2025/04/30 09:38:53 Requesting https://server4:443/lzcsrmucnf. 2025/04/30 09:38:53 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:53 Increased send buffer size to 14336 kiB 2025/04/30 09:38:53 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:53 Created qlog file: /logs/qlog/bb8c3069465185d5.sqlog 2025/04/30 09:38:53 client Starting new connection to server4 ([::]:36761 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bb8c3069465185d5, version v1 2025/04/30 09:38:53 Adding connection ID (empty). 2025/04/30 09:38:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:53 client -> Sending packet 0 (1280 bytes) for connection bb8c3069465185d5, Initial 2025/04/30 09:38:53 client Long Header{Type: Initial, DestConnectionID: bb8c3069465185d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:54 client -> Sending packet 1 (1280 bytes) for connection bb8c3069465185d5, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: bb8c3069465185d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:54 client -> Sending packet 2 (1280 bytes) for connection bb8c3069465185d5, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: bb8c3069465185d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:54 client <- Reading packet 6481863 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000005c394d0ac, Token: (empty), PacketNumber: 6481863, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:54 client Received first packet. Switching destination connection ID to: 40000005c394d0ac 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 824µs} 2025/04/30 09:38:54 client -> Sending packet 3 (1280 bytes) for connection bb8c3069465185d5, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: 40000005c394d0ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 6481863, LowestAcked: 6481863, DelayTime: 0s} 2025/04/30 09:38:54 client <- Reading packet 6481865 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000005c394d0ac, PacketNumber: 6481865, PacketNumberLen: 3, Length: 737, Version: v1} 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:38:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bb8c3069465185d5, InitialSourceConnectionID: 40000005c394d0ac, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xcb2681e99a14adf6d1c7c79d4c0aba6c, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:54 client -> Sending packet 0 (82 bytes) for connection bb8c3069465185d5, Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: 40000005c394d0ac, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 6481865, LowestAcked: 6481865, DelayTime: 0s} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:54 client Dropping Initial keys. 2025/04/30 09:38:54 client -> Sending packet 0 (46 bytes) for connection bb8c3069465185d5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 40000005c394d0ac, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:54 client <- Reading packet 6481866 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000005c394d0ac, PacketNumber: 6481866, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 09:38:54 client Peer doesn't await address validation any longer. 2025/04/30 09:38:54 client newly acked packets (1): [0] 2025/04/30 09:38:54 client updated RTT: 30.984628ms (σ: 15.492314ms) 2025/04/30 09:38:54 client Canceling loss detection timer. 2025/04/30 09:38:54 client <- Reading packet 6481864 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:54 client Short Header{DestConnectionID: (empty), PacketNumber: 6481864, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680µs} 2025/04/30 09:38:54 client newly acked packets (1): [0] 2025/04/30 09:38:54 client updated RTT: 31.028ms (σ: 11.707ms) 2025/04/30 09:38:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:54 client Dropping Handshake keys. 2025/04/30 09:38:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:54 client -> Sending packet 1 (35 bytes) for connection bb8c3069465185d5, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 40000005c394d0ac, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 6481864, LowestAcked: 6481864, DelayTime: 89.316µs} 2025/04/30 09:38:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:54 client -> Sending packet 2 (30 bytes) for connection bb8c3069465185d5, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 40000005c394d0ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:54 client Connection bb8c3069465185d5 closed. 2025/04/30 09:38:54 Requesting https://server4:443/jboryxibyv. 2025/04/30 09:38:54 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:54 Increased send buffer size to 14336 kiB 2025/04/30 09:38:54 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:54 Created qlog file: /logs/qlog/029a31d630c1ddf3315a61a64d0e5c.sqlog 2025/04/30 09:38:54 client Starting new connection to server4 ([::]:38623 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 029a31d630c1ddf3315a61a64d0e5c, version v1 2025/04/30 09:38:54 Adding connection ID (empty). 2025/04/30 09:38:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:54 client -> Sending packet 0 (1280 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: 029a31d630c1ddf3315a61a64d0e5c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:38:54 client <- Reading packet 14232702 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000ddc17297d0, Token: (empty), PacketNumber: 14232702, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:54 client Received first packet. Switching destination connection ID to: 400000ddc17297d0 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 624µs} 2025/04/30 09:38:54 client newly acked packets (1): [0] 2025/04/30 09:38:54 client updated RTT: 33.15734ms (σ: 16.57867ms) 2025/04/30 09:38:54 client -> Sending packet 1 (1280 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: 400000ddc17297d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 14232702, LowestAcked: 14232702, DelayTime: 0s} 2025/04/30 09:38:54 client <- Reading packet 14232702 (762 bytes) for connection (empty), Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000ddc17297d0, PacketNumber: 14232702, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 029a31d630c1ddf3315a61a64d0e5c, InitialSourceConnectionID: 400000ddc17297d0, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x77bca826e28df2bc65f6b87a9063affb, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:54 client -> Sending packet 0 (82 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: 400000ddc17297d0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 14232702, LowestAcked: 14232702, DelayTime: 0s} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:54 client Dropping Initial keys. 2025/04/30 09:38:54 client -> Sending packet 0 (46 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 400000ddc17297d0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:54 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:54 client -> Sending packet 1 (74 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: 400000ddc17297d0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:54 client -> Sending packet 2 (74 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: 400000ddc17297d0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:54 client <- Reading packet 14232704 (762 bytes) for connection (empty), Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000ddc17297d0, PacketNumber: 14232704, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:54 client -> Sending packet 3 (45 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: 400000ddc17297d0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 14232704, LowestAcked: 14232702, AckRanges: {{Largest: 14232704, Smallest: 14232704}, {Largest: 14232702, Smallest: 14232702}}, DelayTime: 0s} 2025/04/30 09:38:54 client <- Reading packet 14232705 (41 bytes) for connection (empty), Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000ddc17297d0, PacketNumber: 14232705, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 264µs} 2025/04/30 09:38:54 client Peer doesn't await address validation any longer. 2025/04/30 09:38:54 client <- Reading packet 14232702 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:54 client Short Header{DestConnectionID: (empty), PacketNumber: 14232702, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.344ms} 2025/04/30 09:38:54 client newly acked packets (1): [0] 2025/04/30 09:38:54 client updated RTT: 42.298ms (σ: 30.715ms) 2025/04/30 09:38:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:54 client Canceling loss detection timer. 2025/04/30 09:38:54 client Dropping Handshake keys. 2025/04/30 09:38:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cd387e8ec1, StatelessResetToken: 0x51b646b19b9e1c4c0b249d719b6a16fd} 2025/04/30 09:38:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d388fd1800, StatelessResetToken: 0xc17b4595af591b2a7c1b66bd06ca4587} 2025/04/30 09:38:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000cbbdf8fbda, StatelessResetToken: 0x91cbf614ac61fc2783c38e0df5a58b0a} 2025/04/30 09:38:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:54 client -> Sending packet 1 (37 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 400000cd387e8ec1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 14232702, LowestAcked: 14232702, DelayTime: 150.351µs} 2025/04/30 09:38:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:54 client <- Reading packet 14232704 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:54 client Short Header{DestConnectionID: (empty), PacketNumber: 14232704, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 104µs} 2025/04/30 09:38:54 client newly acked packets (1): [1] 2025/04/30 09:38:54 client updated RTT: 40.85ms (σ: 25.93ms) 2025/04/30 09:38:54 client Canceling loss detection timer. 2025/04/30 09:38:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000c931d44ece, StatelessResetToken: 0x5f95ad69cf8059263148e4405b7020eb} 2025/04/30 09:38:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:54 client Ignoring all packets below 14232703. 2025/04/30 09:38:54 client -> Sending packet 2 (35 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 400000cd387e8ec1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 14232704, LowestAcked: 14232704, DelayTime: 129.111µs} 2025/04/30 09:38:54 client <- Reading packet 14232706 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:54 client Short Header{DestConnectionID: (empty), PacketNumber: 14232706, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:54 client -> Sending packet 3 (37 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 400000cd387e8ec1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 14232706, LowestAcked: 14232704, AckRanges: {{Largest: 14232706, Smallest: 14232706}, {Largest: 14232704, Smallest: 14232704}}, DelayTime: 118.902µs} 2025/04/30 09:38:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:54 client -> Sending packet 4 (30 bytes) for connection 029a31d630c1ddf3315a61a64d0e5c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 400000cd387e8ec1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:54 client Connection 029a31d630c1ddf3315a61a64d0e5c closed. 2025/04/30 09:38:54 Requesting https://server4:443/udizukwqjv. 2025/04/30 09:38:54 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:54 Increased send buffer size to 14336 kiB 2025/04/30 09:38:54 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:54 Created qlog file: /logs/qlog/52b390ea3c32593740ae691d523803.sqlog 2025/04/30 09:38:54 client Starting new connection to server4 ([::]:38322 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 52b390ea3c32593740ae691d523803, version v1 2025/04/30 09:38:54 Adding connection ID (empty). 2025/04/30 09:38:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:54 client -> Sending packet 0 (1280 bytes) for connection 52b390ea3c32593740ae691d523803, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: 52b390ea3c32593740ae691d523803, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:38:54 client <- Reading packet 8984488 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000008b7e99d375, Token: (empty), PacketNumber: 8984488, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:54 client Received first packet. Switching destination connection ID to: 4000008b7e99d375 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 688µs} 2025/04/30 09:38:54 client newly acked packets (1): [0] 2025/04/30 09:38:54 client updated RTT: 33.24784ms (σ: 16.62392ms) 2025/04/30 09:38:54 client -> Sending packet 1 (1280 bytes) for connection 52b390ea3c32593740ae691d523803, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: 4000008b7e99d375, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 8984488, LowestAcked: 8984488, DelayTime: 0s} 2025/04/30 09:38:54 client <- Reading packet 8984488 (762 bytes) for connection (empty), Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008b7e99d375, PacketNumber: 8984488, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 52b390ea3c32593740ae691d523803, InitialSourceConnectionID: 4000008b7e99d375, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x765cb834fb0a3ab23b820ce9121283b1, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:54 client -> Sending packet 0 (82 bytes) for connection 52b390ea3c32593740ae691d523803, Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: 4000008b7e99d375, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 8984488, LowestAcked: 8984488, DelayTime: 0s} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:54 client Dropping Initial keys. 2025/04/30 09:38:54 client -> Sending packet 0 (46 bytes) for connection 52b390ea3c32593740ae691d523803, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 4000008b7e99d375, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:54 client <- Reading packet 8984489 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008b7e99d375, PacketNumber: 8984489, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 09:38:54 client Peer doesn't await address validation any longer. 2025/04/30 09:38:54 client newly acked packets (1): [0] 2025/04/30 09:38:54 client updated RTT: 32.997ms (σ: 12.966ms) 2025/04/30 09:38:54 client Canceling loss detection timer. 2025/04/30 09:38:54 client <- Reading packet 8984488 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:54 client Short Header{DestConnectionID: (empty), PacketNumber: 8984488, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:54 client Dropping Handshake keys. 2025/04/30 09:38:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000009fd8ff6162, StatelessResetToken: 0xb245ea24a66d0261880491fbb93312c0} 2025/04/30 09:38:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000948362dedd, StatelessResetToken: 0xf78a9000184d4f7ea6ed0671e8bd9ecb} 2025/04/30 09:38:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000090dcdbf538, StatelessResetToken: 0x09c3bc49b6aba18f37517f1ea2a48031} 2025/04/30 09:38:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:54 client -> Sending packet 1 (37 bytes) for connection 52b390ea3c32593740ae691d523803, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 4000009fd8ff6162, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 8984488, LowestAcked: 8984488, DelayTime: 183.14µs} 2025/04/30 09:38:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:54 client <- Reading packet 8984490 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:54 client Short Header{DestConnectionID: (empty), PacketNumber: 8984490, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 09:38:54 client newly acked packets (2): [0 1] 2025/04/30 09:38:54 client updated RTT: 32.717ms (σ: 10.282ms) 2025/04/30 09:38:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:54 client Canceling loss detection timer. 2025/04/30 09:38:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000008d8a22b159, StatelessResetToken: 0x05ea447b7e77c7703ada5cb3c92ff7fd} 2025/04/30 09:38:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:54 client Ignoring all packets below 8984489. 2025/04/30 09:38:54 client -> Sending packet 2 (35 bytes) for connection 52b390ea3c32593740ae691d523803, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 4000009fd8ff6162, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 8984490, LowestAcked: 8984490, DelayTime: 125.754µs} 2025/04/30 09:38:54 client <- Reading packet 8984493 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:54 client Short Header{DestConnectionID: (empty), PacketNumber: 8984493, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 81.496ms} 2025/04/30 09:38:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:54 client -> Sending packet 3 (37 bytes) for connection 52b390ea3c32593740ae691d523803, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 4000009fd8ff6162, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 8984493, LowestAcked: 8984490, AckRanges: {{Largest: 8984493, Smallest: 8984493}, {Largest: 8984490, Smallest: 8984490}}, DelayTime: 135.834µs} 2025/04/30 09:38:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:54 client -> Sending packet 4 (30 bytes) for connection 52b390ea3c32593740ae691d523803, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 4000009fd8ff6162, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:54 client Connection 52b390ea3c32593740ae691d523803 closed. 2025/04/30 09:38:54 Requesting https://server4:443/hvmumabcak. 2025/04/30 09:38:54 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:54 Increased send buffer size to 14336 kiB 2025/04/30 09:38:54 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:54 Created qlog file: /logs/qlog/ca00391c89240bf93e792dc96d5a0330.sqlog 2025/04/30 09:38:54 client Starting new connection to server4 ([::]:56988 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ca00391c89240bf93e792dc96d5a0330, version v1 2025/04/30 09:38:54 Adding connection ID (empty). 2025/04/30 09:38:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:54 client -> Sending packet 0 (1280 bytes) for connection ca00391c89240bf93e792dc96d5a0330, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: ca00391c89240bf93e792dc96d5a0330, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:54 client -> Sending packet 1 (1280 bytes) for connection ca00391c89240bf93e792dc96d5a0330, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: ca00391c89240bf93e792dc96d5a0330, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:54 client -> Sending packet 2 (1280 bytes) for connection ca00391c89240bf93e792dc96d5a0330, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: ca00391c89240bf93e792dc96d5a0330, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:54 client <- Reading packet 12604773 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000091ffe97477, Token: (empty), PacketNumber: 12604773, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:54 client Received first packet. Switching destination connection ID to: 40000091ffe97477 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 840µs} 2025/04/30 09:38:54 client -> Sending packet 3 (1280 bytes) for connection ca00391c89240bf93e792dc96d5a0330, Initial 2025/04/30 09:38:54 client Long Header{Type: Initial, DestConnectionID: 40000091ffe97477, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 12604773, LowestAcked: 12604773, DelayTime: 0s} 2025/04/30 09:38:54 client <- Reading packet 12604773 (762 bytes) for connection (empty), Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000091ffe97477, PacketNumber: 12604773, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:38:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ca00391c89240bf93e792dc96d5a0330, InitialSourceConnectionID: 40000091ffe97477, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x05daa9990070c493c088584627b0945b, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:54 client -> Sending packet 0 (82 bytes) for connection ca00391c89240bf93e792dc96d5a0330, Handshake 2025/04/30 09:38:54 client Long Header{Type: Handshake, DestConnectionID: 40000091ffe97477, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:54 client -> &wire.AckFrame{LargestAcked: 12604773, LowestAcked: 12604773, DelayTime: 0s} 2025/04/30 09:38:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:54 client Dropping Initial keys. 2025/04/30 09:38:54 client -> Sending packet 0 (46 bytes) for connection ca00391c89240bf93e792dc96d5a0330, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:54 client Short Header{DestConnectionID: 40000091ffe97477, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:55 client <- Reading packet 12604775 (762 bytes) for connection (empty), Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000091ffe97477, PacketNumber: 12604775, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:38:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:55 client -> Sending packet 1 (45 bytes) for connection ca00391c89240bf93e792dc96d5a0330, Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: 40000091ffe97477, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 12604775, LowestAcked: 12604773, AckRanges: {{Largest: 12604775, Smallest: 12604775}, {Largest: 12604773, Smallest: 12604773}}, DelayTime: 0s} 2025/04/30 09:38:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:55 client -> Sending packet 2 (74 bytes) for connection ca00391c89240bf93e792dc96d5a0330, Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: 40000091ffe97477, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:55 client -> Sending packet 3 (74 bytes) for connection ca00391c89240bf93e792dc96d5a0330, Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: 40000091ffe97477, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:55 client <- Reading packet 12604776 (41 bytes) for connection (empty), Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000091ffe97477, PacketNumber: 12604776, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 352µs} 2025/04/30 09:38:55 client Peer doesn't await address validation any longer. 2025/04/30 09:38:55 client <- Reading packet 12604773 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:55 client Short Header{DestConnectionID: (empty), PacketNumber: 12604773, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:55 client Dropping Handshake keys. 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000080a7b0b9b6, StatelessResetToken: 0xbc756f59a4bccc7eb531793ba4af2381} 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000098eb98a46c, StatelessResetToken: 0x11df578be03edcb3cf0b752b3b0d1c09} 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000083866127fb, StatelessResetToken: 0x55debcd82d6f4ee41a3f64d5216058f4} 2025/04/30 09:38:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:55 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:55 client -> Sending packet 2 (56 bytes) for connection ca00391c89240bf93e792dc96d5a0330, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 40000080a7b0b9b6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 12604773, LowestAcked: 12604773, DelayTime: 177.18µs} 2025/04/30 09:38:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:55 client -> Sending packet 3 (48 bytes) for connection ca00391c89240bf93e792dc96d5a0330, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 40000080a7b0b9b6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:55 client -> Sending packet 4 (1366 bytes) for connection ca00391c89240bf93e792dc96d5a0330, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 40000080a7b0b9b6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.PingFrame{} 2025/04/30 09:38:55 client Dropping %!s(logging.PacketType=1) packet (41 bytes) because we already dropped the keys. 2025/04/30 09:38:55 client <- Reading packet 12604774 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:55 client Short Header{DestConnectionID: (empty), PacketNumber: 12604774, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 304µs} 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000094bfadf1a3, StatelessResetToken: 0xe3e59b9ebae72f42dd2d9d871c1b55b6} 2025/04/30 09:38:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:55 client <- Reading packet 12604775 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:55 client Short Header{DestConnectionID: (empty), PacketNumber: 12604775, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 360µs} 2025/04/30 09:38:55 client newly acked packets (1): [3] 2025/04/30 09:38:55 client updated RTT: 31.877758ms (σ: 15.938879ms) 2025/04/30 09:38:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:55 client Canceling loss detection timer. 2025/04/30 09:38:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:55 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:38:55 client -> Sending packet 5 (35 bytes) for connection ca00391c89240bf93e792dc96d5a0330, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 40000080a7b0b9b6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 12604775, LowestAcked: 12604773, DelayTime: 95.658µs} 2025/04/30 09:38:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:55 client -> Sending packet 6 (30 bytes) for connection ca00391c89240bf93e792dc96d5a0330, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 40000080a7b0b9b6, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:55 client Connection ca00391c89240bf93e792dc96d5a0330 closed. 2025/04/30 09:38:55 Requesting https://server4:443/rkzbyyqzep. 2025/04/30 09:38:55 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:55 Increased send buffer size to 14336 kiB 2025/04/30 09:38:55 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:55 Created qlog file: /logs/qlog/f2ae05379a943b965b.sqlog 2025/04/30 09:38:55 client Starting new connection to server4 ([::]:35901 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f2ae05379a943b965b, version v1 2025/04/30 09:38:55 Adding connection ID (empty). 2025/04/30 09:38:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:55 client -> Sending packet 0 (1280 bytes) for connection f2ae05379a943b965b, Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: f2ae05379a943b965b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:55 client -> Sending packet 1 (1280 bytes) for connection f2ae05379a943b965b, Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: f2ae05379a943b965b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:55 client -> Sending packet 2 (1280 bytes) for connection f2ae05379a943b965b, Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: f2ae05379a943b965b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:55 client <- Reading packet 14688221 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000000189bac297, Token: (empty), PacketNumber: 14688221, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:55 client Received first packet. Switching destination connection ID to: 4000000189bac297 2025/04/30 09:38:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 776µs} 2025/04/30 09:38:55 client -> Sending packet 3 (1280 bytes) for connection f2ae05379a943b965b, Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: 4000000189bac297, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 14688221, LowestAcked: 14688221, DelayTime: 0s} 2025/04/30 09:38:55 client <- Reading packet 14688221 (757 bytes) for connection (empty), Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000189bac297, PacketNumber: 14688221, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:38:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:38:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f2ae05379a943b965b, InitialSourceConnectionID: 4000000189bac297, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x70b36c5f546f08f0a4fcea6cdf300cc3, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:55 client -> Sending packet 0 (82 bytes) for connection f2ae05379a943b965b, Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: 4000000189bac297, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 14688221, LowestAcked: 14688221, DelayTime: 0s} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:55 client Dropping Initial keys. 2025/04/30 09:38:55 client -> Sending packet 0 (46 bytes) for connection f2ae05379a943b965b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 4000000189bac297, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:55 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:55 client -> Sending packet 1 (74 bytes) for connection f2ae05379a943b965b, Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: 4000000189bac297, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:55 client -> Sending packet 2 (74 bytes) for connection f2ae05379a943b965b, Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: 4000000189bac297, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:55 client <- Reading packet 14688221 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:55 client Short Header{DestConnectionID: (empty), PacketNumber: 14688221, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.736ms} 2025/04/30 09:38:55 client Peer doesn't await address validation any longer. 2025/04/30 09:38:55 client newly acked packets (1): [0] 2025/04/30 09:38:55 client updated RTT: 231.86476ms (σ: 115.93238ms) 2025/04/30 09:38:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:55 client Canceling loss detection timer. 2025/04/30 09:38:55 client Dropping Handshake keys. 2025/04/30 09:38:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001284c53c27, StatelessResetToken: 0x21ac17c78b945ef9dd15f60f364af488} 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000000f63a57586, StatelessResetToken: 0x17a541a8d803cab42431e677af342c23} 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000156869a55c, StatelessResetToken: 0x0f3faaac804ca2b084db4d1cb38ea0d1} 2025/04/30 09:38:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:55 client Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 09:38:55 client -> Sending packet 1 (37 bytes) for connection f2ae05379a943b965b, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 4000001284c53c27, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 14688221, LowestAcked: 14688221, DelayTime: 237.623µs} 2025/04/30 09:38:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:55 client <- Reading packet 14688222 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:55 client Short Header{DestConnectionID: (empty), PacketNumber: 14688222, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:55 client -> Sending packet 2 (30 bytes) for connection f2ae05379a943b965b, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 4000001284c53c27, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:55 client Connection f2ae05379a943b965b closed. 2025/04/30 09:38:55 Requesting https://server4:443/eilgtgiwhf. 2025/04/30 09:38:55 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:55 Increased send buffer size to 14336 kiB 2025/04/30 09:38:55 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:55 Created qlog file: /logs/qlog/4c97acfe57fee7e96397.sqlog 2025/04/30 09:38:55 client Starting new connection to server4 ([::]:59571 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4c97acfe57fee7e96397, version v1 2025/04/30 09:38:55 Adding connection ID (empty). 2025/04/30 09:38:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:55 client -> Sending packet 0 (1280 bytes) for connection 4c97acfe57fee7e96397, Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: 4c97acfe57fee7e96397, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:38:55 client Queueing packet (756 bytes) for later decryption 2025/04/30 09:38:55 client <- Reading packet 11643931 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000082064e68d7, Token: (empty), PacketNumber: 11643931, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:55 client Received first packet. Switching destination connection ID to: 40000082064e68d7 2025/04/30 09:38:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.952ms} 2025/04/30 09:38:55 client newly acked packets (1): [0] 2025/04/30 09:38:55 client updated RTT: 142.816926ms (σ: 71.408463ms) 2025/04/30 09:38:55 client -> Sending packet 1 (1280 bytes) for connection 4c97acfe57fee7e96397, Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: 40000082064e68d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 11643931, LowestAcked: 11643931, DelayTime: 0s} 2025/04/30 09:38:55 client <- Reading packet 11643929 (756 bytes) for connection (empty), Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000082064e68d7, PacketNumber: 11643929, PacketNumberLen: 4, Length: 739, Version: v1} 2025/04/30 09:38:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:38:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4c97acfe57fee7e96397, InitialSourceConnectionID: 40000082064e68d7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xe9d7f48feb0aa9f8a7d84b3f69575192, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:55 client -> Sending packet 0 (82 bytes) for connection 4c97acfe57fee7e96397, Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: 40000082064e68d7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 11643929, LowestAcked: 11643929, DelayTime: 0s} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:55 client Dropping Initial keys. 2025/04/30 09:38:55 client -> Sending packet 0 (46 bytes) for connection 4c97acfe57fee7e96397, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 40000082064e68d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:55 client <- Reading packet 11643932 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000082064e68d7, PacketNumber: 11643932, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 09:38:55 client Peer doesn't await address validation any longer. 2025/04/30 09:38:55 client newly acked packets (1): [0] 2025/04/30 09:38:55 client updated RTT: 128.941ms (σ: 81.305ms) 2025/04/30 09:38:55 client Canceling loss detection timer. 2025/04/30 09:38:55 client <- Reading packet 11643929 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:55 client Short Header{DestConnectionID: (empty), PacketNumber: 11643929, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:55 client Dropping Handshake keys. 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000008122748e9e, StatelessResetToken: 0x0adcfccf97a8a0cb6ce83138312a8e57} 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000093f7d8ba21, StatelessResetToken: 0x1be9abed4de39b4e43c88e52590562f9} 2025/04/30 09:38:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000803e0264b8, StatelessResetToken: 0xe3e668517a36b16b774bd47ba7a0aa8d} 2025/04/30 09:38:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:55 client -> Sending packet 1 (37 bytes) for connection 4c97acfe57fee7e96397, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 4000008122748e9e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 11643929, LowestAcked: 11643929, DelayTime: 166.911µs} 2025/04/30 09:38:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:55 client <- Reading packet 11643930 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:55 client Short Header{DestConnectionID: (empty), PacketNumber: 11643930, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 552µs} 2025/04/30 09:38:55 client newly acked packets (1): [0] 2025/04/30 09:38:55 client updated RTT: 116.846ms (σ: 85.167ms) 2025/04/30 09:38:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:55 client -> Sending packet 2 (30 bytes) for connection 4c97acfe57fee7e96397, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:55 client Short Header{DestConnectionID: 4000008122748e9e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:55 client Connection 4c97acfe57fee7e96397 closed. 2025/04/30 09:38:55 Requesting https://server4:443/uvkztxsnye. 2025/04/30 09:38:55 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:55 Increased send buffer size to 14336 kiB 2025/04/30 09:38:55 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:55 Created qlog file: /logs/qlog/99f855d9ebb1b5642108ba1ccf.sqlog 2025/04/30 09:38:55 client Starting new connection to server4 ([::]:39829 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 99f855d9ebb1b5642108ba1ccf, version v1 2025/04/30 09:38:55 Adding connection ID (empty). 