2025/04/30 09:37:56 Requesting https://server4:443/wyhajrgdnx. 2025/04/30 09:37:56 Increased receive buffer size to 14336 kiB 2025/04/30 09:37:56 Increased send buffer size to 14336 kiB 2025/04/30 09:37:56 Setting DF for IPv4 and IPv6. 2025/04/30 09:37:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:37:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:37:56 Created qlog file: /logs/qlog/62545cc6d186c27c0b8a08035c.sqlog 2025/04/30 09:37:56 client Starting new connection to server4 ([::]:33150 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 62545cc6d186c27c0b8a08035c, version v1 2025/04/30 09:37:56 Adding connection ID (empty). 2025/04/30 09:37:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:37:56 client -> Sending packet 0 (1280 bytes) for connection 62545cc6d186c27c0b8a08035c, Initial 2025/04/30 09:37:56 client Long Header{Type: Initial, DestConnectionID: 62545cc6d186c27c0b8a08035c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:37:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:37:56 client <- Reading packet 7775963 (1232 bytes) for connection (empty), Initial 2025/04/30 09:37:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004f0a0d8ca5, Token: (empty), PacketNumber: 7775963, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:37:56 client Received first packet. Switching destination connection ID to: 4000004f0a0d8ca5 2025/04/30 09:37:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:37:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 728µs} 2025/04/30 09:37:56 client newly acked packets (1): [0] 2025/04/30 09:37:56 client updated RTT: 38.430252ms (σ: 19.215126ms) 2025/04/30 09:37:56 client -> Sending packet 1 (1280 bytes) for connection 62545cc6d186c27c0b8a08035c, Initial 2025/04/30 09:37:56 client Long Header{Type: Initial, DestConnectionID: 4000004f0a0d8ca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:37:56 client -> &wire.AckFrame{LargestAcked: 7775963, LowestAcked: 7775963, DelayTime: 0s} 2025/04/30 09:37:56 client -> Sending packet 2 (1280 bytes) for connection 62545cc6d186c27c0b8a08035c, Initial 2025/04/30 09:37:56 client Long Header{Type: Initial, DestConnectionID: 4000004f0a0d8ca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:37:56 client -> &wire.PingFrame{} 2025/04/30 09:37:56 client <- Reading packet 7775965 (1232 bytes) for connection (empty), Initial 2025/04/30 09:37:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004f0a0d8ca5, Token: (empty), PacketNumber: 7775965, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:37:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:37:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 120.192ms} 2025/04/30 09:37:56 client -> Sending packet 3 (1280 bytes) for connection 62545cc6d186c27c0b8a08035c, Initial 2025/04/30 09:37:56 client Long Header{Type: Initial, DestConnectionID: 4000004f0a0d8ca5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:37:56 client -> &wire.AckFrame{LargestAcked: 7775965, LowestAcked: 7775963, AckRanges: {{Largest: 7775965, Smallest: 7775965}, {Largest: 7775963, Smallest: 7775963}}, DelayTime: 0s} 2025/04/30 09:37:56 client <- Reading packet 7775966 (1232 bytes) for connection (empty), Initial 2025/04/30 09:37:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004f0a0d8ca5, Token: (empty), PacketNumber: 7775966, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:37:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 232µs} 2025/04/30 09:37:56 client newly acked packets (1): [2] 2025/04/30 09:37:56 client updated RTT: 37.743ms (σ: 15.783ms) 2025/04/30 09:37:57 client <- Reading packet 7775967 (758 bytes) for connection (empty), Handshake 2025/04/30 09:37:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004f0a0d8ca5, PacketNumber: 7775967, PacketNumberLen: 3, Length: 741, Version: v1} 2025/04/30 09:37:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 09:37:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 62545cc6d186c27c0b8a08035c, InitialSourceConnectionID: 4000004f0a0d8ca5, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x04c93b7acebc0fe0b0b3e57349c18e0c, MaxDatagramFrameSize: 65535} 2025/04/30 09:37:57 client -> Sending packet 0 (82 bytes) for connection 62545cc6d186c27c0b8a08035c, Handshake 2025/04/30 09:37:57 client Long Header{Type: Handshake, DestConnectionID: 4000004f0a0d8ca5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:37:57 client -> &wire.AckFrame{LargestAcked: 7775967, LowestAcked: 7775967, DelayTime: 0s} 2025/04/30 09:37:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:57 client Dropping Initial keys. 2025/04/30 09:37:57 client -> Sending packet 0 (46 bytes) for connection 62545cc6d186c27c0b8a08035c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 4000004f0a0d8ca5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:37:57 client -> Sending packet 1 (74 bytes) for connection 62545cc6d186c27c0b8a08035c, Handshake 2025/04/30 09:37:57 client Long Header{Type: Handshake, DestConnectionID: 4000004f0a0d8ca5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:37:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:57 client -> Sending packet 2 (74 bytes) for connection 62545cc6d186c27c0b8a08035c, Handshake 2025/04/30 09:37:57 client Long Header{Type: Handshake, DestConnectionID: 4000004f0a0d8ca5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:37:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:57 client <- Reading packet 7775965 (106 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7775965, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:37:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:37:57 client Dropping Handshake keys. 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000004bda64a33d, StatelessResetToken: 0xe5dc4650f2e3b5db79e43cf784564e43} 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000004c32804259, StatelessResetToken: 0x2c66bd8f476b5e0cfde5c789b183624f} 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000465d30a67e, StatelessResetToken: 0xc9923f1b9891d6de9b441b78ea9a7b70} 2025/04/30 09:37:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:37:57 client -> Sending packet 1 (37 bytes) for connection 62545cc6d186c27c0b8a08035c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 4000004bda64a33d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.AckFrame{LargestAcked: 7775965, LowestAcked: 7775965, DelayTime: 141.174µs} 2025/04/30 09:37:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:37:57 client <- Reading packet 7775966 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7775966, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:37:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 240µs} 2025/04/30 09:37:57 client newly acked packets (1): [1] 2025/04/30 09:37:57 client updated RTT: 36.91ms (σ: 13.503ms) 2025/04/30 09:37:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:37:57 client lost packet 0 (time threshold) 2025/04/30 09:37:57 client Canceling loss detection timer. 