packet 2 (91 bytes) for connection 0688be74367c61dc88d7d6f0, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: d281275df3916290ef, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client -> Sending packet 3 (91 bytes) for connection 0688be74367c61dc88d7d6f0, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: d281275df3916290ef, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:02 client Peer doesn't await address validation any longer. 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 45.519ms (σ: 37.18ms) 2025/04/30 12:07:02 client ECN capability confirmed. 2025/04/30 12:07:02 client Canceling loss detection timer. 2025/04/30 12:07:02 client Dropping Handshake keys. 2025/04/30 12:07:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d281dcb1287b3fdc04, StatelessResetToken: 0x37ecf7618b7b46f25107302565a755e7} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d281d8ccf115a56dbd, StatelessResetToken: 0x6bec9249d50ae597d8d3eb91701dfdba} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d2817c2ccb87364b42, StatelessResetToken: 0xdf0e9888b331582ec51ed445063437eb} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 33bf889178737ad010, StatelessResetToken: 0xfd744fad55dd242c89259b42890236e8} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 33bf43314b2e35c01d, StatelessResetToken: 0x9d90f3af52fcef4caf86d3ad5ffe9269} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 33bf5a482685cefa69, StatelessResetToken: 0x3e5125dfa5eaacc62cacacbcf3f31957} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 33bf7da4520d1efa4c, StatelessResetToken: 0xbc60355bbc3cc1e2e9456d3e60e603e9} 2025/04/30 12:07:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:02 client -> Sending packet 1 (41 bytes) for connection 0688be74367c61dc88d7d6f0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 33bf889178737ad010, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 212.186µs} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:02 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.PingFrame{} 2025/04/30 12:07:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:02 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:02 client -> Sending packet 2 (33 bytes) for connection 0688be74367c61dc88d7d6f0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 33bf889178737ad010, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 48.42µs} 2025/04/30 12:07:02 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:02 client -> Sending packet 3 (31 bytes) for connection 0688be74367c61dc88d7d6f0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 33bf889178737ad010, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:02 client Connection 0688be74367c61dc88d7d6f0 closed. 2025/04/30 12:07:02 Requesting https://server4:443/kthdcrckem. 2025/04/30 12:07:02 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:02 Increased send buffer size to 14336 kiB 2025/04/30 12:07:02 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:02 Created qlog file: /logs/qlog/0c3c433c27fff684.sqlog 2025/04/30 12:07:02 client Starting new connection to server4 ([::]:45148 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0c3c433c27fff684, version v1 2025/04/30 12:07:02 Adding connection ID (empty). 2025/04/30 12:07:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:02 client -> Sending packet 0 (1280 bytes) for connection 0c3c433c27fff684, Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 0c3c433c27fff684, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:02 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f3b7a1875dc261cee4, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:02 client Received first packet. Switching destination connection ID to: f3b7a1875dc261cee4 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 33.055428ms (σ: 16.527714ms) 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:02 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f3b7a1875dc261cee4, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:07:02 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0c3c433c27fff684, InitialSourceConnectionID: f3b7a1875dc261cee4, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xbbc01d403b95ed22aa57375fe72b3a8e} 2025/04/30 12:07:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0c3c433c27fff684 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: f3b7a1875dc261cee4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: f3b7a1875dc261cee4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client Dropping Initial keys. 2025/04/30 12:07:02 client -> Sending packet 1 (41 bytes) for connection 0c3c433c27fff684, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: f3b7a1875dc261cee4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:02 client -> Sending packet 0 (47 bytes) for connection 0c3c433c27fff684, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: f3b7a1875dc261cee4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:02 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:02 client -> Sending packet 1 (33 bytes) for connection 0c3c433c27fff684, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: f3b7a1875dc261cee4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 59.611µs} 2025/04/30 12:07:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:02 client -> Sending packet 2 (71 bytes) for connection 0c3c433c27fff684, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: f3b7a1875dc261cee4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 client Short Header{DestConnectionID: f3b7a1875dc261cee4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:02 client Connection 0c3c433c27fff684 closed. 2025/04/30 12:07:02 Requesting https://server4:443/lswhdclybo. 2025/04/30 12:07:02 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:02 Increased send buffer size to 14336 kiB 2025/04/30 12:07:02 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:02 Created qlog file: /logs/qlog/2e8e796135ec2573fb.sqlog 2025/04/30 12:07:02 client Starting new connection to server4 ([::]:35412 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2e8e796135ec2573fb, version v1 2025/04/30 12:07:02 Adding connection ID (empty). 2025/04/30 12:07:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:02 client -> Sending packet 0 (1280 bytes) for connection 2e8e796135ec2573fb, Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 2e8e796135ec2573fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:02 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3a8891b9db1a1d8e11, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:02 client Received first packet. Switching destination connection ID to: 3a8891b9db1a1d8e11 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 33.009ms (σ: 16.5045ms) 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:02 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3a8891b9db1a1d8e11, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:07:02 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2e8e796135ec2573fb, InitialSourceConnectionID: 3a8891b9db1a1d8e11, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x1ac1c2af8fb1abce774b53d77c565abb} 2025/04/30 12:07:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2e8e796135ec2573fb 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 3a8891b9db1a1d8e11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 3a8891b9db1a1d8e11, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client Dropping Initial keys. 2025/04/30 12:07:02 client -> Sending packet 1 (88 bytes) for connection 2e8e796135ec2573fb, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 3a8891b9db1a1d8e11, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3a8891b9db1a1d8e11, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:02 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:02 client Peer doesn't await address validation any longer. 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 32.973ms (σ: 12.448ms) 2025/04/30 12:07:02 client Canceling loss detection timer. 2025/04/30 12:07:02 client Dropping Handshake keys. 2025/04/30 12:07:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3a88eef8cfff390b28, StatelessResetToken: 0xef729febb8e61980490ddb20cde69a45} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3a880f7844a8ecd822, StatelessResetToken: 0xc85a850c20b4f0525a71efde1f7ee2f0} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3a8885e4046c0cb683, StatelessResetToken: 0x30516d3c296610d23b0b544a6635edb5} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: a33b53ae4f5a3bb470, StatelessResetToken: 0x0916f2513e4e430248d072d513ae641c} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: a33bbaaf216d342486, StatelessResetToken: 0xc30ec0e768d923a017c800060080400b} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: a33b4f8e0c621c5323, StatelessResetToken: 0x791f930e8b0f389e4f001950f125b983} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: a33bdd3530e26b94eb, StatelessResetToken: 0x59396046e55e9c0957de9e2c287e7ea1} 2025/04/30 12:07:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:02 client -> Sending packet 1 (41 bytes) for connection 2e8e796135ec2573fb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: a33b53ae4f5a3bb470, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 181.289µs} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:02 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.PingFrame{} 2025/04/30 12:07:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:02 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:02 client -> Sending packet 2 (33 bytes) for connection 2e8e796135ec2573fb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: a33b53ae4f5a3bb470, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 45.735µs} 2025/04/30 12:07:02 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:02 client -> Sending packet 3 (31 bytes) for connection 2e8e796135ec2573fb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: a33b53ae4f5a3bb470, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:02 client Connection 2e8e796135ec2573fb closed. 2025/04/30 12:07:02 Requesting https://server4:443/zhurgppjtw. 2025/04/30 12:07:02 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:02 Increased send buffer size to 14336 kiB 2025/04/30 12:07:02 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:02 Created qlog file: /logs/qlog/3714e8d58eaf60ab59e8b98238c2ecb64d2debfd.sqlog 2025/04/30 12:07:02 client Starting new connection to server4 ([::]:56251 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd, version v1 2025/04/30 12:07:02 Adding connection ID (empty). 2025/04/30 12:07:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:02 client -> Sending packet 0 (1280 bytes) for connection 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd, Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:02 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3189dd998f46df60c8, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:02 client Received first packet. Switching destination connection ID to: 3189dd998f46df60c8 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 33.01966ms (σ: 16.50983ms) 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:02 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3189dd998f46df60c8, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/04/30 12:07:02 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd, InitialSourceConnectionID: 3189dd998f46df60c8, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xa76793932ec1e99c8a2b906e0bb5b8b9} 2025/04/30 12:07:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 3189dd998f46df60c8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 3189dd998f46df60c8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client Dropping Initial keys. 2025/04/30 12:07:02 client -> Sending packet 1 (88 bytes) for connection 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 3189dd998f46df60c8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3189dd998f46df60c8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:02 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.PingFrame{} 2025/04/30 12:07:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:02 client -> Sending packet 1 (33 bytes) for connection 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3189dd998f46df60c8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 79.869µs} 2025/04/30 12:07:02 client <- Reading packet 5 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:02 client Peer doesn't await address validation any longer. 