2025/04/30 09:38:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:55 client -> Sending packet 0 (1280 bytes) for connection 99f855d9ebb1b5642108ba1ccf, Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: 99f855d9ebb1b5642108ba1ccf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:38:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:38:55 client <- Reading packet 11247233 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c9ab46d447, Token: (empty), PacketNumber: 11247233, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:55 client Received first packet. Switching destination connection ID to: 400000c9ab46d447 2025/04/30 09:38:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 712µs} 2025/04/30 09:38:55 client newly acked packets (1): [0] 2025/04/30 09:38:55 client updated RTT: 33.27017ms (σ: 16.635085ms) 2025/04/30 09:38:55 client -> Sending packet 1 (1280 bytes) for connection 99f855d9ebb1b5642108ba1ccf, Initial 2025/04/30 09:38:55 client Long Header{Type: Initial, DestConnectionID: 400000c9ab46d447, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:55 client -> &wire.AckFrame{LargestAcked: 11247233, LowestAcked: 11247233, DelayTime: 0s} 2025/04/30 09:38:56 client -> Sending packet 2 (1280 bytes) for connection 99f855d9ebb1b5642108ba1ccf, Initial 2025/04/30 09:38:56 client Long Header{Type: Initial, DestConnectionID: 400000c9ab46d447, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:56 client -> &wire.PingFrame{} 2025/04/30 09:38:56 client <- Reading packet 11247235 (761 bytes) for connection (empty), Handshake 2025/04/30 09:38:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c9ab46d447, PacketNumber: 11247235, PacketNumberLen: 4, Length: 744, Version: v1} 2025/04/30 09:38:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 99f855d9ebb1b5642108ba1ccf, InitialSourceConnectionID: 400000c9ab46d447, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x932265c4dda9179c4a6a3564f7016ffb, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:56 client -> Sending packet 0 (82 bytes) for connection 99f855d9ebb1b5642108ba1ccf, Handshake 2025/04/30 09:38:56 client Long Header{Type: Handshake, DestConnectionID: 400000c9ab46d447, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:56 client -> &wire.AckFrame{LargestAcked: 11247235, LowestAcked: 11247235, DelayTime: 0s} 2025/04/30 09:38:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:56 client Dropping Initial keys. 2025/04/30 09:38:56 client -> Sending packet 0 (46 bytes) for connection 99f855d9ebb1b5642108ba1ccf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:56 client Short Header{DestConnectionID: 400000c9ab46d447, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:56 client -> Sending packet 1 (74 bytes) for connection 99f855d9ebb1b5642108ba1ccf, Handshake 2025/04/30 09:38:56 client Long Header{Type: Handshake, DestConnectionID: 400000c9ab46d447, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:56 client -> Sending packet 2 (74 bytes) for connection 99f855d9ebb1b5642108ba1ccf, Handshake 2025/04/30 09:38:56 client Long Header{Type: Handshake, DestConnectionID: 400000c9ab46d447, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:56 client <- Reading packet 11247236 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:56 client Short Header{DestConnectionID: (empty), PacketNumber: 11247236, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:56 client Dropping Handshake keys. 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cd83392c8d, StatelessResetToken: 0x0155b6d948d936857e83e22982515561} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000c29c021fc5, StatelessResetToken: 0xa186a339c6104e5feac12b8e5473c8d4} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ddb3f281ec, StatelessResetToken: 0x4c98918406ed6619ecb719be8e8a88d7} 2025/04/30 09:38:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:56 client <- Reading packet 11247237 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:56 client Short Header{DestConnectionID: (empty), PacketNumber: 11247237, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cd83392c8d, StatelessResetToken: 0x0155b6d948d936857e83e22982515561} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000c29c021fc5, StatelessResetToken: 0xa186a339c6104e5feac12b8e5473c8d4} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ddb3f281ec, StatelessResetToken: 0x4c98918406ed6619ecb719be8e8a88d7} 2025/04/30 09:38:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:56 client -> Sending packet 2 (56 bytes) for connection 99f855d9ebb1b5642108ba1ccf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:56 client Short Header{DestConnectionID: 400000cd83392c8d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:56 client -> &wire.AckFrame{LargestAcked: 11247237, LowestAcked: 11247236, DelayTime: 172.191µs} 2025/04/30 09:38:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:56 client -> Sending packet 3 (48 bytes) for connection 99f855d9ebb1b5642108ba1ccf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:56 client Short Header{DestConnectionID: 400000cd83392c8d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:56 client Dropping %!s(logging.PacketType=1) packet (38 bytes) because we already dropped the keys. 2025/04/30 09:38:56 client Dropping %!s(logging.PacketType=1) packet (38 bytes) because we already dropped the keys. 2025/04/30 09:38:56 client <- Reading packet 11247240 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:56 client Short Header{DestConnectionID: (empty), PacketNumber: 11247240, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cd83392c8d, StatelessResetToken: 0x0155b6d948d936857e83e22982515561} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000c29c021fc5, StatelessResetToken: 0xa186a339c6104e5feac12b8e5473c8d4} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ddb3f281ec, StatelessResetToken: 0x4c98918406ed6619ecb719be8e8a88d7} 2025/04/30 09:38:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:56 client <- Reading packet 11247241 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:56 client Short Header{DestConnectionID: (empty), PacketNumber: 11247241, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cd83392c8d, StatelessResetToken: 0x0155b6d948d936857e83e22982515561} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000c29c021fc5, StatelessResetToken: 0xa186a339c6104e5feac12b8e5473c8d4} 2025/04/30 09:38:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ddb3f281ec, StatelessResetToken: 0x4c98918406ed6619ecb719be8e8a88d7} 2025/04/30 09:38:56 client -> Sending packet 4 (1366 bytes) for connection 99f855d9ebb1b5642108ba1ccf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:56 client Short Header{DestConnectionID: 400000cd83392c8d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:56 client -> &wire.PingFrame{} 2025/04/30 09:38:56 client -> Sending packet 5 (37 bytes) for connection 99f855d9ebb1b5642108ba1ccf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:56 client Short Header{DestConnectionID: 400000cd83392c8d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:56 client -> &wire.AckFrame{LargestAcked: 11247241, LowestAcked: 11247236, AckRanges: {{Largest: 11247241, Smallest: 11247240}, {Largest: 11247237, Smallest: 11247236}}, DelayTime: 244.837µs} 2025/04/30 09:38:56 client <- Reading packet 11247242 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:56 client Short Header{DestConnectionID: (empty), PacketNumber: 11247242, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:56 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 20.384ms} 2025/04/30 09:38:56 client newly acked packets (2): [3 4] 2025/04/30 09:38:56 client updated RTT: 35.641ms (σ: 17.219ms) 2025/04/30 09:38:56 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:56 client Canceling loss detection timer. 2025/04/30 09:38:57 client <- Reading packet 11247247 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:57 client Short Header{DestConnectionID: (empty), PacketNumber: 11247247, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cd83392c8d, StatelessResetToken: 0x0155b6d948d936857e83e22982515561} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000c29c021fc5, StatelessResetToken: 0xa186a339c6104e5feac12b8e5473c8d4} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ddb3f281ec, StatelessResetToken: 0x4c98918406ed6619ecb719be8e8a88d7} 2025/04/30 09:38:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:57 client <- Reading packet 11247248 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:57 client Short Header{DestConnectionID: (empty), PacketNumber: 11247248, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cd83392c8d, StatelessResetToken: 0x0155b6d948d936857e83e22982515561} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000c29c021fc5, StatelessResetToken: 0xa186a339c6104e5feac12b8e5473c8d4} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ddb3f281ec, StatelessResetToken: 0x4c98918406ed6619ecb719be8e8a88d7} 2025/04/30 09:38:57 client -> Sending packet 6 (1409 bytes) for connection 99f855d9ebb1b5642108ba1ccf, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:57 client Short Header{DestConnectionID: 400000cd83392c8d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:57 client -> &wire.PingFrame{} 2025/04/30 09:38:57 client -> Sending packet 7 (39 bytes) for connection 99f855d9ebb1b5642108ba1ccf, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:57 client Short Header{DestConnectionID: 400000cd83392c8d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:57 client -> &wire.AckFrame{LargestAcked: 11247248, LowestAcked: 11247236, AckRanges: {{Largest: 11247248, Smallest: 11247247}, {Largest: 11247242, Smallest: 11247240}, {Largest: 11247237, Smallest: 11247236}}, DelayTime: 266.627µs} 2025/04/30 09:38:57 client <- Reading packet 11247249 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:57 client Short Header{DestConnectionID: (empty), PacketNumber: 11247249, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:57 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 296µs} 2025/04/30 09:38:57 client newly acked packets (1): [6] 2025/04/30 09:38:57 client updated RTT: 35.207ms (σ: 13.781ms) 2025/04/30 09:38:57 client <- Reading packet 11247250 (1104 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:57 client Short Header{DestConnectionID: (empty), PacketNumber: 11247250, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:57 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 432µs} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000c35430bcbd, StatelessResetToken: 0x6325cc3d6fba22524a6993ea0a1b08cf} 2025/04/30 09:38:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:57 client -> Sending packet 8 (30 bytes) for connection 99f855d9ebb1b5642108ba1ccf, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:57 client Short Header{DestConnectionID: 400000cd83392c8d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:57 client Connection 99f855d9ebb1b5642108ba1ccf closed. 2025/04/30 09:38:57 Requesting https://server4:443/sxjbeqyeel. 2025/04/30 09:38:57 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:57 Increased send buffer size to 14336 kiB 2025/04/30 09:38:57 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:57 Created qlog file: /logs/qlog/8bdd94e967e25b0025.sqlog 2025/04/30 09:38:57 client Starting new connection to server4 ([::]:59308 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8bdd94e967e25b0025, version v1 2025/04/30 09:38:57 Adding connection ID (empty). 2025/04/30 09:38:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:57 client -> Sending packet 0 (1280 bytes) for connection 8bdd94e967e25b0025, Initial 2025/04/30 09:38:57 client Long Header{Type: Initial, DestConnectionID: 8bdd94e967e25b0025, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:38:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:38:57 client Queueing packet (757 bytes) for later decryption 2025/04/30 09:38:57 client <- Reading packet 15153203 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c4c22f2d9a, Token: (empty), PacketNumber: 15153203, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:57 client Received first packet. Switching destination connection ID to: 400000c4c22f2d9a 2025/04/30 09:38:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 110.192ms} 2025/04/30 09:38:57 client newly acked packets (1): [0] 2025/04/30 09:38:57 client updated RTT: 142.924031ms (σ: 71.462015ms) 2025/04/30 09:38:57 client -> Sending packet 1 (1280 bytes) for connection 8bdd94e967e25b0025, Initial 2025/04/30 09:38:57 client Long Header{Type: Initial, DestConnectionID: 400000c4c22f2d9a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:57 client -> &wire.AckFrame{LargestAcked: 15153203, LowestAcked: 15153203, DelayTime: 0s} 2025/04/30 09:38:57 client <- Reading packet 15153201 (757 bytes) for connection (empty), Handshake 2025/04/30 09:38:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c4c22f2d9a, PacketNumber: 15153201, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:38:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:38:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8bdd94e967e25b0025, InitialSourceConnectionID: 400000c4c22f2d9a, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xcde6d8cb406fc49eebdf6d2a088e1fff, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:57 client -> Sending packet 0 (82 bytes) for connection 8bdd94e967e25b0025, Handshake 2025/04/30 09:38:57 client Long Header{Type: Handshake, DestConnectionID: 400000c4c22f2d9a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:57 client -> &wire.AckFrame{LargestAcked: 15153201, LowestAcked: 15153201, DelayTime: 0s} 2025/04/30 09:38:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:57 client Dropping Initial keys. 2025/04/30 09:38:57 client -> Sending packet 0 (46 bytes) for connection 8bdd94e967e25b0025, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:57 client Short Header{DestConnectionID: 400000c4c22f2d9a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:57 client <- Reading packet 15153204 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c4c22f2d9a, PacketNumber: 15153204, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 328µs} 2025/04/30 09:38:57 client Peer doesn't await address validation any longer. 2025/04/30 09:38:57 client newly acked packets (1): [0] 2025/04/30 09:38:57 client updated RTT: 129.02ms (σ: 81.402ms) 2025/04/30 09:38:57 client Canceling loss detection timer. 2025/04/30 09:38:57 client <- Reading packet 15153201 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:57 client Short Header{DestConnectionID: (empty), PacketNumber: 15153201, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:57 client Dropping Handshake keys. 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cc96bc5716, StatelessResetToken: 0xd3513b8bef5676aa52bffc3dd65efe25} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000cd30a16719, StatelessResetToken: 0x320cf873533bcc13f4edf5610c265ea3} 2025/04/30 09:38:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000cae52a4025, StatelessResetToken: 0x37fe37d1a41b7abc8cb1cd45a31ce3ef} 2025/04/30 09:38:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:57 client -> Sending packet 1 (37 bytes) for connection 8bdd94e967e25b0025, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:57 client Short Header{DestConnectionID: 400000cc96bc5716, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:57 client -> &wire.AckFrame{LargestAcked: 15153201, LowestAcked: 15153201, DelayTime: 74.459µs} 2025/04/30 09:38:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:57 client <- Reading packet 15153202 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:57 client Short Header{DestConnectionID: (empty), PacketNumber: 15153202, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 608µs} 2025/04/30 09:38:57 client newly acked packets (1): [0] 2025/04/30 09:38:57 client updated RTT: 116.91ms (σ: 85.269ms) 2025/04/30 09:38:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:57 client -> Sending packet 2 (30 bytes) for connection 8bdd94e967e25b0025, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:57 client Short Header{DestConnectionID: 400000cc96bc5716, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:57 client Connection 8bdd94e967e25b0025 closed. 2025/04/30 09:38:57 Requesting https://server4:443/xsljcvkbhr. 2025/04/30 09:38:57 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:57 Increased send buffer size to 14336 kiB 2025/04/30 09:38:57 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:57 Created qlog file: /logs/qlog/f605c85e8239188a299f611d9d1b18e74d60.sqlog 2025/04/30 09:38:57 client Starting new connection to server4 ([::]:47062 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f605c85e8239188a299f611d9d1b18e74d60, version v1 2025/04/30 09:38:57 Adding connection ID (empty). 2025/04/30 09:38:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:57 client -> Sending packet 0 (1280 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, Initial 2025/04/30 09:38:57 client Long Header{Type: Initial, DestConnectionID: f605c85e8239188a299f611d9d1b18e74d60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:38:57 client Queueing packet (765 bytes) for later decryption 2025/04/30 09:38:57 client <- Reading packet 9719571 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000956b65991f, Token: (empty), PacketNumber: 9719571, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:57 client Received first packet. Switching destination connection ID to: 400000956b65991f 2025/04/30 09:38:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 110.008ms} 2025/04/30 09:38:57 client newly acked packets (1): [0] 2025/04/30 09:38:57 client updated RTT: 142.822686ms (σ: 71.411343ms) 2025/04/30 09:38:57 client -> Sending packet 1 (1280 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, Initial 2025/04/30 09:38:57 client Long Header{Type: Initial, DestConnectionID: 400000956b65991f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:57 client -> &wire.AckFrame{LargestAcked: 9719571, LowestAcked: 9719571, DelayTime: 0s} 2025/04/30 09:38:57 client <- Reading packet 9719569 (765 bytes) for connection (empty), Handshake 2025/04/30 09:38:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000956b65991f, PacketNumber: 9719569, PacketNumberLen: 4, Length: 748, Version: v1} 2025/04/30 09:38:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:38:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f605c85e8239188a299f611d9d1b18e74d60, InitialSourceConnectionID: 400000956b65991f, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xa9584af74e4c729bb7315b7afd6674c8, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:57 client -> Sending packet 0 (82 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, Handshake 2025/04/30 09:38:57 client Long Header{Type: Handshake, DestConnectionID: 400000956b65991f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:57 client -> &wire.AckFrame{LargestAcked: 9719569, LowestAcked: 9719569, DelayTime: 0s} 2025/04/30 09:38:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:57 client Dropping Initial keys. 2025/04/30 09:38:57 client -> Sending packet 0 (46 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:57 client Short Header{DestConnectionID: 400000956b65991f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:58 client <- Reading packet 9719575 (765 bytes) for connection (empty), Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000956b65991f, PacketNumber: 9719575, PacketNumberLen: 4, Length: 748, Version: v1} 2025/04/30 09:38:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:38:58 client -> Sending packet 1 (45 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: 400000956b65991f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 9719575, LowestAcked: 9719569, AckRanges: {{Largest: 9719575, Smallest: 9719575}, {Largest: 9719569, Smallest: 9719569}}, DelayTime: 0s} 2025/04/30 09:38:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:58 client -> Sending packet 2 (74 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: 400000956b65991f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:58 client -> Sending packet 3 (74 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: 400000956b65991f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:58 client <- Reading packet 9719569 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:58 client Short Header{DestConnectionID: (empty), PacketNumber: 9719569, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:58 client Dropping Handshake keys. 2025/04/30 09:38:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000096094f8489, StatelessResetToken: 0x45e5333df1dfd3d14cad2ff7d2d9592b} 2025/04/30 09:38:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000088266d3420, StatelessResetToken: 0x102eb072e92dd0fabd387264f137cd75} 2025/04/30 09:38:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000944077ad0b, StatelessResetToken: 0x38aea6a8370ee03df0ec34bb8ea482f3} 2025/04/30 09:38:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:58 client Dropping %!s(logging.PacketType=1) packet (38 bytes) because we already dropped the keys. 2025/04/30 09:38:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:58 client -> Sending packet 2 (56 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 40000096094f8489, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 9719569, LowestAcked: 9719569, DelayTime: 165.199µs} 2025/04/30 09:38:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:58 client -> Sending packet 3 (48 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 40000096094f8489, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:58 client <- Reading packet 9719570 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:58 client Short Header{DestConnectionID: (empty), PacketNumber: 9719570, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 280µs} 2025/04/30 09:38:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000099ee8831ba, StatelessResetToken: 0x0862d5289495204310a04a333cc695a5} 2025/04/30 09:38:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:58 client Sending ACK because the ACK timer expired. 2025/04/30 09:38:58 client -> Sending packet 4 (36 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 40000096094f8489, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 9719570, LowestAcked: 9719569, DelayTime: 25.265647ms} 2025/04/30 09:38:58 client <- Reading packet 9719575 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:58 client Short Header{DestConnectionID: (empty), PacketNumber: 9719575, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 315.824ms} 2025/04/30 09:38:58 client newly acked packets (1): [3] 2025/04/30 09:38:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:58 client Canceling loss detection timer. 2025/04/30 09:38:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:58 client -> Sending packet 5 (37 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 40000096094f8489, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 9719575, LowestAcked: 9719569, AckRanges: {{Largest: 9719575, Smallest: 9719575}, {Largest: 9719570, Smallest: 9719569}}, DelayTime: 164.397µs} 2025/04/30 09:38:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:58 client -> Sending packet 6 (30 bytes) for connection f605c85e8239188a299f611d9d1b18e74d60, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 40000096094f8489, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:58 client Connection f605c85e8239188a299f611d9d1b18e74d60 closed. 2025/04/30 09:38:58 Requesting https://server4:443/qbmpmtckit. 2025/04/30 09:38:58 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:58 Increased send buffer size to 14336 kiB 2025/04/30 09:38:58 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:58 Created qlog file: /logs/qlog/0d811bb6424ed6fc212ab1c75005.sqlog 2025/04/30 09:38:58 client Starting new connection to server4 ([::]:36532 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0d811bb6424ed6fc212ab1c75005, version v1 2025/04/30 09:38:58 Adding connection ID (empty). 2025/04/30 09:38:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:58 client -> Sending packet 0 (1280 bytes) for connection 0d811bb6424ed6fc212ab1c75005, Initial 2025/04/30 09:38:58 client Long Header{Type: Initial, DestConnectionID: 0d811bb6424ed6fc212ab1c75005, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:38:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:38:58 client <- Reading packet 129635 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000009e8aab98da, Token: (empty), PacketNumber: 129635, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:58 client Received first packet. Switching destination connection ID to: 4000009e8aab98da 2025/04/30 09:38:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 600µs} 2025/04/30 09:38:58 client newly acked packets (1): [0] 2025/04/30 09:38:58 client updated RTT: 33.186038ms (σ: 16.593019ms) 2025/04/30 09:38:58 client -> Sending packet 1 (1280 bytes) for connection 0d811bb6424ed6fc212ab1c75005, Initial 2025/04/30 09:38:58 client Long Header{Type: Initial, DestConnectionID: 4000009e8aab98da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 129635, LowestAcked: 129635, DelayTime: 0s} 2025/04/30 09:38:58 client <- Reading packet 129635 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009e8aab98da, PacketNumber: 129635, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:38:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0d811bb6424ed6fc212ab1c75005, InitialSourceConnectionID: 4000009e8aab98da, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf838dcd662314683a95f78ef151179ae, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:58 client -> Sending packet 0 (82 bytes) for connection 0d811bb6424ed6fc212ab1c75005, Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: 4000009e8aab98da, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 129635, LowestAcked: 129635, DelayTime: 0s} 2025/04/30 09:38:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:58 client Dropping Initial keys. 2025/04/30 09:38:58 client -> Sending packet 0 (46 bytes) for connection 0d811bb6424ed6fc212ab1c75005, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 4000009e8aab98da, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:58 client <- Reading packet 129636 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009e8aab98da, PacketNumber: 129636, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 09:38:58 client Peer doesn't await address validation any longer. 2025/04/30 09:38:58 client newly acked packets (1): [0] 2025/04/30 09:38:58 client updated RTT: 32.951ms (σ: 12.913ms) 2025/04/30 09:38:58 client Canceling loss detection timer. 2025/04/30 09:38:58 client <- Reading packet 129635 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:58 client Short Header{DestConnectionID: (empty), PacketNumber: 129635, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:58 client Dropping Handshake keys. 2025/04/30 09:38:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000008a394fdfea, StatelessResetToken: 0xc9615797876a046df98fe49ecf04e8f6} 2025/04/30 09:38:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000009dfa5711b7, StatelessResetToken: 0xf42f19bc88963842f0d9c682cb44a859} 2025/04/30 09:38:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000080219b4163, StatelessResetToken: 0xb6f9758c9191e62a52c4abbd160dc24b} 2025/04/30 09:38:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:58 client -> Sending packet 1 (37 bytes) for connection 0d811bb6424ed6fc212ab1c75005, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 4000008a394fdfea, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 129635, LowestAcked: 129635, DelayTime: 184.695µs} 2025/04/30 09:38:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:58 client <- Reading packet 129636 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:58 client Short Header{DestConnectionID: (empty), PacketNumber: 129636, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 536µs} 2025/04/30 09:38:58 client newly acked packets (1): [0] 2025/04/30 09:38:58 client updated RTT: 32.805ms (σ: 9.975ms) 2025/04/30 09:38:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:58 client -> Sending packet 2 (30 bytes) for connection 0d811bb6424ed6fc212ab1c75005, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 4000008a394fdfea, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:58 client Connection 0d811bb6424ed6fc212ab1c75005 closed. 2025/04/30 09:38:58 Requesting https://server4:443/lcochvqgwb. 2025/04/30 09:38:58 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:58 Increased send buffer size to 14336 kiB 2025/04/30 09:38:58 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:58 Created qlog file: /logs/qlog/5f641cf70376c6c7eccc.sqlog 2025/04/30 09:38:58 client Starting new connection to server4 ([::]:55455 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5f641cf70376c6c7eccc, version v1 2025/04/30 09:38:58 Adding connection ID (empty). 2025/04/30 09:38:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:58 client -> Sending packet 0 (1280 bytes) for connection 5f641cf70376c6c7eccc, Initial 2025/04/30 09:38:58 client Long Header{Type: Initial, DestConnectionID: 5f641cf70376c6c7eccc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:58 client <- Reading packet 13133346 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000019cc35e338, Token: (empty), PacketNumber: 13133346, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:58 client Received first packet. Switching destination connection ID to: 40000019cc35e338 2025/04/30 09:38:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 656µs} 2025/04/30 09:38:58 client newly acked packets (1): [0] 2025/04/30 09:38:58 client updated RTT: 33.244082ms (σ: 16.622041ms) 2025/04/30 09:38:58 client -> Sending packet 1 (1280 bytes) for connection 5f641cf70376c6c7eccc, Initial 2025/04/30 09:38:58 client Long Header{Type: Initial, DestConnectionID: 40000019cc35e338, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 13133346, LowestAcked: 13133346, DelayTime: 0s} 2025/04/30 09:38:58 client <- Reading packet 13133346 (757 bytes) for connection (empty), Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000019cc35e338, PacketNumber: 13133346, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:38:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:38:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5f641cf70376c6c7eccc, InitialSourceConnectionID: 40000019cc35e338, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xcb56863a43184f787f2c5dfa6dd41c35, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:58 client -> Sending packet 0 (82 bytes) for connection 5f641cf70376c6c7eccc, Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: 40000019cc35e338, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:58 client -> &wire.AckFrame{LargestAcked: 13133346, LowestAcked: 13133346, DelayTime: 0s} 2025/04/30 09:38:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:58 client Dropping Initial keys. 2025/04/30 09:38:58 client -> Sending packet 0 (46 bytes) for connection 5f641cf70376c6c7eccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:58 client Short Header{DestConnectionID: 40000019cc35e338, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:58 client <- Reading packet 13133347 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000019cc35e338, PacketNumber: 13133347, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs} 2025/04/30 09:38:58 client Peer doesn't await address validation any longer. 2025/04/30 09:38:58 client newly acked packets (1): [0] 2025/04/30 09:38:58 client updated RTT: 32.991ms (σ: 12.971ms) 2025/04/30 09:38:58 client Canceling loss detection timer. 2025/04/30 09:38:59 client <- Reading packet 13133350 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 13133350, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:59 client Dropping Handshake keys. 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000000548ca479d, StatelessResetToken: 0xd601c92ba6f0a34591e7b7b10c785ee3} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000016517fa926, StatelessResetToken: 0xdc0a6e88b3753b2a1bd8f2df78622b93} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000bdeb7983b, StatelessResetToken: 0x7e06340eb0513b6f20ad11aa31a3fe91} 2025/04/30 09:38:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:59 client -> Sending packet 2 (56 bytes) for connection 5f641cf70376c6c7eccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000000548ca479d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 13133350, LowestAcked: 13133350, DelayTime: 184.655µs} 2025/04/30 09:38:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:59 client -> Sending packet 3 (48 bytes) for connection 5f641cf70376c6c7eccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000000548ca479d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:59 client <- Reading packet 13133351 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 13133351, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 232µs} 2025/04/30 09:38:59 client newly acked packets (1): [3] 2025/04/30 09:38:59 client updated RTT: 32.738ms (σ: 10.233ms) 2025/04/30 09:38:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:59 client Canceling loss detection timer. 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000156a846f1b, StatelessResetToken: 0x30bb210de3a16daa4b961f842a084aaf} 2025/04/30 09:38:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:59 client <- Reading packet 13133352 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 13133352, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:38:59 client -> Sending packet 4 (35 bytes) for connection 5f641cf70376c6c7eccc, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000000548ca479d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 13133352, LowestAcked: 13133350, DelayTime: 94.987µs} 2025/04/30 09:38:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:59 client -> Sending packet 5 (30 bytes) for connection 5f641cf70376c6c7eccc, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000000548ca479d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:59 client Connection 5f641cf70376c6c7eccc closed. 2025/04/30 09:38:59 Requesting https://server4:443/zknnqdhvzs. 2025/04/30 09:38:59 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:59 Increased send buffer size to 14336 kiB 2025/04/30 09:38:59 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:59 Created qlog file: /logs/qlog/594c52ee204a53df9a2b749c.sqlog 2025/04/30 09:38:59 client Starting new connection to server4 ([::]:45243 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 594c52ee204a53df9a2b749c, version v1 2025/04/30 09:38:59 Adding connection ID (empty). 