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000594f034d19, StatelessResetToken: 0xed25e044f1f604a1501429134966c810} 2025/04/30 09:37:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:37:57 client Ignoring all packets below 7775966. 2025/04/30 09:37:57 client -> Sending packet 2 (54 bytes) for connection 62545cc6d186c27c0b8a08035c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 4000004bda64a33d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.AckFrame{LargestAcked: 7775966, LowestAcked: 7775966, DelayTime: 175.106µs} 2025/04/30 09:37:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:37:57 client -> Sending packet 4 (46 bytes) for connection 62545cc6d186c27c0b8a08035c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 4000004bda64a33d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:57 client -> Sending packet 5 (46 bytes) for connection 62545cc6d186c27c0b8a08035c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 4000004bda64a33d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:57 client <- Reading packet 7775969 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7775969, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:37:57 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 464µs} 2025/04/30 09:37:57 client newly acked packets (1): [5] 2025/04/30 09:37:57 client updated RTT: 36.205ms (σ: 11.537ms) 2025/04/30 09:37:57 client Canceling loss detection timer. 2025/04/30 09:37:57 client <- Reading packet 7775970 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7775970, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:37:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:37:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:37:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:37:57 client -> Sending packet 6 (30 bytes) for connection 62545cc6d186c27c0b8a08035c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 4000004bda64a33d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:37:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:37:57 client Connection 62545cc6d186c27c0b8a08035c closed. 2025/04/30 09:37:57 Requesting https://server4:443/jiewrolkzo. 2025/04/30 09:37:57 Increased receive buffer size to 14336 kiB 2025/04/30 09:37:57 Increased send buffer size to 14336 kiB 2025/04/30 09:37:57 Setting DF for IPv4 and IPv6. 2025/04/30 09:37:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:37:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:37:57 Created qlog file: /logs/qlog/2aa546aaf31f927804.sqlog 2025/04/30 09:37:57 client Starting new connection to server4 ([::]:58303 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2aa546aaf31f927804, version v1 2025/04/30 09:37:57 Adding connection ID (empty). 2025/04/30 09:37:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:37:57 client -> Sending packet 0 (1280 bytes) for connection 2aa546aaf31f927804, Initial 2025/04/30 09:37:57 client Long Header{Type: Initial, DestConnectionID: 2aa546aaf31f927804, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:37:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:37:57 client <- Reading packet 5841361 (1232 bytes) for connection (empty), Initial 2025/04/30 09:37:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d9c5400bf6, Token: (empty), PacketNumber: 5841361, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:37:57 client Received first packet. Switching destination connection ID to: 400000d9c5400bf6 2025/04/30 09:37:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:37:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 608µs} 2025/04/30 09:37:57 client newly acked packets (1): [0] 2025/04/30 09:37:57 client updated RTT: 33.219508ms (σ: 16.609754ms) 2025/04/30 09:37:57 client -> Sending packet 1 (1280 bytes) for connection 2aa546aaf31f927804, Initial 2025/04/30 09:37:57 client Long Header{Type: Initial, DestConnectionID: 400000d9c5400bf6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:37:57 client -> &wire.AckFrame{LargestAcked: 5841361, LowestAcked: 5841361, DelayTime: 0s} 2025/04/30 09:37:57 client <- Reading packet 5841361 (754 bytes) for connection (empty), Handshake 2025/04/30 09:37:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d9c5400bf6, PacketNumber: 5841361, PacketNumberLen: 3, Length: 737, Version: v1} 2025/04/30 09:37:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:37:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2aa546aaf31f927804, InitialSourceConnectionID: 400000d9c5400bf6, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf2bb7f07a0c6579110943e812c29db70, MaxDatagramFrameSize: 65535} 2025/04/30 09:37:57 client -> Sending packet 0 (82 bytes) for connection 2aa546aaf31f927804, Handshake 2025/04/30 09:37:57 client Long Header{Type: Handshake, DestConnectionID: 400000d9c5400bf6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:37:57 client -> &wire.AckFrame{LargestAcked: 5841361, LowestAcked: 5841361, DelayTime: 0s} 2025/04/30 09:37:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:57 client Dropping Initial keys. 2025/04/30 09:37:57 client -> Sending packet 0 (46 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 400000d9c5400bf6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:57 client <- Reading packet 5841361 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5841361, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:37:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:37:57 client Dropping Handshake keys. 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000c6cd452251, StatelessResetToken: 0x6e69ba69dc4b49ac977ab07b31407e6a} 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d5957a79de, StatelessResetToken: 0xd72a33fd8e9901c446632d6006dfbf9a} 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000cffafe03c0, StatelessResetToken: 0xfe180d3580c97d64e798576e5313fede} 2025/04/30 09:37:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:37:57 client -> Sending packet 1 (37 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.AckFrame{LargestAcked: 5841361, LowestAcked: 5841361, DelayTime: 101.82µs} 2025/04/30 09:37:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:37:57 client <- Reading packet 5841363 (106 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5841363, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:37:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000c6cd452251, StatelessResetToken: 0x6e69ba69dc4b49ac977ab07b31407e6a} 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d5957a79de, StatelessResetToken: 0xd72a33fd8e9901c446632d6006dfbf9a} 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000cffafe03c0, StatelessResetToken: 0xfe180d3580c97d64e798576e5313fede} 2025/04/30 09:37:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:37:57 client -> Sending packet 2 (37 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.AckFrame{LargestAcked: 5841363, LowestAcked: 5841361, AckRanges: {{Largest: 5841363, Smallest: 5841363}, {Largest: 5841361, Smallest: 5841361}}, DelayTime: 149.468µs} 2025/04/30 09:37:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:37:57 client -> Sending packet 4 (46 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:57 client Skipping packet number 3 2025/04/30 09:37:57 client -> Sending packet 5 (29 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:37:57 client <- Reading packet 5841364 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5841364, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:37:57 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 312µs} 2025/04/30 09:37:57 client newly acked packets (2): [4 5] 2025/04/30 09:37:57 client updated RTT: 32.959ms (σ: 12.976ms) 2025/04/30 09:37:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:37:57 client Canceling loss detection timer. 