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 33.25ms (σ: 12.844ms) 2025/04/30 12:07:02 client Canceling loss detection timer. 2025/04/30 12:07:02 client Dropping Handshake keys. 2025/04/30 12:07:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:02 client -> Sending packet 2 (35 bytes) for connection 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3189dd998f46df60c8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 89.788µs} 2025/04/30 12:07:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:02 client -> Sending packet 3 (31 bytes) for connection 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3189dd998f46df60c8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:02 client Connection 3714e8d58eaf60ab59e8b98238c2ecb64d2debfd closed. 2025/04/30 12:07:02 Requesting https://server4:443/xlbtbbnknc. 2025/04/30 12:07:02 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:02 Increased send buffer size to 14336 kiB 2025/04/30 12:07:02 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:02 Created qlog file: /logs/qlog/3d9a671254451623ebcd06b9ac422ab6a92b.sqlog 2025/04/30 12:07:02 client Starting new connection to server4 ([::]:57029 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3d9a671254451623ebcd06b9ac422ab6a92b, version v1 2025/04/30 12:07:02 Adding connection ID (empty). 2025/04/30 12:07:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:02 client -> Sending packet 0 (1280 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b, Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 3d9a671254451623ebcd06b9ac422ab6a92b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:02 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3a5cc28d78a0afd537, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:02 client Received first packet. Switching destination connection ID to: 3a5cc28d78a0afd537 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 32.999833ms (σ: 16.499916ms) 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:02 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3a5cc28d78a0afd537, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/04/30 12:07:02 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3d9a671254451623ebcd06b9ac422ab6a92b, InitialSourceConnectionID: 3a5cc28d78a0afd537, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x01be478556c0c92c294ad5a8f3849e23} 2025/04/30 12:07:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 3a5cc28d78a0afd537, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 3a5cc28d78a0afd537, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client Dropping Initial keys. 2025/04/30 12:07:02 client -> Sending packet 1 (41 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 3a5cc28d78a0afd537, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:02 client -> Sending packet 0 (47 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3a5cc28d78a0afd537, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:07:02 client -> Sending packet 2 (91 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 3a5cc28d78a0afd537, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client -> Sending packet 3 (91 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 3a5cc28d78a0afd537, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:02 client Peer doesn't await address validation any longer. 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 45.31ms (σ: 36.996ms) 2025/04/30 12:07:02 client ECN capability confirmed. 2025/04/30 12:07:02 client Canceling loss detection timer. 2025/04/30 12:07:02 client Dropping Handshake keys. 2025/04/30 12:07:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3a5c665dc9adee17ea, StatelessResetToken: 0x813b31161a66ba3aa2c74489798b1525} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3a5cc5122ef27d7aae, StatelessResetToken: 0x5edd945167d4174f7545b5c1a99dbd48} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3a5cd90e7e5d5a7693, StatelessResetToken: 0x89d8b33f111219010ef7900cee125eb6} 2025/04/30 12:07:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:02 client -> Sending packet 1 (35 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3a5c665dc9adee17ea, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 152.775µs} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:02 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.PingFrame{} 2025/04/30 12:07:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:02 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:02 client -> Sending packet 2 (33 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3a5c665dc9adee17ea, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 56.225µs} 2025/04/30 12:07:02 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:02 client -> Sending packet 3 (31 bytes) for connection 3d9a671254451623ebcd06b9ac422ab6a92b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 3a5c665dc9adee17ea, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:02 client Connection 3d9a671254451623ebcd06b9ac422ab6a92b closed. 2025/04/30 12:07:02 Requesting https://server4:443/ubfguwikah. 2025/04/30 12:07:02 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:02 Increased send buffer size to 14336 kiB 2025/04/30 12:07:02 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:02 Created qlog file: /logs/qlog/ffd28694c0313c20cd6ca085.sqlog 2025/04/30 12:07:02 client Starting new connection to server4 ([::]:42988 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ffd28694c0313c20cd6ca085, version v1 2025/04/30 12:07:02 Adding connection ID (empty). 2025/04/30 12:07:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:02 client -> Sending packet 0 (1280 bytes) for connection ffd28694c0313c20cd6ca085, Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: ffd28694c0313c20cd6ca085, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:07:02 client <- Reading packet 2 (133 bytes) for connection (empty), Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fbbbf65c9fcbb5059d, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:07:02 client Received first packet. Switching destination connection ID to: fbbbf65c9fcbb5059d 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:07:02 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fbbbf65c9fcbb5059d, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 12:07:02 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ffd28694c0313c20cd6ca085, InitialSourceConnectionID: fbbbf65c9fcbb5059d, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe1e5e934b58ae1a7321d197b6eb601bc} 2025/04/30 12:07:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ffd28694c0313c20cd6ca085 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: fbbbf65c9fcbb5059d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: fbbbf65c9fcbb5059d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client Dropping Initial keys. 2025/04/30 12:07:02 client -> Sending packet 1 (41 bytes) for connection ffd28694c0313c20cd6ca085, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: fbbbf65c9fcbb5059d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 12:07:02 client -> Sending packet 0 (47 bytes) for connection ffd28694c0313c20cd6ca085, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: fbbbf65c9fcbb5059d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:07:02 client -> Sending packet 2 (91 bytes) for connection ffd28694c0313c20cd6ca085, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: fbbbf65c9fcbb5059d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client -> Sending packet 3 (91 bytes) for connection ffd28694c0313c20cd6ca085, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: fbbbf65c9fcbb5059d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.PingFrame{} 2025/04/30 12:07:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:02 client -> Sending packet 1 (33 bytes) for connection ffd28694c0313c20cd6ca085, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: fbbbf65c9fcbb5059d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 64.43µs} 2025/04/30 12:07:02 client <- Reading packet 6 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:02 client <- Reading packet 7 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:02 client -> Sending packet 2 (33 bytes) for connection ffd28694c0313c20cd6ca085, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: fbbbf65c9fcbb5059d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 61.624µs} 2025/04/30 12:07:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:02 client -> Sending packet 4 (71 bytes) for connection ffd28694c0313c20cd6ca085, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: fbbbf65c9fcbb5059d, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 client Short Header{DestConnectionID: fbbbf65c9fcbb5059d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:02 client Connection ffd28694c0313c20cd6ca085 closed. 2025/04/30 12:07:02 Requesting https://server4:443/zryhrwkvxn. 2025/04/30 12:07:02 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:02 Increased send buffer size to 14336 kiB 2025/04/30 12:07:02 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:02 Created qlog file: /logs/qlog/98d957d94a6f7210ee9d.sqlog 2025/04/30 12:07:02 client Starting new connection to server4 ([::]:47393 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 98d957d94a6f7210ee9d, version v1 2025/04/30 12:07:02 Adding connection ID (empty). 2025/04/30 12:07:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:02 client -> Sending packet 0 (1280 bytes) for connection 98d957d94a6f7210ee9d, Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 98d957d94a6f7210ee9d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:02 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 91ddb16b96c1a8762d, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:02 client Received first packet. Switching destination connection ID to: 91ddb16b96c1a8762d 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 33.000269ms (σ: 16.500134ms) 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:02 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:02 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 91ddb16b96c1a8762d, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:07:02 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 98d957d94a6f7210ee9d, InitialSourceConnectionID: 91ddb16b96c1a8762d, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe77c22bfa24f8a7e15dec0b45927d4e9} 2025/04/30 12:07:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 98d957d94a6f7210ee9d 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 91ddb16b96c1a8762d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 91ddb16b96c1a8762d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:02 client Dropping Initial keys. 2025/04/30 12:07:02 client -> Sending packet 1 (41 bytes) for connection 98d957d94a6f7210ee9d, Handshake 2025/04/30 12:07:02 client Long Header{Type: Handshake, DestConnectionID: 91ddb16b96c1a8762d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:02 client -> Sending packet 0 (47 bytes) for connection 98d957d94a6f7210ee9d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 91ddb16b96c1a8762d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:02 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:02 client Peer doesn't await address validation any longer. 2025/04/30 12:07:02 client newly acked packets (1): [0] 2025/04/30 12:07:02 client updated RTT: 32.963ms (σ: 12.448ms) 2025/04/30 12:07:02 client ECN capability confirmed. 2025/04/30 12:07:02 client Canceling loss detection timer. 