2025/04/30 09:38:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:59 client -> Sending packet 0 (1280 bytes) for connection 594c52ee204a53df9a2b749c, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 594c52ee204a53df9a2b749c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:59 client <- Reading packet 11219548 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000092a6ea37f9, Token: (empty), PacketNumber: 11219548, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:59 client Received first packet. Switching destination connection ID to: 40000092a6ea37f9 2025/04/30 09:38:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 584µs} 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 33.170512ms (σ: 16.585256ms) 2025/04/30 09:38:59 client -> Sending packet 1 (1280 bytes) for connection 594c52ee204a53df9a2b749c, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 40000092a6ea37f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 11219548, LowestAcked: 11219548, DelayTime: 0s} 2025/04/30 09:38:59 client -> Sending packet 2 (1280 bytes) for connection 594c52ee204a53df9a2b749c, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 40000092a6ea37f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:59 client -> &wire.PingFrame{} 2025/04/30 09:38:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:59 client <- Reading packet 11219551 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000092a6ea37f9, Token: (empty), PacketNumber: 11219551, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 232µs} 2025/04/30 09:38:59 client newly acked packets (1): [2] 2025/04/30 09:38:59 client updated RTT: 33.135ms (σ: 12.507ms) 2025/04/30 09:38:59 client -> Sending packet 3 (1280 bytes) for connection 594c52ee204a53df9a2b749c, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 40000092a6ea37f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:59 client -> &wire.PingFrame{} 2025/04/30 09:38:59 client <- Reading packet 11219552 (758 bytes) for connection (empty), Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000092a6ea37f9, PacketNumber: 11219552, PacketNumberLen: 4, Length: 741, Version: v1} 2025/04/30 09:38:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 594c52ee204a53df9a2b749c, InitialSourceConnectionID: 40000092a6ea37f9, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xfa7a4018fe5924c69ced84a8e923dd78, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:59 client -> Sending packet 0 (82 bytes) for connection 594c52ee204a53df9a2b749c, Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: 40000092a6ea37f9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 11219552, LowestAcked: 11219552, DelayTime: 0s} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:59 client Dropping Initial keys. 2025/04/30 09:38:59 client -> Sending packet 0 (46 bytes) for connection 594c52ee204a53df9a2b749c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 40000092a6ea37f9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:59 client -> Sending packet 1 (74 bytes) for connection 594c52ee204a53df9a2b749c, Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: 40000092a6ea37f9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:59 client -> Sending packet 2 (74 bytes) for connection 594c52ee204a53df9a2b749c, Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: 40000092a6ea37f9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:59 client <- Reading packet 11219553 (41 bytes) for connection (empty), Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000092a6ea37f9, PacketNumber: 11219553, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 352µs} 2025/04/30 09:38:59 client Peer doesn't await address validation any longer. 2025/04/30 09:38:59 client <- Reading packet 11219548 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 11219548, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 83.968ms} 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 40.187ms (σ: 23.485ms) 2025/04/30 09:38:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:59 client Canceling loss detection timer. 2025/04/30 09:38:59 client Dropping Handshake keys. 2025/04/30 09:38:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000901bf4e76a, StatelessResetToken: 0x7bd07db4622eb4c870f0db6b00db7147} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000085ca2b0c3f, StatelessResetToken: 0x97eb11b3d89ebc4502f113ee1a2efe1e} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000095a6b6a2a7, StatelessResetToken: 0x36e5e6f355a8bd8fbbff149e36103a36} 2025/04/30 09:38:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:59 client -> Sending packet 1 (37 bytes) for connection 594c52ee204a53df9a2b749c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 400000901bf4e76a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 11219548, LowestAcked: 11219548, DelayTime: 168.034µs} 2025/04/30 09:38:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:59 client <- Reading packet 11219550 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 11219550, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 120µs} 2025/04/30 09:38:59 client newly acked packets (1): [1] 2025/04/30 09:38:59 client updated RTT: 39.01ms (σ: 19.965ms) 2025/04/30 09:38:59 client Canceling loss detection timer. 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000008be69e1f95, StatelessResetToken: 0xfead595aabeab06311303610ce8bf227} 2025/04/30 09:38:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:59 client Ignoring all packets below 11219549. 2025/04/30 09:38:59 client -> Sending packet 2 (35 bytes) for connection 594c52ee204a53df9a2b749c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 400000901bf4e76a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 11219550, LowestAcked: 11219550, DelayTime: 120.745µs} 2025/04/30 09:38:59 client <- Reading packet 11219551 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 11219551, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 120µs} 2025/04/30 09:38:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:59 client -> Sending packet 3 (30 bytes) for connection 594c52ee204a53df9a2b749c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 400000901bf4e76a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:59 client Connection 594c52ee204a53df9a2b749c closed. 2025/04/30 09:38:59 Requesting https://server4:443/sfzvwpevbi. 2025/04/30 09:38:59 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:59 Increased send buffer size to 14336 kiB 2025/04/30 09:38:59 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:59 Created qlog file: /logs/qlog/0ab8ac587b93d10820fea5e794c789d8.sqlog 2025/04/30 09:38:59 client Starting new connection to server4 ([::]:60947 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0ab8ac587b93d10820fea5e794c789d8, version v1 2025/04/30 09:38:59 Adding connection ID (empty). 2025/04/30 09:38:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:59 client -> Sending packet 0 (1280 bytes) for connection 0ab8ac587b93d10820fea5e794c789d8, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 0ab8ac587b93d10820fea5e794c789d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:59 client <- Reading packet 3429378 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005413ceb739, Token: (empty), PacketNumber: 3429378, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:59 client Received first packet. Switching destination connection ID to: 4000005413ceb739 2025/04/30 09:38:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 608µs} 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 33.175934ms (σ: 16.587967ms) 2025/04/30 09:38:59 client -> Sending packet 1 (1280 bytes) for connection 0ab8ac587b93d10820fea5e794c789d8, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 4000005413ceb739, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 3429378, LowestAcked: 3429378, DelayTime: 0s} 2025/04/30 09:38:59 client <- Reading packet 3429378 (761 bytes) for connection (empty), Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005413ceb739, PacketNumber: 3429378, PacketNumberLen: 3, Length: 744, Version: v1} 2025/04/30 09:38:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0ab8ac587b93d10820fea5e794c789d8, InitialSourceConnectionID: 4000005413ceb739, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1e625f8c57e1fbac735173adff850da9, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:59 client -> Sending packet 0 (82 bytes) for connection 0ab8ac587b93d10820fea5e794c789d8, Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: 4000005413ceb739, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 3429378, LowestAcked: 3429378, DelayTime: 0s} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:59 client Dropping Initial keys. 2025/04/30 09:38:59 client -> Sending packet 0 (46 bytes) for connection 0ab8ac587b93d10820fea5e794c789d8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000005413ceb739, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:59 client <- Reading packet 3429379 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005413ceb739, PacketNumber: 3429379, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/04/30 09:38:59 client Peer doesn't await address validation any longer. 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 32.923ms (σ: 12.944ms) 2025/04/30 09:38:59 client Canceling loss detection timer. 2025/04/30 09:38:59 client <- Reading packet 3429378 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3429378, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:59 client Dropping Handshake keys. 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000057273e500a, StatelessResetToken: 0x1fe72cd6282459f4126415b96dcaede9} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000005d5db0692c, StatelessResetToken: 0xe5eaf411dd1516f0d12a4e540631f923} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000056e396319e, StatelessResetToken: 0xeb0751ccb7e17e3c11fb6b6287e8859b} 2025/04/30 09:38:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:59 client -> Sending packet 1 (37 bytes) for connection 0ab8ac587b93d10820fea5e794c789d8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 40000057273e500a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 3429378, LowestAcked: 3429378, DelayTime: 77.194µs} 2025/04/30 09:38:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:59 client -> Sending packet 3 (46 bytes) for connection 0ab8ac587b93d10820fea5e794c789d8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 40000057273e500a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:59 client Skipping packet number 2 2025/04/30 09:38:59 client -> Sending packet 4 (29 bytes) for connection 0ab8ac587b93d10820fea5e794c789d8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 40000057273e500a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:59 client <- Reading packet 3429382 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3429382, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 288µs} 2025/04/30 09:38:59 client newly acked packets (1): [3] 2025/04/30 09:38:59 client updated RTT: 32.682ms (σ: 10.189ms) 2025/04/30 09:38:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:59 client <- Reading packet 3429383 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3429383, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 352µs} 2025/04/30 09:38:59 client newly acked packets (1): [4] 2025/04/30 09:38:59 client updated RTT: 32.538ms (σ: 7.929ms) 2025/04/30 09:38:59 client Canceling loss detection timer. 2025/04/30 09:38:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:59 client -> Sending packet 5 (30 bytes) for connection 0ab8ac587b93d10820fea5e794c789d8, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 40000057273e500a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:59 client Connection 0ab8ac587b93d10820fea5e794c789d8 closed. 2025/04/30 09:38:59 Requesting https://server4:443/rsjsztziya. 2025/04/30 09:38:59 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:59 Increased send buffer size to 14336 kiB 2025/04/30 09:38:59 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:59 Created qlog file: /logs/qlog/0ee95b14c62cca9d3ead46a1033b5d6c988e26.sqlog 2025/04/30 09:38:59 client Starting new connection to server4 ([::]:58753 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0ee95b14c62cca9d3ead46a1033b5d6c988e26, version v1 2025/04/30 09:38:59 Adding connection ID (empty). 2025/04/30 09:38:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:59 client -> Sending packet 0 (1280 bytes) for connection 0ee95b14c62cca9d3ead46a1033b5d6c988e26, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 0ee95b14c62cca9d3ead46a1033b5d6c988e26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:59 client <- Reading packet 5875365 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000002e3c2261e, Token: (empty), PacketNumber: 5875365, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:59 client Received first packet. Switching destination connection ID to: 40000002e3c2261e 2025/04/30 09:38:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 33.144543ms (σ: 16.572271ms) 2025/04/30 09:38:59 client -> Sending packet 1 (1280 bytes) for connection 0ee95b14c62cca9d3ead46a1033b5d6c988e26, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 40000002e3c2261e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 5875365, LowestAcked: 5875365, DelayTime: 0s} 2025/04/30 09:38:59 client <- Reading packet 5875365 (764 bytes) for connection (empty), Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000002e3c2261e, PacketNumber: 5875365, PacketNumberLen: 3, Length: 747, Version: v1} 2025/04/30 09:38:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:38:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0ee95b14c62cca9d3ead46a1033b5d6c988e26, InitialSourceConnectionID: 40000002e3c2261e, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xcbad2b1f17d54db313aa062960b64f22, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:59 client -> Sending packet 0 (82 bytes) for connection 0ee95b14c62cca9d3ead46a1033b5d6c988e26, Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: 40000002e3c2261e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 5875365, LowestAcked: 5875365, DelayTime: 0s} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:59 client Dropping Initial keys. 2025/04/30 09:38:59 client -> Sending packet 0 (46 bytes) for connection 0ee95b14c62cca9d3ead46a1033b5d6c988e26, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 40000002e3c2261e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:59 client <- Reading packet 5875366 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000002e3c2261e, PacketNumber: 5875366, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 232µs} 2025/04/30 09:38:59 client Peer doesn't await address validation any longer. 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 32.918ms (σ: 12.88ms) 2025/04/30 09:38:59 client Canceling loss detection timer. 2025/04/30 09:38:59 client <- Reading packet 5875365 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5875365, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:59 client Dropping Handshake keys. 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000000c79318d2d, StatelessResetToken: 0x3984917388c0760595ad5dbccabc143a} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000054e3afbdd, StatelessResetToken: 0x1cec2b526cd8e0e3258ae82bd82b932d} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000001b8dbaf948, StatelessResetToken: 0x6ccca424adc353d2b10a5b85353354c3} 2025/04/30 09:38:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:59 client -> Sending packet 1 (37 bytes) for connection 0ee95b14c62cca9d3ead46a1033b5d6c988e26, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000000c79318d2d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 5875365, LowestAcked: 5875365, DelayTime: 157.101µs} 2025/04/30 09:38:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:59 client <- Reading packet 5875366 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5875366, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 32.783ms (σ: 9.929ms) 2025/04/30 09:38:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:59 client -> Sending packet 2 (30 bytes) for connection 0ee95b14c62cca9d3ead46a1033b5d6c988e26, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000000c79318d2d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:59 client Connection 0ee95b14c62cca9d3ead46a1033b5d6c988e26 closed. 2025/04/30 09:38:59 Requesting https://server4:443/wcruqindak. 2025/04/30 09:38:59 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:59 Increased send buffer size to 14336 kiB 2025/04/30 09:38:59 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:59 Created qlog file: /logs/qlog/5035cc3fbd05cd78ffc71fb92f.sqlog 2025/04/30 09:38:59 client Starting new connection to server4 ([::]:42874 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5035cc3fbd05cd78ffc71fb92f, version v1 2025/04/30 09:38:59 Adding connection ID (empty). 2025/04/30 09:38:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:59 client -> Sending packet 0 (1280 bytes) for connection 5035cc3fbd05cd78ffc71fb92f, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 5035cc3fbd05cd78ffc71fb92f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:59 client <- Reading packet 12310919 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005b7a732bf2, Token: (empty), PacketNumber: 12310919, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:59 client Received first packet. Switching destination connection ID to: 4000005b7a732bf2 2025/04/30 09:38:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 504µs} 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 33.014308ms (σ: 16.507154ms) 2025/04/30 09:38:59 client -> Sending packet 1 (1280 bytes) for connection 5035cc3fbd05cd78ffc71fb92f, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 4000005b7a732bf2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 12310919, LowestAcked: 12310919, DelayTime: 0s} 2025/04/30 09:38:59 client <- Reading packet 12310919 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005b7a732bf2, PacketNumber: 12310919, PacketNumberLen: 4, Length: 743, Version: v1} 2025/04/30 09:38:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 09:38:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5035cc3fbd05cd78ffc71fb92f, InitialSourceConnectionID: 4000005b7a732bf2, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x0b3da84bcfb4b35b1c026958acf9391a, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:59 client -> Sending packet 0 (82 bytes) for connection 5035cc3fbd05cd78ffc71fb92f, Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: 4000005b7a732bf2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 12310919, LowestAcked: 12310919, DelayTime: 0s} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:59 client Dropping Initial keys. 2025/04/30 09:38:59 client -> Sending packet 0 (46 bytes) for connection 5035cc3fbd05cd78ffc71fb92f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000005b7a732bf2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:59 client <- Reading packet 12310920 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005b7a732bf2, PacketNumber: 12310920, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 160µs} 2025/04/30 09:38:59 client Peer doesn't await address validation any longer. 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 32.78ms (σ: 12.846ms) 2025/04/30 09:38:59 client Canceling loss detection timer. 2025/04/30 09:38:59 client <- Reading packet 12310919 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 12310919, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:59 client Dropping Handshake keys. 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000005260ffc7bf, StatelessResetToken: 0x45a79a00699b14ed26cf183321127bb9} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000041ea3dc292, StatelessResetToken: 0x2e3687eef96e128be5b7a1c5ba1158cc} 2025/04/30 09:38:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000441b812ddc, StatelessResetToken: 0x36dca460ab5e2d46e9a9ffcc0f6cd539} 2025/04/30 09:38:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:59 client -> Sending packet 1 (37 bytes) for connection 5035cc3fbd05cd78ffc71fb92f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000005260ffc7bf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.AckFrame{LargestAcked: 12310919, LowestAcked: 12310919, DelayTime: 137.589µs} 2025/04/30 09:38:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:59 client <- Reading packet 12310920 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:59 client Short Header{DestConnectionID: (empty), PacketNumber: 12310920, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 320µs} 2025/04/30 09:38:59 client newly acked packets (1): [0] 2025/04/30 09:38:59 client updated RTT: 32.652ms (σ: 9.89ms) 2025/04/30 09:38:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:59 client -> Sending packet 2 (30 bytes) for connection 5035cc3fbd05cd78ffc71fb92f, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:59 client Short Header{DestConnectionID: 4000005260ffc7bf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:59 client Connection 5035cc3fbd05cd78ffc71fb92f closed. 2025/04/30 09:38:59 Requesting https://server4:443/fsgckujpqk. 2025/04/30 09:38:59 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:59 Increased send buffer size to 14336 kiB 2025/04/30 09:38:59 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:59 Created qlog file: /logs/qlog/9f5c1c7b401059ec7a1888bdf04e1861d7c866a5.sqlog 2025/04/30 09:38:59 client Starting new connection to server4 ([::]:44142 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, version v1 2025/04/30 09:38:59 Adding connection ID (empty). 2025/04/30 09:38:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:59 client -> Sending packet 0 (1280 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, Initial 2025/04/30 09:38:59 client Long Header{Type: Initial, DestConnectionID: 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:38:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:39:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:00 client -> Sending packet 1 (1280 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:39:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:39:00 client -> Sending packet 2 (1280 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:39:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:39:00 client <- Reading packet 1035840 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c42c322d5f, Token: (empty), PacketNumber: 1035840, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:00 client Received first packet. Switching destination connection ID to: 400000c42c322d5f 2025/04/30 09:39:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 608µs} 2025/04/30 09:39:00 client -> Sending packet 3 (1280 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: 400000c42c322d5f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:00 client -> &wire.AckFrame{LargestAcked: 1035840, LowestAcked: 1035840, DelayTime: 0s} 2025/04/30 09:39:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:00 client <- Reading packet 1035842 (767 bytes) for connection (empty), Handshake 2025/04/30 09:39:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c42c322d5f, PacketNumber: 1035842, PacketNumberLen: 3, Length: 750, Version: v1} 2025/04/30 09:39:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:39:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, InitialSourceConnectionID: 400000c42c322d5f, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x505865c7c5a2cdafd435fde1d7f14c59, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:00 client -> Sending packet 0 (82 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, Handshake 2025/04/30 09:39:00 client Long Header{Type: Handshake, DestConnectionID: 400000c42c322d5f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:00 client -> &wire.AckFrame{LargestAcked: 1035842, LowestAcked: 1035842, DelayTime: 0s} 2025/04/30 09:39:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:00 client Dropping Initial keys. 2025/04/30 09:39:00 client -> Sending packet 0 (46 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:00 client Short Header{DestConnectionID: 400000c42c322d5f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:00 client <- Reading packet 1035840 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1035840, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:00 client Dropping Handshake keys. 2025/04/30 09:39:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000c8f2108b72, StatelessResetToken: 0xa6f27bca9680cba9c43e5665c948fd5a} 2025/04/30 09:39:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000cd1db1e226, StatelessResetToken: 0x039306b27dab11376682b184e04d84ec} 2025/04/30 09:39:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000c119ab02f2, StatelessResetToken: 0x550781183ce4a74f1c02d2c001e1a7be} 2025/04/30 09:39:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:00 client -> Sending packet 1 (1366 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:00 client Short Header{DestConnectionID: 400000c8f2108b72, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:00 client -> &wire.PingFrame{} 2025/04/30 09:39:00 client -> Sending packet 2 (37 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:00 client Short Header{DestConnectionID: 400000c8f2108b72, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:00 client -> &wire.AckFrame{LargestAcked: 1035840, LowestAcked: 1035840, DelayTime: 157.896µs} 2025/04/30 09:39:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:00 client <- Reading packet 1035841 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1035841, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 536µs} 2025/04/30 09:39:00 client newly acked packets (1): [0] 2025/04/30 09:39:00 client updated RTT: 32.077139ms (σ: 16.038569ms) 2025/04/30 09:39:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:00 client -> Sending packet 3 (30 bytes) for connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:00 client Short Header{DestConnectionID: 400000c8f2108b72, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:00 client Connection 9f5c1c7b401059ec7a1888bdf04e1861d7c866a5 closed. 2025/04/30 09:39:00 Requesting https://server4:443/sozsjstsui. 2025/04/30 09:39:00 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:00 Increased send buffer size to 14336 kiB 2025/04/30 09:39:00 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:00 Created qlog file: /logs/qlog/c8e87fea7492dcd744fcf9f02d4bd6136e5d.sqlog 2025/04/30 09:39:00 client Starting new connection to server4 ([::]:48773 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c8e87fea7492dcd744fcf9f02d4bd6136e5d, version v1 2025/04/30 09:39:00 Adding connection ID (empty). 2025/04/30 09:39:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:00 client -> Sending packet 0 (1280 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: c8e87fea7492dcd744fcf9f02d4bd6136e5d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:39:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:39:00 client <- Reading packet 16776001 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d1cb31f796, Token: (empty), PacketNumber: 16776001, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:00 client Received first packet. Switching destination connection ID to: 400000d1cb31f796 2025/04/30 09:39:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:39:00 client newly acked packets (1): [0] 2025/04/30 09:39:00 client updated RTT: 33.165903ms (σ: 16.582951ms) 2025/04/30 09:39:00 client -> Sending packet 1 (1280 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: 400000d1cb31f796, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:00 client -> &wire.AckFrame{LargestAcked: 16776001, LowestAcked: 16776001, DelayTime: 0s} 2025/04/30 09:39:00 client -> Sending packet 2 (1280 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: 400000d1cb31f796, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:00 client -> &wire.PingFrame{} 2025/04/30 09:39:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:39:00 client -> Sending packet 3 (1280 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: 400000d1cb31f796, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:00 client -> &wire.PingFrame{} 2025/04/30 09:39:00 client -> Sending packet 4 (1280 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: 400000d1cb31f796, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:00 client -> &wire.PingFrame{} 2025/04/30 09:39:00 client <- Reading packet 16776005 (765 bytes) for connection (empty), Handshake 2025/04/30 09:39:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d1cb31f796, PacketNumber: 16776005, PacketNumberLen: 4, Length: 748, Version: v1} 2025/04/30 09:39:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:39:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c8e87fea7492dcd744fcf9f02d4bd6136e5d, InitialSourceConnectionID: 400000d1cb31f796, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xdfe3be6965bd32aa648b267951b9e441, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:00 client -> Sending packet 0 (82 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, Handshake 2025/04/30 09:39:00 client Long Header{Type: Handshake, DestConnectionID: 400000d1cb31f796, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:00 client -> &wire.AckFrame{LargestAcked: 16776005, LowestAcked: 16776005, DelayTime: 0s} 2025/04/30 09:39:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:00 client Dropping Initial keys. 2025/04/30 09:39:00 client -> Sending packet 0 (46 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:00 client Short Header{DestConnectionID: 400000d1cb31f796, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:39:00 client -> Sending packet 1 (74 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, Handshake 2025/04/30 09:39:00 client Long Header{Type: Handshake, DestConnectionID: 400000d1cb31f796, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:00 client -> Sending packet 2 (74 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, Handshake 2025/04/30 09:39:00 client Long Header{Type: Handshake, DestConnectionID: 400000d1cb31f796, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:00 client <- Reading packet 16776006 (41 bytes) for connection (empty), Handshake 2025/04/30 09:39:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d1cb31f796, PacketNumber: 16776006, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:39:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 336µs} 2025/04/30 09:39:00 client Peer doesn't await address validation any longer. 2025/04/30 09:39:00 client <- Reading packet 16776001 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:00 client Short Header{DestConnectionID: (empty), PacketNumber: 16776001, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.96ms} 2025/04/30 09:39:00 client newly acked packets (1): [0] 2025/04/30 09:39:00 client updated RTT: 42.348ms (σ: 30.803ms) 2025/04/30 09:39:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:00 client Canceling loss detection timer. 2025/04/30 09:39:00 client Dropping Handshake keys. 2025/04/30 09:39:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000c8614cb27a, StatelessResetToken: 0xe6a6b116b55fcc52358d4bb518fe5386} 2025/04/30 09:39:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000cc9a3fc9c3, StatelessResetToken: 0x164fd58edff32df9665027e2245bb839} 2025/04/30 09:39:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000d2ac64935b, StatelessResetToken: 0x80cbef4b899fc4f88361d9576fb21c57} 2025/04/30 09:39:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:00 client -> Sending packet 1 (37 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:00 client Short Header{DestConnectionID: 400000c8614cb27a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:00 client -> &wire.AckFrame{LargestAcked: 16776001, LowestAcked: 16776001, DelayTime: 220.753µs} 2025/04/30 09:39:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:00 client <- Reading packet 16776002 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:00 client Short Header{DestConnectionID: (empty), PacketNumber: 16776002, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:00 client -> Sending packet 2 (30 bytes) for connection c8e87fea7492dcd744fcf9f02d4bd6136e5d, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:00 client Short Header{DestConnectionID: 400000c8614cb27a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:00 client Connection c8e87fea7492dcd744fcf9f02d4bd6136e5d closed. 2025/04/30 09:39:00 Requesting https://server4:443/fuahkrwclk. 2025/04/30 09:39:00 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:00 Increased send buffer size to 14336 kiB 2025/04/30 09:39:00 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:00 Created qlog file: /logs/qlog/183d0d325992252859.sqlog 2025/04/30 09:39:00 client Starting new connection to server4 ([::]:52451 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 183d0d325992252859, version v1 2025/04/30 09:39:00 Adding connection ID (empty). 2025/04/30 09:39:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:00 client -> Sending packet 0 (1280 bytes) for connection 183d0d325992252859, Initial 2025/04/30 09:39:00 client Long Header{Type: Initial, DestConnectionID: 183d0d325992252859, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:39:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:39:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:01 client -> Sending packet 1 (1280 bytes) for connection 183d0d325992252859, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 183d0d325992252859, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:39:01 client -> Sending packet 2 (1280 bytes) for connection 183d0d325992252859, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 183d0d325992252859, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:39:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:39:01 client -> Sending packet 3 (1280 bytes) for connection 183d0d325992252859, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 183d0d325992252859, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:39:01 client -> Sending packet 4 (1280 bytes) for connection 183d0d325992252859, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 183d0d325992252859, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:39:01 client <- Reading packet 4272356 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d83458e8bc, Token: (empty), PacketNumber: 4272356, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:01 client Received first packet. Switching destination connection ID to: 400000d83458e8bc 2025/04/30 09:39:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 808µs} 2025/04/30 09:39:01 client -> Sending packet 5 (1280 bytes) for connection 183d0d325992252859, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 400000d83458e8bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 4272356, LowestAcked: 4272356, DelayTime: 0s} 2025/04/30 09:39:01 client <- Reading packet 4272356 (755 bytes) for connection (empty), Handshake 2025/04/30 09:39:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d83458e8bc, PacketNumber: 4272356, PacketNumberLen: 3, Length: 738, Version: v1} 2025/04/30 09:39:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:39:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 183d0d325992252859, InitialSourceConnectionID: 400000d83458e8bc, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x54a37edc240605cbbc906f699e3f772a, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:01 client -> Sending packet 0 (82 bytes) for connection 183d0d325992252859, Handshake 2025/04/30 09:39:01 client Long Header{Type: Handshake, DestConnectionID: 400000d83458e8bc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 4272356, LowestAcked: 4272356, DelayTime: 0s} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:01 client Dropping Initial keys. 2025/04/30 09:39:01 client -> Sending packet 0 (46 bytes) for connection 183d0d325992252859, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 400000d83458e8bc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:01 client <- Reading packet 4272357 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4272357, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/04/30 09:39:01 client Peer doesn't await address validation any longer. 2025/04/30 09:39:01 client newly acked packets (1): [0] 2025/04/30 09:39:01 client updated RTT: 31.206812ms (σ: 15.603406ms) 2025/04/30 09:39:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:01 client Canceling loss detection timer. 2025/04/30 09:39:01 client Dropping Handshake keys. 2025/04/30 09:39:01 client <- Reading packet 4272358 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4272358, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:01 client -> Sending packet 1 (35 bytes) for connection 183d0d325992252859, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 400000d83458e8bc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 4272358, LowestAcked: 4272357, DelayTime: 94.186µs} 2025/04/30 09:39:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:01 client -> Sending packet 2 (30 bytes) for connection 183d0d325992252859, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 400000d83458e8bc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:01 client Connection 183d0d325992252859 closed. 2025/04/30 09:39:01 Requesting https://server4:443/icvdvtunni. 2025/04/30 09:39:01 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:01 Increased send buffer size to 14336 kiB 2025/04/30 09:39:01 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:01 Created qlog file: /logs/qlog/77ec760dd067757998109e6f48dc0c4b0f9d51.sqlog 2025/04/30 09:39:01 client Starting new connection to server4 ([::]:48274 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 77ec760dd067757998109e6f48dc0c4b0f9d51, version v1 2025/04/30 09:39:01 Adding connection ID (empty). 