2025/04/30 09:37:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000d080f9f852, StatelessResetToken: 0x88d3474d53d1bb195ba14f152623b46f} 2025/04/30 09:37:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:37:57 client -> Sending packet 6 (1366 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.PingFrame{} 2025/04/30 09:37:57 client Sending ACK because the ACK timer expired. 2025/04/30 09:37:57 client -> Sending packet 7 (38 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:57 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:57 client -> &wire.AckFrame{LargestAcked: 5841364, LowestAcked: 5841361, AckRanges: {{Largest: 5841364, Smallest: 5841363}, {Largest: 5841361, Smallest: 5841361}}, DelayTime: 25.411561ms} 2025/04/30 09:37:57 client <- Reading packet 5841366 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5841366, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:37:57 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 21.408ms} 2025/04/30 09:37:57 client newly acked packets (1): [6] 2025/04/30 09:37:58 client <- Reading packet 5841372 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5841372, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:37:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:37:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:37:58 client -> Sending packet 8 (1409 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.PingFrame{} 2025/04/30 09:37:58 client -> Sending packet 9 (41 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.AckFrame{LargestAcked: 5841372, LowestAcked: 5841361, AckRanges: {{Largest: 5841372, Smallest: 5841372}, {Largest: 5841366, Smallest: 5841366}, {Largest: 5841364, Smallest: 5841363}, {Largest: 5841361, Smallest: 5841361}}, DelayTime: 182.671µs} 2025/04/30 09:37:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:37:58 client -> Sending packet 10 (30 bytes) for connection 2aa546aaf31f927804, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000c6cd452251, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:37:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:37:58 client Connection 2aa546aaf31f927804 closed. 2025/04/30 09:37:58 Requesting https://server4:443/usifmxncsd. 2025/04/30 09:37:58 Increased receive buffer size to 14336 kiB 2025/04/30 09:37:58 Increased send buffer size to 14336 kiB 2025/04/30 09:37:58 Setting DF for IPv4 and IPv6. 2025/04/30 09:37:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:37:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:37:58 Created qlog file: /logs/qlog/3ac58f63458ddcf7b9599c.sqlog 2025/04/30 09:37:58 client Starting new connection to server4 ([::]:59501 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3ac58f63458ddcf7b9599c, version v1 2025/04/30 09:37:58 Adding connection ID (empty). 2025/04/30 09:37:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:37:58 client -> Sending packet 0 (1280 bytes) for connection 3ac58f63458ddcf7b9599c, Initial 2025/04/30 09:37:58 client Long Header{Type: Initial, DestConnectionID: 3ac58f63458ddcf7b9599c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:37:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:37:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:37:58 client -> Sending packet 1 (1280 bytes) for connection 3ac58f63458ddcf7b9599c, Initial 2025/04/30 09:37:58 client Long Header{Type: Initial, DestConnectionID: 3ac58f63458ddcf7b9599c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:37:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:37:58 client -> Sending packet 2 (1280 bytes) for connection 3ac58f63458ddcf7b9599c, Initial 2025/04/30 09:37:58 client Long Header{Type: Initial, DestConnectionID: 3ac58f63458ddcf7b9599c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:37:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:37:58 client <- Reading packet 11122956 (1232 bytes) for connection (empty), Initial 2025/04/30 09:37:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000cc94741f8c, Token: (empty), PacketNumber: 11122956, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:37:58 client Received first packet. Switching destination connection ID to: 400000cc94741f8c 2025/04/30 09:37:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:37:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 840µs} 2025/04/30 09:37:58 client -> Sending packet 3 (1280 bytes) for connection 3ac58f63458ddcf7b9599c, Initial 2025/04/30 09:37:58 client Long Header{Type: Initial, DestConnectionID: 400000cc94741f8c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:37:58 client -> &wire.AckFrame{LargestAcked: 11122956, LowestAcked: 11122956, DelayTime: 0s} 2025/04/30 09:37:58 client <- Reading packet 11122956 (757 bytes) for connection (empty), Handshake 2025/04/30 09:37:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000cc94741f8c, PacketNumber: 11122956, PacketNumberLen: 4, Length: 740, Version: v1} 2025/04/30 09:37:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:37:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3ac58f63458ddcf7b9599c, InitialSourceConnectionID: 400000cc94741f8c, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf962bf22ab99053fdb1ddc68308b20f7, MaxDatagramFrameSize: 65535} 2025/04/30 09:37:58 client -> Sending packet 0 (82 bytes) for connection 3ac58f63458ddcf7b9599c, Handshake 2025/04/30 09:37:58 client Long Header{Type: Handshake, DestConnectionID: 400000cc94741f8c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:37:58 client -> &wire.AckFrame{LargestAcked: 11122956, LowestAcked: 11122956, DelayTime: 0s} 2025/04/30 09:37:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:58 client Dropping Initial keys. 2025/04/30 09:37:58 client -> Sending packet 0 (46 bytes) for connection 3ac58f63458ddcf7b9599c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000cc94741f8c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:58 client <- Reading packet 11122957 (38 bytes) for connection (empty), Handshake 2025/04/30 09:37:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000cc94741f8c, PacketNumber: 11122957, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:37:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/04/30 09:37:58 client Peer doesn't await address validation any longer. 