2025/04/30 12:07:02 client Dropping Handshake keys. 2025/04/30 12:07:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 91dd22a0f608924be1, StatelessResetToken: 0xec29370896cdecdc5d2d719e1adcfcd7} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 91dd5ada83f7b8d763, StatelessResetToken: 0x5c985363d9cfe69780652bd20a8cd84e} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 91ddc982e2fba0ba1d, StatelessResetToken: 0x3511f84b8d6817cb806540d1599424cd} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 48d7c5fbb25fecee99, StatelessResetToken: 0x0e76ae25db60e37b71b2ea2f67bd6981} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 48d73e2313370a540b, StatelessResetToken: 0x5bfacfc47e567830efd84a7ce30448f5} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 48d7a1e0bd55364f9e, StatelessResetToken: 0x5d01de910351602bf71b3180a61b4e56} 2025/04/30 12:07:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 48d71c4072b7de129c, StatelessResetToken: 0xe9772913198bdced9696910132df7411} 2025/04/30 12:07:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:02 client -> Sending packet 1 (41 bytes) for connection 98d957d94a6f7210ee9d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 48d7c5fbb25fecee99, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 153.606µs} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:02 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.PingFrame{} 2025/04/30 12:07:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:02 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:02 client -> Sending packet 2 (35 bytes) for connection 98d957d94a6f7210ee9d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 48d7c5fbb25fecee99, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 71.303µs} 2025/04/30 12:07:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:02 client -> Sending packet 3 (31 bytes) for connection 98d957d94a6f7210ee9d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:02 client Short Header{DestConnectionID: 48d7c5fbb25fecee99, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:02 client Connection 98d957d94a6f7210ee9d closed. 2025/04/30 12:07:02 Requesting https://server4:443/qcudzptvxd. 2025/04/30 12:07:02 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:02 Increased send buffer size to 14336 kiB 2025/04/30 12:07:02 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:02 Created qlog file: /logs/qlog/79d176fe999f39fbfe.sqlog 2025/04/30 12:07:02 client Starting new connection to server4 ([::]:60104 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 79d176fe999f39fbfe, version v1 2025/04/30 12:07:02 Adding connection ID (empty). 2025/04/30 12:07:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:02 client -> Sending packet 0 (1280 bytes) for connection 79d176fe999f39fbfe, Initial 2025/04/30 12:07:02 client Long Header{Type: Initial, DestConnectionID: 79d176fe999f39fbfe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:07:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:07:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:07:03 client -> Sending packet 1 (1280 bytes) for connection 79d176fe999f39fbfe, Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: 79d176fe999f39fbfe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:07:03 client -> Sending packet 2 (1280 bytes) for connection 79d176fe999f39fbfe, Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: 79d176fe999f39fbfe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:07:03 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:03 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e2b1f51d296748ffb1, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:03 client Received first packet. Switching destination connection ID to: e2b1f51d296748ffb1 2025/04/30 12:07:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 8µs} 2025/04/30 12:07:03 client newly acked packets (1): [2] 2025/04/30 12:07:03 client updated RTT: 34.130596ms (σ: 17.065298ms) 2025/04/30 12:07:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:03 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:03 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e2b1f51d296748ffb1, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:07:03 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 79d176fe999f39fbfe, InitialSourceConnectionID: e2b1f51d296748ffb1, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xc813d0c9fb19008b80b1ea217ee347c4} 2025/04/30 12:07:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 79d176fe999f39fbfe 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: e2b1f51d296748ffb1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: e2b1f51d296748ffb1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:03 client Dropping Initial keys. 2025/04/30 12:07:03 client -> Sending packet 1 (88 bytes) for connection 79d176fe999f39fbfe, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: e2b1f51d296748ffb1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:03 client Short Header{DestConnectionID: e2b1f51d296748ffb1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:07:03 client -> Sending packet 2 (91 bytes) for connection 79d176fe999f39fbfe, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: e2b1f51d296748ffb1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:03 client -> Sending packet 3 (91 bytes) for connection 79d176fe999f39fbfe, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: e2b1f51d296748ffb1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:07:03 client -> Sending packet 4 (91 bytes) for connection 79d176fe999f39fbfe, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: e2b1f51d296748ffb1, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:03 client -> Sending packet 5 (91 bytes) for connection 79d176fe999f39fbfe, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: e2b1f51d296748ffb1, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:03 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:03 client Peer doesn't await address validation any longer. 2025/04/30 12:07:03 client newly acked packets (1): [0] 2025/04/30 12:07:03 client updated RTT: 72.38ms (σ: 89.3ms) 2025/04/30 12:07:03 client Canceling loss detection timer. 2025/04/30 12:07:03 client Dropping Handshake keys. 2025/04/30 12:07:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e2b1ec920d2e0a1312, StatelessResetToken: 0xd4c69334ab4ab6baa99c26e53329872a} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e2b1676b29fe7783be, StatelessResetToken: 0x97f1d626a00a6c0d5ff773b417ddf0ae} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e2b10f2d6fe3f15162, StatelessResetToken: 0x981981a69c21330a37f2c4d338ddb9b9} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f38829c074e17d66e2, StatelessResetToken: 0x62de50a6581760e660a6b92c9d6abe39} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: f388b23acfb305d7d7, StatelessResetToken: 0xc944e66df48bbd4a150dd46441a91379} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: f388f91127329614d3, StatelessResetToken: 0xb83f100eebb2151488d4c4e2bb4dd04d} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: f38883ac51a76082a7, StatelessResetToken: 0xca1dbd21e98adbd28e15a35e9d2d4bf9} 2025/04/30 12:07:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:03 client -> Sending packet 1 (41 bytes) for connection 79d176fe999f39fbfe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: f38829c074e17d66e2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 225.25µs} 2025/04/30 12:07:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:03 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.PingFrame{} 2025/04/30 12:07:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:03 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:03 client -> Sending packet 2 (34 bytes) for connection 79d176fe999f39fbfe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: f38829c074e17d66e2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.244058ms} 2025/04/30 12:07:03 client <- Reading packet 6 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:03 client newly acked packets (1): [1] 2025/04/30 12:07:03 client updated RTT: 70.303ms (σ: 71.128ms) 2025/04/30 12:07:03 client ECN capability confirmed. 2025/04/30 12:07:03 client Canceling loss detection timer. 2025/04/30 12:07:03 client Ignoring all packets below 3. 2025/04/30 12:07:03 client <- Reading packet 7 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.PingFrame{} 2025/04/30 12:07:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:03 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:03 client -> Sending packet 3 (36 bytes) for connection 79d176fe999f39fbfe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: f38829c074e17d66e2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 25.261697ms} 2025/04/30 12:07:03 client <- Reading packet 8 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 54.016ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:07:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:03 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/04/30 12:07:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:03 client <- Reading packet 9 (190 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 861, Data length: 163, Offset + Data length: 1024} 2025/04/30 12:07:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:03 client -> Sending packet 4 (35 bytes) for connection 79d176fe999f39fbfe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: f38829c074e17d66e2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 80.23µs} 2025/04/30 12:07:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:03 client -> Sending packet 5 (31 bytes) for connection 79d176fe999f39fbfe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: f38829c074e17d66e2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:03 client Connection 79d176fe999f39fbfe closed. 2025/04/30 12:07:03 Requesting https://server4:443/ykpjjvcwys. 2025/04/30 12:07:03 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:03 Increased send buffer size to 14336 kiB 2025/04/30 12:07:03 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:03 Created qlog file: /logs/qlog/e227e2ee841d4f3c2cfeff7f81a713ec00d412aa.sqlog 2025/04/30 12:07:03 client Starting new connection to server4 ([::]:35035 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, version v1 2025/04/30 12:07:03 Adding connection ID (empty). 2025/04/30 12:07:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:03 client -> Sending packet 0 (1280 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 12:07:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:07:03 client -> Sending packet 1 (1280 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 12:07:03 client -> Sending packet 2 (1280 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 12:07:03 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:03 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 694815d2a993108b67, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:03 client Received first packet. Switching destination connection ID to: 694815d2a993108b67 2025/04/30 12:07:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 12:07:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:03 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:03 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 694815d2a993108b67, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 744, Offset + Data length: 744} 2025/04/30 12:07:03 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, InitialSourceConnectionID: 694815d2a993108b67, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x7ded0fe750069aec31aaa1716911ecf1} 2025/04/30 12:07:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: 694815d2a993108b67, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: 694815d2a993108b67, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:03 client Dropping Initial keys. 2025/04/30 12:07:03 client -> Sending packet 1 (41 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: 694815d2a993108b67, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:03 client -> Sending packet 0 (47 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: 694815d2a993108b67, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:03 client Dropping %!s(logging.PacketType=0) packet (1220 bytes) because we already dropped the keys. 2025/04/30 12:07:03 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:03 client Dropping Handshake keys. 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 69487088bb73a668d6, StatelessResetToken: 0x7b50d9bf19d28d79f60b6d406937fa62} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6948220d52f5460bf9, StatelessResetToken: 0x07203cf723c9c20086fe2f3c4716d39d} 2025/04/30 12:07:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6948d39e061870bb35, StatelessResetToken: 0x042f08f0ce7787b952f2f440f5717910} 2025/04/30 12:07:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:03 client -> Sending packet 1 (1366 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: 69487088bb73a668d6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.PingFrame{} 2025/04/30 12:07:03 client -> Sending packet 2 (35 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: 69487088bb73a668d6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 201.626µs} 2025/04/30 12:07:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:03 client <- Reading packet 4 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.PingFrame{} 2025/04/30 12:07:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:03 client <- Reading packet 5 (354 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:03 client newly acked packets (1): [0] 2025/04/30 12:07:03 client updated RTT: 33.904575ms (σ: 16.952287ms) 2025/04/30 12:07:03 client ECN capability confirmed. 