2025/04/30 09:39:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:01 client -> Sending packet 0 (1280 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 77ec760dd067757998109e6f48dc0c4b0f9d51, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:01 client <- Reading packet 7708372 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000048c0abe686, Token: (empty), PacketNumber: 7708372, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:01 client Received first packet. Switching destination connection ID to: 40000048c0abe686 2025/04/30 09:39:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 584µs} 2025/04/30 09:39:01 client newly acked packets (1): [0] 2025/04/30 09:39:01 client updated RTT: 33.088513ms (σ: 16.544256ms) 2025/04/30 09:39:01 client -> Sending packet 1 (1280 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 40000048c0abe686, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 7708372, LowestAcked: 7708372, DelayTime: 0s} 2025/04/30 09:39:01 client <- Reading packet 7708372 (766 bytes) for connection (empty), Handshake 2025/04/30 09:39:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000048c0abe686, PacketNumber: 7708372, PacketNumberLen: 3, Length: 749, Version: v1} 2025/04/30 09:39:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:39:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 77ec760dd067757998109e6f48dc0c4b0f9d51, InitialSourceConnectionID: 40000048c0abe686, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xa948be8c32bce143b29f23cd0228807c, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:01 client -> Sending packet 0 (82 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, Handshake 2025/04/30 09:39:01 client Long Header{Type: Handshake, DestConnectionID: 40000048c0abe686, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 7708372, LowestAcked: 7708372, DelayTime: 0s} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:01 client Dropping Initial keys. 2025/04/30 09:39:01 client -> Sending packet 0 (46 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 40000048c0abe686, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:01 client <- Reading packet 7708373 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000048c0abe686, PacketNumber: 7708373, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 184µs} 2025/04/30 09:39:01 client Peer doesn't await address validation any longer. 2025/04/30 09:39:01 client newly acked packets (1): [0] 2025/04/30 09:39:01 client updated RTT: 32.843ms (σ: 12.897ms) 2025/04/30 09:39:01 client Canceling loss detection timer. 2025/04/30 09:39:01 client <- Reading packet 7708372 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7708372, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:01 client Dropping Handshake keys. 2025/04/30 09:39:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000542e540e6c, StatelessResetToken: 0x08525922f2f7ebc00f5ba65255161848} 2025/04/30 09:39:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000004658282531, StatelessResetToken: 0x2b2c545e09f8fb966d8db81a55ad4c85} 2025/04/30 09:39:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000005d11fc823a, StatelessResetToken: 0x4dbf9e2eb107d5560e15ac5fdd9c27e3} 2025/04/30 09:39:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:01 client -> Sending packet 1 (37 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 400000542e540e6c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 7708372, LowestAcked: 7708372, DelayTime: 116.354µs} 2025/04/30 09:39:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:39:01 client -> Sending packet 3 (46 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 400000542e540e6c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:01 client Skipping packet number 2 2025/04/30 09:39:01 client -> Sending packet 4 (29 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 400000542e540e6c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:01 client <- Reading packet 7708375 (53 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7708375, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000004c2c828a8d, StatelessResetToken: 0xb2b573cf6b4f05d3664dd07aa6db7dff} 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 90.384ms} 2025/04/30 09:39:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:01 client -> Sending packet 5 (37 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 400000542e540e6c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 7708375, LowestAcked: 7708372, AckRanges: {{Largest: 7708375, Smallest: 7708375}, {Largest: 7708372, Smallest: 7708372}}, DelayTime: 115.386µs} 2025/04/30 09:39:01 client <- Reading packet 7708376 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7708376, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 352µs} 2025/04/30 09:39:01 client newly acked packets (1): [3] 2025/04/30 09:39:01 client updated RTT: 32.623ms (σ: 10.111ms) 2025/04/30 09:39:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:01 client <- Reading packet 7708377 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7708377, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 440µs} 2025/04/30 09:39:01 client newly acked packets (1): [4] 2025/04/30 09:39:01 client updated RTT: 32.494ms (σ: 7.839ms) 2025/04/30 09:39:01 client Canceling loss detection timer. 2025/04/30 09:39:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:01 client -> Sending packet 6 (30 bytes) for connection 77ec760dd067757998109e6f48dc0c4b0f9d51, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 400000542e540e6c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:01 client Connection 77ec760dd067757998109e6f48dc0c4b0f9d51 closed. 2025/04/30 09:39:01 Requesting https://server4:443/jwnqcwmqac. 2025/04/30 09:39:01 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:01 Increased send buffer size to 14336 kiB 2025/04/30 09:39:01 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:01 Created qlog file: /logs/qlog/5723f20a62c40229be1c.sqlog 2025/04/30 09:39:01 client Starting new connection to server4 ([::]:48365 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5723f20a62c40229be1c, version v1 2025/04/30 09:39:01 Adding connection ID (empty). 2025/04/30 09:39:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:01 client -> Sending packet 0 (1280 bytes) for connection 5723f20a62c40229be1c, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 5723f20a62c40229be1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:39:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:01 client -> Sending packet 1 (1280 bytes) for connection 5723f20a62c40229be1c, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 5723f20a62c40229be1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:39:01 client -> Sending packet 2 (1280 bytes) for connection 5723f20a62c40229be1c, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 5723f20a62c40229be1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:39:01 client <- Reading packet 2020320 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005819cad3a6, Token: (empty), PacketNumber: 2020320, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:01 client Received first packet. Switching destination connection ID to: 4000005819cad3a6 2025/04/30 09:39:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 712µs} 2025/04/30 09:39:01 client -> Sending packet 3 (1280 bytes) for connection 5723f20a62c40229be1c, Initial 2025/04/30 09:39:01 client Long Header{Type: Initial, DestConnectionID: 4000005819cad3a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 2020320, LowestAcked: 2020320, DelayTime: 0s} 2025/04/30 09:39:01 client <- Reading packet 2020320 (756 bytes) for connection (empty), Handshake 2025/04/30 09:39:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005819cad3a6, PacketNumber: 2020320, PacketNumberLen: 3, Length: 739, Version: v1} 2025/04/30 09:39:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5723f20a62c40229be1c, InitialSourceConnectionID: 4000005819cad3a6, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x2a836a5cb34be4f7e115cb8afc63d1e4, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:01 client -> Sending packet 0 (82 bytes) for connection 5723f20a62c40229be1c, Handshake 2025/04/30 09:39:01 client Long Header{Type: Handshake, DestConnectionID: 4000005819cad3a6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 2020320, LowestAcked: 2020320, DelayTime: 0s} 2025/04/30 09:39:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:01 client Dropping Initial keys. 2025/04/30 09:39:01 client -> Sending packet 0 (46 bytes) for connection 5723f20a62c40229be1c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 4000005819cad3a6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:01 client <- Reading packet 2020321 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005819cad3a6, PacketNumber: 2020321, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/04/30 09:39:01 client Peer doesn't await address validation any longer. 2025/04/30 09:39:01 client newly acked packets (1): [0] 2025/04/30 09:39:01 client updated RTT: 31.13975ms (σ: 15.569875ms) 2025/04/30 09:39:01 client Canceling loss detection timer. 2025/04/30 09:39:01 client <- Reading packet 2020320 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:01 client Short Header{DestConnectionID: (empty), PacketNumber: 2020320, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:01 client Dropping Handshake keys. 2025/04/30 09:39:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000005c9e8d1707, StatelessResetToken: 0xb4843ace016a0c19c9f08d3864074a69} 2025/04/30 09:39:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000502fb0a7df, StatelessResetToken: 0xa664e11eae7619abb7a63801ec313cfc} 2025/04/30 09:39:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000004a91d1e5d2, StatelessResetToken: 0xa2171f9d7f307d58ae6af5fb3fca0c3f} 2025/04/30 09:39:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:01 client -> Sending packet 1 (37 bytes) for connection 5723f20a62c40229be1c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 4000005c9e8d1707, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 2020320, LowestAcked: 2020320, DelayTime: 159.464µs} 2025/04/30 09:39:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:01 client <- Reading packet 2020323 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:01 client Short Header{DestConnectionID: (empty), PacketNumber: 2020323, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 09:39:01 client newly acked packets (2): [0 1] 2025/04/30 09:39:01 client updated RTT: 31.097ms (σ: 11.76ms) 2025/04/30 09:39:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:01 client Canceling loss detection timer. 2025/04/30 09:39:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000005467666b49, StatelessResetToken: 0x22c0c49d70c9708ca9dab11f9230ddf3} 2025/04/30 09:39:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:01 client Ignoring all packets below 2020321. 2025/04/30 09:39:01 client -> Sending packet 2 (35 bytes) for connection 5723f20a62c40229be1c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:01 client Short Header{DestConnectionID: 4000005c9e8d1707, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:01 client -> &wire.AckFrame{LargestAcked: 2020323, LowestAcked: 2020323, DelayTime: 143.929µs} 2025/04/30 09:39:02 client <- Reading packet 2020324 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2020324, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 128µs} 2025/04/30 09:39:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:02 client -> Sending packet 3 (30 bytes) for connection 5723f20a62c40229be1c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 4000005c9e8d1707, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:02 client Connection 5723f20a62c40229be1c closed. 2025/04/30 09:39:02 Requesting https://server4:443/hzjkczncne. 2025/04/30 09:39:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:02 Increased send buffer size to 14336 kiB 2025/04/30 09:39:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:02 Created qlog file: /logs/qlog/94742a070602938597249a58e77c62c9172a.sqlog 2025/04/30 09:39:02 client Starting new connection to server4 ([::]:58069 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 94742a070602938597249a58e77c62c9172a, version v1 2025/04/30 09:39:02 Adding connection ID (empty). 2025/04/30 09:39:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:02 client -> Sending packet 0 (1280 bytes) for connection 94742a070602938597249a58e77c62c9172a, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 94742a070602938597249a58e77c62c9172a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:39:02 client <- Reading packet 10957535 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000040b3259323, Token: (empty), PacketNumber: 10957535, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:02 client Received first packet. Switching destination connection ID to: 40000040b3259323 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 552µs} 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 33.113979ms (σ: 16.556989ms) 2025/04/30 09:39:02 client -> Sending packet 1 (1280 bytes) for connection 94742a070602938597249a58e77c62c9172a, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 40000040b3259323, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 10957535, LowestAcked: 10957535, DelayTime: 0s} 2025/04/30 09:39:02 client -> Sending packet 2 (1280 bytes) for connection 94742a070602938597249a58e77c62c9172a, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 40000040b3259323, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.PingFrame{} 2025/04/30 09:39:02 client <- Reading packet 10957537 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000040b3259323, Token: (empty), PacketNumber: 10957537, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 115.92ms} 2025/04/30 09:39:02 client -> Sending packet 3 (1280 bytes) for connection 94742a070602938597249a58e77c62c9172a, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 40000040b3259323, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 10957537, LowestAcked: 10957535, AckRanges: {{Largest: 10957537, Smallest: 10957537}, {Largest: 10957535, Smallest: 10957535}}, DelayTime: 0s} 2025/04/30 09:39:02 client <- Reading packet 10957537 (766 bytes) for connection (empty), Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000040b3259323, PacketNumber: 10957537, PacketNumberLen: 4, Length: 749, Version: v1} 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 09:39:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 94742a070602938597249a58e77c62c9172a, InitialSourceConnectionID: 40000040b3259323, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xe3d27fe14ff69061aba095a5b8446a32, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:02 client -> Sending packet 0 (82 bytes) for connection 94742a070602938597249a58e77c62c9172a, Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: 40000040b3259323, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 10957537, LowestAcked: 10957537, DelayTime: 0s} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:02 client Dropping Initial keys. 2025/04/30 09:39:02 client -> Sending packet 0 (46 bytes) for connection 94742a070602938597249a58e77c62c9172a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 40000040b3259323, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:02 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:39:02 client <- Reading packet 10957536 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:02 client Short Header{DestConnectionID: (empty), PacketNumber: 10957536, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 09:39:02 client Peer doesn't await address validation any longer. 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 32.975ms (σ: 12.691ms) 2025/04/30 09:39:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:02 client Canceling loss detection timer. 2025/04/30 09:39:02 client Dropping Handshake keys. 2025/04/30 09:39:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:02 client -> Sending packet 1 (35 bytes) for connection 94742a070602938597249a58e77c62c9172a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 40000040b3259323, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 10957536, LowestAcked: 10957536, DelayTime: 187.169µs} 2025/04/30 09:39:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:02 client -> Sending packet 2 (30 bytes) for connection 94742a070602938597249a58e77c62c9172a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 40000040b3259323, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:02 client Connection 94742a070602938597249a58e77c62c9172a closed. 2025/04/30 09:39:02 Requesting https://server4:443/fsixmaeqke. 2025/04/30 09:39:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:02 Increased send buffer size to 14336 kiB 2025/04/30 09:39:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:02 Created qlog file: /logs/qlog/48ba252114a10f4b94a3908409e304b152e5.sqlog 2025/04/30 09:39:02 client Starting new connection to server4 ([::]:56465 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 48ba252114a10f4b94a3908409e304b152e5, version v1 2025/04/30 09:39:02 Adding connection ID (empty). 2025/04/30 09:39:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:02 client -> Sending packet 0 (1280 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 48ba252114a10f4b94a3908409e304b152e5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:02 client <- Reading packet 4971249 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000012d7a777b5, Token: (empty), PacketNumber: 4971249, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:02 client Received first packet. Switching destination connection ID to: 40000012d7a777b5 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 33.400074ms (σ: 16.700037ms) 2025/04/30 09:39:02 client -> Sending packet 1 (1280 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 40000012d7a777b5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 4971249, LowestAcked: 4971249, DelayTime: 0s} 2025/04/30 09:39:02 client -> Sending packet 2 (1280 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 40000012d7a777b5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.PingFrame{} 2025/04/30 09:39:02 client <- Reading packet 4971251 (764 bytes) for connection (empty), Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000012d7a777b5, PacketNumber: 4971251, PacketNumberLen: 3, Length: 747, Version: v1} 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:39:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 48ba252114a10f4b94a3908409e304b152e5, InitialSourceConnectionID: 40000012d7a777b5, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xde7d788f4bde7c0c592b599b9b2be9b0, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:02 client -> Sending packet 0 (82 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: 40000012d7a777b5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 4971251, LowestAcked: 4971251, DelayTime: 0s} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:02 client Dropping Initial keys. 2025/04/30 09:39:02 client -> Sending packet 0 (46 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 40000012d7a777b5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:39:02 client -> Sending packet 1 (74 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: 40000012d7a777b5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:02 client -> Sending packet 2 (74 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: 40000012d7a777b5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:02 client <- Reading packet 4971252 (40 bytes) for connection (empty), Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000012d7a777b5, PacketNumber: 4971252, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 320µs} 2025/04/30 09:39:02 client Peer doesn't await address validation any longer. 2025/04/30 09:39:02 client <- Reading packet 4971249 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4971249, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.976ms} 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 42.54ms (σ: 30.805ms) 2025/04/30 09:39:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:02 client Canceling loss detection timer. 2025/04/30 09:39:02 client Dropping Handshake keys. 2025/04/30 09:39:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000000f3df1798f, StatelessResetToken: 0xe49163cb4f73f0749c8cdcaf05b2cdc1} 2025/04/30 09:39:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000001043f46479, StatelessResetToken: 0x0b02fbc010fabe917411a6b81fcbeb70} 2025/04/30 09:39:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000838021fcc, StatelessResetToken: 0xb2d32e96cef1e177e1f41267cb86bde8} 2025/04/30 09:39:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:02 client -> Sending packet 1 (37 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 4000000f3df1798f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 4971249, LowestAcked: 4971249, DelayTime: 181.039µs} 2025/04/30 09:39:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:02 client Dropping %!s(logging.PacketType=1) packet (41 bytes) because we already dropped the keys. 2025/04/30 09:39:02 client <- Reading packet 4971250 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4971250, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:02 client -> Sending packet 2 (30 bytes) for connection 48ba252114a10f4b94a3908409e304b152e5, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 4000000f3df1798f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:02 client Connection 48ba252114a10f4b94a3908409e304b152e5 closed. 2025/04/30 09:39:02 Requesting https://server4:443/uyybuudmlu. 2025/04/30 09:39:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:02 Increased send buffer size to 14336 kiB 2025/04/30 09:39:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:02 Created qlog file: /logs/qlog/d00d0fdd5f6e5eebc9f70f.sqlog 2025/04/30 09:39:02 client Starting new connection to server4 ([::]:47992 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d00d0fdd5f6e5eebc9f70f, version v1 2025/04/30 09:39:02 Adding connection ID (empty). 2025/04/30 09:39:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:02 client -> Sending packet 0 (1280 bytes) for connection d00d0fdd5f6e5eebc9f70f, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: d00d0fdd5f6e5eebc9f70f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:39:02 client <- Reading packet 9695274 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000014c25017dd, Token: (empty), PacketNumber: 9695274, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:02 client Received first packet. Switching destination connection ID to: 40000014c25017dd 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 560µs} 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 33.06197ms (σ: 16.530985ms) 2025/04/30 09:39:02 client -> Sending packet 1 (1280 bytes) for connection d00d0fdd5f6e5eebc9f70f, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 40000014c25017dd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 9695274, LowestAcked: 9695274, DelayTime: 0s} 2025/04/30 09:39:02 client <- Reading packet 9695274 (758 bytes) for connection (empty), Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000014c25017dd, PacketNumber: 9695274, PacketNumberLen: 4, Length: 741, Version: v1} 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:39:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d00d0fdd5f6e5eebc9f70f, InitialSourceConnectionID: 40000014c25017dd, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x46a3f55fa83512dfb8590c1a9c279298, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:02 client -> Sending packet 0 (82 bytes) for connection d00d0fdd5f6e5eebc9f70f, Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: 40000014c25017dd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 9695274, LowestAcked: 9695274, DelayTime: 0s} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:02 client Dropping Initial keys. 2025/04/30 09:39:02 client -> Sending packet 0 (46 bytes) for connection d00d0fdd5f6e5eebc9f70f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 40000014c25017dd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:02 client <- Reading packet 9695275 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000014c25017dd, PacketNumber: 9695275, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200µs} 2025/04/30 09:39:02 client Peer doesn't await address validation any longer. 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 32.823ms (σ: 12.872ms) 2025/04/30 09:39:02 client Canceling loss detection timer. 2025/04/30 09:39:02 client <- Reading packet 9695274 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:02 client Short Header{DestConnectionID: (empty), PacketNumber: 9695274, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:02 client Dropping Handshake keys. 2025/04/30 09:39:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000015c0b85351, StatelessResetToken: 0x9dcd4c10bf876295df7c4c58edaf4fed} 2025/04/30 09:39:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000167f5d6f67, StatelessResetToken: 0x2d996a0e1c1b9d49cd7719fd536b76b0} 2025/04/30 09:39:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000015e3042578, StatelessResetToken: 0x7400d73fd66d6525cd17f0f98ca1ffb5} 2025/04/30 09:39:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:02 client -> Sending packet 1 (37 bytes) for connection d00d0fdd5f6e5eebc9f70f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 40000015c0b85351, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 9695274, LowestAcked: 9695274, DelayTime: 378.816µs} 2025/04/30 09:39:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:02 client <- Reading packet 9695275 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:02 client Short Header{DestConnectionID: (empty), PacketNumber: 9695275, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 32.684ms (σ: 9.93ms) 2025/04/30 09:39:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:02 client -> Sending packet 2 (30 bytes) for connection d00d0fdd5f6e5eebc9f70f, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 40000015c0b85351, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:02 client Connection d00d0fdd5f6e5eebc9f70f closed. 2025/04/30 09:39:02 Requesting https://server4:443/erzxmljebd. 2025/04/30 09:39:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:02 Increased send buffer size to 14336 kiB 2025/04/30 09:39:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:02 Created qlog file: /logs/qlog/9f2dda9d54ddc212d7a7.sqlog 2025/04/30 09:39:02 client Starting new connection to server4 ([::]:53669 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9f2dda9d54ddc212d7a7, version v1 2025/04/30 09:39:02 Adding connection ID (empty). 2025/04/30 09:39:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:02 client -> Sending packet 0 (1280 bytes) for connection 9f2dda9d54ddc212d7a7, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 9f2dda9d54ddc212d7a7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:39:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:02 client -> Sending packet 1 (1280 bytes) for connection 9f2dda9d54ddc212d7a7, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 9f2dda9d54ddc212d7a7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:39:02 client -> Sending packet 2 (1280 bytes) for connection 9f2dda9d54ddc212d7a7, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 9f2dda9d54ddc212d7a7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:39:02 client <- Reading packet 11553195 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004c1f6ef97b, Token: (empty), PacketNumber: 11553195, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:02 client Received first packet. Switching destination connection ID to: 4000004c1f6ef97b 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 712µs} 2025/04/30 09:39:02 client -> Sending packet 3 (1280 bytes) for connection 9f2dda9d54ddc212d7a7, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 4000004c1f6ef97b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 11553195, LowestAcked: 11553195, DelayTime: 0s} 2025/04/30 09:39:02 client <- Reading packet 11553197 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004c1f6ef97b, Token: (empty), PacketNumber: 11553197, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 111.032ms} 2025/04/30 09:39:02 client -> Sending packet 4 (1280 bytes) for connection 9f2dda9d54ddc212d7a7, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 4000004c1f6ef97b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 11553197, LowestAcked: 11553195, AckRanges: {{Largest: 11553197, Smallest: 11553197}, {Largest: 11553195, Smallest: 11553195}}, DelayTime: 0s} 2025/04/30 09:39:02 client <- Reading packet 11553197 (757 bytes) for connection (empty), Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004c1f6ef97b, PacketNumber: 11553197, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9f2dda9d54ddc212d7a7, InitialSourceConnectionID: 4000004c1f6ef97b, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x66c970854b0a30b45799bdf048bb9b6f, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:02 client -> Sending packet 0 (82 bytes) for connection 9f2dda9d54ddc212d7a7, Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: 4000004c1f6ef97b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 11553197, LowestAcked: 11553197, DelayTime: 0s} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:02 client Dropping Initial keys. 2025/04/30 09:39:02 client -> Sending packet 0 (46 bytes) for connection 9f2dda9d54ddc212d7a7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 4000004c1f6ef97b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:02 client <- Reading packet 11553196 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:02 client Short Header{DestConnectionID: (empty), PacketNumber: 11553196, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 544µs} 2025/04/30 09:39:02 client Peer doesn't await address validation any longer. 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 32.276512ms (σ: 16.138256ms) 2025/04/30 09:39:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:02 client Canceling loss detection timer. 2025/04/30 09:39:02 client Dropping Handshake keys. 2025/04/30 09:39:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:02 client -> Sending packet 1 (35 bytes) for connection 9f2dda9d54ddc212d7a7, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 4000004c1f6ef97b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 11553196, LowestAcked: 11553196, DelayTime: 132.066µs} 2025/04/30 09:39:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:02 client -> Sending packet 2 (30 bytes) for connection 9f2dda9d54ddc212d7a7, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 4000004c1f6ef97b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:02 client Connection 9f2dda9d54ddc212d7a7 closed. 2025/04/30 09:39:02 Requesting https://server4:443/ziejhdgwgw. 2025/04/30 09:39:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:02 Increased send buffer size to 14336 kiB 2025/04/30 09:39:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:02 Created qlog file: /logs/qlog/dab8444834553d5b59fda31a2bb113.sqlog 2025/04/30 09:39:02 client Starting new connection to server4 ([::]:48675 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dab8444834553d5b59fda31a2bb113, version v1 2025/04/30 09:39:02 Adding connection ID (empty). 2025/04/30 09:39:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:02 client -> Sending packet 0 (1280 bytes) for connection dab8444834553d5b59fda31a2bb113, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: dab8444834553d5b59fda31a2bb113, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:39:02 client <- Reading packet 2216903 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000000b7faa5aea, Token: (empty), PacketNumber: 2216903, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:02 client Received first packet. Switching destination connection ID to: 4000000b7faa5aea 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 552µs} 2025/04/30 09:39:02 client newly acked packets (1): [0] 2025/04/30 09:39:02 client updated RTT: 33.095239ms (σ: 16.547619ms) 2025/04/30 09:39:02 client -> Sending packet 1 (1280 bytes) for connection dab8444834553d5b59fda31a2bb113, Initial 2025/04/30 09:39:02 client Long Header{Type: Initial, DestConnectionID: 4000000b7faa5aea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 2216903, LowestAcked: 2216903, DelayTime: 0s} 2025/04/30 09:39:02 client <- Reading packet 2216903 (762 bytes) for connection (empty), Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000b7faa5aea, PacketNumber: 2216903, PacketNumberLen: 3, Length: 745, Version: v1} 2025/04/30 09:39:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 09:39:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dab8444834553d5b59fda31a2bb113, InitialSourceConnectionID: 4000000b7faa5aea, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5ae5d796285154695f61f1d31afd4aad, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:02 client -> Sending packet 0 (82 bytes) for connection dab8444834553d5b59fda31a2bb113, Handshake 2025/04/30 09:39:02 client Long Header{Type: Handshake, DestConnectionID: 4000000b7faa5aea, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:02 client -> &wire.AckFrame{LargestAcked: 2216903, LowestAcked: 2216903, DelayTime: 0s} 2025/04/30 09:39:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:02 client Dropping Initial keys. 2025/04/30 09:39:02 client -> Sending packet 0 (46 bytes) for connection dab8444834553d5b59fda31a2bb113, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:02 client Short Header{DestConnectionID: 4000000b7faa5aea, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:39:03 client -> Sending packet 1 (74 bytes) for connection dab8444834553d5b59fda31a2bb113, Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: 4000000b7faa5aea, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:03 client -> Sending packet 2 (74 bytes) for connection dab8444834553d5b59fda31a2bb113, Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: 4000000b7faa5aea, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:03 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:39:03 client <- Reading packet 2216905 (762 bytes) for connection (empty), Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000b7faa5aea, PacketNumber: 2216905, PacketNumberLen: 3, Length: 745, Version: v1} 2025/04/30 09:39:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 09:39:03 client -> Sending packet 3 (45 bytes) for connection dab8444834553d5b59fda31a2bb113, Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: 4000000b7faa5aea, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 2216905, LowestAcked: 2216903, AckRanges: {{Largest: 2216905, Smallest: 2216905}, {Largest: 2216903, Smallest: 2216903}}, DelayTime: 0s} 2025/04/30 09:39:03 client <- Reading packet 2216906 (40 bytes) for connection (empty), Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000b7faa5aea, PacketNumber: 2216906, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 248µs} 2025/04/30 09:39:03 client Peer doesn't await address validation any longer. 2025/04/30 09:39:03 client newly acked packets (1): [2] 2025/04/30 09:39:03 client updated RTT: 32.818ms (σ: 12.963ms) 2025/04/30 09:39:03 client Canceling loss detection timer. 2025/04/30 09:39:03 client <- Reading packet 2216904 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2216904, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:03 client -> Sending packet 1 (35 bytes) for connection dab8444834553d5b59fda31a2bb113, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000000b7faa5aea, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 2216904, LowestAcked: 2216904, DelayTime: 87.634µs} 2025/04/30 09:39:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:03 client -> Sending packet 4 (69 bytes) for connection dab8444834553d5b59fda31a2bb113, Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: 4000000b7faa5aea, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:39:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000000b7faa5aea, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:03 client Connection dab8444834553d5b59fda31a2bb113 closed. 