2025/04/30 09:37:58 client newly acked packets (1): [0] 2025/04/30 09:37:58 client updated RTT: 31.202852ms (σ: 15.601426ms) 2025/04/30 09:37:58 client Canceling loss detection timer. 2025/04/30 09:37:58 client <- Reading packet 11122958 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:58 client Short Header{DestConnectionID: (empty), PacketNumber: 11122958, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:37:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:37:58 client Dropping Handshake keys. 2025/04/30 09:37:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000df547eb5e9, StatelessResetToken: 0x65df8d873777e43f2b5595a52f839616} 2025/04/30 09:37:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000dad5dc1f5a, StatelessResetToken: 0xc24825c029b694b0e0c6ea265287210e} 2025/04/30 09:37:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000da9e576df7, StatelessResetToken: 0xa99f389c4f356eee3a7cf03d90551e85} 2025/04/30 09:37:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:37:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:37:58 client -> Sending packet 2 (56 bytes) for connection 3ac58f63458ddcf7b9599c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000df547eb5e9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.AckFrame{LargestAcked: 11122958, LowestAcked: 11122958, DelayTime: 144.63µs} 2025/04/30 09:37:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:37:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:58 client -> Sending packet 3 (48 bytes) for connection 3ac58f63458ddcf7b9599c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000df547eb5e9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:37:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:58 client <- Reading packet 11122959 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:58 client Short Header{DestConnectionID: (empty), PacketNumber: 11122959, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:37:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 288µs} 2025/04/30 09:37:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000ce73fbc67e, StatelessResetToken: 0x4d7070b92e5f3efe7ca10deaee3ee8d4} 2025/04/30 09:37:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:37:58 client Sending ACK because the ACK timer expired. 2025/04/30 09:37:58 client -> Sending packet 4 (36 bytes) for connection 3ac58f63458ddcf7b9599c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000df547eb5e9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.AckFrame{LargestAcked: 11122959, LowestAcked: 11122958, DelayTime: 25.293776ms} 2025/04/30 09:37:58 client <- Reading packet 11122962 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:58 client Short Header{DestConnectionID: (empty), PacketNumber: 11122962, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:37:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:37:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 65.288ms} 2025/04/30 09:37:58 client newly acked packets (1): [3] 2025/04/30 09:37:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:37:58 client Canceling loss detection timer. 2025/04/30 09:37:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:37:58 client -> Sending packet 5 (37 bytes) for connection 3ac58f63458ddcf7b9599c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000df547eb5e9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.AckFrame{LargestAcked: 11122962, LowestAcked: 11122958, AckRanges: {{Largest: 11122962, Smallest: 11122962}, {Largest: 11122959, Smallest: 11122958}}, DelayTime: 132.567µs} 2025/04/30 09:37:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:37:58 client -> Sending packet 6 (30 bytes) for connection 3ac58f63458ddcf7b9599c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:58 client Short Header{DestConnectionID: 400000df547eb5e9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:37:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:37:58 client Connection 3ac58f63458ddcf7b9599c closed. 2025/04/30 09:37:58 Requesting https://server4:443/ykxqergazm. 2025/04/30 09:37:58 Increased receive buffer size to 14336 kiB 2025/04/30 09:37:58 Increased send buffer size to 14336 kiB 2025/04/30 09:37:58 Setting DF for IPv4 and IPv6. 2025/04/30 09:37:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:37:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:37:58 Created qlog file: /logs/qlog/351b4352065a2ac5f199031c63256872ff.sqlog 2025/04/30 09:37:58 client Starting new connection to server4 ([::]:47216 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 351b4352065a2ac5f199031c63256872ff, version v1 2025/04/30 09:37:58 Adding connection ID (empty). 2025/04/30 09:37:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:37:58 client -> Sending packet 0 (1280 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Initial 2025/04/30 09:37:58 client Long Header{Type: Initial, DestConnectionID: 351b4352065a2ac5f199031c63256872ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:37:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:37:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:37:59 client -> Sending packet 1 (1280 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Initial 2025/04/30 09:37:59 client Long Header{Type: Initial, DestConnectionID: 351b4352065a2ac5f199031c63256872ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:37:59 client -> Sending packet 2 (1280 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Initial 2025/04/30 09:37:59 client Long Header{Type: Initial, DestConnectionID: 351b4352065a2ac5f199031c63256872ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:37:59 client <- Reading packet 15943308 (1232 bytes) for connection (empty), Initial 2025/04/30 09:37:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000000fd59aed01, Token: (empty), PacketNumber: 15943308, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:37:59 client Received first packet. Switching destination connection ID to: 4000000fd59aed01 2025/04/30 09:37:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:37:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 888µs} 2025/04/30 09:37:59 client -> Sending packet 3 (1280 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Initial 2025/04/30 09:37:59 client Long Header{Type: Initial, DestConnectionID: 4000000fd59aed01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:37:59 client -> &wire.AckFrame{LargestAcked: 15943308, LowestAcked: 15943308, DelayTime: 0s} 2025/04/30 09:37:59 client <- Reading packet 15943310 (763 bytes) for connection (empty), Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000fd59aed01, PacketNumber: 15943310, PacketNumberLen: 4, Length: 746, Version: v1} 2025/04/30 09:37:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 