2025/04/30 12:07:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:03 client -> Sending packet 3 (33 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: 69487088bb73a668d6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 80.691µs} 2025/04/30 12:07:03 client <- Reading packet 6 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:03 client -> Sending packet 4 (31 bytes) for connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: 69487088bb73a668d6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:03 client Connection e227e2ee841d4f3c2cfeff7f81a713ec00d412aa closed. 2025/04/30 12:07:03 Requesting https://server4:443/dwybrtomfy. 2025/04/30 12:07:03 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:03 Increased send buffer size to 14336 kiB 2025/04/30 12:07:03 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:03 Created qlog file: /logs/qlog/45e3f8516ca4481221732d106f870dc681735f.sqlog 2025/04/30 12:07:03 client Starting new connection to server4 ([::]:34963 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 45e3f8516ca4481221732d106f870dc681735f, version v1 2025/04/30 12:07:03 Adding connection ID (empty). 2025/04/30 12:07:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:03 client -> Sending packet 0 (1280 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: 45e3f8516ca4481221732d106f870dc681735f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:07:03 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:03 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7b3bcf234b9c28bf95, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:03 client Received first packet. Switching destination connection ID to: 7b3bcf234b9c28bf95 2025/04/30 12:07:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 12:07:03 client newly acked packets (1): [0] 2025/04/30 12:07:03 client updated RTT: 33.029862ms (σ: 16.514931ms) 2025/04/30 12:07:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:03 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:03 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b3bcf234b9c28bf95, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/04/30 12:07:03 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 45e3f8516ca4481221732d106f870dc681735f, InitialSourceConnectionID: 7b3bcf234b9c28bf95, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf43f991abafc1f0c6c0f86cadaa2c48c} 2025/04/30 12:07:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f 2025/04/30 12:07:03 client Long Header{Type: Initial, DestConnectionID: 7b3bcf234b9c28bf95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: 7b3bcf234b9c28bf95, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:03 client Dropping Initial keys. 2025/04/30 12:07:03 client -> Sending packet 1 (41 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: 7b3bcf234b9c28bf95, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:03 client -> Sending packet 0 (47 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: 7b3bcf234b9c28bf95, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:03 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:03 client <- &wire.PingFrame{} 2025/04/30 12:07:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:03 client -> Sending packet 1 (33 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:03 client Short Header{DestConnectionID: 7b3bcf234b9c28bf95, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:03 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 63.629µs} 2025/04/30 12:07:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:07:03 client -> Sending packet 2 (91 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: 7b3bcf234b9c28bf95, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:03 client -> Sending packet 3 (91 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, Handshake 2025/04/30 12:07:03 client Long Header{Type: Handshake, DestConnectionID: 7b3bcf234b9c28bf95, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:04 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:04 client Dropping Handshake keys. 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b3b2e793c076fa8e9, StatelessResetToken: 0xfd238339b467d5684f21c418c4bbafb5} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b3b90fb64425fd199, StatelessResetToken: 0x92f1bdc2b853e3db2c4621ba518f02ca} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7b3b18cb98c5c7f217, StatelessResetToken: 0xf6a39139732150409c6da78088bb16e6} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 9aae2290bcbeda746e, StatelessResetToken: 0x3ed07edf80fb73129270576241df29ea} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 9aae1f62f1b29acf32, StatelessResetToken: 0xda6a16b5241322d390e94f8893c71d6d} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 9aae4c7889be6eec8b, StatelessResetToken: 0xb4d9075e9375e0b80caff37909d253e4} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 9aae685a8d9d9d7af2, StatelessResetToken: 0x54a785482245a21bda65c76aee78b70a} 2025/04/30 12:07:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:07:04 client -> Sending packet 3 (62 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: 9aae2290bcbeda746e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 195.645µs} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:04 client -> Sending packet 4 (55 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: 9aae2290bcbeda746e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:04 client <- Reading packet 6 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:04 client <- Reading packet 7 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.PingFrame{} 2025/04/30 12:07:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:04 client -> Sending packet 5 (35 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: 9aae2290bcbeda746e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 64.671µs} 2025/04/30 12:07:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:04 client <- Reading packet 9 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.088ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:07:04 client newly acked packets (1): [4] 2025/04/30 12:07:04 client updated RTT: 35.911ms (σ: 18.149ms) 2025/04/30 12:07:04 client ECN capability confirmed. 2025/04/30 12:07:04 client Canceling loss detection timer. 2025/04/30 12:07:04 client <- Reading packet 11 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 78.08ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:07:04 client <- &wire.PingFrame{} 2025/04/30 12:07:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:04 client -> Sending packet 6 (39 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: 9aae2290bcbeda746e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 3, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 106.178µs} 2025/04/30 12:07:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:04 client -> Sending packet 7 (31 bytes) for connection 45e3f8516ca4481221732d106f870dc681735f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: 9aae2290bcbeda746e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:04 client Connection 45e3f8516ca4481221732d106f870dc681735f closed. 2025/04/30 12:07:04 Requesting https://server4:443/lyoxdsxqoq. 2025/04/30 12:07:04 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:04 Increased send buffer size to 14336 kiB 2025/04/30 12:07:04 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:04 Created qlog file: /logs/qlog/6567f4d86dd48bded79a9771.sqlog 2025/04/30 12:07:04 client Starting new connection to server4 ([::]:54962 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6567f4d86dd48bded79a9771, version v1 2025/04/30 12:07:04 Adding connection ID (empty). 2025/04/30 12:07:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:04 client -> Sending packet 0 (1280 bytes) for connection 6567f4d86dd48bded79a9771, Initial 2025/04/30 12:07:04 client Long Header{Type: Initial, DestConnectionID: 6567f4d86dd48bded79a9771, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:07:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:07:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:04 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:07:04 client <- Reading packet 2 (133 bytes) for connection (empty), Initial 2025/04/30 12:07:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08bd5928f4c400842d, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:07:04 client Received first packet. Switching destination connection ID to: 08bd5928f4c400842d 2025/04/30 12:07:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:04 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:04 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:04 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:07:04 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:07:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08bd5928f4c400842d, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:07:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 12:07:04 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:04 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6567f4d86dd48bded79a9771, InitialSourceConnectionID: 08bd5928f4c400842d, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe1e4e6e185c2cc5e3ae783a23f229d40} 2025/04/30 12:07:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6567f4d86dd48bded79a9771 2025/04/30 12:07:04 client Long Header{Type: Initial, DestConnectionID: 08bd5928f4c400842d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:07:04 client Long Header{Type: Handshake, DestConnectionID: 08bd5928f4c400842d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:04 client Dropping Initial keys. 2025/04/30 12:07:04 client -> Sending packet 1 (41 bytes) for connection 6567f4d86dd48bded79a9771, Handshake 2025/04/30 12:07:04 client Long Header{Type: Handshake, DestConnectionID: 08bd5928f4c400842d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 12:07:04 client -> Sending packet 0 (47 bytes) for connection 6567f4d86dd48bded79a9771, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: 08bd5928f4c400842d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:04 client <- Reading packet 4 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:04 client Dropping Handshake keys. 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08bd59fddecc46be34, StatelessResetToken: 0x198ce442f89e4afbdc443f1e945f8710} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08bdcb346118449503, StatelessResetToken: 0x37867690001004cbd983c08a84deeab7} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08bd912e1182fd655d, StatelessResetToken: 0x4b3cd90fbb59e11d7d883b41ee9bbf9c} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b241cb91588da5a304, StatelessResetToken: 0x7cc30276491d2e7bbbf09c21f2413b0a} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: b241fc14365d4dbd91, StatelessResetToken: 0xe9d333f62eedf3a30688ea5eccacf234} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: b241b78565b15f1902, StatelessResetToken: 0x3f1b439efdab804753f6ad5dcd09c33b} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: b241293fae22119b15, StatelessResetToken: 0x88005b1a7ed6d95a135e3c97db3aebd4} 2025/04/30 12:07:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:04 client -> Sending packet 1 (1366 bytes) for connection 6567f4d86dd48bded79a9771, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: b241cb91588da5a304, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.PingFrame{} 2025/04/30 12:07:04 client -> Sending packet 2 (41 bytes) for connection 6567f4d86dd48bded79a9771, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: b241cb91588da5a304, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 205.804µs} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:04 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.PingFrame{} 2025/04/30 12:07:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:04 client <- Reading packet 6 (354 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:04 client newly acked packets (1): [0] 2025/04/30 12:07:04 client updated RTT: 33.89766ms (σ: 16.94883ms) 2025/04/30 12:07:04 client ECN capability confirmed. 