2025/04/30 19:24:09 Requesting https://server4:443/enanfyotea. 2025/04/30 19:24:09 Increased receive buffer size to 14336 kiB 2025/04/30 19:24:09 Increased send buffer size to 14336 kiB 2025/04/30 19:24:09 Setting DF for IPv4 and IPv6. 2025/04/30 19:24:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 19:24:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 19:24:09 Created qlog file: /logs/qlog/48b5a40c6cb8b96a6711ccc4384f379d760fbb77.sqlog 2025/04/30 19:24:09 client Starting new connection to server4 ([::]:39308 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, version v1 2025/04/30 19:24:09 Adding connection ID (empty). 2025/04/30 19:24:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 19:24:09 client -> Sending packet 0 (1280 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Initial 2025/04/30 19:24:09 client Long Header{Type: Initial, DestConnectionID: 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 19:24:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:24:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 19:24:09 client -> Sending packet 1 (1280 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Initial 2025/04/30 19:24:09 client Long Header{Type: Initial, DestConnectionID: 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 19:24:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:24:09 client -> Sending packet 2 (1280 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Initial 2025/04/30 19:24:09 client Long Header{Type: Initial, DestConnectionID: 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 19:24:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:24:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 19:24:10 client -> Sending packet 3 (1280 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Initial 2025/04/30 19:24:10 client Long Header{Type: Initial, DestConnectionID: 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 19:24:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:24:10 client -> Sending packet 4 (1280 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Initial 2025/04/30 19:24:10 client Long Header{Type: Initial, DestConnectionID: 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 19:24:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:24:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 19:24:11 client -> Sending packet 5 (1280 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Initial 2025/04/30 19:24:11 client Long Header{Type: Initial, DestConnectionID: 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 19:24:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:24:11 client -> Sending packet 6 (1280 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Initial 2025/04/30 19:24:11 client Long Header{Type: Initial, DestConnectionID: 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 19:24:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 19:24:11 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 19:24:11 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 19:24:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d1eb4a230f197aa635, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 19:24:11 client Received first packet. Switching destination connection ID to: d1eb4a230f197aa635 2025/04/30 19:24:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 24µs} 2025/04/30 19:24:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 19:24:11 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 19:24:11 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 19:24:11 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 19:24:11 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d1eb4a230f197aa635, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 19:24:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/04/30 19:24:11 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 19:24:11 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 19:24:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, InitialSourceConnectionID: d1eb4a230f197aa635, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xae7c726624d70459cdd92738fc696dae} 2025/04/30 19:24:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77 2025/04/30 19:24:11 client Long Header{Type: Initial, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1170, Version: v1} 2025/04/30 19:24:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 19:24:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 19:24:11 client Dropping Initial keys. 2025/04/30 19:24:11 client -> Sending packet 1 (41 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 19:24:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 19:24:11 client -> Sending packet 0 (47 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, 1-RTT (ECN: ECT(0)) 2025/04/30 19:24:11 client Short Header{DestConnectionID: d1eb4a230f197aa635, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:24:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 19:24:11 client Parsed a coalesced packet. Part 1: 133 bytes. Remaining: 1087 bytes. 2025/04/30 19:24:11 client Dropping %!s(logging.PacketType=0) packet (133 bytes) because we already dropped the keys. 2025/04/30 19:24:11 client Parsed a coalesced packet. Part 2: 1087 bytes. Remaining: 0 bytes. 2025/04/30 19:24:11 client <- Reading packet 3 (1087 bytes) for connection (empty), Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d1eb4a230f197aa635, PacketNumber: 3, PacketNumberLen: 4, Length: 1069, Version: v1} 2025/04/30 19:24:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/04/30 19:24:11 client -> Sending packet 2 (43 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 19:24:11 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 19:24:11 client Dropping %!s(logging.PacketType=0) packet (1220 bytes) because we already dropped the keys. 2025/04/30 19:24:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 19:24:11 client -> Sending packet 3 (91 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 19:24:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 19:24:11 client -> Sending packet 4 (91 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 19:24:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 19:24:11 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1086 bytes. 