2025/04/30 09:39:03 Requesting https://server4:443/awwjokimgn. 2025/04/30 09:39:03 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:03 Increased send buffer size to 14336 kiB 2025/04/30 09:39:03 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:03 Created qlog file: /logs/qlog/7bcf9f666638771e58452e.sqlog 2025/04/30 09:39:03 client Starting new connection to server4 ([::]:35562 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7bcf9f666638771e58452e, version v1 2025/04/30 09:39:03 Adding connection ID (empty). 2025/04/30 09:39:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:03 client -> Sending packet 0 (1280 bytes) for connection 7bcf9f666638771e58452e, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: 7bcf9f666638771e58452e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:39:03 client Queueing packet (756 bytes) for later decryption 2025/04/30 09:39:03 client <- Reading packet 3623369 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000019559cb38c, Token: (empty), PacketNumber: 3623369, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:03 client Received first packet. Switching destination connection ID to: 40000019559cb38c 2025/04/30 09:39:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 107.272ms} 2025/04/30 09:39:03 client newly acked packets (1): [0] 2025/04/30 09:39:03 client updated RTT: 139.905798ms (σ: 69.952899ms) 2025/04/30 09:39:03 client -> Sending packet 1 (1280 bytes) for connection 7bcf9f666638771e58452e, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: 40000019559cb38c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 3623369, LowestAcked: 3623369, DelayTime: 0s} 2025/04/30 09:39:03 client <- Reading packet 3623367 (756 bytes) for connection (empty), Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000019559cb38c, PacketNumber: 3623367, PacketNumberLen: 3, Length: 739, Version: v1} 2025/04/30 09:39:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7bcf9f666638771e58452e, InitialSourceConnectionID: 40000019559cb38c, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x8686d9732f69c3e6f4f2278472d2d5f9, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:03 client -> Sending packet 0 (82 bytes) for connection 7bcf9f666638771e58452e, Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: 40000019559cb38c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 3623367, LowestAcked: 3623367, DelayTime: 0s} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:03 client Dropping Initial keys. 2025/04/30 09:39:03 client -> Sending packet 0 (46 bytes) for connection 7bcf9f666638771e58452e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 40000019559cb38c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:03 client <- Reading packet 3623367 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3623367, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:03 client Dropping Handshake keys. 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000000a0b255acf, StatelessResetToken: 0xb4e8b139e34f52ce0311b58a9a263ca3} 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000000003396d11, StatelessResetToken: 0xbe3bf289007dc56c9f5d451c4f17a197} 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000016a95c2f2c, StatelessResetToken: 0x9e86a180189eac7fa4b370d2a49bd758} 2025/04/30 09:39:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:03 client -> Sending packet 1 (37 bytes) for connection 7bcf9f666638771e58452e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000000a0b255acf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 3623367, LowestAcked: 3623367, DelayTime: 142.616µs} 2025/04/30 09:39:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:03 client <- Reading packet 3623368 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3623368, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 616µs} 2025/04/30 09:39:03 client newly acked packets (1): [0] 2025/04/30 09:39:03 client updated RTT: 126.5ms (σ: 79.272ms) 2025/04/30 09:39:03 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:03 client -> Sending packet 2 (30 bytes) for connection 7bcf9f666638771e58452e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000000a0b255acf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:03 client Connection 7bcf9f666638771e58452e closed. 2025/04/30 09:39:03 Requesting https://server4:443/gfjbmwzyue. 2025/04/30 09:39:03 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:03 Increased send buffer size to 14336 kiB 2025/04/30 09:39:03 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:03 Created qlog file: /logs/qlog/bfab5cfadc23def5905b.sqlog 2025/04/30 09:39:03 client Starting new connection to server4 ([::]:33661 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bfab5cfadc23def5905b, version v1 2025/04/30 09:39:03 Adding connection ID (empty). 2025/04/30 09:39:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:03 client -> Sending packet 0 (1280 bytes) for connection bfab5cfadc23def5905b, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: bfab5cfadc23def5905b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:39:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:03 client -> Sending packet 1 (1280 bytes) for connection bfab5cfadc23def5905b, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: bfab5cfadc23def5905b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:39:03 client -> Sending packet 2 (1280 bytes) for connection bfab5cfadc23def5905b, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: bfab5cfadc23def5905b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:39:03 client <- Reading packet 7777659 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000000a5e9403dc, Token: (empty), PacketNumber: 7777659, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:03 client Received first packet. Switching destination connection ID to: 4000000a5e9403dc 2025/04/30 09:39:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 816µs} 2025/04/30 09:39:03 client -> Sending packet 3 (1280 bytes) for connection bfab5cfadc23def5905b, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: 4000000a5e9403dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 7777659, LowestAcked: 7777659, DelayTime: 0s} 2025/04/30 09:39:03 client <- Reading packet 7777659 (755 bytes) for connection (empty), Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000a5e9403dc, PacketNumber: 7777659, PacketNumberLen: 3, Length: 738, Version: v1} 2025/04/30 09:39:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:39:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bfab5cfadc23def5905b, InitialSourceConnectionID: 4000000a5e9403dc, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5ac2105769c8688da20bd64159f70179, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:03 client -> Sending packet 0 (82 bytes) for connection bfab5cfadc23def5905b, Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: 4000000a5e9403dc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 7777659, LowestAcked: 7777659, DelayTime: 0s} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:03 client Dropping Initial keys. 2025/04/30 09:39:03 client -> Sending packet 0 (46 bytes) for connection bfab5cfadc23def5905b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000000a5e9403dc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:03 client <- Reading packet 7777659 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:03 client Short Header{DestConnectionID: (empty), PacketNumber: 7777659, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:03 client Dropping Handshake keys. 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001203bcff13, StatelessResetToken: 0x100e434fe72f68db3ae8b05cf929927c} 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000144e44c2c0, StatelessResetToken: 0x47f80c2fde4c2c49029b413ec7fbbfe6} 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000011af34b658, StatelessResetToken: 0x795ad4743661976cada9620d66a51176} 2025/04/30 09:39:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:03 client -> Sending packet 1 (1366 bytes) for connection bfab5cfadc23def5905b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000001203bcff13, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.PingFrame{} 2025/04/30 09:39:03 client -> Sending packet 2 (37 bytes) for connection bfab5cfadc23def5905b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000001203bcff13, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 7777659, LowestAcked: 7777659, DelayTime: 214.127µs} 2025/04/30 09:39:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:03 client <- Reading packet 7777660 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:03 client Short Header{DestConnectionID: (empty), PacketNumber: 7777660, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 09:39:03 client newly acked packets (1): [0] 2025/04/30 09:39:03 client updated RTT: 32.150122ms (σ: 16.075061ms) 2025/04/30 09:39:03 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:03 client -> Sending packet 3 (30 bytes) for connection bfab5cfadc23def5905b, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000001203bcff13, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:03 client Connection bfab5cfadc23def5905b closed. 2025/04/30 09:39:03 Requesting https://server4:443/dvhrrgbpnf. 2025/04/30 09:39:03 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:03 Increased send buffer size to 14336 kiB 2025/04/30 09:39:03 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:03 Created qlog file: /logs/qlog/bfcb7e64431d2505b2a3e30a49474ce2.sqlog 2025/04/30 09:39:03 client Starting new connection to server4 ([::]:41396 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bfcb7e64431d2505b2a3e30a49474ce2, version v1 2025/04/30 09:39:03 Adding connection ID (empty). 2025/04/30 09:39:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:03 client -> Sending packet 0 (1280 bytes) for connection bfcb7e64431d2505b2a3e30a49474ce2, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: bfcb7e64431d2505b2a3e30a49474ce2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:39:03 client Queueing packet (763 bytes) for later decryption 2025/04/30 09:39:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:03 client <- Reading packet 14593703 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000000abcb57e7, Token: (empty), PacketNumber: 14593703, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:03 client Received first packet. Switching destination connection ID to: 40000000abcb57e7 2025/04/30 09:39:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 119.232ms} 2025/04/30 09:39:03 client newly acked packets (1): [0] 2025/04/30 09:39:03 client updated RTT: 151.853392ms (σ: 75.926696ms) 2025/04/30 09:39:03 client -> Sending packet 1 (1280 bytes) for connection bfcb7e64431d2505b2a3e30a49474ce2, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: 40000000abcb57e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 14593703, LowestAcked: 14593703, DelayTime: 0s} 2025/04/30 09:39:03 client <- Reading packet 14593701 (763 bytes) for connection (empty), Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000000abcb57e7, PacketNumber: 14593701, PacketNumberLen: 4, Length: 746, Version: v1} 2025/04/30 09:39:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 09:39:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bfcb7e64431d2505b2a3e30a49474ce2, InitialSourceConnectionID: 40000000abcb57e7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x147b97912c53e9193745ec83f84b53e3, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:03 client <- Reading packet 14593703 (763 bytes) for connection (empty), Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000000abcb57e7, PacketNumber: 14593703, PacketNumberLen: 4, Length: 746, Version: v1} 2025/04/30 09:39:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 09:39:03 client -> Sending packet 0 (84 bytes) for connection bfcb7e64431d2505b2a3e30a49474ce2, Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: 40000000abcb57e7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 14593703, LowestAcked: 14593701, AckRanges: {{Largest: 14593703, Smallest: 14593703}, {Largest: 14593701, Smallest: 14593701}}, DelayTime: 0s} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:03 client Dropping Initial keys. 2025/04/30 09:39:03 client -> Sending packet 0 (46 bytes) for connection bfcb7e64431d2505b2a3e30a49474ce2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 40000000abcb57e7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:03 client <- Reading packet 14593704 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000000abcb57e7, PacketNumber: 14593704, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 09:39:03 client Peer doesn't await address validation any longer. 2025/04/30 09:39:03 client newly acked packets (1): [0] 2025/04/30 09:39:03 client updated RTT: 136.825ms (σ: 87ms) 2025/04/30 09:39:03 client Canceling loss detection timer. 2025/04/30 09:39:03 client <- Reading packet 14593701 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:03 client Short Header{DestConnectionID: (empty), PacketNumber: 14593701, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:03 client Dropping Handshake keys. 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001a1de4d392, StatelessResetToken: 0x570b774f27027730bccb39d3b5102152} 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000000a136fe629, StatelessResetToken: 0x0d85d4462a782341a737c309d5bf3618} 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000001a065e00ff, StatelessResetToken: 0xa221a2d64080f4e5c791f54fc18a4b26} 2025/04/30 09:39:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:03 client -> Sending packet 1 (37 bytes) for connection bfcb7e64431d2505b2a3e30a49474ce2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000001a1de4d392, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 14593701, LowestAcked: 14593701, DelayTime: 79.378µs} 2025/04/30 09:39:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:03 client <- Reading packet 14593703 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:03 client Short Header{DestConnectionID: (empty), PacketNumber: 14593703, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 168µs} 2025/04/30 09:39:03 client newly acked packets (2): [0 1] 2025/04/30 09:39:03 client updated RTT: 123.579ms (σ: 91.741ms) 2025/04/30 09:39:03 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:03 client Canceling loss detection timer. 2025/04/30 09:39:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000005d660e67d, StatelessResetToken: 0x5dc39341d432a20c147ad3ee91c655e2} 2025/04/30 09:39:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:03 client Ignoring all packets below 14593702. 2025/04/30 09:39:03 client -> Sending packet 2 (35 bytes) for connection bfcb7e64431d2505b2a3e30a49474ce2, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000001a1de4d392, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.AckFrame{LargestAcked: 14593703, LowestAcked: 14593703, DelayTime: 146.232µs} 2025/04/30 09:39:03 client <- Reading packet 14593704 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:03 client Short Header{DestConnectionID: (empty), PacketNumber: 14593704, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 88µs} 2025/04/30 09:39:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:03 client -> Sending packet 3 (30 bytes) for connection bfcb7e64431d2505b2a3e30a49474ce2, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:03 client Short Header{DestConnectionID: 4000001a1de4d392, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:03 client Connection bfcb7e64431d2505b2a3e30a49474ce2 closed. 2025/04/30 09:39:03 Requesting https://server4:443/xymmkzfrxu. 2025/04/30 09:39:03 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:03 Increased send buffer size to 14336 kiB 2025/04/30 09:39:03 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:03 Created qlog file: /logs/qlog/b5db374611e98f28e14aaee3d3.sqlog 2025/04/30 09:39:03 client Starting new connection to server4 ([::]:48302 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b5db374611e98f28e14aaee3d3, version v1 2025/04/30 09:39:03 Adding connection ID (empty). 2025/04/30 09:39:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:03 client -> Sending packet 0 (1280 bytes) for connection b5db374611e98f28e14aaee3d3, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: b5db374611e98f28e14aaee3d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:39:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:03 client -> Sending packet 1 (1280 bytes) for connection b5db374611e98f28e14aaee3d3, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: b5db374611e98f28e14aaee3d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:39:03 client -> Sending packet 2 (1280 bytes) for connection b5db374611e98f28e14aaee3d3, Initial 2025/04/30 09:39:03 client Long Header{Type: Initial, DestConnectionID: b5db374611e98f28e14aaee3d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:39:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:39:04 client <- Reading packet 3416532 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005048e94d33, Token: (empty), PacketNumber: 3416532, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:04 client Received first packet. Switching destination connection ID to: 4000005048e94d33 2025/04/30 09:39:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 744µs} 2025/04/30 09:39:04 client -> Sending packet 3 (1280 bytes) for connection b5db374611e98f28e14aaee3d3, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: 4000005048e94d33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 3416532, LowestAcked: 3416532, DelayTime: 0s} 2025/04/30 09:39:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:04 client <- Reading packet 3416534 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005048e94d33, Token: (empty), PacketNumber: 3416534, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 110.136ms} 2025/04/30 09:39:04 client -> Sending packet 4 (1280 bytes) for connection b5db374611e98f28e14aaee3d3, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: 4000005048e94d33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 3416534, LowestAcked: 3416532, AckRanges: {{Largest: 3416534, Smallest: 3416534}, {Largest: 3416532, Smallest: 3416532}}, DelayTime: 0s} 2025/04/30 09:39:04 client <- Reading packet 3416534 (760 bytes) for connection (empty), Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005048e94d33, PacketNumber: 3416534, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:39:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:39:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b5db374611e98f28e14aaee3d3, InitialSourceConnectionID: 4000005048e94d33, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5e4e3f2bfa36736474c3e211740637ee, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:04 client -> Sending packet 0 (82 bytes) for connection b5db374611e98f28e14aaee3d3, Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: 4000005048e94d33, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 3416534, LowestAcked: 3416534, DelayTime: 0s} 2025/04/30 09:39:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:04 client Dropping Initial keys. 2025/04/30 09:39:04 client -> Sending packet 0 (46 bytes) for connection b5db374611e98f28e14aaee3d3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 4000005048e94d33, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:04 client <- Reading packet 3416535 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005048e94d33, PacketNumber: 3416535, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 09:39:04 client Peer doesn't await address validation any longer. 2025/04/30 09:39:04 client newly acked packets (1): [0] 2025/04/30 09:39:04 client updated RTT: 31.222408ms (σ: 15.611204ms) 2025/04/30 09:39:04 client Canceling loss detection timer. 2025/04/30 09:39:04 client <- Reading packet 3416533 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3416533, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 544µs} 2025/04/30 09:39:04 client newly acked packets (1): [0] 2025/04/30 09:39:04 client updated RTT: 31.277ms (σ: 11.82ms) 2025/04/30 09:39:04 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:04 client Dropping Handshake keys. 2025/04/30 09:39:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:04 client -> Sending packet 1 (35 bytes) for connection b5db374611e98f28e14aaee3d3, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 4000005048e94d33, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 3416533, LowestAcked: 3416533, DelayTime: 93.113µs} 2025/04/30 09:39:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:04 client -> Sending packet 2 (30 bytes) for connection b5db374611e98f28e14aaee3d3, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 4000005048e94d33, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:04 client Connection b5db374611e98f28e14aaee3d3 closed. 2025/04/30 09:39:04 Requesting https://server4:443/prqpwdliuh. 2025/04/30 09:39:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:04 Increased send buffer size to 14336 kiB 2025/04/30 09:39:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:04 Created qlog file: /logs/qlog/e92118a91264bee6.sqlog 2025/04/30 09:39:04 client Starting new connection to server4 ([::]:51628 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e92118a91264bee6, version v1 2025/04/30 09:39:04 Adding connection ID (empty). 2025/04/30 09:39:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:04 client -> Sending packet 0 (1280 bytes) for connection e92118a91264bee6, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: e92118a91264bee6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:39:04 client <- Reading packet 684186 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000007f2216a6, Token: (empty), PacketNumber: 684186, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:04 client Received first packet. Switching destination connection ID to: 400000007f2216a6 2025/04/30 09:39:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 544µs} 2025/04/30 09:39:04 client newly acked packets (1): [0] 2025/04/30 09:39:04 client updated RTT: 33.092983ms (σ: 16.546491ms) 2025/04/30 09:39:04 client -> Sending packet 1 (1280 bytes) for connection e92118a91264bee6, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: 400000007f2216a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 684186, LowestAcked: 684186, DelayTime: 0s} 2025/04/30 09:39:04 client -> Sending packet 2 (1280 bytes) for connection e92118a91264bee6, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: 400000007f2216a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:04 client -> &wire.PingFrame{} 2025/04/30 09:39:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:39:04 client -> Sending packet 3 (1280 bytes) for connection e92118a91264bee6, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: 400000007f2216a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:04 client -> &wire.PingFrame{} 2025/04/30 09:39:04 client -> Sending packet 4 (1280 bytes) for connection e92118a91264bee6, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: 400000007f2216a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:04 client -> &wire.PingFrame{} 2025/04/30 09:39:04 client <- Reading packet 684190 (753 bytes) for connection (empty), Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000007f2216a6, PacketNumber: 684190, PacketNumberLen: 3, Length: 736, Version: v1} 2025/04/30 09:39:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:39:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e92118a91264bee6, InitialSourceConnectionID: 400000007f2216a6, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xe6d2c8d75a6f72d8d9764d8bc01fe739, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:04 client -> Sending packet 0 (82 bytes) for connection e92118a91264bee6, Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: 400000007f2216a6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 684190, LowestAcked: 684190, DelayTime: 0s} 2025/04/30 09:39:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:04 client Dropping Initial keys. 2025/04/30 09:39:04 client -> Sending packet 0 (46 bytes) for connection e92118a91264bee6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 400000007f2216a6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:04 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:39:04 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:39:04 client -> Sending packet 1 (74 bytes) for connection e92118a91264bee6, Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: 400000007f2216a6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:04 client -> Sending packet 2 (74 bytes) for connection e92118a91264bee6, Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: 400000007f2216a6, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:04 client <- Reading packet 684186 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:04 client Short Header{DestConnectionID: (empty), PacketNumber: 684186, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 98.384ms} 2025/04/30 09:39:04 client Peer doesn't await address validation any longer. 2025/04/30 09:39:04 client newly acked packets (1): [0] 2025/04/30 09:39:04 client updated RTT: 42.15ms (σ: 30.526ms) 2025/04/30 09:39:04 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:04 client Canceling loss detection timer. 2025/04/30 09:39:04 client Dropping Handshake keys. 2025/04/30 09:39:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000000019bf3bb, StatelessResetToken: 0xd4c3e41478804eadbc338921545f290c} 2025/04/30 09:39:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000001cab94ce5b, StatelessResetToken: 0x37698a0d697bc8d6407e1bda83ca7eba} 2025/04/30 09:39:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000071de3a84, StatelessResetToken: 0x6954c1c7d992a1e52ce1fe433bf3c4d6} 2025/04/30 09:39:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:04 client -> Sending packet 1 (37 bytes) for connection e92118a91264bee6, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 40000000019bf3bb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 684186, LowestAcked: 684186, DelayTime: 165.889µs} 2025/04/30 09:39:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:04 client <- Reading packet 684190 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:04 client Short Header{DestConnectionID: (empty), PacketNumber: 684190, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:04 client -> Sending packet 2 (37 bytes) for connection e92118a91264bee6, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 40000000019bf3bb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 684190, LowestAcked: 684186, AckRanges: {{Largest: 684190, Smallest: 684190}, {Largest: 684186, Smallest: 684186}}, DelayTime: 102.932µs} 2025/04/30 09:39:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:04 client -> Sending packet 3 (30 bytes) for connection e92118a91264bee6, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 40000000019bf3bb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:04 client Connection e92118a91264bee6 closed. 2025/04/30 09:39:04 Requesting https://server4:443/iimmbwsmbx. 2025/04/30 09:39:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:04 Increased send buffer size to 14336 kiB 2025/04/30 09:39:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:04 Created qlog file: /logs/qlog/c7d13b92e5caaf465ad89599ed1444.sqlog 2025/04/30 09:39:04 client Starting new connection to server4 ([::]:38867 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c7d13b92e5caaf465ad89599ed1444, version v1 2025/04/30 09:39:04 Adding connection ID (empty). 2025/04/30 09:39:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:04 client -> Sending packet 0 (1280 bytes) for connection c7d13b92e5caaf465ad89599ed1444, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: c7d13b92e5caaf465ad89599ed1444, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:39:04 client <- Reading packet 6218492 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c66ffa9236, Token: (empty), PacketNumber: 6218492, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:04 client Received first packet. Switching destination connection ID to: 400000c66ffa9236 2025/04/30 09:39:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 576µs} 2025/04/30 09:39:04 client newly acked packets (1): [0] 2025/04/30 09:39:04 client updated RTT: 33.120589ms (σ: 16.560294ms) 2025/04/30 09:39:04 client -> Sending packet 1 (1280 bytes) for connection c7d13b92e5caaf465ad89599ed1444, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: 400000c66ffa9236, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 6218492, LowestAcked: 6218492, DelayTime: 0s} 2025/04/30 09:39:04 client <- Reading packet 6218492 (761 bytes) for connection (empty), Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c66ffa9236, PacketNumber: 6218492, PacketNumberLen: 3, Length: 744, Version: v1} 2025/04/30 09:39:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:39:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c7d13b92e5caaf465ad89599ed1444, InitialSourceConnectionID: 400000c66ffa9236, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xfd9874924a1f0339f6e02e78d8695dc6, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:04 client -> Sending packet 0 (82 bytes) for connection c7d13b92e5caaf465ad89599ed1444, Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: 400000c66ffa9236, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 6218492, LowestAcked: 6218492, DelayTime: 0s} 2025/04/30 09:39:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:04 client Dropping Initial keys. 2025/04/30 09:39:04 client -> Sending packet 0 (46 bytes) for connection c7d13b92e5caaf465ad89599ed1444, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 400000c66ffa9236, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:04 client <- Reading packet 6218493 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c66ffa9236, PacketNumber: 6218493, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 136µs} 2025/04/30 09:39:04 client Peer doesn't await address validation any longer. 2025/04/30 09:39:04 client newly acked packets (1): [0] 2025/04/30 09:39:04 client updated RTT: 32.875ms (σ: 12.908ms) 2025/04/30 09:39:04 client Canceling loss detection timer. 2025/04/30 09:39:04 client <- Reading packet 6218492 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:04 client Short Header{DestConnectionID: (empty), PacketNumber: 6218492, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:04 client Dropping Handshake keys. 2025/04/30 09:39:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000c2b9684c32, StatelessResetToken: 0x2087a46613e49b59e58de2055fb61b07} 2025/04/30 09:39:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000df0f77fa0c, StatelessResetToken: 0x3751ed03ea12ee429e7b33cc3b263d8d} 2025/04/30 09:39:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ceb9e9fe6a, StatelessResetToken: 0xe5f11c5f4f9d1b49442f27d10ef61629} 2025/04/30 09:39:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:04 client -> Sending packet 1 (37 bytes) for connection c7d13b92e5caaf465ad89599ed1444, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 400000c2b9684c32, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 6218492, LowestAcked: 6218492, DelayTime: 80.648µs} 2025/04/30 09:39:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:04 client <- Reading packet 6218494 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:04 client Short Header{DestConnectionID: (empty), PacketNumber: 6218494, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 09:39:04 client newly acked packets (2): [0 1] 2025/04/30 09:39:04 client updated RTT: 32.61ms (σ: 10.209ms) 2025/04/30 09:39:04 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:04 client Canceling loss detection timer. 2025/04/30 09:39:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000d662290649, StatelessResetToken: 0xbea4b5be9c56ee68f3c74fbd63b1fdc7} 2025/04/30 09:39:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:04 client Ignoring all packets below 6218493. 2025/04/30 09:39:04 client -> Sending packet 2 (35 bytes) for connection c7d13b92e5caaf465ad89599ed1444, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 400000c2b9684c32, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.AckFrame{LargestAcked: 6218494, LowestAcked: 6218494, DelayTime: 111.678µs} 2025/04/30 09:39:04 client <- Reading packet 6218495 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:04 client Short Header{DestConnectionID: (empty), PacketNumber: 6218495, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:04 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 96µs} 2025/04/30 09:39:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:04 client -> Sending packet 3 (30 bytes) for connection c7d13b92e5caaf465ad89599ed1444, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:04 client Short Header{DestConnectionID: 400000c2b9684c32, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:04 client Connection c7d13b92e5caaf465ad89599ed1444 closed. 2025/04/30 09:39:04 Requesting https://server4:443/hxhrhatjtt. 2025/04/30 09:39:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:04 Increased send buffer size to 14336 kiB 2025/04/30 09:39:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:04 Created qlog file: /logs/qlog/de86d53f37e422df238f3545.sqlog 2025/04/30 09:39:04 client Starting new connection to server4 ([::]:50372 -> 193.167.100.100:443), source connection ID (empty), destination connection ID de86d53f37e422df238f3545, version v1 2025/04/30 09:39:04 Adding connection ID (empty). 