09:37:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 351b4352065a2ac5f199031c63256872ff, InitialSourceConnectionID: 4000000fd59aed01, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x361457ef2268c2026740515fe02197cd, MaxDatagramFrameSize: 65535} 2025/04/30 09:37:59 client -> Sending packet 0 (82 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: 4000000fd59aed01, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:37:59 client -> &wire.AckFrame{LargestAcked: 15943310, LowestAcked: 15943310, DelayTime: 0s} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:59 client Dropping Initial keys. 2025/04/30 09:37:59 client -> Sending packet 0 (46 bytes) for connection 351b4352065a2ac5f199031c63256872ff, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:59 client Short Header{DestConnectionID: 4000000fd59aed01, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:37:59 client <- Reading packet 15943312 (763 bytes) for connection (empty), Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000fd59aed01, PacketNumber: 15943312, PacketNumberLen: 4, Length: 746, Version: v1} 2025/04/30 09:37:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 09:37:59 client -> Sending packet 1 (45 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: 4000000fd59aed01, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:37:59 client -> &wire.AckFrame{LargestAcked: 15943312, LowestAcked: 15943310, AckRanges: {{Largest: 15943312, Smallest: 15943312}, {Largest: 15943310, Smallest: 15943310}}, DelayTime: 0s} 2025/04/30 09:37:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:37:59 client -> Sending packet 2 (74 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: 4000000fd59aed01, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:59 client -> Sending packet 3 (74 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: 4000000fd59aed01, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:37:59 client -> Sending packet 4 (74 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: 4000000fd59aed01, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:59 client -> Sending packet 5 (74 bytes) for connection 351b4352065a2ac5f199031c63256872ff, Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: 4000000fd59aed01, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:59 client <- Reading packet 15943313 (40 bytes) for connection (empty), Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000fd59aed01, PacketNumber: 15943313, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 09:37:59 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 400µs} 2025/04/30 09:37:59 client Peer doesn't await address validation any longer. 2025/04/30 09:37:59 client <- Reading packet 15943308 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:59 client Short Header{DestConnectionID: (empty), PacketNumber: 15943308, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:37:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 601.288ms} 2025/04/30 09:37:59 client newly acked packets (1): [0] 2025/04/30 09:37:59 client updated RTT: 631.879445ms (σ: 315.939722ms) 2025/04/30 09:37:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:37:59 client Canceling loss detection timer. 2025/04/30 09:37:59 client Dropping Handshake keys. 2025/04/30 09:37:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:37:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001311c922e9, StatelessResetToken: 0xd4afb0801e1c1446f71fd9503b20c972} 2025/04/30 09:37:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000001aa0d443da, StatelessResetToken: 0xd39916f7d2ab804ed8dba5de4cbda714} 2025/04/30 09:37:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000022bb1acc2, StatelessResetToken: 0xda6a7823e79cbccb2e0374c2eaa1355a} 2025/04/30 09:37:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:37:59 client -> Sending packet 1 (37 bytes) for connection 351b4352065a2ac5f199031c63256872ff, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:59 client Short Header{DestConnectionID: 4000001311c922e9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:59 client -> &wire.AckFrame{LargestAcked: 15943308, LowestAcked: 15943308, DelayTime: 193.657µs} 2025/04/30 09:37:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:37:59 client Dropping %!s(logging.PacketType=1) packet (41 bytes) because we already dropped the keys. 2025/04/30 09:37:59 client <- Reading packet 15943309 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:37:59 client Short Header{DestConnectionID: (empty), PacketNumber: 15943309, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:37:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:37:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:37:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:37:59 client -> Sending packet 2 (30 bytes) for connection 351b4352065a2ac5f199031c63256872ff, 1-RTT (ECN: Not-ECT) 2025/04/30 09:37:59 client Short Header{DestConnectionID: 4000001311c922e9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:37:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:37:59 client Connection 351b4352065a2ac5f199031c63256872ff closed. 2025/04/30 09:37:59 Requesting https://server4:443/plnqrgghdi. 2025/04/30 09:37:59 Increased receive buffer size to 14336 kiB 2025/04/30 09:37:59 Increased send buffer size to 14336 kiB 2025/04/30 09:37:59 Setting DF for IPv4 and IPv6. 2025/04/30 09:37:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:37:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:37:59 Created qlog file: /logs/qlog/f02650d0c16c7bba.sqlog 2025/04/30 09:37:59 client Starting new connection to server4 ([::]:54774 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f02650d0c16c7bba, version v1 2025/04/30 09:37:59 Adding connection ID (empty). 2025/04/30 09:37:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:37:59 client -> Sending packet 0 (1280 bytes) for connection f02650d0c16c7bba, Initial 2025/04/30 09:37:59 client Long Header{Type: Initial, DestConnectionID: f02650d0c16c7bba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:37:59 client <- Reading packet 6064747 (1232 bytes) for connection (empty), Initial 2025/04/30 09:37:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000118e442cda, Token: (empty), PacketNumber: 6064747, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:37:59 client Received first packet. Switching destination connection ID to: 400000118e442cda 2025/04/30 09:37:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:37:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 688µs} 2025/04/30 09:37:59 client newly acked packets (1): [0] 2025/04/30 09:37:59 client updated RTT: 33.34565ms (σ: 16.672825ms) 2025/04/30 09:37:59 client -> Sending packet 1 (1280 bytes) for connection f02650d0c16c7bba, Initial 2025/04/30 09:37:59 client Long Header{Type: Initial, DestConnectionID: 400000118e442cda, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:37:59 client -> &wire.AckFrame{LargestAcked: 