2025/04/30 19:24:11 client Dropping %!s(logging.PacketType=0) packet (134 bytes) because we already dropped the keys. 2025/04/30 19:24:11 client Parsed a coalesced packet. Part 2: 1086 bytes. Remaining: 0 bytes. 2025/04/30 19:24:11 client <- Reading packet 6 (1086 bytes) for connection (empty), Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d1eb4a230f197aa635, PacketNumber: 6, PacketNumberLen: 4, Length: 1068, Version: v1} 2025/04/30 19:24:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/04/30 19:24:11 client -> Sending packet 5 (45 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 27, Version: v1} 2025/04/30 19:24:11 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 19:24:11 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 19:24:11 client Dropping %!s(logging.PacketType=0) packet (1220 bytes) because we already dropped the keys. 2025/04/30 19:24:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 19:24:11 client -> Sending packet 6 (91 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 19:24:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 19:24:11 client -> Sending packet 7 (91 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:11 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 19:24:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 19:24:12 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1086 bytes. 2025/04/30 19:24:12 client Dropping %!s(logging.PacketType=0) packet (134 bytes) because we already dropped the keys. 2025/04/30 19:24:12 client Parsed a coalesced packet. Part 2: 1086 bytes. Remaining: 0 bytes. 2025/04/30 19:24:12 client <- Reading packet 9 (1086 bytes) for connection (empty), Handshake 2025/04/30 19:24:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d1eb4a230f197aa635, PacketNumber: 9, PacketNumberLen: 4, Length: 1068, Version: v1} 2025/04/30 19:24:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 743, Offset + Data length: 743} 2025/04/30 19:24:12 client -> Sending packet 8 (47 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:12 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 29, Version: v1} 2025/04/30 19:24:12 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 19:24:12 client Dropping %!s(logging.PacketType=0) packet (1220 bytes) because we already dropped the keys. 2025/04/30 19:24:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 19:24:12 client -> Sending packet 9 (91 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:12 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 19:24:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 19:24:12 client -> Sending packet 10 (91 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, Handshake 2025/04/30 19:24:12 client Long Header{Type: Handshake, DestConnectionID: d1eb4a230f197aa635, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 19:24:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 19:24:12 client <- Reading packet 11 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 19:24:12 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 19:24:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 19:24:12 client Peer doesn't await address validation any longer. 2025/04/30 19:24:12 client newly acked packets (1): [0] 2025/04/30 19:24:12 client updated RTT: 1.502596785s (σ: 751.298392ms) 2025/04/30 19:24:12 client ECN capability confirmed. 2025/04/30 19:24:12 client Canceling loss detection timer. 2025/04/30 19:24:12 client Dropping Handshake keys. 2025/04/30 19:24:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 19:24:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d1eb06b60e4b5b126f, StatelessResetToken: 0xff1507b94054354cb42181d2a9f39fa7} 2025/04/30 19:24:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d1eb47fc989f010947, StatelessResetToken: 0x172289a4a03b4292fa4cc78c05287a7a} 2025/04/30 19:24:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d1eb660e066b1c5075, StatelessResetToken: 0x673c01b82972b066c9991de26bb1b85e} 2025/04/30 19:24:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 19:24:12 client -> Sending packet 1 (35 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, 1-RTT (ECN: ECT(0)) 2025/04/30 19:24:12 client Short Header{DestConnectionID: d1eb06b60e4b5b126f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:24:12 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 144.851µs} 2025/04/30 19:24:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 19:24:12 client <- Reading packet 12 (1252 bytes) for connection (empty), 1-RTT 2025/04/30 19:24:12 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 19:24:12 client <- &wire.PingFrame{} 2025/04/30 19:24:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 19:24:12 client <- Reading packet 13 (346 bytes) for connection (empty), 1-RTT 2025/04/30 19:24:12 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 19:24:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 19:24:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 19:24:12 client -> Sending packet 2 (33 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, 1-RTT (ECN: ECT(0)) 2025/04/30 19:24:12 client Short Header{DestConnectionID: d1eb06b60e4b5b126f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:24:12 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 11, DelayTime: 47.779µs} 2025/04/30 19:24:12 client <- Reading packet 14 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 19:24:12 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 19:24:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 19:24:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 19:24:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 19:24:12 client -> Sending packet 3 (31 bytes) for connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77, 1-RTT (ECN: ECT(0)) 2025/04/30 19:24:12 client Short Header{DestConnectionID: d1eb06b60e4b5b126f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 19:24:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 19:24:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 19:24:12 client Connection 48b5a40c6cb8b96a6711ccc4384f379d760fbb77 closed.