2025/04/30 09:39:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:04 client -> Sending packet 0 (1280 bytes) for connection de86d53f37e422df238f3545, Initial 2025/04/30 09:39:04 client Long Header{Type: Initial, DestConnectionID: de86d53f37e422df238f3545, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:39:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:04 client Queueing packet (758 bytes) for later decryption 2025/04/30 09:39:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:05 client Queueing packet (758 bytes) for later decryption 2025/04/30 09:39:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:05 client -> Sending packet 1 (1280 bytes) for connection de86d53f37e422df238f3545, Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: de86d53f37e422df238f3545, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:39:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:05 client -> Sending packet 2 (1280 bytes) for connection de86d53f37e422df238f3545, Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: de86d53f37e422df238f3545, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:39:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:05 client Queueing packet (758 bytes) for later decryption 2025/04/30 09:39:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:39:05 client -> Sending packet 3 (1280 bytes) for connection de86d53f37e422df238f3545, Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: de86d53f37e422df238f3545, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:39:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:05 client -> Sending packet 4 (1280 bytes) for connection de86d53f37e422df238f3545, Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: de86d53f37e422df238f3545, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:39:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:05 client <- Reading packet 6988272 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d8c7e172cb, Token: (empty), PacketNumber: 6988272, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:05 client Received first packet. Switching destination connection ID to: 400000d8c7e172cb 2025/04/30 09:39:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 130.464ms} 2025/04/30 09:39:05 client newly acked packets (1): [4] 2025/04/30 09:39:05 client updated RTT: 164.329437ms (σ: 82.164718ms) 2025/04/30 09:39:05 client -> Sending packet 5 (1280 bytes) for connection de86d53f37e422df238f3545, Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: 400000d8c7e172cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:05 client -> &wire.AckFrame{LargestAcked: 6988272, LowestAcked: 6988272, DelayTime: 0s} 2025/04/30 09:39:05 client <- Reading packet 6988265 (758 bytes) for connection (empty), Handshake 2025/04/30 09:39:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d8c7e172cb, PacketNumber: 6988265, PacketNumberLen: 3, Length: 741, Version: v1} 2025/04/30 09:39:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 09:39:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: de86d53f37e422df238f3545, InitialSourceConnectionID: 400000d8c7e172cb, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x99e2e3957e84a989117811a11d852bbb, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:05 client <- Reading packet 6988267 (758 bytes) for connection (empty), Handshake 2025/04/30 09:39:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d8c7e172cb, PacketNumber: 6988267, PacketNumberLen: 3, Length: 741, Version: v1} 2025/04/30 09:39:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 09:39:05 client <- Reading packet 6988269 (758 bytes) for connection (empty), Handshake 2025/04/30 09:39:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d8c7e172cb, PacketNumber: 6988269, PacketNumberLen: 3, Length: 741, Version: v1} 2025/04/30 09:39:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 09:39:05 client <- Reading packet 6988271 (758 bytes) for connection (empty), Handshake 2025/04/30 09:39:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d8c7e172cb, PacketNumber: 6988271, PacketNumberLen: 3, Length: 741, Version: v1} 2025/04/30 09:39:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 09:39:05 client -> Sending packet 0 (88 bytes) for connection de86d53f37e422df238f3545, Handshake 2025/04/30 09:39:05 client Long Header{Type: Handshake, DestConnectionID: 400000d8c7e172cb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 71, Version: v1} 2025/04/30 09:39:05 client -> &wire.AckFrame{LargestAcked: 6988271, LowestAcked: 6988265, AckRanges: {{Largest: 6988271, Smallest: 6988271}, {Largest: 6988269, Smallest: 6988269}, {Largest: 6988267, Smallest: 6988267}, {Largest: 6988265, Smallest: 6988265}}, DelayTime: 0s} 2025/04/30 09:39:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:05 client Dropping Initial keys. 2025/04/30 09:39:05 client -> Sending packet 0 (46 bytes) for connection de86d53f37e422df238f3545, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:05 client Short Header{DestConnectionID: 400000d8c7e172cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:05 client <- Reading packet 6988272 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d8c7e172cb, PacketNumber: 6988272, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 09:39:05 client Peer doesn't await address validation any longer. 2025/04/30 09:39:05 client newly acked packets (1): [0] 2025/04/30 09:39:05 client updated RTT: 147.72ms (σ: 94.84ms) 2025/04/30 09:39:05 client Canceling loss detection timer. 2025/04/30 09:39:05 client <- Reading packet 6988266 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6988266, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 472µs} 2025/04/30 09:39:05 client newly acked packets (1): [0] 2025/04/30 09:39:05 client updated RTT: 133.216ms (σ: 100.137ms) 2025/04/30 09:39:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:05 client Dropping Handshake keys. 2025/04/30 09:39:05 client <- Reading packet 6988267 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6988267, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:05 client -> Sending packet 1 (35 bytes) for connection de86d53f37e422df238f3545, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:05 client Short Header{DestConnectionID: 400000d8c7e172cb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:05 client -> &wire.AckFrame{LargestAcked: 6988267, LowestAcked: 6988266, DelayTime: 76.333µs} 2025/04/30 09:39:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:05 client -> Sending packet 2 (30 bytes) for connection de86d53f37e422df238f3545, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:05 client Short Header{DestConnectionID: 400000d8c7e172cb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:05 client Connection de86d53f37e422df238f3545 closed. 2025/04/30 09:39:05 Requesting https://server4:443/qkoasxzxwd. 2025/04/30 09:39:05 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:05 Increased send buffer size to 14336 kiB 2025/04/30 09:39:05 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:05 Created qlog file: /logs/qlog/75d0ccaf0d610c208f6019f9e92e.sqlog 2025/04/30 09:39:05 client Starting new connection to server4 ([::]:47777 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 75d0ccaf0d610c208f6019f9e92e, version v1 2025/04/30 09:39:05 Adding connection ID (empty). 2025/04/30 09:39:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:05 client -> Sending packet 0 (1280 bytes) for connection 75d0ccaf0d610c208f6019f9e92e, Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: 75d0ccaf0d610c208f6019f9e92e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:39:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:39:05 client Queueing packet (760 bytes) for later decryption 2025/04/30 09:39:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:05 client <- Reading packet 6940508 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000437a75ebf7, Token: (empty), PacketNumber: 6940508, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:05 client Received first packet. Switching destination connection ID to: 400000437a75ebf7 2025/04/30 09:39:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 115.928ms} 2025/04/30 09:39:05 client newly acked packets (1): [0] 2025/04/30 09:39:05 client updated RTT: 148.505648ms (σ: 74.252824ms) 2025/04/30 09:39:05 client -> Sending packet 1 (1280 bytes) for connection 75d0ccaf0d610c208f6019f9e92e, Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: 400000437a75ebf7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:05 client -> &wire.AckFrame{LargestAcked: 6940508, LowestAcked: 6940508, DelayTime: 0s} 2025/04/30 09:39:05 client <- Reading packet 6940506 (760 bytes) for connection (empty), Handshake 2025/04/30 09:39:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000437a75ebf7, PacketNumber: 6940506, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:39:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:39:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 75d0ccaf0d610c208f6019f9e92e, InitialSourceConnectionID: 400000437a75ebf7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x0bdb004016713102edac51708dc9ba9c, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:05 client -> Sending packet 0 (82 bytes) for connection 75d0ccaf0d610c208f6019f9e92e, Handshake 2025/04/30 09:39:05 client Long Header{Type: Handshake, DestConnectionID: 400000437a75ebf7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:05 client -> &wire.AckFrame{LargestAcked: 6940506, LowestAcked: 6940506, DelayTime: 0s} 2025/04/30 09:39:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:05 client Dropping Initial keys. 2025/04/30 09:39:05 client -> Sending packet 0 (46 bytes) for connection 75d0ccaf0d610c208f6019f9e92e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:05 client Short Header{DestConnectionID: 400000437a75ebf7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:05 client <- Reading packet 6940506 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6940506, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:05 client Dropping Handshake keys. 2025/04/30 09:39:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000005cb2c82209, StatelessResetToken: 0x4d6e34e461c6d72bddad7cdb891a7c7c} 2025/04/30 09:39:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000005e539e1410, StatelessResetToken: 0xa662918eb45988b273bb461812b814eb} 2025/04/30 09:39:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000048fbff2dcb, StatelessResetToken: 0xe38718e5d5e06ab2b41242d6b20dfbda} 2025/04/30 09:39:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:05 client -> Sending packet 1 (37 bytes) for connection 75d0ccaf0d610c208f6019f9e92e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:05 client Short Header{DestConnectionID: 4000005cb2c82209, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:05 client -> &wire.AckFrame{LargestAcked: 6940506, LowestAcked: 6940506, DelayTime: 135.984µs} 2025/04/30 09:39:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:05 client <- Reading packet 6940508 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6940508, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 09:39:05 client newly acked packets (2): [0 1] 2025/04/30 09:39:05 client updated RTT: 133.78ms (σ: 85.138ms) 2025/04/30 09:39:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:05 client Canceling loss detection timer. 2025/04/30 09:39:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000053411a9f46, StatelessResetToken: 0x09732d7c2f90ecbf096257d919e46820} 2025/04/30 09:39:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:05 client Ignoring all packets below 6940507. 2025/04/30 09:39:05 client -> Sending packet 2 (35 bytes) for connection 75d0ccaf0d610c208f6019f9e92e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:05 client Short Header{DestConnectionID: 4000005cb2c82209, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:05 client -> &wire.AckFrame{LargestAcked: 6940508, LowestAcked: 6940508, DelayTime: 122.157µs} 2025/04/30 09:39:05 client <- Reading packet 6940509 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6940509, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 72µs} 2025/04/30 09:39:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:05 client -> Sending packet 3 (30 bytes) for connection 75d0ccaf0d610c208f6019f9e92e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:05 client Short Header{DestConnectionID: 4000005cb2c82209, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:05 client Connection 75d0ccaf0d610c208f6019f9e92e closed. 2025/04/30 09:39:05 Requesting https://server4:443/dircgntago. 2025/04/30 09:39:05 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:05 Increased send buffer size to 14336 kiB 2025/04/30 09:39:05 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:05 Created qlog file: /logs/qlog/5fefa179a185584f361b1a06966c08.sqlog 2025/04/30 09:39:05 client Starting new connection to server4 ([::]:47213 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5fefa179a185584f361b1a06966c08, version v1 2025/04/30 09:39:05 Adding connection ID (empty). 2025/04/30 09:39:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:05 client -> Sending packet 0 (1280 bytes) for connection 5fefa179a185584f361b1a06966c08, Initial 2025/04/30 09:39:05 client Long Header{Type: Initial, DestConnectionID: 5fefa179a185584f361b1a06966c08, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:39:05 client Queueing packet (760 bytes) for later decryption 2025/04/30 09:39:06 client <- Reading packet 5205580 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000ce47075288, Token: (empty), PacketNumber: 5205580, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:06 client Received first packet. Switching destination connection ID to: 400000ce47075288 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 110.2ms} 2025/04/30 09:39:06 client newly acked packets (1): [0] 2025/04/30 09:39:06 client updated RTT: 142.79238ms (σ: 71.39619ms) 2025/04/30 09:39:06 client -> Sending packet 1 (1280 bytes) for connection 5fefa179a185584f361b1a06966c08, Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: 400000ce47075288, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 5205580, LowestAcked: 5205580, DelayTime: 0s} 2025/04/30 09:39:06 client <- Reading packet 5205578 (760 bytes) for connection (empty), Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000ce47075288, PacketNumber: 5205578, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:39:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5fefa179a185584f361b1a06966c08, InitialSourceConnectionID: 400000ce47075288, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x21d7cab7613e0c5f9b84096518fb0c0c, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:06 client -> Sending packet 0 (82 bytes) for connection 5fefa179a185584f361b1a06966c08, Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: 400000ce47075288, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 5205578, LowestAcked: 5205578, DelayTime: 0s} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:06 client Dropping Initial keys. 2025/04/30 09:39:06 client -> Sending packet 0 (46 bytes) for connection 5fefa179a185584f361b1a06966c08, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:06 client Short Header{DestConnectionID: 400000ce47075288, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:06 client <- Reading packet 5205580 (760 bytes) for connection (empty), Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000ce47075288, PacketNumber: 5205580, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:39:06 client -> Sending packet 1 (45 bytes) for connection 5fefa179a185584f361b1a06966c08, Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: 400000ce47075288, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 5205580, LowestAcked: 5205578, AckRanges: {{Largest: 5205580, Smallest: 5205580}, {Largest: 5205578, Smallest: 5205578}}, DelayTime: 0s} 2025/04/30 09:39:06 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:39:06 client <- Reading packet 5205582 (760 bytes) for connection (empty), Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000ce47075288, PacketNumber: 5205582, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:39:06 client -> Sending packet 2 (47 bytes) for connection 5fefa179a185584f361b1a06966c08, Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: 400000ce47075288, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 5205582, LowestAcked: 5205578, AckRanges: {{Largest: 5205582, Smallest: 5205582}, {Largest: 5205580, Smallest: 5205580}, {Largest: 5205578, Smallest: 5205578}}, DelayTime: 0s} 2025/04/30 09:39:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:39:06 client -> Sending packet 3 (74 bytes) for connection 5fefa179a185584f361b1a06966c08, Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: 400000ce47075288, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:06 client -> Sending packet 4 (74 bytes) for connection 5fefa179a185584f361b1a06966c08, Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: 400000ce47075288, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:06 client <- Reading packet 5205578 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5205578, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 428.688ms} 2025/04/30 09:39:06 client Peer doesn't await address validation any longer. 2025/04/30 09:39:06 client newly acked packets (1): [0] 2025/04/30 09:39:06 client updated RTT: 179.343ms (σ: 126.649ms) 2025/04/30 09:39:06 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:06 client Canceling loss detection timer. 2025/04/30 09:39:06 client Dropping Handshake keys. 2025/04/30 09:39:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000dc240fd6c7, StatelessResetToken: 0xcfadc8ea7dc47daa52fff48a9f40c071} 2025/04/30 09:39:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000cbab04c055, StatelessResetToken: 0xdd8d081da68d2616f59118884c3c5e94} 2025/04/30 09:39:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000d3ec13e931, StatelessResetToken: 0x16c65bf7e53d0c220c54ebd38a38de84} 2025/04/30 09:39:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:06 client Dropping %!s(logging.PacketType=1) packet (38 bytes) because we already dropped the keys. 2025/04/30 09:39:06 client -> Sending packet 1 (37 bytes) for connection 5fefa179a185584f361b1a06966c08, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:06 client Short Header{DestConnectionID: 400000dc240fd6c7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 5205578, LowestAcked: 5205578, DelayTime: 153.937µs} 2025/04/30 09:39:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:06 client <- Reading packet 5205579 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5205579, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:06 client -> Sending packet 2 (30 bytes) for connection 5fefa179a185584f361b1a06966c08, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:06 client Short Header{DestConnectionID: 400000dc240fd6c7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:06 client Connection 5fefa179a185584f361b1a06966c08 closed. 2025/04/30 09:39:06 Requesting https://server4:443/maddppwonc. 2025/04/30 09:39:06 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:06 Increased send buffer size to 14336 kiB 2025/04/30 09:39:06 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:06 Created qlog file: /logs/qlog/5e291a7664dd63afffafd9.sqlog 2025/04/30 09:39:06 client Starting new connection to server4 ([::]:57060 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5e291a7664dd63afffafd9, version v1 2025/04/30 09:39:06 Adding connection ID (empty). 2025/04/30 09:39:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:06 client -> Sending packet 0 (1280 bytes) for connection 5e291a7664dd63afffafd9, Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: 5e291a7664dd63afffafd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:39:06 client <- Reading packet 10845738 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000008dba8d0b65, Token: (empty), PacketNumber: 10845738, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:06 client Received first packet. Switching destination connection ID to: 4000008dba8d0b65 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 584µs} 2025/04/30 09:39:06 client newly acked packets (1): [0] 2025/04/30 09:39:06 client updated RTT: 33.090465ms (σ: 16.545232ms) 2025/04/30 09:39:06 client -> Sending packet 1 (1280 bytes) for connection 5e291a7664dd63afffafd9, Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: 4000008dba8d0b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 10845738, LowestAcked: 10845738, DelayTime: 0s} 2025/04/30 09:39:06 client <- Reading packet 10845738 (757 bytes) for connection (empty), Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008dba8d0b65, PacketNumber: 10845738, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5e291a7664dd63afffafd9, InitialSourceConnectionID: 4000008dba8d0b65, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x7ad0689c6c465bfba46d28caf4a244a5, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:06 client -> Sending packet 0 (82 bytes) for connection 5e291a7664dd63afffafd9, Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: 4000008dba8d0b65, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 10845738, LowestAcked: 10845738, DelayTime: 0s} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:06 client Dropping Initial keys. 2025/04/30 09:39:06 client -> Sending packet 0 (46 bytes) for connection 5e291a7664dd63afffafd9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:06 client Short Header{DestConnectionID: 4000008dba8d0b65, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:06 client <- Reading packet 10845739 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008dba8d0b65, PacketNumber: 10845739, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 328µs} 2025/04/30 09:39:06 client Peer doesn't await address validation any longer. 2025/04/30 09:39:06 client newly acked packets (1): [0] 2025/04/30 09:39:06 client updated RTT: 32.88ms (σ: 12.828ms) 2025/04/30 09:39:06 client Canceling loss detection timer. 2025/04/30 09:39:06 client <- Reading packet 10845738 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:06 client Short Header{DestConnectionID: (empty), PacketNumber: 10845738, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:06 client Dropping Handshake keys. 2025/04/30 09:39:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000865007377e, StatelessResetToken: 0x846399a20bd932260dab6bebb3e1ffa1} 2025/04/30 09:39:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000092389de905, StatelessResetToken: 0x67ea2aaad654bcb04557ef2d3a2ba22e} 2025/04/30 09:39:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000086b06be400, StatelessResetToken: 0x776d7d14ee3ebd316e6a725edbd5062e} 2025/04/30 09:39:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:06 client -> Sending packet 1 (37 bytes) for connection 5e291a7664dd63afffafd9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:06 client Short Header{DestConnectionID: 400000865007377e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 10845738, LowestAcked: 10845738, DelayTime: 120.855µs} 2025/04/30 09:39:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:06 client <- Reading packet 10845739 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:06 client Short Header{DestConnectionID: (empty), PacketNumber: 10845739, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 520µs} 2025/04/30 09:39:06 client newly acked packets (1): [0] 2025/04/30 09:39:06 client updated RTT: 32.703ms (σ: 9.974ms) 2025/04/30 09:39:06 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:06 client -> Sending packet 2 (30 bytes) for connection 5e291a7664dd63afffafd9, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:06 client Short Header{DestConnectionID: 400000865007377e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:06 client Connection 5e291a7664dd63afffafd9 closed. 2025/04/30 09:39:06 Requesting https://server4:443/hnnvjbbwbs. 2025/04/30 09:39:06 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:06 Increased send buffer size to 14336 kiB 2025/04/30 09:39:06 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:06 Created qlog file: /logs/qlog/98140dc569360029d582282ce231.sqlog 2025/04/30 09:39:06 client Starting new connection to server4 ([::]:49203 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 98140dc569360029d582282ce231, version v1 2025/04/30 09:39:06 Adding connection ID (empty). 2025/04/30 09:39:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:06 client -> Sending packet 0 (1280 bytes) for connection 98140dc569360029d582282ce231, Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: 98140dc569360029d582282ce231, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:39:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:06 client -> Sending packet 1 (1280 bytes) for connection 98140dc569360029d582282ce231, Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: 98140dc569360029d582282ce231, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:39:06 client -> Sending packet 2 (1280 bytes) for connection 98140dc569360029d582282ce231, Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: 98140dc569360029d582282ce231, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:39:06 client <- Reading packet 14789130 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000001d09be729a, Token: (empty), PacketNumber: 14789130, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:06 client Received first packet. Switching destination connection ID to: 4000001d09be729a 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 736µs} 2025/04/30 09:39:06 client -> Sending packet 3 (1280 bytes) for connection 98140dc569360029d582282ce231, Initial 2025/04/30 09:39:06 client Long Header{Type: Initial, DestConnectionID: 4000001d09be729a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 14789130, LowestAcked: 14789130, DelayTime: 0s} 2025/04/30 09:39:06 client <- Reading packet 14789130 (762 bytes) for connection (empty), Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001d09be729a, PacketNumber: 14789130, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:39:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 98140dc569360029d582282ce231, InitialSourceConnectionID: 4000001d09be729a, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x243010eeb9948a76e5f0ba4f425c3266, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:06 client -> Sending packet 0 (82 bytes) for connection 98140dc569360029d582282ce231, Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: 4000001d09be729a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 14789130, LowestAcked: 14789130, DelayTime: 0s} 2025/04/30 09:39:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:06 client Dropping Initial keys. 2025/04/30 09:39:06 client -> Sending packet 0 (46 bytes) for connection 98140dc569360029d582282ce231, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:06 client Short Header{DestConnectionID: 4000001d09be729a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:06 client <- Reading packet 14789132 (762 bytes) for connection (empty), Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001d09be729a, PacketNumber: 14789132, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:39:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:39:06 client -> Sending packet 1 (45 bytes) for connection 98140dc569360029d582282ce231, Handshake 2025/04/30 09:39:06 client Long Header{Type: Handshake, DestConnectionID: 4000001d09be729a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:39:06 client -> &wire.AckFrame{LargestAcked: 14789132, LowestAcked: 14789130, AckRanges: {{Largest: 14789132, Smallest: 14789132}, {Largest: 14789130, Smallest: 14789130}}, DelayTime: 0s} 2025/04/30 09:39:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:39:07 client -> Sending packet 2 (74 bytes) for connection 98140dc569360029d582282ce231, Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: 4000001d09be729a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:07 client -> Sending packet 3 (74 bytes) for connection 98140dc569360029d582282ce231, Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: 4000001d09be729a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:07 client <- Reading packet 14789133 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001d09be729a, PacketNumber: 14789133, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 328µs} 2025/04/30 09:39:07 client Peer doesn't await address validation any longer. 2025/04/30 09:39:07 client <- Reading packet 14789130 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:07 client Short Header{DestConnectionID: (empty), PacketNumber: 14789130, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.72ms} 2025/04/30 09:39:07 client newly acked packets (1): [0] 2025/04/30 09:39:07 client updated RTT: 231.651691ms (σ: 115.825845ms) 2025/04/30 09:39:07 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:07 client Canceling loss detection timer. 2025/04/30 09:39:07 client Dropping Handshake keys. 2025/04/30 09:39:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000012cf2157ad, StatelessResetToken: 0x4368d733013127ecda954d0c459e95e2} 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000001d86659f53, StatelessResetToken: 0xa6403fdbed294434eb6267b08359f504} 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000001bd78194d7, StatelessResetToken: 0xb955e135e0dc5b864dbb7765ee8d65ea} 2025/04/30 09:39:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:07 client -> Sending packet 1 (37 bytes) for connection 98140dc569360029d582282ce231, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 40000012cf2157ad, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 14789130, LowestAcked: 14789130, DelayTime: 202.157µs} 2025/04/30 09:39:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:07 client Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 09:39:07 client <- Reading packet 14789131 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:07 client Short Header{DestConnectionID: (empty), PacketNumber: 14789131, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:07 client -> Sending packet 2 (30 bytes) for connection 98140dc569360029d582282ce231, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 40000012cf2157ad, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:07 client Connection 98140dc569360029d582282ce231 closed. 2025/04/30 09:39:07 Requesting https://server4:443/gqoskkvcux. 2025/04/30 09:39:07 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:07 Increased send buffer size to 14336 kiB 2025/04/30 09:39:07 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:07 Created qlog file: /logs/qlog/1eb76e7b9aaf34444e3b921fccddd435f9e0936f.sqlog 2025/04/30 09:39:07 client Starting new connection to server4 ([::]:47607 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, version v1 2025/04/30 09:39:07 Adding connection ID (empty). 2025/04/30 09:39:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:07 client -> Sending packet 0 (1280 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:07 client -> Sending packet 1 (1280 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:07 client -> Sending packet 2 (1280 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:07 client <- Reading packet 11241062 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000001e7c0799be, Token: (empty), PacketNumber: 11241062, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:07 client Received first packet. Switching destination connection ID to: 4000001e7c0799be 2025/04/30 09:39:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 712µs} 2025/04/30 09:39:07 client -> Sending packet 3 (1280 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: 4000001e7c0799be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 11241062, LowestAcked: 11241062, DelayTime: 0s} 2025/04/30 09:39:07 client <- Reading packet 11241064 (768 bytes) for connection (empty), Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001e7c0799be, PacketNumber: 11241064, PacketNumberLen: 4, Length: 751, Version: v1} 2025/04/30 09:39:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:39:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, InitialSourceConnectionID: 4000001e7c0799be, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x744b321c7dbaa4401588719f2f0bedda, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:07 client -> Sending packet 0 (82 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: 4000001e7c0799be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 11241064, LowestAcked: 11241064, DelayTime: 0s} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:07 client Dropping Initial keys. 2025/04/30 09:39:07 client -> Sending packet 0 (46 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 4000001e7c0799be, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:07 client <- Reading packet 11241062 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:07 client Short Header{DestConnectionID: (empty), PacketNumber: 11241062, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:07 client Dropping Handshake keys. 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000000f8740cc55, StatelessResetToken: 0xd6c93689b81d7c385311f91f936897ca} 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000004e0cb4209, StatelessResetToken: 0x387052142d1a21ebb30f8e0b503cfcd5} 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000088061321, StatelessResetToken: 0xdbb17bfbf7fa675bf1186d03e4a17dbd} 2025/04/30 09:39:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:07 client -> Sending packet 1 (1366 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 4000000f8740cc55, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.PingFrame{} 2025/04/30 09:39:07 client -> Sending packet 2 (37 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 4000000f8740cc55, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 11241062, LowestAcked: 11241062, DelayTime: 154.678µs} 2025/04/30 09:39:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:07 client <- Reading packet 11241064 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:07 client Short Header{DestConnectionID: (empty), PacketNumber: 11241064, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:07 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:07 client -> Sending packet 3 (37 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 4000000f8740cc55, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 11241064, LowestAcked: 11241062, AckRanges: {{Largest: 11241064, Smallest: 11241064}, {Largest: 11241062, Smallest: 11241062}}, DelayTime: 83.396µs} 2025/04/30 09:39:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:07 client -> Sending packet 4 (30 bytes) for connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 4000000f8740cc55, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:07 client Connection 1eb76e7b9aaf34444e3b921fccddd435f9e0936f closed. 2025/04/30 09:39:07 Requesting https://server4:443/ncmumtyzbw. 2025/04/30 09:39:07 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:07 Increased send buffer size to 14336 kiB 2025/04/30 09:39:07 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:07 Created qlog file: /logs/qlog/f90bc3a89a770c209f.sqlog 2025/04/30 09:39:07 client Starting new connection to server4 ([::]:42640 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f90bc3a89a770c209f, version v1 2025/04/30 09:39:07 Adding connection ID (empty). 2025/04/30 09:39:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:07 client -> Sending packet 0 (1280 bytes) for connection f90bc3a89a770c209f, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: f90bc3a89a770c209f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:39:07 client <- Reading packet 9613838 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d9027b1899, Token: (empty), PacketNumber: 9613838, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:07 client Received first packet. Switching destination connection ID to: 400000d9027b1899 2025/04/30 09:39:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 568µs} 2025/04/30 09:39:07 client newly acked packets (1): [0] 2025/04/30 09:39:07 client updated RTT: 33.132642ms (σ: 16.566321ms) 2025/04/30 09:39:07 client -> Sending packet 1 (1280 bytes) for connection f90bc3a89a770c209f, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: 400000d9027b1899, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 9613838, LowestAcked: 9613838, DelayTime: 0s} 2025/04/30 09:39:07 client <- Reading packet 9613838 (756 bytes) for connection (empty), Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d9027b1899, PacketNumber: 9613838, PacketNumberLen: 4, Length: 739, Version: v1} 2025/04/30 09:39:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:39:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f90bc3a89a770c209f, InitialSourceConnectionID: 400000d9027b1899, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x49a93a8f2849369ad8d503390cc613a7, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:07 client -> Sending packet 0 (82 bytes) for connection f90bc3a89a770c209f, Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: 400000d9027b1899, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 9613838, LowestAcked: 9613838, DelayTime: 0s} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:07 client Dropping Initial keys. 2025/04/30 09:39:07 client -> Sending packet 0 (46 bytes) for connection f90bc3a89a770c209f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 400000d9027b1899, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:07 client <- Reading packet 9613839 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d9027b1899, PacketNumber: 9613839, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/04/30 09:39:07 client Peer doesn't await address validation any longer. 2025/04/30 09:39:07 client newly acked packets (1): [0] 2025/04/30 09:39:07 client updated RTT: 32.903ms (σ: 12.881ms) 2025/04/30 09:39:07 client Canceling loss detection timer. 2025/04/30 09:39:07 client <- Reading packet 9613838 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:07 client Short Header{DestConnectionID: (empty), PacketNumber: 9613838, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:07 client Dropping Handshake keys. 