2025/04/30 12:07:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:04 client -> Sending packet 3 (33 bytes) for connection 6567f4d86dd48bded79a9771, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: b241cb91588da5a304, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 73.788µs} 2025/04/30 12:07:04 client <- Reading packet 7 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:04 client -> Sending packet 4 (31 bytes) for connection 6567f4d86dd48bded79a9771, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: b241cb91588da5a304, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:04 client Connection 6567f4d86dd48bded79a9771 closed. 2025/04/30 12:07:04 Requesting https://server4:443/ffhbwtoyke. 2025/04/30 12:07:04 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:04 Increased send buffer size to 14336 kiB 2025/04/30 12:07:04 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:04 Created qlog file: /logs/qlog/dabcb38d42bbfff9ad42b702a706eac24f03.sqlog 2025/04/30 12:07:04 client Starting new connection to server4 ([::]:55549 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dabcb38d42bbfff9ad42b702a706eac24f03, version v1 2025/04/30 12:07:04 Adding connection ID (empty). 2025/04/30 12:07:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:04 client -> Sending packet 0 (1280 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03, Initial 2025/04/30 12:07:04 client Long Header{Type: Initial, DestConnectionID: dabcb38d42bbfff9ad42b702a706eac24f03, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:07:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:07:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:04 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:07:04 client <- Reading packet 2 (133 bytes) for connection (empty), Initial 2025/04/30 12:07:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2baacd136a68d61735, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:07:04 client Received first packet. Switching destination connection ID to: 2baacd136a68d61735 2025/04/30 12:07:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:04 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:04 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:04 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:07:04 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:07:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2baacd136a68d61735, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:07:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 742, Offset + Data length: 742} 2025/04/30 12:07:04 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:04 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dabcb38d42bbfff9ad42b702a706eac24f03, InitialSourceConnectionID: 2baacd136a68d61735, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x05b687a4a04ba1346d5d7c3bd74bb51d} 2025/04/30 12:07:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03 2025/04/30 12:07:04 client Long Header{Type: Initial, DestConnectionID: 2baacd136a68d61735, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:07:04 client Long Header{Type: Handshake, DestConnectionID: 2baacd136a68d61735, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:04 client Dropping Initial keys. 2025/04/30 12:07:04 client -> Sending packet 1 (41 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03, Handshake 2025/04/30 12:07:04 client Long Header{Type: Handshake, DestConnectionID: 2baacd136a68d61735, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 12:07:04 client -> Sending packet 0 (47 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: 2baacd136a68d61735, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:04 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:07:04 client -> Sending packet 2 (91 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03, Handshake 2025/04/30 12:07:04 client Long Header{Type: Handshake, DestConnectionID: 2baacd136a68d61735, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:04 client -> Sending packet 3 (91 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03, Handshake 2025/04/30 12:07:04 client Long Header{Type: Handshake, DestConnectionID: 2baacd136a68d61735, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:04 client <- Reading packet 4 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:04 client Peer doesn't await address validation any longer. 2025/04/30 12:07:04 client newly acked packets (1): [0] 2025/04/30 12:07:04 client updated RTT: 232.426298ms (σ: 116.213149ms) 2025/04/30 12:07:04 client ECN capability confirmed. 2025/04/30 12:07:04 client Canceling loss detection timer. 2025/04/30 12:07:04 client Dropping Handshake keys. 2025/04/30 12:07:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2baa559c568ff19eb9, StatelessResetToken: 0x14cfbed78e852871119367e19f9aeeb1} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2baa3bbc86c9a4940e, StatelessResetToken: 0x8338b83ebf79e5fb7dd5b91f6a1efe23} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2baa81c39011b933b8, StatelessResetToken: 0x6ab28b1a4f71c7527b6419f6636143f5} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: aa9308208277b20a16, StatelessResetToken: 0xca966dcc2c02e86967336c9c96d5351e} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: aa93c3309b8a0fb201, StatelessResetToken: 0x1ccdc352dce36a06ec95b185778c78c6} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: aa93b2407c01a88486, StatelessResetToken: 0xc12e5f8fce2afd76b608cb2dec58a75f} 2025/04/30 12:07:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: aa9311a3d3a3fdd0a9, StatelessResetToken: 0x9a63c8d818df67cb0f424b5d741cd8ff} 2025/04/30 12:07:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:04 client -> Sending packet 1 (41 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: aa9308208277b20a16, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 133.479µs} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:04 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.PingFrame{} 2025/04/30 12:07:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:04 client <- Reading packet 7 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:04 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:04 client -> Sending packet 2 (35 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: aa9308208277b20a16, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 62.848µs} 2025/04/30 12:07:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:04 client -> Sending packet 3 (31 bytes) for connection dabcb38d42bbfff9ad42b702a706eac24f03, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:04 client Short Header{DestConnectionID: aa9308208277b20a16, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:04 client Connection dabcb38d42bbfff9ad42b702a706eac24f03 closed. 2025/04/30 12:07:04 Requesting https://server4:443/wyitlirmqh. 2025/04/30 12:07:04 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:04 Increased send buffer size to 14336 kiB 2025/04/30 12:07:04 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:04 Created qlog file: /logs/qlog/92594a8c89cbee7c.sqlog 2025/04/30 12:07:04 client Starting new connection to server4 ([::]:45063 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 92594a8c89cbee7c, version v1 2025/04/30 12:07:04 Adding connection ID (empty). 2025/04/30 12:07:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:04 client -> Sending packet 0 (1280 bytes) for connection 92594a8c89cbee7c, Initial 2025/04/30 12:07:04 client Long Header{Type: Initial, DestConnectionID: 92594a8c89cbee7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:07:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 12:07:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:07:05 client -> Sending packet 1 (1280 bytes) for connection 92594a8c89cbee7c, Initial 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: 92594a8c89cbee7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:07:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 12:07:05 client -> Sending packet 2 (1280 bytes) for connection 92594a8c89cbee7c, Initial 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: 92594a8c89cbee7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:07:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 12:07:05 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:05 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1721dcb712b65a2ad, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:05 client Received first packet. Switching destination connection ID to: c1721dcb712b65a2ad 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:05 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:05 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c1721dcb712b65a2ad, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:07:05 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 92594a8c89cbee7c, InitialSourceConnectionID: c1721dcb712b65a2ad, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x709db3b531f60d85f9df73dfce86862c} 2025/04/30 12:07:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 92594a8c89cbee7c 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: c1721dcb712b65a2ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: c1721dcb712b65a2ad, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:05 client Dropping Initial keys. 2025/04/30 12:07:05 client -> Sending packet 1 (41 bytes) for connection 92594a8c89cbee7c, Handshake 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: c1721dcb712b65a2ad, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:05 client -> Sending packet 0 (47 bytes) for connection 92594a8c89cbee7c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: c1721dcb712b65a2ad, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:05 client <- Reading packet 4 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.PingFrame{} 2025/04/30 12:07:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:05 client -> Sending packet 1 (33 bytes) for connection 92594a8c89cbee7c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: c1721dcb712b65a2ad, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 75.481µs} 2025/04/30 12:07:05 client <- Reading packet 5 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:05 client <- Reading packet 6 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:05 client -> Sending packet 2 (33 bytes) for connection 92594a8c89cbee7c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: c1721dcb712b65a2ad, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 71.995µs} 2025/04/30 12:07:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:05 client -> Sending packet 2 (71 bytes) for connection 92594a8c89cbee7c, Handshake 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: c1721dcb712b65a2ad, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:07:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:05 client Short Header{DestConnectionID: c1721dcb712b65a2ad, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:05 client Connection 92594a8c89cbee7c closed. 2025/04/30 12:07:05 Requesting https://server4:443/lqwdcgmxuf. 2025/04/30 12:07:05 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:05 Increased send buffer size to 14336 kiB 2025/04/30 12:07:05 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:05 Created qlog file: /logs/qlog/39bd32e8d3515c9b0e.sqlog 2025/04/30 12:07:05 client Starting new connection to server4 ([::]:38320 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 39bd32e8d3515c9b0e, version v1 2025/04/30 12:07:05 Adding connection ID (empty). 