2025/04/30 12:04:44 Requesting https://server4:443/whcdisryem. 2025/04/30 12:04:44 Increased receive buffer size to 14336 kiB 2025/04/30 12:04:44 Increased send buffer size to 14336 kiB 2025/04/30 12:04:44 Setting DF for IPv4 and IPv6. 2025/04/30 12:04:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:04:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:04:44 Created qlog file: /logs/qlog/708fa78440d08f43e289c1f209dd63f8.sqlog 2025/04/30 12:04:44 client Starting new connection to server4 ([::]:57104 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 708fa78440d08f43e289c1f209dd63f8, version v1 2025/04/30 12:04:44 Adding connection ID (empty). 2025/04/30 12:04:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:04:44 client -> Sending packet 0 (1280 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, Initial 2025/04/30 12:04:44 client Long Header{Type: Initial, DestConnectionID: 708fa78440d08f43e289c1f209dd63f8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:04:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:04:44 client updated RTT: 36.880724ms (σ: 18.440362ms) 2025/04/30 12:04:44 client <- Received Retry: 2025/04/30 12:04:44 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 26c481a9d3bba12318, Token: 0xfc892b0d2d03000060ff84e00caea40057b85a6096287b30bb8388a0a29add5ab92c250da041de3932a5effed3645526d0b85b54f68b4d6d565921474476f638fa1a1c51fe6a52eb81051c2a00000000, Version: v1} 2025/04/30 12:04:44 client Switching destination connection ID to: 26c481a9d3bba12318 2025/04/30 12:04:44 client -> Sending packet 1 (1280 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, Initial 2025/04/30 12:04:44 client Long Header{Type: Initial, DestConnectionID: 26c481a9d3bba12318, SrcConnectionID: (empty), Token: 0xfc892b0d2d03000060ff84e00caea40057b85a6096287b30bb8388a0a29add5ab92c250da041de3932a5effed3645526d0b85b54f68b4d6d565921474476f638fa1a1c51fe6a52eb81051c2a00000000, PacketNumber: 1, PacketNumberLen: 2, Length: 1180, Version: v1} 2025/04/30 12:04:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:04:44 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1082 bytes. 2025/04/30 12:04:44 client <- Reading packet 0 (138 bytes) for connection (empty), Initial 2025/04/30 12:04:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2d463bd3bbfb5cfed, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 12:04:44 client Received first packet. Switching destination connection ID to: b2d463bd3bbfb5cfed 2025/04/30 12:04:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 12:04:44 client newly acked packets (1): [1] 2025/04/30 12:04:44 client updated RTT: 36.432ms (σ: 14.725ms) 2025/04/30 12:04:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:04:44 client Installed Handshake Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:04:44 client Installed Handshake Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:04:44 client Parsed a coalesced packet. Part 2: 1082 bytes. Remaining: 0 bytes. 2025/04/30 12:04:44 client <- Reading packet 1 (1082 bytes) for connection (empty), Handshake 2025/04/30 12:04:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2d463bd3bbfb5cfed, PacketNumber: 1, PacketNumberLen: 4, Length: 1064, Version: v1} 2025/04/30 12:04:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 751, Offset + Data length: 751} 2025/04/30 12:04:44 client Installed 1-RTT Write keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:04:44 client Installed 1-RTT Read keys (using TLS_AES_256_GCM_SHA384) 2025/04/30 12:04:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 708fa78440d08f43e289c1f209dd63f8, InitialSourceConnectionID: b2d463bd3bbfb5cfed, RetrySourceConnectionID: 26c481a9d3bba12318, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x81c1afec90bf4fcb6179f3c7db817108} 2025/04/30 12:04:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 708fa78440d08f43e289c1f209dd63f8 2025/04/30 12:04:44 client Long Header{Type: Initial, DestConnectionID: b2d463bd3bbfb5cfed, SrcConnectionID: (empty), Token: 0xfc892b0d2d03000060ff84e00caea40057b85a6096287b30bb8388a0a29add5ab92c250da041de3932a5effed3645526d0b85b54f68b4d6d565921474476f638fa1a1c51fe6a52eb81051c2a00000000, PacketNumber: 2, PacketNumberLen: 2, Length: 1089, Version: v1} 2025/04/30 12:04:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:04:44 client Long Header{Type: Handshake, DestConnectionID: b2d463bd3bbfb5cfed, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 12:04:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 52, Offset + Data length: 52} 2025/04/30 12:04:44 client Dropping Initial keys. 2025/04/30 12:04:44 client -> Sending packet 1 (41 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, Handshake 2025/04/30 12:04:44 client Long Header{Type: Handshake, DestConnectionID: b2d463bd3bbfb5cfed, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:04:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 12:04:44 client -> Sending packet 0 (47 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:04:44 client Short Header{DestConnectionID: b2d463bd3bbfb5cfed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:04:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:04:44 client <- Reading packet 2 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:04:44 client Peer doesn't await address validation any longer. 2025/04/30 12:04:44 client newly acked packets (1): [0] 2025/04/30 12:04:44 client updated RTT: 35.945ms (σ: 12.016ms) 2025/04/30 12:04:44 client ECN capability confirmed. 2025/04/30 12:04:44 client Canceling loss detection timer. 