2025/04/30 09:34:25 Requesting https://server4:443/pagilgvcov. 2025/04/30 09:34:25 Increased receive buffer size to 14336 kiB 2025/04/30 09:34:25 Increased send buffer size to 14336 kiB 2025/04/30 09:34:25 Setting DF for IPv4 and IPv6. 2025/04/30 09:34:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:34:25 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:34:25 Created qlog file: /logs/qlog/e3c5d9a7b4e34bc1bb884e.sqlog 2025/04/30 09:34:25 client Starting new connection to server4 ([::]:55604 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e3c5d9a7b4e34bc1bb884e, version v1 2025/04/30 09:34:25 Adding connection ID (empty). 2025/04/30 09:34:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:34:25 client -> Sending packet 0 (1280 bytes) for connection e3c5d9a7b4e34bc1bb884e, Initial 2025/04/30 09:34:25 client Long Header{Type: Initial, DestConnectionID: e3c5d9a7b4e34bc1bb884e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:34:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:34:25 client <- Reading packet 499099 (1232 bytes) for connection (empty), Initial 2025/04/30 09:34:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004fa97845e7, Token: (empty), PacketNumber: 499099, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:34:25 client Received first packet. Switching destination connection ID to: 4000004fa97845e7 2025/04/30 09:34:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:34:25 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:34:25 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:34:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 744µs} 2025/04/30 09:34:25 client newly acked packets (1): [0] 2025/04/30 09:34:25 client updated RTT: 38.373779ms (σ: 19.186889ms) 2025/04/30 09:34:25 client -> Sending packet 1 (1280 bytes) for connection e3c5d9a7b4e34bc1bb884e, Initial 2025/04/30 09:34:25 client Long Header{Type: Initial, DestConnectionID: 4000004fa97845e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:34:25 client -> &wire.AckFrame{LargestAcked: 499099, LowestAcked: 499099, DelayTime: 0s} 2025/04/30 09:34:25 client <- Reading packet 499099 (757 bytes) for connection (empty), Handshake 2025/04/30 09:34:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004fa97845e7, PacketNumber: 499099, PacketNumberLen: 3, Length: 740, Version: v1} 2025/04/30 09:34:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:34:25 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:34:25 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:34:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e3c5d9a7b4e34bc1bb884e, InitialSourceConnectionID: 4000004fa97845e7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x8292c2ca07b7e21fa1c1ff3ae8f602b0, MaxDatagramFrameSize: 65535} 2025/04/30 09:34:25 client -> Sending packet 0 (82 bytes) for connection e3c5d9a7b4e34bc1bb884e, Handshake 2025/04/30 09:34:25 client Long Header{Type: Handshake, DestConnectionID: 4000004fa97845e7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:34:25 client -> &wire.AckFrame{LargestAcked: 499099, LowestAcked: 499099, DelayTime: 0s} 2025/04/30 09:34:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:34:25 client Dropping Initial keys. 2025/04/30 09:34:25 client -> Sending packet 0 (46 bytes) for connection e3c5d9a7b4e34bc1bb884e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:34:25 client Short Header{DestConnectionID: 4000004fa97845e7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:34:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:34:25 client <- Reading packet 499100 (38 bytes) for connection (empty), Handshake 2025/04/30 09:34:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004fa97845e7, PacketNumber: 499100, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:34:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs} 2025/04/30 09:34:25 client Peer doesn't await address validation any longer. 2025/04/30 09:34:25 client newly acked packets (1): [0] 2025/04/30 09:34:25 client updated RTT: 37.486ms (σ: 16.163ms) 2025/04/30 09:34:25 client Canceling loss detection timer. 2025/04/30 09:34:25 client <- Reading packet 499099 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:34:25 client Short Header{DestConnectionID: (empty), PacketNumber: 499099, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:34:25 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:34:25 client Dropping Handshake keys. 2025/04/30 09:34:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000050e030680d, StatelessResetToken: 0xdcc6add94b8d721ac77c67ee36f12ed8} 2025/04/30 09:34:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000044a76671fe, StatelessResetToken: 0xf6c2cbaf0b957cf5c780f44594020750} 2025/04/30 09:34:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000055bb35e1b5, StatelessResetToken: 0x1910f4dbb4849beb2d672ae481d05d51} 2025/04/30 09:34:25 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:34:25 client -> Sending packet 1 (37 bytes) for connection e3c5d9a7b4e34bc1bb884e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:34:25 client Short Header{DestConnectionID: 40000050e030680d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:34:25 client -> &wire.AckFrame{LargestAcked: 499099, LowestAcked: 499099, DelayTime: 175.328µs} 2025/04/30 09:34:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:34:25 client <- Reading packet 499100 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:34:25 client Short Header{DestConnectionID: (empty), PacketNumber: 499100, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:34:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 704µs} 2025/04/30 09:34:25 client newly acked packets (1): [0] 2025/04/30 09:34:25 client updated RTT: 36.769ms (σ: 13.554ms) 2025/04/30 09:34:25 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:34:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:34:25 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:34:25 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:34:25 client -> Sending packet 2 (30 bytes) for connection e3c5d9a7b4e34bc1bb884e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:34:25 client Short Header{DestConnectionID: 40000050e030680d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:34:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:34:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:34:25 client Connection e3c5d9a7b4e34bc1bb884e closed.