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000c2d9fa9cb7, StatelessResetToken: 0x6256adeeb28d4ed6ca4eae089852b8e2} 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d0fbd47888, StatelessResetToken: 0xfd1330633759200bdb885e563abd2719} 2025/04/30 09:39:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000c2a3967d5b, StatelessResetToken: 0x9cf7a820225a4c9dc7609057b0b1acf2} 2025/04/30 09:39:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:07 client -> Sending packet 1 (37 bytes) for connection f90bc3a89a770c209f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 400000c2d9fa9cb7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 9613838, LowestAcked: 9613838, DelayTime: 91.258µs} 2025/04/30 09:39:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:07 client <- Reading packet 9613839 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:07 client Short Header{DestConnectionID: (empty), PacketNumber: 9613839, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 09:39:07 client newly acked packets (1): [0] 2025/04/30 09:39:07 client updated RTT: 32.771ms (σ: 9.924ms) 2025/04/30 09:39:07 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:07 client -> Sending packet 2 (30 bytes) for connection f90bc3a89a770c209f, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 400000c2d9fa9cb7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:07 client Connection f90bc3a89a770c209f closed. 2025/04/30 09:39:07 Requesting https://server4:443/wbqtacjqnf. 2025/04/30 09:39:07 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:07 Increased send buffer size to 14336 kiB 2025/04/30 09:39:07 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:07 Created qlog file: /logs/qlog/b476ee5107dece12a3cb917c53.sqlog 2025/04/30 09:39:07 client Starting new connection to server4 ([::]:37316 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b476ee5107dece12a3cb917c53, version v1 2025/04/30 09:39:07 Adding connection ID (empty). 2025/04/30 09:39:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:07 client -> Sending packet 0 (1280 bytes) for connection b476ee5107dece12a3cb917c53, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: b476ee5107dece12a3cb917c53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:39:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:07 client -> Sending packet 1 (1280 bytes) for connection b476ee5107dece12a3cb917c53, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: b476ee5107dece12a3cb917c53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:39:07 client -> Sending packet 2 (1280 bytes) for connection b476ee5107dece12a3cb917c53, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: b476ee5107dece12a3cb917c53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:39:07 client <- Reading packet 4361174 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c01d6ac8e8, Token: (empty), PacketNumber: 4361174, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:07 client Received first packet. Switching destination connection ID to: 400000c01d6ac8e8 2025/04/30 09:39:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 688µs} 2025/04/30 09:39:07 client -> Sending packet 3 (1280 bytes) for connection b476ee5107dece12a3cb917c53, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: 400000c01d6ac8e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 4361174, LowestAcked: 4361174, DelayTime: 0s} 2025/04/30 09:39:07 client <- Reading packet 4361176 (760 bytes) for connection (empty), Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c01d6ac8e8, PacketNumber: 4361176, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:39:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:39:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b476ee5107dece12a3cb917c53, InitialSourceConnectionID: 400000c01d6ac8e8, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1c158f61a369fb382b8be871bbc1e89e, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:07 client -> Sending packet 0 (82 bytes) for connection b476ee5107dece12a3cb917c53, Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: 400000c01d6ac8e8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 4361176, LowestAcked: 4361176, DelayTime: 0s} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:07 client Dropping Initial keys. 2025/04/30 09:39:07 client -> Sending packet 0 (46 bytes) for connection b476ee5107dece12a3cb917c53, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 400000c01d6ac8e8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:07 client <- Reading packet 4361177 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c01d6ac8e8, PacketNumber: 4361177, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 216µs} 2025/04/30 09:39:07 client Peer doesn't await address validation any longer. 2025/04/30 09:39:07 client newly acked packets (1): [0] 2025/04/30 09:39:07 client updated RTT: 30.907568ms (σ: 15.453784ms) 2025/04/30 09:39:07 client Canceling loss detection timer. 2025/04/30 09:39:07 client <- Reading packet 4361175 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:07 client Short Header{DestConnectionID: (empty), PacketNumber: 4361175, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/04/30 09:39:07 client newly acked packets (1): [0] 2025/04/30 09:39:07 client updated RTT: 30.981ms (σ: 11.739ms) 2025/04/30 09:39:07 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:07 client Dropping Handshake keys. 2025/04/30 09:39:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:07 client -> Sending packet 1 (35 bytes) for connection b476ee5107dece12a3cb917c53, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 400000c01d6ac8e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 4361175, LowestAcked: 4361175, DelayTime: 89.827µs} 2025/04/30 09:39:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:07 client -> Sending packet 2 (30 bytes) for connection b476ee5107dece12a3cb917c53, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 400000c01d6ac8e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:07 client Connection b476ee5107dece12a3cb917c53 closed. 2025/04/30 09:39:07 Requesting https://server4:443/cyolzxajlf. 2025/04/30 09:39:07 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:07 Increased send buffer size to 14336 kiB 2025/04/30 09:39:07 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:07 Created qlog file: /logs/qlog/de83c1848f4ac7b8ee45ad08a8240b0141a1597b.sqlog 2025/04/30 09:39:07 client Starting new connection to server4 ([::]:53033 -> 193.167.100.100:443), source connection ID (empty), destination connection ID de83c1848f4ac7b8ee45ad08a8240b0141a1597b, version v1 2025/04/30 09:39:07 Adding connection ID (empty). 2025/04/30 09:39:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:07 client -> Sending packet 0 (1280 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: de83c1848f4ac7b8ee45ad08a8240b0141a1597b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:39:07 client <- Reading packet 8757952 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000938345da79, Token: (empty), PacketNumber: 8757952, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:07 client Received first packet. Switching destination connection ID to: 400000938345da79 2025/04/30 09:39:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:39:07 client newly acked packets (1): [0] 2025/04/30 09:39:07 client updated RTT: 33.152113ms (σ: 16.576056ms) 2025/04/30 09:39:07 client -> Sending packet 1 (1280 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: 400000938345da79, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 8757952, LowestAcked: 8757952, DelayTime: 0s} 2025/04/30 09:39:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:07 client -> Sending packet 2 (1280 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, Initial 2025/04/30 09:39:07 client Long Header{Type: Initial, DestConnectionID: 400000938345da79, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:07 client -> &wire.PingFrame{} 2025/04/30 09:39:07 client <- Reading packet 8757954 (767 bytes) for connection (empty), Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000938345da79, PacketNumber: 8757954, PacketNumberLen: 4, Length: 750, Version: v1} 2025/04/30 09:39:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:39:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: de83c1848f4ac7b8ee45ad08a8240b0141a1597b, InitialSourceConnectionID: 400000938345da79, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x183474c8bb972129f29fb149f5108259, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:07 client -> Sending packet 0 (82 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, Handshake 2025/04/30 09:39:07 client Long Header{Type: Handshake, DestConnectionID: 400000938345da79, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:07 client -> &wire.AckFrame{LargestAcked: 8757954, LowestAcked: 8757954, DelayTime: 0s} 2025/04/30 09:39:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:07 client Dropping Initial keys. 2025/04/30 09:39:07 client -> Sending packet 0 (46 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:07 client Short Header{DestConnectionID: 400000938345da79, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:08 client <- Reading packet 8757955 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000938345da79, PacketNumber: 8757955, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200µs} 2025/04/30 09:39:08 client Peer doesn't await address validation any longer. 2025/04/30 09:39:08 client newly acked packets (1): [0] 2025/04/30 09:39:08 client updated RTT: 32.865ms (σ: 13.005ms) 2025/04/30 09:39:08 client Canceling loss detection timer. 2025/04/30 09:39:08 client <- Reading packet 8757952 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:08 client Short Header{DestConnectionID: (empty), PacketNumber: 8757952, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:08 client Dropping Handshake keys. 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000848a246802, StatelessResetToken: 0xecd0a134ad5cb4a355615424b480fc8c} 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000009a51745e41, StatelessResetToken: 0x7591cdab3f42f412488dca86b6f20574} 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000009b33381f49, StatelessResetToken: 0xffd27619a0333d9eed01347662cd4178} 2025/04/30 09:39:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:08 client -> Sending packet 1 (37 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000848a246802, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 8757952, LowestAcked: 8757952, DelayTime: 73.536µs} 2025/04/30 09:39:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:08 client <- Reading packet 8757954 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:08 client Short Header{DestConnectionID: (empty), PacketNumber: 8757954, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000848a246802, StatelessResetToken: 0xecd0a134ad5cb4a355615424b480fc8c} 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000009a51745e41, StatelessResetToken: 0x7591cdab3f42f412488dca86b6f20574} 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000009b33381f49, StatelessResetToken: 0xffd27619a0333d9eed01347662cd4178} 2025/04/30 09:39:08 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:08 client -> Sending packet 2 (37 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000848a246802, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 8757954, LowestAcked: 8757952, AckRanges: {{Largest: 8757954, Smallest: 8757954}, {Largest: 8757952, Smallest: 8757952}}, DelayTime: 104.906µs} 2025/04/30 09:39:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:39:08 client -> Sending packet 4 (46 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000848a246802, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:08 client Skipping packet number 3 2025/04/30 09:39:08 client -> Sending packet 5 (29 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000848a246802, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:08 client <- Reading packet 8757956 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:08 client Short Header{DestConnectionID: (empty), PacketNumber: 8757956, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:08 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:08 client -> Sending packet 6 (39 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000848a246802, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 8757956, LowestAcked: 8757952, AckRanges: {{Largest: 8757956, Smallest: 8757956}, {Largest: 8757954, Smallest: 8757954}, {Largest: 8757952, Smallest: 8757952}}, DelayTime: 74.019µs} 2025/04/30 09:39:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:08 client -> Sending packet 7 (30 bytes) for connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000848a246802, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:08 client Connection de83c1848f4ac7b8ee45ad08a8240b0141a1597b closed. 2025/04/30 09:39:08 Requesting https://server4:443/qxawunprvm. 2025/04/30 09:39:08 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:08 Increased send buffer size to 14336 kiB 2025/04/30 09:39:08 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:08 Created qlog file: /logs/qlog/e012da79df262fe83a511a4969d985.sqlog 2025/04/30 09:39:08 client Starting new connection to server4 ([::]:34392 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e012da79df262fe83a511a4969d985, version v1 2025/04/30 09:39:08 Adding connection ID (empty). 2025/04/30 09:39:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:08 client -> Sending packet 0 (1280 bytes) for connection e012da79df262fe83a511a4969d985, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: e012da79df262fe83a511a4969d985, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:39:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:08 client <- Reading packet 12562217 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000923e1ddfed, Token: (empty), PacketNumber: 12562217, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:08 client Received first packet. Switching destination connection ID to: 400000923e1ddfed 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 118.016ms} 2025/04/30 09:39:08 client newly acked packets (1): [0] 2025/04/30 09:39:08 client updated RTT: 150.628755ms (σ: 75.314377ms) 2025/04/30 09:39:08 client -> Sending packet 1 (1280 bytes) for connection e012da79df262fe83a511a4969d985, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 400000923e1ddfed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 12562217, LowestAcked: 12562217, DelayTime: 0s} 2025/04/30 09:39:08 client <- Reading packet 12562217 (761 bytes) for connection (empty), Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000923e1ddfed, PacketNumber: 12562217, PacketNumberLen: 4, Length: 744, Version: v1} 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:39:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e012da79df262fe83a511a4969d985, InitialSourceConnectionID: 400000923e1ddfed, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x05ef29c5de3cff3b0715884255154bc1, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:08 client -> Sending packet 0 (82 bytes) for connection e012da79df262fe83a511a4969d985, Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: 400000923e1ddfed, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 12562217, LowestAcked: 12562217, DelayTime: 0s} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:08 client Dropping Initial keys. 2025/04/30 09:39:08 client -> Sending packet 0 (46 bytes) for connection e012da79df262fe83a511a4969d985, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000923e1ddfed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:08 client <- Reading packet 12562215 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:08 client Short Header{DestConnectionID: (empty), PacketNumber: 12562215, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:08 client Dropping Handshake keys. 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000082cdecf491, StatelessResetToken: 0x056de149710dc0d30c30d5c21da26a14} 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000084901adecd, StatelessResetToken: 0x8340f03a705b1d560c7f72d099afb047} 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000009b5304f8d0, StatelessResetToken: 0xf0ea5427001712195bc2dc44714088f9} 2025/04/30 09:39:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:08 client -> Sending packet 1 (37 bytes) for connection e012da79df262fe83a511a4969d985, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 40000082cdecf491, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 12562215, LowestAcked: 12562215, DelayTime: 93.595µs} 2025/04/30 09:39:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:08 client <- Reading packet 12562216 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:08 client Short Header{DestConnectionID: (empty), PacketNumber: 12562216, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 104µs} 2025/04/30 09:39:08 client newly acked packets (1): [1] 2025/04/30 09:39:08 client updated RTT: 135.64ms (σ: 86.46ms) 2025/04/30 09:39:08 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:08 client setting loss timer for packet 0 (1-RTT) to 152.595ms (in 2025-04-30 09:39:08.477806269 +0000 UTC m=+14.620798332) 2025/04/30 09:39:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000083ca9490e8, StatelessResetToken: 0x2a42af4d8c4c1ee7941a29c9e53843fe} 2025/04/30 09:39:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:08 client Ignoring all packets below 12562216. 2025/04/30 09:39:08 client Sending ACK because the ACK timer expired. 2025/04/30 09:39:08 client -> Sending packet 2 (36 bytes) for connection e012da79df262fe83a511a4969d985, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 40000082cdecf491, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 12562216, LowestAcked: 12562216, DelayTime: 25.342526ms} 2025/04/30 09:39:08 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:39:08.477806269 +0000 UTC m=+14.620798332 2025/04/30 09:39:08 client lost packet 0 (time threshold) 2025/04/30 09:39:08 client Canceling loss detection timer. 2025/04/30 09:39:08 client -> Sending packet 3 (46 bytes) for connection e012da79df262fe83a511a4969d985, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 40000082cdecf491, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:08 client <- Reading packet 12562217 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:08 client Short Header{DestConnectionID: (empty), PacketNumber: 12562217, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 264µs} 2025/04/30 09:39:08 client newly acked packets (1): [3] 2025/04/30 09:39:08 client updated RTT: 122.62ms (σ: 90.883ms) 2025/04/30 09:39:08 client Canceling loss detection timer. 2025/04/30 09:39:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:08 client -> Sending packet 4 (30 bytes) for connection e012da79df262fe83a511a4969d985, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 40000082cdecf491, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:08 client Connection e012da79df262fe83a511a4969d985 closed. 2025/04/30 09:39:08 Requesting https://server4:443/qjqlrgrohb. 2025/04/30 09:39:08 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:08 Increased send buffer size to 14336 kiB 2025/04/30 09:39:08 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:08 Created qlog file: /logs/qlog/4ed03aee7059ebbdaa38.sqlog 2025/04/30 09:39:08 client Starting new connection to server4 ([::]:57012 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4ed03aee7059ebbdaa38, version v1 2025/04/30 09:39:08 Adding connection ID (empty). 2025/04/30 09:39:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:08 client -> Sending packet 0 (1280 bytes) for connection 4ed03aee7059ebbdaa38, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 4ed03aee7059ebbdaa38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:39:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:08 client <- Reading packet 16190108 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000001bb134b9ca, Token: (empty), PacketNumber: 16190108, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:08 client Received first packet. Switching destination connection ID to: 4000001bb134b9ca 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 576µs} 2025/04/30 09:39:08 client newly acked packets (1): [0] 2025/04/30 09:39:08 client updated RTT: 33.075995ms (σ: 16.537997ms) 2025/04/30 09:39:08 client -> Sending packet 1 (1280 bytes) for connection 4ed03aee7059ebbdaa38, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 4000001bb134b9ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 16190108, LowestAcked: 16190108, DelayTime: 0s} 2025/04/30 09:39:08 client <- Reading packet 16190108 (757 bytes) for connection (empty), Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001bb134b9ca, PacketNumber: 16190108, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4ed03aee7059ebbdaa38, InitialSourceConnectionID: 4000001bb134b9ca, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5d5ca9622cc81617b384bc25bc841659, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:08 client -> Sending packet 0 (82 bytes) for connection 4ed03aee7059ebbdaa38, Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: 4000001bb134b9ca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 16190108, LowestAcked: 16190108, DelayTime: 0s} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:08 client Dropping Initial keys. 2025/04/30 09:39:08 client -> Sending packet 0 (46 bytes) for connection 4ed03aee7059ebbdaa38, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 4000001bb134b9ca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:08 client <- Reading packet 16190109 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001bb134b9ca, PacketNumber: 16190109, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/04/30 09:39:08 client Peer doesn't await address validation any longer. 2025/04/30 09:39:08 client newly acked packets (1): [0] 2025/04/30 09:39:08 client updated RTT: 32.821ms (σ: 12.91ms) 2025/04/30 09:39:08 client Canceling loss detection timer. 2025/04/30 09:39:08 client <- Reading packet 16190109 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:08 client Short Header{DestConnectionID: (empty), PacketNumber: 16190109, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 336µs} 2025/04/30 09:39:08 client newly acked packets (1): [0] 2025/04/30 09:39:08 client updated RTT: 32.671ms (σ: 9.981ms) 2025/04/30 09:39:08 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:08 client Dropping Handshake keys. 2025/04/30 09:39:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:08 client -> Sending packet 1 (35 bytes) for connection 4ed03aee7059ebbdaa38, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 4000001bb134b9ca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 16190109, LowestAcked: 16190109, DelayTime: 81.332µs} 2025/04/30 09:39:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:08 client -> Sending packet 2 (30 bytes) for connection 4ed03aee7059ebbdaa38, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 4000001bb134b9ca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:08 client Connection 4ed03aee7059ebbdaa38 closed. 2025/04/30 09:39:08 Requesting https://server4:443/cdyqhcpzms. 2025/04/30 09:39:08 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:08 Increased send buffer size to 14336 kiB 2025/04/30 09:39:08 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:08 Created qlog file: /logs/qlog/364ff3d9b3da335b14de.sqlog 2025/04/30 09:39:08 client Starting new connection to server4 ([::]:45005 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 364ff3d9b3da335b14de, version v1 2025/04/30 09:39:08 Adding connection ID (empty). 2025/04/30 09:39:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:08 client -> Sending packet 0 (1280 bytes) for connection 364ff3d9b3da335b14de, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 364ff3d9b3da335b14de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:08 client -> Sending packet 1 (1280 bytes) for connection 364ff3d9b3da335b14de, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 364ff3d9b3da335b14de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:08 client -> Sending packet 2 (1280 bytes) for connection 364ff3d9b3da335b14de, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 364ff3d9b3da335b14de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:08 client Queueing packet (757 bytes) for later decryption 2025/04/30 09:39:08 client <- Reading packet 12433591 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c55dd750d7, Token: (empty), PacketNumber: 12433591, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:08 client Received first packet. Switching destination connection ID to: 400000c55dd750d7 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 110.992ms} 2025/04/30 09:39:08 client newly acked packets (1): [2] 2025/04/30 09:39:08 client updated RTT: 144.707972ms (σ: 72.353986ms) 2025/04/30 09:39:08 client -> Sending packet 3 (1280 bytes) for connection 364ff3d9b3da335b14de, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 400000c55dd750d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 12433591, LowestAcked: 12433591, DelayTime: 0s} 2025/04/30 09:39:08 client <- Reading packet 12433589 (757 bytes) for connection (empty), Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c55dd750d7, PacketNumber: 12433589, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 364ff3d9b3da335b14de, InitialSourceConnectionID: 400000c55dd750d7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1e7456fd8293de3957b8e57e5b6c1c93, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:08 client <- Reading packet 12433591 (757 bytes) for connection (empty), Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c55dd750d7, PacketNumber: 12433591, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:08 client -> Sending packet 0 (84 bytes) for connection 364ff3d9b3da335b14de, Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: 400000c55dd750d7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 12433591, LowestAcked: 12433589, AckRanges: {{Largest: 12433591, Smallest: 12433591}, {Largest: 12433589, Smallest: 12433589}}, DelayTime: 0s} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:08 client Dropping Initial keys. 2025/04/30 09:39:08 client -> Sending packet 0 (46 bytes) for connection 364ff3d9b3da335b14de, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000c55dd750d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:08 client <- Reading packet 12433592 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c55dd750d7, PacketNumber: 12433592, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 216µs} 2025/04/30 09:39:08 client Peer doesn't await address validation any longer. 2025/04/30 09:39:08 client newly acked packets (1): [0] 2025/04/30 09:39:08 client updated RTT: 130.554ms (σ: 82.569ms) 2025/04/30 09:39:08 client Canceling loss detection timer. 2025/04/30 09:39:08 client <- Reading packet 12433590 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:08 client Short Header{DestConnectionID: (empty), PacketNumber: 12433590, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/04/30 09:39:08 client newly acked packets (1): [0] 2025/04/30 09:39:08 client updated RTT: 118.242ms (σ: 86.55ms) 2025/04/30 09:39:08 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:08 client Dropping Handshake keys. 2025/04/30 09:39:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:08 client -> Sending packet 1 (35 bytes) for connection 364ff3d9b3da335b14de, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000c55dd750d7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 12433590, LowestAcked: 12433590, DelayTime: 90.288µs} 2025/04/30 09:39:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:08 client -> Sending packet 2 (30 bytes) for connection 364ff3d9b3da335b14de, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 400000c55dd750d7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:08 client Connection 364ff3d9b3da335b14de closed. 2025/04/30 09:39:08 Requesting https://server4:443/temuabccdv. 2025/04/30 09:39:08 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:08 Increased send buffer size to 14336 kiB 2025/04/30 09:39:08 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:08 Created qlog file: /logs/qlog/4c9fb3b829266125bb5a281f29a061996ab99e25.sqlog 2025/04/30 09:39:08 client Starting new connection to server4 ([::]:58963 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4c9fb3b829266125bb5a281f29a061996ab99e25, version v1 2025/04/30 09:39:08 Adding connection ID (empty). 2025/04/30 09:39:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:08 client -> Sending packet 0 (1280 bytes) for connection 4c9fb3b829266125bb5a281f29a061996ab99e25, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 4c9fb3b829266125bb5a281f29a061996ab99e25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:39:08 client <- Reading packet 950037 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000008b941d12e8, Token: (empty), PacketNumber: 950037, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:08 client Received first packet. Switching destination connection ID to: 4000008b941d12e8 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 520µs} 2025/04/30 09:39:08 client newly acked packets (1): [0] 2025/04/30 09:39:08 client updated RTT: 33.055685ms (σ: 16.527842ms) 2025/04/30 09:39:08 client -> Sending packet 1 (1280 bytes) for connection 4c9fb3b829266125bb5a281f29a061996ab99e25, Initial 2025/04/30 09:39:08 client Long Header{Type: Initial, DestConnectionID: 4000008b941d12e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 950037, LowestAcked: 950037, DelayTime: 0s} 2025/04/30 09:39:08 client <- Reading packet 950037 (766 bytes) for connection (empty), Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008b941d12e8, PacketNumber: 950037, PacketNumberLen: 3, Length: 749, Version: v1} 2025/04/30 09:39:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:39:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4c9fb3b829266125bb5a281f29a061996ab99e25, InitialSourceConnectionID: 4000008b941d12e8, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xa18adf7ee8addf91d5b93a1731d26a9e, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:08 client -> Sending packet 0 (82 bytes) for connection 4c9fb3b829266125bb5a281f29a061996ab99e25, Handshake 2025/04/30 09:39:08 client Long Header{Type: Handshake, DestConnectionID: 4000008b941d12e8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:08 client -> &wire.AckFrame{LargestAcked: 950037, LowestAcked: 950037, DelayTime: 0s} 2025/04/30 09:39:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:08 client Dropping Initial keys. 2025/04/30 09:39:08 client -> Sending packet 0 (46 bytes) for connection 4c9fb3b829266125bb5a281f29a061996ab99e25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:08 client Short Header{DestConnectionID: 4000008b941d12e8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:09 client <- Reading packet 950038 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008b941d12e8, PacketNumber: 950038, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144µs} 2025/04/30 09:39:09 client Peer doesn't await address validation any longer. 2025/04/30 09:39:09 client newly acked packets (1): [0] 2025/04/30 09:39:09 client updated RTT: 32.82ms (σ: 12.863ms) 2025/04/30 09:39:09 client Canceling loss detection timer. 2025/04/30 09:39:09 client <- Reading packet 950038 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:09 client Short Header{DestConnectionID: (empty), PacketNumber: 950038, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 09:39:09 client newly acked packets (1): [0] 2025/04/30 09:39:09 client updated RTT: 32.688ms (σ: 9.909ms) 2025/04/30 09:39:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:09 client Dropping Handshake keys. 2025/04/30 09:39:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:09 client -> Sending packet 1 (35 bytes) for connection 4c9fb3b829266125bb5a281f29a061996ab99e25, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:09 client Short Header{DestConnectionID: 4000008b941d12e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:09 client -> &wire.AckFrame{LargestAcked: 950038, LowestAcked: 950038, DelayTime: 85.58µs} 2025/04/30 09:39:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:09 client -> Sending packet 2 (30 bytes) for connection 4c9fb3b829266125bb5a281f29a061996ab99e25, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:09 client Short Header{DestConnectionID: 4000008b941d12e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:09 client Connection 4c9fb3b829266125bb5a281f29a061996ab99e25 closed. 2025/04/30 09:39:09 Requesting https://server4:443/iprlfrsmka. 2025/04/30 09:39:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:09 Increased send buffer size to 14336 kiB 2025/04/30 09:39:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:09 Created qlog file: /logs/qlog/a0c98ddeea498fb21a19eebc82bed40d47fa.sqlog 2025/04/30 09:39:09 client Starting new connection to server4 ([::]:35550 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a0c98ddeea498fb21a19eebc82bed40d47fa, version v1 2025/04/30 09:39:09 Adding connection ID (empty). 2025/04/30 09:39:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:09 client -> Sending packet 0 (1280 bytes) for connection a0c98ddeea498fb21a19eebc82bed40d47fa, Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: a0c98ddeea498fb21a19eebc82bed40d47fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:39:09 client <- Reading packet 16137195 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c79a711ce7, Token: (empty), PacketNumber: 16137195, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:09 client Received first packet. Switching destination connection ID to: 400000c79a711ce7 2025/04/30 09:39:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 488µs} 2025/04/30 09:39:09 client newly acked packets (1): [0] 2025/04/30 09:39:09 client updated RTT: 32.969753ms (σ: 16.484876ms) 2025/04/30 09:39:09 client -> Sending packet 1 (1280 bytes) for connection a0c98ddeea498fb21a19eebc82bed40d47fa, Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: 400000c79a711ce7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:09 client -> &wire.AckFrame{LargestAcked: 16137195, LowestAcked: 16137195, DelayTime: 0s} 2025/04/30 09:39:09 client <- Reading packet 16137195 (764 bytes) for connection (empty), Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c79a711ce7, PacketNumber: 16137195, PacketNumberLen: 4, Length: 747, Version: v1} 2025/04/30 09:39:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:39:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a0c98ddeea498fb21a19eebc82bed40d47fa, InitialSourceConnectionID: 400000c79a711ce7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x8e4a513abce7ee2585cd788420d14a72, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:09 client -> Sending packet 0 (82 bytes) for connection a0c98ddeea498fb21a19eebc82bed40d47fa, Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: 400000c79a711ce7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:09 client -> &wire.AckFrame{LargestAcked: 16137195, LowestAcked: 16137195, DelayTime: 0s} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:09 client Dropping Initial keys. 2025/04/30 09:39:09 client -> Sending packet 0 (46 bytes) for connection a0c98ddeea498fb21a19eebc82bed40d47fa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:09 client Short Header{DestConnectionID: 400000c79a711ce7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:09 client <- Reading packet 16137196 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c79a711ce7, PacketNumber: 16137196, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/04/30 09:39:09 client Peer doesn't await address validation any longer. 2025/04/30 09:39:09 client newly acked packets (1): [0] 2025/04/30 09:39:09 client updated RTT: 32.729ms (σ: 12.842ms) 2025/04/30 09:39:09 client Canceling loss detection timer. 