2025/04/30 12:04:44 client Dropping Handshake keys. 2025/04/30 12:04:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:04:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b2d43ce96f62e8ad71, StatelessResetToken: 0x97d698c6d4898f3382f304d34844ea88} 2025/04/30 12:04:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2d492843c5c10977b, StatelessResetToken: 0xa9b05ae28154124bf77460ef6ba1f7b1} 2025/04/30 12:04:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b2d43704bcfedf4645, StatelessResetToken: 0x0426a79f5b93598fe8c2d39a2a55f5c1} 2025/04/30 12:04:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b8bfc4f4e3240677f1, StatelessResetToken: 0xb1a4d33bc80bc0fbdb7eb513ffb59668} 2025/04/30 12:04:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 2, ConnectionID: b8bf892e739e01c660, StatelessResetToken: 0xb245c179f16876c1a1b8026738503ac0} 2025/04/30 12:04:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 6, RetirePriorTo: 3, ConnectionID: b8bf854f5818ade1f4, StatelessResetToken: 0xecc91515a909f7221eb184b7711cbfe5} 2025/04/30 12:04:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 7, RetirePriorTo: 4, ConnectionID: b8bfd75c831f9d608b, StatelessResetToken: 0xaa8b309e11a39cd166a3e837a7dae09a} 2025/04/30 12:04:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:04:44 client -> Sending packet 1 (41 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:04:44 client Short Header{DestConnectionID: b8bfc4f4e3240677f1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:04:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 197.859µs} 2025/04/30 12:04:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 2} 2025/04/30 12:04:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:04:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 1} 2025/04/30 12:04:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 3} 2025/04/30 12:04:44 client <- Reading packet 3 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.PingFrame{} 2025/04/30 12:04:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:04:44 client <- Reading packet 4 (346 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 12:04:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:04:44 client -> Sending packet 2 (33 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:04:44 client Short Header{DestConnectionID: b8bfc4f4e3240677f1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:04:44 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 61.855µs} 2025/04/30 12:04:44 client <- Reading packet 5 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1195, Offset + Data length: 1195} 2025/04/30 12:04:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:04:44 client <- Reading packet 6 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1195, Data length: 1193, Offset + Data length: 2388} 2025/04/30 12:04:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:04:44 client -> Sending packet 3 (33 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:04:44 client Short Header{DestConnectionID: b8bfc4f4e3240677f1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:04:44 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 56.876µs} 2025/04/30 12:04:44 client <- Reading packet 7 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2388, Data length: 1193, Offset + Data length: 3581} 2025/04/30 12:04:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:04:44 client <- Reading packet 8 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3581, Data length: 1193, Offset + Data length: 4774} 2025/04/30 12:04:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:04:44 client -> Sending packet 4 (33 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:04:44 client Short Header{DestConnectionID: b8bfc4f4e3240677f1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:04:44 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, DelayTime: 70.292µs} 2025/04/30 12:04:44 client <- Reading packet 9 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4774, Data length: 1193, Offset + Data length: 5967} 2025/04/30 12:04:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:04:44 client <- Reading packet 10 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 5967, Data length: 1193, Offset + Data length: 7160} 2025/04/30 12:04:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:04:44 client -> Sending packet 5 (33 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:04:44 client Short Header{DestConnectionID: b8bfc4f4e3240677f1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:04:44 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, DelayTime: 71.193µs} 2025/04/30 12:04:44 client <- Reading packet 11 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 7160, Data length: 1193, Offset + Data length: 8353} 2025/04/30 12:04:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:04:44 client <- Reading packet 12 (1220 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 8353, Data length: 1193, Offset + Data length: 9546} 2025/04/30 12:04:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:04:44 client -> Sending packet 6 (33 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:04:44 client Short Header{DestConnectionID: b8bfc4f4e3240677f1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:04:44 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, DelayTime: 53.199µs} 2025/04/30 12:04:44 client <- Reading packet 13 (721 bytes) for connection (empty), 1-RTT 2025/04/30 12:04:44 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 12:04:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 9546, Data length: 694, Offset + Data length: 10240} 2025/04/30 12:04:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:04:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:04:44 client -> Sending packet 7 (31 bytes) for connection 708fa78440d08f43e289c1f209dd63f8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:04:44 client Short Header{DestConnectionID: b8bfc4f4e3240677f1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:04:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:04:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:04:44 client Connection 708fa78440d08f43e289c1f209dd63f8 closed.