2025/04/30 12:07:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:05 client -> Sending packet 0 (1280 bytes) for connection 39bd32e8d3515c9b0e, Initial 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: 39bd32e8d3515c9b0e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:07:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:07:05 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 12:07:05 client <- Reading packet 2 (133 bytes) for connection (empty), Initial 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f96e72f763f70e2e8e, Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 114, Version: v1} 2025/04/30 12:07:05 client Received first packet. Switching destination connection ID to: f96e72f763f70e2e8e 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:05 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 12:07:05 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f96e72f763f70e2e8e, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:07:05 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 39bd32e8d3515c9b0e, InitialSourceConnectionID: f96e72f763f70e2e8e, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xbbf073f2e1281ab068ab8bf5d8872d4a} 2025/04/30 12:07:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 39bd32e8d3515c9b0e 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: f96e72f763f70e2e8e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: f96e72f763f70e2e8e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:05 client Dropping Initial keys. 2025/04/30 12:07:05 client -> Sending packet 1 (41 bytes) for connection 39bd32e8d3515c9b0e, Handshake 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: f96e72f763f70e2e8e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 12:07:05 client -> Sending packet 0 (47 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: f96e72f763f70e2e8e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:05 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.PingFrame{} 2025/04/30 12:07:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:05 client -> Sending packet 1 (33 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: f96e72f763f70e2e8e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 64.531µs} 2025/04/30 12:07:05 client <- Reading packet 7 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.PingFrame{} 2025/04/30 12:07:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:05 client -> Sending packet 2 (35 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: f96e72f763f70e2e8e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 74.018µs} 2025/04/30 12:07:05 client <- Reading packet 8 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.12ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:05 client Peer doesn't await address validation any longer. 2025/04/30 12:07:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:05 client Dropping Handshake keys. 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f96e7e503bcb3ec7a0, StatelessResetToken: 0x5c5f4ec1a3b6ec7e665fe2044cca2a7c} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f96ec8a5497066ba24, StatelessResetToken: 0x48ddd59b15dd30defa18a4150ea3d1d0} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f96ee87cd9972651bd, StatelessResetToken: 0x22bc66f089c64d6b89683dfc6fbf4cbf} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: baabd8a3eea3867638, StatelessResetToken: 0x5ffb8773232497a967b78065c6563f33} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: baab4befc017111277, StatelessResetToken: 0xc91d1bc192f22e44a0af171f7a5e4882} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: baab662c44d30d03bc, StatelessResetToken: 0xf0b5f257ef2b63c21030083097da06d3} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: baab77cd56db772833, StatelessResetToken: 0x3c2df5421bdccbc15502355b8713bf08} 2025/04/30 12:07:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:05 client -> Sending packet 3 (1366 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.PingFrame{} 2025/04/30 12:07:05 client -> Sending packet 4 (43 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 269.153µs} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:05 client <- Reading packet 9 (31 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:07:05 client newly acked packets (1): [3] 2025/04/30 12:07:05 client updated RTT: 31.701887ms (σ: 15.850943ms) 2025/04/30 12:07:05 client ECN capability confirmed. 2025/04/30 12:07:05 client lost packet 0 (time threshold) 2025/04/30 12:07:05 client -> Sending packet 5 (47 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:05 client <- Reading packet 10 (354 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:07:05 client newly acked packets (1): [4] 2025/04/30 12:07:05 client updated RTT: 31.737ms (σ: 11.959ms) 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:05 client Ignoring all packets below 9. 2025/04/30 12:07:05 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:05 client -> Sending packet 6 (34 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 25.250965ms} 2025/04/30 12:07:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:07:05 client -> Sending packet 8 (47 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:05 client -> Sending packet 9 (47 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:05 client <- Reading packet 12 (36 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:07:05 client <- &wire.MaxDataFrame{MaximumData: 16777233} 2025/04/30 12:07:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:07:05 client -> Sending packet 10 (1409 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.PingFrame{} 2025/04/30 12:07:05 client -> Sending packet 11 (35 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 9, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 9}}, DelayTime: 110.667µs} 2025/04/30 12:07:05 client <- Reading packet 14 (32 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 25.088ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:07:05 client newly acked packets (1): [9] 2025/04/30 12:07:05 client updated RTT: 34.786ms (σ: 15.068ms) 2025/04/30 12:07:05 client Canceling loss detection timer. 2025/04/30 12:07:05 client <- Reading packet 15 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 9, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}}, DelayTime: 59.136ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:07:05 client <- &wire.PingFrame{} 2025/04/30 12:07:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:05 client <- Reading packet 16 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.PingFrame{} 2025/04/30 12:07:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:05 client -> Sending packet 12 (37 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 9, AckRanges: {{Largest: 16, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 9}}, DelayTime: 60.002µs} 2025/04/30 12:07:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:05 client -> Sending packet 13 (31 bytes) for connection 39bd32e8d3515c9b0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: baabd8a3eea3867638, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:05 client Connection 39bd32e8d3515c9b0e closed. 2025/04/30 12:07:05 Requesting https://server4:443/ttwqgdwgsu. 2025/04/30 12:07:05 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:05 Increased send buffer size to 14336 kiB 2025/04/30 12:07:05 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:05 Created qlog file: /logs/qlog/c54fc83b13ef6cd10383245f6ef19df3.sqlog 2025/04/30 12:07:05 client Starting new connection to server4 ([::]:45846 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c54fc83b13ef6cd10383245f6ef19df3, version v1 2025/04/30 12:07:05 Adding connection ID (empty). 2025/04/30 12:07:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:05 client -> Sending packet 0 (1280 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, Initial 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: c54fc83b13ef6cd10383245f6ef19df3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:07:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:07:05 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:05 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5219a5bfc54d679ba5, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:05 client Received first packet. Switching destination connection ID to: 5219a5bfc54d679ba5 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:05 client newly acked packets (1): [0] 2025/04/30 12:07:05 client updated RTT: 33.04631ms (σ: 16.523155ms) 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:05 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:05 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5219a5bfc54d679ba5, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 740, Offset + Data length: 740} 2025/04/30 12:07:05 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c54fc83b13ef6cd10383245f6ef19df3, InitialSourceConnectionID: 5219a5bfc54d679ba5, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xda40d44e096b904722911fbf0b480fad} 2025/04/30 12:07:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3 2025/04/30 12:07:05 client Long Header{Type: Initial, DestConnectionID: 5219a5bfc54d679ba5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: 5219a5bfc54d679ba5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:05 client Dropping Initial keys. 2025/04/30 12:07:05 client -> Sending packet 1 (88 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, Handshake 2025/04/30 12:07:05 client Long Header{Type: Handshake, DestConnectionID: 5219a5bfc54d679ba5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:05 client Short Header{DestConnectionID: 5219a5bfc54d679ba5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:05 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:05 client Peer doesn't await address validation any longer. 2025/04/30 12:07:05 client newly acked packets (1): [0] 2025/04/30 12:07:05 client updated RTT: 33.004ms (σ: 12.476ms) 2025/04/30 12:07:05 client Canceling loss detection timer. 2025/04/30 12:07:05 client Dropping Handshake keys. 2025/04/30 12:07:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5219009cfe3e29ef78, StatelessResetToken: 0xfd7829bba1db153b9245b3ad0aa47f7b} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5219de4a61ece6eeb0, StatelessResetToken: 0xa6c602efd7e7859e540fc6d27f6228a8} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52196b92e21f8fe740, StatelessResetToken: 0x514c0f317f21727eefe03c8fe6f8a686} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b1a71cc9121f441c58, StatelessResetToken: 0x93c17f7c4c938e8c95a41c5de30737eb} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: b1a72c6047879c5587, StatelessResetToken: 0x8f82eb227be812046972c4f829e721e7} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: b1a763f16e45dbce57, StatelessResetToken: 0xb163015cd85b30a30f3445b7d7fb60d7} 2025/04/30 12:07:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: b1a7fa6c943df01ee9, StatelessResetToken: 0x70f4a32e530bbf2500a8e24cfe25c4f6} 2025/04/30 12:07:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:05 client -> Sending packet 1 (41 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 182.809µs} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:05 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.PingFrame{} 2025/04/30 12:07:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:05 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:05 client -> Sending packet 2 (33 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 64.17µs} 2025/04/30 12:07:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:07:05 client -> Sending packet 4 (36 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:05 client -> Sending packet 5 (36 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:05 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:05 client <- Reading packet 7 (31 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:05 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 12:07:06 client -> Sending packet 7 (36 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:06 client -> Sending packet 8 (36 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:06 client -> Sending packet 9 (1366 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.PingFrame{} 2025/04/30 12:07:06 client <- Reading packet 8 (33 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:07:06 client newly acked packets (1): [8] 2025/04/30 12:07:06 client updated RTT: 32.727ms (σ: 9.91ms) 2025/04/30 12:07:06 client ECN capability confirmed. 2025/04/30 12:07:06 client Canceling loss detection timer. 2025/04/30 12:07:06 client <- Reading packet 9 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b1a71cc9121f441c58, StatelessResetToken: 0x93c17f7c4c938e8c95a41c5de30737eb} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: b1a72c6047879c5587, StatelessResetToken: 0x8f82eb227be812046972c4f829e721e7} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: b1a763f16e45dbce57, StatelessResetToken: 0xb163015cd85b30a30f3445b7d7fb60d7} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: b1a7fa6c943df01ee9, StatelessResetToken: 0x70f4a32e530bbf2500a8e24cfe25c4f6} 2025/04/30 12:07:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:06 client Sending ACK because the ACK timer expired. 