6064747, LowestAcked: 6064747, DelayTime: 0s} 2025/04/30 09:37:59 client <- Reading packet 6064747 (754 bytes) for connection (empty), Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000118e442cda, PacketNumber: 6064747, PacketNumberLen: 3, Length: 737, Version: v1} 2025/04/30 09:37:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:37:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:37:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f02650d0c16c7bba, InitialSourceConnectionID: 400000118e442cda, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xb742ee85a4410e6b54bedb7b44f8faa5, MaxDatagramFrameSize: 65535} 2025/04/30 09:37:59 client -> Sending packet 0 (82 bytes) for connection f02650d0c16c7bba, Handshake 2025/04/30 09:37:59 client Long Header{Type: Handshake, DestConnectionID: 400000118e442cda, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:37:59 client -> &wire.AckFrame{LargestAcked: 6064747, LowestAcked: 6064747, DelayTime: 0s} 2025/04/30 09:37:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:37:59 client Dropping Initial keys. 2025/04/30 09:37:59 client -> Sending packet 0 (46 bytes) for connection f02650d0c16c7bba, 1-RTT (ECN: ECT(0)) 2025/04/30 09:37:59 client Short Header{DestConnectionID: 400000118e442cda, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:37:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:00 client -> Sending packet 1 (74 bytes) for connection f02650d0c16c7bba, Handshake 2025/04/30 09:38:00 client Long Header{Type: Handshake, DestConnectionID: 400000118e442cda, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:00 client -> Sending packet 2 (74 bytes) for connection f02650d0c16c7bba, Handshake 2025/04/30 09:38:00 client Long Header{Type: Handshake, DestConnectionID: 400000118e442cda, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:00 client <- Reading packet 6064750 (106 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6064750, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:00 client Dropping Handshake keys. 2025/04/30 09:38:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000015edc21104, StatelessResetToken: 0x8f9c707daa2e9a28fbb168a0aead45c8} 2025/04/30 09:38:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000173afadff4, StatelessResetToken: 0x69b12f5444c462391761b43ab55fc4e8} 2025/04/30 09:38:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000012d7d553a7, StatelessResetToken: 0x1df5ac691228be049481f384fe857159} 2025/04/30 09:38:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:00 client -> Sending packet 1 (37 bytes) for connection f02650d0c16c7bba, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:00 client Short Header{DestConnectionID: 40000015edc21104, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:00 client -> &wire.AckFrame{LargestAcked: 6064750, LowestAcked: 6064750, DelayTime: 149.69µs} 2025/04/30 09:38:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:00 client <- Reading packet 6064754 (1081 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6064754, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000019a724107b, StatelessResetToken: 0xdd039d1a471ddc78cec02f58e61688ba} 2025/04/30 09:38:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 79.76ms} 2025/04/30 09:38:00 client newly acked packets (2): [0 1] 2025/04/30 09:38:00 client updated RTT: 39.958ms (σ: 25.73ms) 2025/04/30 09:38:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:00 client Canceling loss detection timer. 2025/04/30 09:38:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:00 client Ignoring all packets below 6064751. 2025/04/30 09:38:00 client -> Sending packet 2 (35 bytes) for connection f02650d0c16c7bba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:00 client Short Header{DestConnectionID: 40000015edc21104, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:00 client -> &wire.AckFrame{LargestAcked: 6064754, LowestAcked: 6064754, DelayTime: 181.649µs} 2025/04/30 09:38:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:00 client -> Sending packet 3 (30 bytes) for connection f02650d0c16c7bba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:00 client Short Header{DestConnectionID: 40000015edc21104, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:00 client Connection f02650d0c16c7bba closed. 2025/04/30 09:38:00 Requesting https://server4:443/myhxdnlpuf. 2025/04/30 09:38:00 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:00 Increased send buffer size to 14336 kiB 2025/04/30 09:38:00 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:00 Created qlog file: /logs/qlog/953bcdd5e595d6a8c5cd3533.sqlog 2025/04/30 09:38:00 client Starting new connection to server4 ([::]:55949 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 953bcdd5e595d6a8c5cd3533, version v1 2025/04/30 09:38:00 Adding connection ID (empty). 2025/04/30 09:38:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:00 client -> Sending packet 0 (1280 bytes) for connection 953bcdd5e595d6a8c5cd3533, Initial 2025/04/30 09:38:00 client Long Header{Type: Initial, DestConnectionID: 953bcdd5e595d6a8c5cd3533, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:38:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:00 client -> Sending packet 1 (1280 bytes) for connection 953bcdd5e595d6a8c5cd3533, Initial 2025/04/30 09:38:00 client Long Header{Type: Initial, DestConnectionID: 953bcdd5e595d6a8c5cd3533, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:38:00 client -> Sending packet 2 (1280 bytes) for connection 953bcdd5e595d6a8c5cd3533, Initial 2025/04/30 09:38:00 client Long Header{Type: Initial, DestConnectionID: 953bcdd5e595d6a8c5cd3533, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:38:00 client <- Reading packet 15147109 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000544dbd7f9f, Token: (empty), PacketNumber: 15147109, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:00 client Received first packet. Switching destination connection ID to: 400000544dbd7f9f 2025/04/30 09:38:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 09:38:00 client -> Sending packet 3 (1280 bytes) for connection 953bcdd5e595d6a8c5cd3533, Initial 2025/04/30 09:38:00 client Long Header{Type: Initial, DestConnectionID: 400000544dbd7f9f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:00 client -> &wire.AckFrame{LargestAcked: 15147109, LowestAcked: 15147109, DelayTime: 0s} 2025/04/30 09:38:00 client <- Reading packet 15147111 (758 bytes) for connection (empty), Handshake 2025/04/30 09:38:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000544dbd7f9f, PacketNumber: 15147111, PacketNumberLen: 4, Length: 741, Version: v1} 2025/04/30 09:38:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 953bcdd5e595d6a8c5cd3533, InitialSourceConnectionID: 400000544dbd7f9f, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x545cf129edcfb6cc634d0e2401e98435, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:00 client -> Sending packet 0 (82 bytes) for connection 953bcdd5e595d6a8c5cd3533, Handshake 2025/04/30 09:38:00 client Long Header{Type: Handshake, DestConnectionID: 400000544dbd7f9f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:00 client -> &wire.AckFrame{LargestAcked: 15147111, LowestAcked: 15147111, DelayTime: 0s} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:00 client Dropping Initial keys. 2025/04/30 09:38:00 client -> Sending packet 0 (46 bytes) for connection 953bcdd5e595d6a8c5cd3533, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:00 client Short Header{DestConnectionID: 400000544dbd7f9f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:00 client <- Reading packet 15147110 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:00 client Short Header{DestConnectionID: (empty), PacketNumber: 15147110, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 528µs} 2025/04/30 09:38:00 client Peer doesn't await address validation any longer. 