2025/04/30 09:39:09 client <- Reading packet 16137195 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:09 client Short Header{DestConnectionID: (empty), PacketNumber: 16137195, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:09 client Dropping Handshake keys. 2025/04/30 09:39:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000ca75fa0466, StatelessResetToken: 0xb22fb0289d23fab2bcd29b3046624ed6} 2025/04/30 09:39:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d61c62e704, StatelessResetToken: 0x489f0ff1e6901c3a94eb05e4056c1b30} 2025/04/30 09:39:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000cd8163f6e3, StatelessResetToken: 0x5aa804caa54327d401b63b4d290ff358} 2025/04/30 09:39:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:09 client -> Sending packet 1 (37 bytes) for connection a0c98ddeea498fb21a19eebc82bed40d47fa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:09 client Short Header{DestConnectionID: 400000ca75fa0466, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:09 client -> &wire.AckFrame{LargestAcked: 16137195, LowestAcked: 16137195, DelayTime: 85.35µs} 2025/04/30 09:39:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:09 client <- Reading packet 16137196 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:09 client Short Header{DestConnectionID: (empty), PacketNumber: 16137196, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/04/30 09:39:09 client newly acked packets (1): [0] 2025/04/30 09:39:09 client updated RTT: 32.585ms (σ: 9.918ms) 2025/04/30 09:39:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:09 client -> Sending packet 2 (30 bytes) for connection a0c98ddeea498fb21a19eebc82bed40d47fa, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:09 client Short Header{DestConnectionID: 400000ca75fa0466, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:09 client Connection a0c98ddeea498fb21a19eebc82bed40d47fa closed. 2025/04/30 09:39:09 Requesting https://server4:443/fsiwwzyyjb. 2025/04/30 09:39:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:09 Increased send buffer size to 14336 kiB 2025/04/30 09:39:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:09 Created qlog file: /logs/qlog/516e79a81d576947f580f8.sqlog 2025/04/30 09:39:09 client Starting new connection to server4 ([::]:57320 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 516e79a81d576947f580f8, version v1 2025/04/30 09:39:09 Adding connection ID (empty). 2025/04/30 09:39:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:09 client -> Sending packet 0 (1280 bytes) for connection 516e79a81d576947f580f8, Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: 516e79a81d576947f580f8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:39:09 client Queueing packet (757 bytes) for later decryption 2025/04/30 09:39:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:09 client <- Reading packet 13018219 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000805ac5b194, Token: (empty), PacketNumber: 13018219, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:09 client Received first packet. Switching destination connection ID to: 400000805ac5b194 2025/04/30 09:39:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.904ms} 2025/04/30 09:39:09 client newly acked packets (1): [0] 2025/04/30 09:39:09 client updated RTT: 142.529309ms (σ: 71.264654ms) 2025/04/30 09:39:09 client -> Sending packet 1 (1280 bytes) for connection 516e79a81d576947f580f8, Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: 400000805ac5b194, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:09 client -> &wire.AckFrame{LargestAcked: 13018219, LowestAcked: 13018219, DelayTime: 0s} 2025/04/30 09:39:09 client <- Reading packet 13018217 (757 bytes) for connection (empty), Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000805ac5b194, PacketNumber: 13018217, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:39:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 516e79a81d576947f580f8, InitialSourceConnectionID: 400000805ac5b194, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x8b4db1c30e3d9dbf9a536fc3f21cd411, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:09 client -> Sending packet 0 (82 bytes) for connection 516e79a81d576947f580f8, Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: 400000805ac5b194, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:09 client -> &wire.AckFrame{LargestAcked: 13018217, LowestAcked: 13018217, DelayTime: 0s} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:09 client Dropping Initial keys. 2025/04/30 09:39:09 client -> Sending packet 0 (46 bytes) for connection 516e79a81d576947f580f8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:09 client Short Header{DestConnectionID: 400000805ac5b194, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:09 client <- Reading packet 13018221 (757 bytes) for connection (empty), Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000805ac5b194, PacketNumber: 13018221, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:39:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:39:09 client -> Sending packet 1 (45 bytes) for connection 516e79a81d576947f580f8, Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: 400000805ac5b194, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:39:09 client -> &wire.AckFrame{LargestAcked: 13018221, LowestAcked: 13018217, AckRanges: {{Largest: 13018221, Smallest: 13018221}, {Largest: 13018217, Smallest: 13018217}}, DelayTime: 0s} 2025/04/30 09:39:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:39:09 client -> Sending packet 2 (74 bytes) for connection 516e79a81d576947f580f8, Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: 400000805ac5b194, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:09 client -> Sending packet 3 (74 bytes) for connection 516e79a81d576947f580f8, Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: 400000805ac5b194, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:09 client <- Reading packet 13018222 (40 bytes) for connection (empty), Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000805ac5b194, PacketNumber: 13018222, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 09:39:09 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 400µs} 2025/04/30 09:39:09 client Peer doesn't await address validation any longer. 2025/04/30 09:39:09 client newly acked packets (1): [3] 2025/04/30 09:39:09 client updated RTT: 128.624ms (σ: 81.256ms) 2025/04/30 09:39:09 client Canceling loss detection timer. 2025/04/30 09:39:09 client <- Reading packet 13018218 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:09 client Short Header{DestConnectionID: (empty), PacketNumber: 13018218, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:09 client -> Sending packet 1 (35 bytes) for connection 516e79a81d576947f580f8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:09 client Short Header{DestConnectionID: 400000805ac5b194, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:09 client -> &wire.AckFrame{LargestAcked: 13018218, LowestAcked: 13018218, DelayTime: 74.109µs} 2025/04/30 09:39:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:09 client -> Sending packet 4 (69 bytes) for connection 516e79a81d576947f580f8, Handshake 2025/04/30 09:39:09 client Long Header{Type: Handshake, DestConnectionID: 400000805ac5b194, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:39:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:09 client Short Header{DestConnectionID: 400000805ac5b194, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:09 client Connection 516e79a81d576947f580f8 closed. 2025/04/30 09:39:09 Requesting https://server4:443/bmumdfonak. 2025/04/30 09:39:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:09 Increased send buffer size to 14336 kiB 2025/04/30 09:39:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:09 Created qlog file: /logs/qlog/3a99beb91e76161435e23f62a0ea86.sqlog 2025/04/30 09:39:09 client Starting new connection to server4 ([::]:48798 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3a99beb91e76161435e23f62a0ea86, version v1 2025/04/30 09:39:09 Adding connection ID (empty). 2025/04/30 09:39:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:09 client -> Sending packet 0 (1280 bytes) for connection 3a99beb91e76161435e23f62a0ea86, Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: 3a99beb91e76161435e23f62a0ea86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:09 client Queueing packet (761 bytes) for later decryption 2025/04/30 09:39:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:09 client -> Sending packet 1 (1280 bytes) for connection 3a99beb91e76161435e23f62a0ea86, Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: 3a99beb91e76161435e23f62a0ea86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:09 client -> Sending packet 2 (1280 bytes) for connection 3a99beb91e76161435e23f62a0ea86, Initial 2025/04/30 09:39:09 client Long Header{Type: Initial, DestConnectionID: 3a99beb91e76161435e23f62a0ea86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:10 client Queueing packet (761 bytes) for later decryption 2025/04/30 09:39:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:39:10 client -> Sending packet 3 (1280 bytes) for connection 3a99beb91e76161435e23f62a0ea86, Initial 2025/04/30 09:39:10 client Long Header{Type: Initial, DestConnectionID: 3a99beb91e76161435e23f62a0ea86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:10 client -> Sending packet 4 (1280 bytes) for connection 3a99beb91e76161435e23f62a0ea86, Initial 2025/04/30 09:39:10 client Long Header{Type: Initial, DestConnectionID: 3a99beb91e76161435e23f62a0ea86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:39:10 client <- Reading packet 1673264 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000017ac57d285, Token: (empty), PacketNumber: 1673264, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:10 client Received first packet. Switching destination connection ID to: 40000017ac57d285 2025/04/30 09:39:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:10 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 130.464ms} 2025/04/30 09:39:10 client newly acked packets (1): [4] 2025/04/30 09:39:10 client updated RTT: 164.154192ms (σ: 82.077096ms) 2025/04/30 09:39:10 client -> Sending packet 5 (1280 bytes) for connection 3a99beb91e76161435e23f62a0ea86, Initial 2025/04/30 09:39:10 client Long Header{Type: Initial, DestConnectionID: 40000017ac57d285, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:10 client -> &wire.AckFrame{LargestAcked: 1673264, LowestAcked: 1673264, DelayTime: 0s} 2025/04/30 09:39:10 client <- Reading packet 1673257 (761 bytes) for connection (empty), Handshake 2025/04/30 09:39:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000017ac57d285, PacketNumber: 1673257, PacketNumberLen: 3, Length: 744, Version: v1} 2025/04/30 09:39:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:39:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3a99beb91e76161435e23f62a0ea86, InitialSourceConnectionID: 40000017ac57d285, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xef7e2463980c96e75e31820b6e5c59a2, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:10 client <- Reading packet 1673261 (761 bytes) for connection (empty), Handshake 2025/04/30 09:39:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000017ac57d285, PacketNumber: 1673261, PacketNumberLen: 3, Length: 744, Version: v1} 2025/04/30 09:39:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:39:10 client <- Reading packet 1673263 (761 bytes) for connection (empty), Handshake 2025/04/30 09:39:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000017ac57d285, PacketNumber: 1673263, PacketNumberLen: 3, Length: 744, Version: v1} 2025/04/30 09:39:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:39:10 client -> Sending packet 0 (132 bytes) for connection 3a99beb91e76161435e23f62a0ea86, Handshake 2025/04/30 09:39:10 client Long Header{Type: Handshake, DestConnectionID: 40000017ac57d285, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 69, Version: v1} 2025/04/30 09:39:10 client -> &wire.AckFrame{LargestAcked: 1673263, LowestAcked: 1673257, AckRanges: {{Largest: 1673263, Smallest: 1673263}, {Largest: 1673261, Smallest: 1673261}, {Largest: 1673257, Smallest: 1673257}}, DelayTime: 0s} 2025/04/30 09:39:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:10 client Short Header{DestConnectionID: 40000017ac57d285, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:10 client Dropping Initial keys. 2025/04/30 09:39:10 client <- Reading packet 1673264 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000017ac57d285, PacketNumber: 1673264, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 360µs} 2025/04/30 09:39:10 client Peer doesn't await address validation any longer. 2025/04/30 09:39:10 client newly acked packets (1): [0] 2025/04/30 09:39:10 client updated RTT: 147.606ms (σ: 94.652ms) 2025/04/30 09:39:10 client Canceling loss detection timer. 2025/04/30 09:39:10 client <- Reading packet 1673258 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1673258, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:10 client -> Sending packet 1 (35 bytes) for connection 3a99beb91e76161435e23f62a0ea86, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:10 client Short Header{DestConnectionID: 40000017ac57d285, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:10 client -> &wire.AckFrame{LargestAcked: 1673258, LowestAcked: 1673258, DelayTime: 102.562µs} 2025/04/30 09:39:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:10 client -> Sending packet 1 (69 bytes) for connection 3a99beb91e76161435e23f62a0ea86, Handshake 2025/04/30 09:39:10 client Long Header{Type: Handshake, DestConnectionID: 40000017ac57d285, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:39:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:10 client Short Header{DestConnectionID: 40000017ac57d285, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:10 client Connection 3a99beb91e76161435e23f62a0ea86 closed. 2025/04/30 09:39:10 Requesting https://server4:443/dzujcfqrhx. 2025/04/30 09:39:10 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:10 Increased send buffer size to 14336 kiB 2025/04/30 09:39:10 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:10 Created qlog file: /logs/qlog/bd0b3be3d86ce869046e2694cc751e.sqlog 2025/04/30 09:39:10 client Starting new connection to server4 ([::]:57489 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bd0b3be3d86ce869046e2694cc751e, version v1 2025/04/30 09:39:10 Adding connection ID (empty). 2025/04/30 09:39:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:10 client -> Sending packet 0 (1280 bytes) for connection bd0b3be3d86ce869046e2694cc751e, Initial 2025/04/30 09:39:10 client Long Header{Type: Initial, DestConnectionID: bd0b3be3d86ce869046e2694cc751e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:39:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:10 client -> Sending packet 1 (1280 bytes) for connection bd0b3be3d86ce869046e2694cc751e, Initial 2025/04/30 09:39:10 client Long Header{Type: Initial, DestConnectionID: bd0b3be3d86ce869046e2694cc751e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:39:10 client -> Sending packet 2 (1280 bytes) for connection bd0b3be3d86ce869046e2694cc751e, Initial 2025/04/30 09:39:10 client Long Header{Type: Initial, DestConnectionID: bd0b3be3d86ce869046e2694cc751e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:39:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:39:10 client <- Reading packet 6788566 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000019cf0d7e41, Token: (empty), PacketNumber: 6788566, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:10 client Received first packet. Switching destination connection ID to: 40000019cf0d7e41 2025/04/30 09:39:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 110.496ms} 2025/04/30 09:39:10 client newly acked packets (1): [2] 2025/04/30 09:39:10 client updated RTT: 144.244267ms (σ: 72.122133ms) 2025/04/30 09:39:10 client Queueing packet (762 bytes) for later decryption 2025/04/30 09:39:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:11 client <- Reading packet 6788568 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000019cf0d7e41, Token: (empty), PacketNumber: 6788568, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 320.904ms} 2025/04/30 09:39:11 client -> Sending packet 3 (1280 bytes) for connection bd0b3be3d86ce869046e2694cc751e, Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: 40000019cf0d7e41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:11 client -> &wire.AckFrame{LargestAcked: 6788568, LowestAcked: 6788566, AckRanges: {{Largest: 6788568, Smallest: 6788568}, {Largest: 6788566, Smallest: 6788566}}, DelayTime: 0s} 2025/04/30 09:39:11 client <- Reading packet 6788566 (762 bytes) for connection (empty), Handshake 2025/04/30 09:39:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000019cf0d7e41, PacketNumber: 6788566, PacketNumberLen: 3, Length: 745, Version: v1} 2025/04/30 09:39:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 09:39:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bd0b3be3d86ce869046e2694cc751e, InitialSourceConnectionID: 40000019cf0d7e41, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x66e540341bf841c1f911831c91790837, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:11 client <- Reading packet 6788568 (762 bytes) for connection (empty), Handshake 2025/04/30 09:39:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000019cf0d7e41, PacketNumber: 6788568, PacketNumberLen: 3, Length: 745, Version: v1} 2025/04/30 09:39:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 09:39:11 client -> Sending packet 0 (84 bytes) for connection bd0b3be3d86ce869046e2694cc751e, Handshake 2025/04/30 09:39:11 client Long Header{Type: Handshake, DestConnectionID: 40000019cf0d7e41, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:39:11 client -> &wire.AckFrame{LargestAcked: 6788568, LowestAcked: 6788566, AckRanges: {{Largest: 6788568, Smallest: 6788568}, {Largest: 6788566, Smallest: 6788566}}, DelayTime: 0s} 2025/04/30 09:39:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:11 client Dropping Initial keys. 2025/04/30 09:39:11 client -> Sending packet 0 (46 bytes) for connection bd0b3be3d86ce869046e2694cc751e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:11 client Short Header{DestConnectionID: 40000019cf0d7e41, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:11 client <- Reading packet 6788569 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000019cf0d7e41, PacketNumber: 6788569, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 09:39:11 client Peer doesn't await address validation any longer. 2025/04/30 09:39:11 client newly acked packets (1): [0] 2025/04/30 09:39:11 client updated RTT: 130.15ms (σ: 82.278ms) 2025/04/30 09:39:11 client Canceling loss detection timer. 2025/04/30 09:39:11 client <- Reading packet 6788564 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:11 client Short Header{DestConnectionID: (empty), PacketNumber: 6788564, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:11 client Dropping Handshake keys. 2025/04/30 09:39:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000064f3bca35, StatelessResetToken: 0xdb8dac533bc0974193cc7551554bc39a} 2025/04/30 09:39:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000007f263df64, StatelessResetToken: 0x68f57c804d32c3600c31b78dcf2b5768} 2025/04/30 09:39:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000057bf5d576, StatelessResetToken: 0x92aa2422dcc591aa2189487b2acabd90} 2025/04/30 09:39:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:11 client <- Reading packet 6788565 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:11 client Short Header{DestConnectionID: (empty), PacketNumber: 6788565, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/04/30 09:39:11 client newly acked packets (1): [0] 2025/04/30 09:39:11 client updated RTT: 117.813ms (σ: 86.381ms) 2025/04/30 09:39:11 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:11 client Canceling loss detection timer. 2025/04/30 09:39:11 client -> Sending packet 1 (37 bytes) for connection bd0b3be3d86ce869046e2694cc751e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:11 client Short Header{DestConnectionID: 400000064f3bca35, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:11 client -> &wire.AckFrame{LargestAcked: 6788565, LowestAcked: 6788564, DelayTime: 131.909µs} 2025/04/30 09:39:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:11 client <- Reading packet 6788567 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:11 client Short Header{DestConnectionID: (empty), PacketNumber: 6788567, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 09:39:11 client newly acked packets (1): [1] 2025/04/30 09:39:11 client updated RTT: 106.932ms (σ: 86.545ms) 2025/04/30 09:39:11 client Canceling loss detection timer. 2025/04/30 09:39:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000000670d8a118, StatelessResetToken: 0x3b2ec9692675b22ebefd70b797527f6d} 2025/04/30 09:39:11 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:11 client Ignoring all packets below 6788566. 2025/04/30 09:39:11 client -> Sending packet 2 (35 bytes) for connection bd0b3be3d86ce869046e2694cc751e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:11 client Short Header{DestConnectionID: 400000064f3bca35, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:11 client -> &wire.AckFrame{LargestAcked: 6788567, LowestAcked: 6788567, DelayTime: 145.121µs} 2025/04/30 09:39:11 client <- Reading packet 6788568 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:11 client Short Header{DestConnectionID: (empty), PacketNumber: 6788568, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 88µs} 2025/04/30 09:39:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:11 client -> Sending packet 3 (30 bytes) for connection bd0b3be3d86ce869046e2694cc751e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:11 client Short Header{DestConnectionID: 400000064f3bca35, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:11 client Connection bd0b3be3d86ce869046e2694cc751e closed. 2025/04/30 09:39:11 Requesting https://server4:443/lqrcbpakyu. 2025/04/30 09:39:11 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:11 Increased send buffer size to 14336 kiB 2025/04/30 09:39:11 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:11 Created qlog file: /logs/qlog/df325d8b308f0b7ca6e553e6.sqlog 2025/04/30 09:39:11 client Starting new connection to server4 ([::]:33804 -> 193.167.100.100:443), source connection ID (empty), destination connection ID df325d8b308f0b7ca6e553e6, version v1 2025/04/30 09:39:11 Adding connection ID (empty). 2025/04/30 09:39:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:11 client -> Sending packet 0 (1280 bytes) for connection df325d8b308f0b7ca6e553e6, Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: df325d8b308f0b7ca6e553e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:39:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:39:11 client <- Reading packet 1553702 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000009a09f250d3, Token: (empty), PacketNumber: 1553702, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:39:11 client Received first packet. Switching destination connection ID to: 4000009a09f250d3 2025/04/30 09:39:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 576µs} 2025/04/30 09:39:11 client newly acked packets (1): [0] 2025/04/30 09:39:11 client updated RTT: 33.13734ms (σ: 16.56867ms) 2025/04/30 09:39:11 client -> Sending packet 1 (1280 bytes) for connection df325d8b308f0b7ca6e553e6, Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: 4000009a09f250d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:11 client -> &wire.AckFrame{LargestAcked: 1553702, LowestAcked: 1553702, DelayTime: 0s} 2025/04/30 09:39:11 client <- Reading packet 1553702 (758 bytes) for connection (empty), Handshake 2025/04/30 09:39:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009a09f250d3, PacketNumber: 1553702, PacketNumberLen: 3, Length: 741, Version: v1} 2025/04/30 09:39:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 09:39:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: df325d8b308f0b7ca6e553e6, InitialSourceConnectionID: 4000009a09f250d3, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x6a219d87ca84467690f0721f4599505c, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:11 client -> Sending packet 0 (82 bytes) for connection df325d8b308f0b7ca6e553e6, Handshake 2025/04/30 09:39:11 client Long Header{Type: Handshake, DestConnectionID: 4000009a09f250d3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:11 client -> &wire.AckFrame{LargestAcked: 1553702, LowestAcked: 1553702, DelayTime: 0s} 2025/04/30 09:39:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:11 client Dropping Initial keys. 2025/04/30 09:39:11 client -> Sending packet 0 (46 bytes) for connection df325d8b308f0b7ca6e553e6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:11 client Short Header{DestConnectionID: 4000009a09f250d3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:11 client <- Reading packet 1553703 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009a09f250d3, PacketNumber: 1553703, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 224µs} 2025/04/30 09:39:11 client Peer doesn't await address validation any longer. 2025/04/30 09:39:11 client newly acked packets (1): [0] 2025/04/30 09:39:11 client updated RTT: 32.902ms (σ: 12.895ms) 2025/04/30 09:39:11 client Canceling loss detection timer. 2025/04/30 09:39:11 client <- Reading packet 1553702 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1553702, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:11 client Dropping Handshake keys. 2025/04/30 09:39:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000009a69a2a453, StatelessResetToken: 0x2333052e650b1f077bd650be124cbe7a} 2025/04/30 09:39:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000095e4fc7560, StatelessResetToken: 0xb1589215df35e77434e90504328a73f7} 2025/04/30 09:39:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000008a3019ba7e, StatelessResetToken: 0x9ba07c62bd0dbcacdd97508660f9a3df} 2025/04/30 09:39:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:11 client -> Sending packet 1 (37 bytes) for connection df325d8b308f0b7ca6e553e6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:11 client Short Header{DestConnectionID: 4000009a69a2a453, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:11 client -> &wire.AckFrame{LargestAcked: 1553702, LowestAcked: 1553702, DelayTime: 88.355µs} 2025/04/30 09:39:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:11 client <- Reading packet 1553703 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1553703, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/04/30 09:39:11 client newly acked packets (1): [0] 2025/04/30 09:39:11 client updated RTT: 32.763ms (σ: 9.948ms) 2025/04/30 09:39:11 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:11 client -> Sending packet 2 (30 bytes) for connection df325d8b308f0b7ca6e553e6, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:11 client Short Header{DestConnectionID: 4000009a69a2a453, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:11 client Connection df325d8b308f0b7ca6e553e6 closed. 2025/04/30 09:39:11 Requesting https://server4:443/zecjjhpwtp. 2025/04/30 09:39:11 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:11 Increased send buffer size to 14336 kiB 2025/04/30 09:39:11 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:11 Created qlog file: /logs/qlog/9d3d6e6dd7a50e3d2aae109f724a.sqlog 2025/04/30 09:39:11 client Starting new connection to server4 ([::]:56998 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9d3d6e6dd7a50e3d2aae109f724a, version v1 2025/04/30 09:39:11 Adding connection ID (empty). 2025/04/30 09:39:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:11 client -> Sending packet 0 (1280 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: 9d3d6e6dd7a50e3d2aae109f724a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:39:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:39:11 client Queueing packet (762 bytes) for later decryption 2025/04/30 09:39:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:39:11 client -> Sending packet 1 (1280 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: 9d3d6e6dd7a50e3d2aae109f724a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:39:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:39:11 client -> Sending packet 2 (1280 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: 9d3d6e6dd7a50e3d2aae109f724a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:39:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:39:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:11 client <- Reading packet 15107569 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d0ff64d9e6, Token: (empty), PacketNumber: 15107569, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:11 client Received first packet. Switching destination connection ID to: 400000d0ff64d9e6 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 121.52ms} 2025/04/30 09:39:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:39:11 client -> Sending packet 3 (1280 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: 400000d0ff64d9e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:39:11 client -> Sending packet 4 (1280 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: 400000d0ff64d9e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:39:11 client <- Reading packet 15107570 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d0ff64d9e6, Token: (empty), PacketNumber: 15107570, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:11 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 224µs} 2025/04/30 09:39:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:39:12 client -> Sending packet 5 (1280 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Initial 2025/04/30 09:39:12 client Long Header{Type: Initial, DestConnectionID: 400000d0ff64d9e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:39:12 client -> Sending packet 6 (1280 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Initial 2025/04/30 09:39:12 client Long Header{Type: Initial, DestConnectionID: 400000d0ff64d9e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:39:12 client <- Reading packet 15107575 (1232 bytes) for connection (empty), Initial 2025/04/30 09:39:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d0ff64d9e6, Token: (empty), PacketNumber: 15107575, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:39:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:12 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 140.512ms} 2025/04/30 09:39:12 client newly acked packets (1): [6] 2025/04/30 09:39:12 client updated RTT: 174.299269ms (σ: 87.149634ms) 2025/04/30 09:39:12 client -> Sending packet 7 (1280 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Initial 2025/04/30 09:39:12 client Long Header{Type: Initial, DestConnectionID: 400000d0ff64d9e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:39:12 client -> &wire.AckFrame{LargestAcked: 15107575, LowestAcked: 15107569, AckRanges: {{Largest: 15107575, Smallest: 15107575}, {Largest: 15107570, Smallest: 15107569}}, DelayTime: 0s} 2025/04/30 09:39:12 client <- Reading packet 15107565 (762 bytes) for connection (empty), Handshake 2025/04/30 09:39:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d0ff64d9e6, PacketNumber: 15107565, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:39:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:39:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9d3d6e6dd7a50e3d2aae109f724a, InitialSourceConnectionID: 400000d0ff64d9e6, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x30fc4663dcc42ee4f1384d556663d2b1, MaxDatagramFrameSize: 65535} 2025/04/30 09:39:12 client <- Reading packet 15107573 (762 bytes) for connection (empty), Handshake 2025/04/30 09:39:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d0ff64d9e6, PacketNumber: 15107573, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:39:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:39:12 client -> Sending packet 0 (84 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, Handshake 2025/04/30 09:39:12 client Long Header{Type: Handshake, DestConnectionID: 400000d0ff64d9e6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:39:12 client -> &wire.AckFrame{LargestAcked: 15107573, LowestAcked: 15107565, AckRanges: {{Largest: 15107573, Smallest: 15107573}, {Largest: 15107565, Smallest: 15107565}}, DelayTime: 0s} 2025/04/30 09:39:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:12 client Dropping Initial keys. 2025/04/30 09:39:12 client -> Sending packet 0 (46 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:12 client Short Header{DestConnectionID: 400000d0ff64d9e6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:12 client <- Reading packet 15107574 (38 bytes) for connection (empty), Handshake 2025/04/30 09:39:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d0ff64d9e6, PacketNumber: 15107574, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/04/30 09:39:12 client Peer doesn't await address validation any longer. 2025/04/30 09:39:12 client newly acked packets (1): [0] 2025/04/30 09:39:12 client updated RTT: 156.45ms (σ: 101.059ms) 2025/04/30 09:39:12 client Canceling loss detection timer. 2025/04/30 09:39:12 client <- Reading packet 15107565 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:12 client Short Header{DestConnectionID: (empty), PacketNumber: 15107565, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:12 client Dropping Handshake keys. 2025/04/30 09:39:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cfb9df01b0, StatelessResetToken: 0xefacc4a9df3c3d1fa0482e7c774ccf5c} 2025/04/30 09:39:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000c4abf05886, StatelessResetToken: 0x8793d01f8c492b1788e4da1e2e8119d3} 2025/04/30 09:39:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000cc0d1d15b3, StatelessResetToken: 0x3132389583218915ca46b534c2d3539c} 2025/04/30 09:39:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:12 client -> Sending packet 1 (37 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:12 client Short Header{DestConnectionID: 400000cfb9df01b0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:12 client -> &wire.AckFrame{LargestAcked: 15107565, LowestAcked: 15107565, DelayTime: 111.316µs} 2025/04/30 09:39:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:12 client <- Reading packet 15107566 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:12 client Short Header{DestConnectionID: (empty), PacketNumber: 15107566, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:39:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/04/30 09:39:12 client newly acked packets (1): [0] 2025/04/30 09:39:12 client updated RTT: 140.861ms (σ: 106.97ms) 2025/04/30 09:39:12 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:39:12 client <- Reading packet 15107568 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:12 client Short Header{DestConnectionID: (empty), PacketNumber: 15107568, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 09:39:12 client newly acked packets (1): [1] 2025/04/30 09:39:12 client updated RTT: 127.103ms (σ: 107.743ms) 2025/04/30 09:39:12 client Canceling loss detection timer. 2025/04/30 09:39:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000c4258f0a3e, StatelessResetToken: 0x770dabf54da326370cd4aba4da141fc3} 2025/04/30 09:39:12 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:39:12 client Ignoring all packets below 15107566. 2025/04/30 09:39:12 client -> Sending packet 2 (37 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:12 client Short Header{DestConnectionID: 400000cfb9df01b0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:12 client -> &wire.AckFrame{LargestAcked: 15107568, LowestAcked: 15107566, AckRanges: {{Largest: 15107568, Smallest: 15107568}, {Largest: 15107566, Smallest: 15107566}}, DelayTime: 115.676µs} 2025/04/30 09:39:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:39:12 client <- Reading packet 15107569 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:12 client Short Header{DestConnectionID: (empty), PacketNumber: 15107569, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:12 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 64µs} 2025/04/30 09:39:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:39:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:12 client -> Sending packet 3 (30 bytes) for connection 9d3d6e6dd7a50e3d2aae109f724a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:39:12 client Short Header{DestConnectionID: 400000cfb9df01b0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:12 client Connection 9d3d6e6dd7a50e3d2aae109f724a closed.