2025/04/30 12:07:06 client -> Sending packet 10 (36 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 7}, {Largest: 4, Smallest: 2}}, DelayTime: 25.359146ms} 2025/04/30 12:07:06 client <- Reading packet 10 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:07:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:06 client <- Reading packet 11 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.PingFrame{} 2025/04/30 12:07:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:06 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:06 client -> Sending packet 11 (35 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 7}, {Largest: 4, Smallest: 2}}, DelayTime: 65.602µs} 2025/04/30 12:07:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:06 client -> Sending packet 12 (31 bytes) for connection c54fc83b13ef6cd10383245f6ef19df3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: b1a71cc9121f441c58, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:06 client Connection c54fc83b13ef6cd10383245f6ef19df3 closed. 2025/04/30 12:07:06 Requesting https://server4:443/qthyfiifzl. 2025/04/30 12:07:06 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:06 Increased send buffer size to 14336 kiB 2025/04/30 12:07:06 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:06 Created qlog file: /logs/qlog/6b64a7c285bba3b07424145d7e3946.sqlog 2025/04/30 12:07:06 client Starting new connection to server4 ([::]:40268 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6b64a7c285bba3b07424145d7e3946, version v1 2025/04/30 12:07:06 Adding connection ID (empty). 2025/04/30 12:07:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:06 client -> Sending packet 0 (1280 bytes) for connection 6b64a7c285bba3b07424145d7e3946, Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: 6b64a7c285bba3b07424145d7e3946, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:07:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:07:06 client -> Sending packet 1 (1280 bytes) for connection 6b64a7c285bba3b07424145d7e3946, Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: 6b64a7c285bba3b07424145d7e3946, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:07:06 client -> Sending packet 2 (1280 bytes) for connection 6b64a7c285bba3b07424145d7e3946, Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: 6b64a7c285bba3b07424145d7e3946, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:07:06 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:06 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 527963c840c82a43dc, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:06 client Received first packet. Switching destination connection ID to: 527963c840c82a43dc 2025/04/30 12:07:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 8µs} 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:06 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:06 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 527963c840c82a43dc, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/04/30 12:07:06 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6b64a7c285bba3b07424145d7e3946, InitialSourceConnectionID: 527963c840c82a43dc, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x99db10c53138782f978b5501e5c8e974} 2025/04/30 12:07:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6b64a7c285bba3b07424145d7e3946 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: 527963c840c82a43dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: 527963c840c82a43dc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:06 client Dropping Initial keys. 2025/04/30 12:07:06 client -> Sending packet 1 (41 bytes) for connection 6b64a7c285bba3b07424145d7e3946, Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: 527963c840c82a43dc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:06 client -> Sending packet 0 (47 bytes) for connection 6b64a7c285bba3b07424145d7e3946, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: 527963c840c82a43dc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:06 client Dropping %!s(logging.PacketType=0) packet (1220 bytes) because we already dropped the keys. 2025/04/30 12:07:06 client <- Reading packet 6 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:06 client Dropping Handshake keys. 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5279183d3779697624, StatelessResetToken: 0x02f253410bda9722a0ed06c785111484} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5279203f484dd1d572, StatelessResetToken: 0x0f358823c8a79098d6de9f1568a35883} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5279ffc2bdfb5a3eed, StatelessResetToken: 0xb6737d7ef179b567723dae836a9ff39e} 2025/04/30 12:07:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:06 client -> Sending packet 1 (1366 bytes) for connection 6b64a7c285bba3b07424145d7e3946, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: 5279183d3779697624, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.PingFrame{} 2025/04/30 12:07:06 client -> Sending packet 2 (35 bytes) for connection 6b64a7c285bba3b07424145d7e3946, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: 5279183d3779697624, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 203.35µs} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:06 client <- Reading packet 7 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:06 client newly acked packets (1): [2] 2025/04/30 12:07:06 client updated RTT: 32.816464ms (σ: 16.408232ms) 2025/04/30 12:07:06 client ECN capability confirmed. 2025/04/30 12:07:06 client lost packet 0 (time threshold) 2025/04/30 12:07:06 client setting loss timer for packet 1 (1-RTT) to 36.918522ms (in 2025-04-30 12:07:06.55911591 +0000 UTC m=+14.622807959) 2025/04/30 12:07:06 client Canceling loss detection timer. 2025/04/30 12:07:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 5279422dd88433595d, StatelessResetToken: 0xaf1656e8066397b06bb8da838abedac6} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 13e5d85a1ff3e04e61, StatelessResetToken: 0xfdb99d0261d7a0e157acd93b455d760c} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 13e53bf50c51cedd73, StatelessResetToken: 0x1cb2e9a629f8f2158aa0a5e34b4a12c9} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 13e513793afd64fae3, StatelessResetToken: 0xb2153361f3a4ecbf3fb225eab79018f4} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 8, RetirePriorTo: 5, ConnectionID: 13e576e7f770f3826c, StatelessResetToken: 0xfe8b3370608797cce272c1a238835189} 2025/04/30 12:07:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:06 client Ignoring all packets below 7. 2025/04/30 12:07:06 client -> Sending packet 3 (60 bytes) for connection 6b64a7c285bba3b07424145d7e3946, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: 13e5d85a1ff3e04e61, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 169.166µs} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 4} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:06 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 12:07:06.55911591 +0000 UTC m=+14.622807959 2025/04/30 12:07:06 client lost packet 1 (time threshold) 2025/04/30 12:07:06 client <- Reading packet 8 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:07:06 client newly acked packets (1): [3] 2025/04/30 12:07:06 client updated RTT: 32.658ms (σ: 12.62ms) 2025/04/30 12:07:06 client Canceling loss detection timer. 2025/04/30 12:07:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:06 client Ignoring all packets below 8. 2025/04/30 12:07:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:06 client -> Sending packet 4 (31 bytes) for connection 6b64a7c285bba3b07424145d7e3946, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: 13e5d85a1ff3e04e61, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:06 client Connection 6b64a7c285bba3b07424145d7e3946 closed. 2025/04/30 12:07:06 Requesting https://server4:443/nsctmmbulq. 2025/04/30 12:07:06 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:06 Increased send buffer size to 14336 kiB 2025/04/30 12:07:06 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:06 Created qlog file: /logs/qlog/7bbd5d806d716e1f.sqlog 2025/04/30 12:07:06 client Starting new connection to server4 ([::]:35573 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7bbd5d806d716e1f, version v1 2025/04/30 12:07:06 Adding connection ID (empty). 2025/04/30 12:07:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:06 client -> Sending packet 0 (1280 bytes) for connection 7bbd5d806d716e1f, Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: 7bbd5d806d716e1f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:07:06 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:06 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 486507f2f1120b0604, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:06 client Received first packet. Switching destination connection ID to: 486507f2f1120b0604 2025/04/30 12:07:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:06 client newly acked packets (1): [0] 2025/04/30 12:07:06 client updated RTT: 33.103714ms (σ: 16.551857ms) 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:06 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:06 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 486507f2f1120b0604, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:07:06 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7bbd5d806d716e1f, InitialSourceConnectionID: 486507f2f1120b0604, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x4f70a0963a0bd575521c48b6ff023674} 2025/04/30 12:07:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7bbd5d806d716e1f 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: 486507f2f1120b0604, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: 486507f2f1120b0604, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:06 client Dropping Initial keys. 2025/04/30 12:07:06 client -> Sending packet 1 (41 bytes) for connection 7bbd5d806d716e1f, Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: 486507f2f1120b0604, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:06 client -> Sending packet 0 (47 bytes) for connection 7bbd5d806d716e1f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: 486507f2f1120b0604, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:06 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:07:06 client Peer doesn't await address validation any longer. 2025/04/30 12:07:06 client newly acked packets (1): [0] 2025/04/30 12:07:06 client updated RTT: 33.057ms (σ: 12.503ms) 2025/04/30 12:07:06 client ECN capability confirmed. 2025/04/30 12:07:06 client Canceling loss detection timer. 2025/04/30 12:07:06 client Dropping Handshake keys. 2025/04/30 12:07:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4865ae9a4a5bda9a08, StatelessResetToken: 0x4f90f9e30673e06d1148aa47f743230e} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 48658dc954e5c76bc9, StatelessResetToken: 0x12a004d78261a140897bebd6c9c85550} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4865b916c1f653b476, StatelessResetToken: 0xe82bd15f91d6a82548268d869fce1ce6} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: db992d9c0ae434df19, StatelessResetToken: 0xf85230c11fd799de427d1e5bb76f5681} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: db99c1b74dc5a64282, StatelessResetToken: 0x1aeec7e155737c67311dc5e193d125ab} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: db9912071d4e7ffd57, StatelessResetToken: 0xc90dbcabbcbd620c4ad974661160b4b2} 2025/04/30 12:07:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: db991881d22693c1f4, StatelessResetToken: 0x29823f0928767765276ab4f0b73b3dbb} 2025/04/30 12:07:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:06 client -> Sending packet 1 (41 bytes) for connection 7bbd5d806d716e1f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: db992d9c0ae434df19, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 179.445µs} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:06 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.PingFrame{} 2025/04/30 12:07:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:06 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:06 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:06 client -> Sending packet 2 (33 bytes) for connection 7bbd5d806d716e1f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: db992d9c0ae434df19, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 57.267µs} 2025/04/30 12:07:06 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:06 client -> Sending packet 3 (31 bytes) for connection 7bbd5d806d716e1f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: db992d9c0ae434df19, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:06 client Connection 7bbd5d806d716e1f closed. 