2025/04/30 09:38:00 client newly acked packets (1): [0] 2025/04/30 09:38:00 client updated RTT: 31.176934ms (σ: 15.588467ms) 2025/04/30 09:38:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:00 client Canceling loss detection timer. 2025/04/30 09:38:00 client Dropping Handshake keys. 2025/04/30 09:38:00 client <- Reading packet 15147111 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:00 client Short Header{DestConnectionID: (empty), PacketNumber: 15147111, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:00 client -> Sending packet 1 (35 bytes) for connection 953bcdd5e595d6a8c5cd3533, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:00 client Short Header{DestConnectionID: 400000544dbd7f9f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:00 client -> &wire.AckFrame{LargestAcked: 15147111, LowestAcked: 15147110, DelayTime: 70.231µs} 2025/04/30 09:38:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:00 client -> Sending packet 2 (30 bytes) for connection 953bcdd5e595d6a8c5cd3533, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:00 client Short Header{DestConnectionID: 400000544dbd7f9f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:00 client Connection 953bcdd5e595d6a8c5cd3533 closed. 2025/04/30 09:38:00 Requesting https://server4:443/kvkigybgvf. 2025/04/30 09:38:00 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:00 Increased send buffer size to 14336 kiB 2025/04/30 09:38:00 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:00 Created qlog file: /logs/qlog/879d70c0c863e8e248e9.sqlog 2025/04/30 09:38:00 client Starting new connection to server4 ([::]:60575 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 879d70c0c863e8e248e9, version v1 2025/04/30 09:38:00 Adding connection ID (empty). 2025/04/30 09:38:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:00 client -> Sending packet 0 (1280 bytes) for connection 879d70c0c863e8e248e9, Initial 2025/04/30 09:38:00 client Long Header{Type: Initial, DestConnectionID: 879d70c0c863e8e248e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:00 client -> Sending packet 1 (1280 bytes) for connection 879d70c0c863e8e248e9, Initial 2025/04/30 09:38:00 client Long Header{Type: Initial, DestConnectionID: 879d70c0c863e8e248e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:00 client -> Sending packet 2 (1280 bytes) for connection 879d70c0c863e8e248e9, Initial 2025/04/30 09:38:00 client Long Header{Type: Initial, DestConnectionID: 879d70c0c863e8e248e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:38:01 client -> Sending packet 3 (1280 bytes) for connection 879d70c0c863e8e248e9, Initial 2025/04/30 09:38:01 client Long Header{Type: Initial, DestConnectionID: 879d70c0c863e8e248e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:01 client -> Sending packet 4 (1280 bytes) for connection 879d70c0c863e8e248e9, Initial 2025/04/30 09:38:01 client Long Header{Type: Initial, DestConnectionID: 879d70c0c863e8e248e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:01 client <- Reading packet 5951132 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000001655b11075, Token: (empty), PacketNumber: 5951132, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:01 client Received first packet. Switching destination connection ID to: 4000001655b11075 2025/04/30 09:38:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 792µs} 2025/04/30 09:38:01 client -> Sending packet 5 (1280 bytes) for connection 879d70c0c863e8e248e9, Initial 2025/04/30 09:38:01 client Long Header{Type: Initial, DestConnectionID: 4000001655b11075, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 5951132, LowestAcked: 5951132, DelayTime: 0s} 2025/04/30 09:38:01 client <- Reading packet 5951136 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001655b11075, PacketNumber: 5951136, PacketNumberLen: 3, Length: 737, Version: v1} 2025/04/30 09:38:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:38:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 879d70c0c863e8e248e9, InitialSourceConnectionID: 4000001655b11075, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x2960bdcf5d70b47c25a52218924d6b99, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:01 client -> Sending packet 0 (82 bytes) for connection 879d70c0c863e8e248e9, Handshake 2025/04/30 09:38:01 client Long Header{Type: Handshake, DestConnectionID: 4000001655b11075, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 5951136, LowestAcked: 5951136, DelayTime: 0s} 2025/04/30 09:38:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:01 client Dropping Initial keys. 2025/04/30 09:38:01 client -> Sending packet 0 (46 bytes) for connection 879d70c0c863e8e248e9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 4000001655b11075, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:01 client <- Reading packet 5951137 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001655b11075, PacketNumber: 5951137, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 09:38:01 client Peer doesn't await address validation any longer. 2025/04/30 09:38:01 client newly acked packets (1): [0] 2025/04/30 09:38:01 client updated RTT: 31.04171ms (σ: 15.520855ms) 2025/04/30 09:38:01 client Canceling loss detection timer. 2025/04/30 09:38:01 client <- Reading packet 5951132 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5951132, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:01 client Dropping Handshake keys. 2025/04/30 09:38:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001233213182, StatelessResetToken: 0xa2e653da631ad787f9171fc12729c8f2} 2025/04/30 09:38:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000000c8e0711b4, StatelessResetToken: 0x768509485fc449a0d49a593f8d068c0b} 2025/04/30 09:38:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000bb324d9c8, StatelessResetToken: 0x6403e8cf3fe2b572fb3f146fede72a48} 2025/04/30 09:38:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:01 client -> Sending packet 1 (37 bytes) for connection 879d70c0c863e8e248e9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 4000001233213182, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 5951132, LowestAcked: 5951132, DelayTime: 173.855µs} 2025/04/30 09:38:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:01 client <- Reading packet 5951133 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5951133, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 176µs} 2025/04/30 09:38:01 client newly acked packets (1): [1] 2025/04/30 09:38:01 client updated RTT: 31.023ms (σ: 11.674ms) 2025/04/30 09:38:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:01 client lost packet 0 (time threshold) 2025/04/30 09:38:01 client Canceling loss detection timer. 