2025/04/30 12:07:06 Requesting https://server4:443/omotnacsmz. 2025/04/30 12:07:06 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:06 Increased send buffer size to 14336 kiB 2025/04/30 12:07:06 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:06 Created qlog file: /logs/qlog/b433d8faefc2b31abea8f948bebd268b.sqlog 2025/04/30 12:07:06 client Starting new connection to server4 ([::]:33993 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b433d8faefc2b31abea8f948bebd268b, version v1 2025/04/30 12:07:06 Adding connection ID (empty). 2025/04/30 12:07:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:06 client -> Sending packet 0 (1280 bytes) for connection b433d8faefc2b31abea8f948bebd268b, Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: b433d8faefc2b31abea8f948bebd268b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:07:06 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:06 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d37cb3f04c94bdc354, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:06 client Received first packet. Switching destination connection ID to: d37cb3f04c94bdc354 2025/04/30 12:07:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 12:07:06 client newly acked packets (1): [0] 2025/04/30 12:07:06 client updated RTT: 33.057881ms (σ: 16.52894ms) 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:06 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:06 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d37cb3f04c94bdc354, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 741, Offset + Data length: 741} 2025/04/30 12:07:06 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b433d8faefc2b31abea8f948bebd268b, InitialSourceConnectionID: d37cb3f04c94bdc354, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xd700f844ab810d9d738f883949e566e9} 2025/04/30 12:07:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b433d8faefc2b31abea8f948bebd268b 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: d37cb3f04c94bdc354, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: d37cb3f04c94bdc354, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:06 client Dropping Initial keys. 2025/04/30 12:07:06 client -> Sending packet 1 (41 bytes) for connection b433d8faefc2b31abea8f948bebd268b, Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: d37cb3f04c94bdc354, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:06 client -> Sending packet 0 (47 bytes) for connection b433d8faefc2b31abea8f948bebd268b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: d37cb3f04c94bdc354, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:07:06 client -> Sending packet 2 (91 bytes) for connection b433d8faefc2b31abea8f948bebd268b, Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: d37cb3f04c94bdc354, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:06 client -> Sending packet 3 (91 bytes) for connection b433d8faefc2b31abea8f948bebd268b, Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: d37cb3f04c94bdc354, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:06 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.PingFrame{} 2025/04/30 12:07:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:06 client -> Sending packet 1 (33 bytes) for connection b433d8faefc2b31abea8f948bebd268b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: d37cb3f04c94bdc354, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 63.218µs} 2025/04/30 12:07:06 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:06 client <- Reading packet 5 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:06 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:06 client -> Sending packet 2 (33 bytes) for connection b433d8faefc2b31abea8f948bebd268b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:06 client Short Header{DestConnectionID: d37cb3f04c94bdc354, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 69.159µs} 2025/04/30 12:07:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:06 client -> Sending packet 4 (71 bytes) for connection b433d8faefc2b31abea8f948bebd268b, Handshake 2025/04/30 12:07:06 client Long Header{Type: Handshake, DestConnectionID: d37cb3f04c94bdc354, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:07:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:06 client Short Header{DestConnectionID: d37cb3f04c94bdc354, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:06 client Connection b433d8faefc2b31abea8f948bebd268b closed. 2025/04/30 12:07:06 Requesting https://server4:443/rlrlhpzsir. 2025/04/30 12:07:06 Increased receive buffer size to 14336 kiB 2025/04/30 12:07:06 Increased send buffer size to 14336 kiB 2025/04/30 12:07:06 Setting DF for IPv4 and IPv6. 2025/04/30 12:07:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:07:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:07:06 Created qlog file: /logs/qlog/851229482b1252fbcdb6038223.sqlog 2025/04/30 12:07:06 client Starting new connection to server4 ([::]:48480 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 851229482b1252fbcdb6038223, version v1 2025/04/30 12:07:06 Adding connection ID (empty). 2025/04/30 12:07:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:07:06 client -> Sending packet 0 (1280 bytes) for connection 851229482b1252fbcdb6038223, Initial 2025/04/30 12:07:06 client Long Header{Type: Initial, DestConnectionID: 851229482b1252fbcdb6038223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:07:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 12:07:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:07:07 client -> Sending packet 1 (1280 bytes) for connection 851229482b1252fbcdb6038223, Initial 2025/04/30 12:07:07 client Long Header{Type: Initial, DestConnectionID: 851229482b1252fbcdb6038223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:07:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 12:07:07 client -> Sending packet 2 (1280 bytes) for connection 851229482b1252fbcdb6038223, Initial 2025/04/30 12:07:07 client Long Header{Type: Initial, DestConnectionID: 851229482b1252fbcdb6038223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:07:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 12:07:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:07:07 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:07:07 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:07:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fa925f8b4ee56e3018, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:07:07 client Received first packet. Switching destination connection ID to: fa925f8b4ee56e3018 2025/04/30 12:07:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 12:07:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:07:07 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:07 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:07 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:07:07 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:07:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fa925f8b4ee56e3018, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:07:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 12:07:07 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:07 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:07:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 851229482b1252fbcdb6038223, InitialSourceConnectionID: fa925f8b4ee56e3018, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xb7f78f9c6c783872056bfbea96a0c4fe} 2025/04/30 12:07:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 851229482b1252fbcdb6038223 2025/04/30 12:07:07 client Long Header{Type: Initial, DestConnectionID: fa925f8b4ee56e3018, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 12:07:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:07 client Long Header{Type: Handshake, DestConnectionID: fa925f8b4ee56e3018, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:07:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:07:07 client Dropping Initial keys. 2025/04/30 12:07:07 client -> Sending packet 1 (88 bytes) for connection 851229482b1252fbcdb6038223, Handshake 2025/04/30 12:07:07 client Long Header{Type: Handshake, DestConnectionID: fa925f8b4ee56e3018, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:07:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:07:07 client Short Header{DestConnectionID: fa925f8b4ee56e3018, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:07:07 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:07 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:07:07 client Peer doesn't await address validation any longer. 2025/04/30 12:07:07 client newly acked packets (1): [0] 2025/04/30 12:07:07 client updated RTT: 32.711964ms (σ: 16.355982ms) 2025/04/30 12:07:07 client Canceling loss detection timer. 2025/04/30 12:07:07 client Dropping Handshake keys. 2025/04/30 12:07:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:07:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fa92433340264cb455, StatelessResetToken: 0x02bcfb72b4ea84c1a79debf1c68d6881} 2025/04/30 12:07:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fa9217f8abdd41736c, StatelessResetToken: 0x0ebce04ebf7f082347ed960f22647382} 2025/04/30 12:07:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fa9220d4dec30f3384, StatelessResetToken: 0x071c0c30b5790629a7cf7a77413b7413} 2025/04/30 12:07:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 839aa6456bc425a0cf, StatelessResetToken: 0xf6431f1884e3b852847c18fbfba3beee} 2025/04/30 12:07:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: 839af494683a237bd7, StatelessResetToken: 0x8d45ef2e7dab78527fdd54b7cd93f3f6} 2025/04/30 12:07:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: 839a7075649587b454, StatelessResetToken: 0x0bd651e37df4132f95341e600e078866} 2025/04/30 12:07:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: 839a05198aa25e2bce, StatelessResetToken: 0x4da832e81c41b64a77b162a3947b404c} 2025/04/30 12:07:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:07:07 client -> Sending packet 1 (41 bytes) for connection 851229482b1252fbcdb6038223, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:07 client Short Header{DestConnectionID: 839aa6456bc425a0cf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 213.128µs} 2025/04/30 12:07:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:07:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:07:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:07:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:07:07 client <- Reading packet 4 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:07 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:07 client <- &wire.PingFrame{} 2025/04/30 12:07:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:07 client <- Reading packet 5 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:07 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:07:07 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:07:07 client -> Sending packet 2 (33 bytes) for connection 851229482b1252fbcdb6038223, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:07 client Short Header{DestConnectionID: 839aa6456bc425a0cf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:07 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 67.927µs} 2025/04/30 12:07:07 client <- Reading packet 6 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 12:07:07 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:07:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:07:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:07:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:07:07 client -> Sending packet 3 (31 bytes) for connection 851229482b1252fbcdb6038223, 1-RTT (ECN: ECT(0)) 2025/04/30 12:07:07 client Short Header{DestConnectionID: 839aa6456bc425a0cf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:07:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:07:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:07:07 client Connection 851229482b1252fbcdb6038223 closed.