2025/04/30 09:38:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000000164831c9e, StatelessResetToken: 0x1ed7e65190100f7f0b3950d26f47078f} 2025/04/30 09:38:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:01 client Ignoring all packets below 5951133. 2025/04/30 09:38:01 client -> Sending packet 2 (54 bytes) for connection 879d70c0c863e8e248e9, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 4000001233213182, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 5951133, LowestAcked: 5951133, DelayTime: 172.742µs} 2025/04/30 09:38:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:01 client <- Reading packet 5951134 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5951134, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 336µs} 2025/04/30 09:38:01 client newly acked packets (1): [2] 2025/04/30 09:38:01 client updated RTT: 31.083ms (σ: 8.876ms) 2025/04/30 09:38:01 client Canceling loss detection timer. 2025/04/30 09:38:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:01 client Ignoring all packets below 5951134. 2025/04/30 09:38:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:01 client -> Sending packet 3 (30 bytes) for connection 879d70c0c863e8e248e9, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 4000001233213182, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:01 client Connection 879d70c0c863e8e248e9 closed. 2025/04/30 09:38:01 Requesting https://server4:443/wrvkcfthaf. 2025/04/30 09:38:01 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:01 Increased send buffer size to 14336 kiB 2025/04/30 09:38:01 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:01 Created qlog file: /logs/qlog/907520814931a95ab5d2c188e2.sqlog 2025/04/30 09:38:01 client Starting new connection to server4 ([::]:57784 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 907520814931a95ab5d2c188e2, version v1 2025/04/30 09:38:01 Adding connection ID (empty). 2025/04/30 09:38:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:01 client -> Sending packet 0 (1280 bytes) for connection 907520814931a95ab5d2c188e2, Initial 2025/04/30 09:38:01 client Long Header{Type: Initial, DestConnectionID: 907520814931a95ab5d2c188e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:38:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:38:01 client Queueing packet (757 bytes) for later decryption 2025/04/30 09:38:01 client <- Reading packet 3308060 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004a79ab6417, Token: (empty), PacketNumber: 3308060, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:01 client Received first packet. Switching destination connection ID to: 4000004a79ab6417 2025/04/30 09:38:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 119.968ms} 2025/04/30 09:38:01 client newly acked packets (1): [0] 2025/04/30 09:38:01 client updated RTT: 152.83189ms (σ: 76.415945ms) 2025/04/30 09:38:01 client -> Sending packet 1 (1280 bytes) for connection 907520814931a95ab5d2c188e2, Initial 2025/04/30 09:38:01 client Long Header{Type: Initial, DestConnectionID: 4000004a79ab6417, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 3308060, LowestAcked: 3308060, DelayTime: 0s} 2025/04/30 09:38:01 client <- Reading packet 3308058 (757 bytes) for connection (empty), Handshake 2025/04/30 09:38:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004a79ab6417, PacketNumber: 3308058, PacketNumberLen: 3, Length: 740, Version: v1} 2025/04/30 09:38:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 907520814931a95ab5d2c188e2, InitialSourceConnectionID: 4000004a79ab6417, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x4dd69ba2ea3d55dd255dac4da1969cab, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:01 client <- Reading packet 3308060 (757 bytes) for connection (empty), Handshake 2025/04/30 09:38:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004a79ab6417, PacketNumber: 3308060, PacketNumberLen: 3, Length: 740, Version: v1} 2025/04/30 09:38:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:01 client -> Sending packet 0 (84 bytes) for connection 907520814931a95ab5d2c188e2, Handshake 2025/04/30 09:38:01 client Long Header{Type: Handshake, DestConnectionID: 4000004a79ab6417, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 3308060, LowestAcked: 3308058, AckRanges: {{Largest: 3308060, Smallest: 3308060}, {Largest: 3308058, Smallest: 3308058}}, DelayTime: 0s} 2025/04/30 09:38:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:01 client Dropping Initial keys. 2025/04/30 09:38:01 client -> Sending packet 0 (46 bytes) for connection 907520814931a95ab5d2c188e2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 4000004a79ab6417, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:01 client <- Reading packet 3308061 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004a79ab6417, PacketNumber: 3308061, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 352µs} 2025/04/30 09:38:01 client Peer doesn't await address validation any longer. 2025/04/30 09:38:01 client newly acked packets (1): [0] 2025/04/30 09:38:01 client updated RTT: 137.684ms (σ: 87.605ms) 2025/04/30 09:38:01 client Canceling loss detection timer. 2025/04/30 09:38:01 client <- Reading packet 3308058 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3308058, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:01 client Dropping Handshake keys. 2025/04/30 09:38:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000053ac9f27d2, StatelessResetToken: 0x1883b90a238a550c451b4046a18f7d40} 2025/04/30 09:38:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000005e44a911a6, StatelessResetToken: 0x33afdc84c77d1e0174c7126b02372986} 2025/04/30 09:38:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000005776b56710, StatelessResetToken: 0xbcc09e34b3002cfe2da085f3dda42f5c} 2025/04/30 09:38:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:01 client -> Sending packet 1 (37 bytes) for connection 907520814931a95ab5d2c188e2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 40000053ac9f27d2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 3308058, LowestAcked: 3308058, DelayTime: 191.777µs} 2025/04/30 09:38:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:01 client <- Reading packet 3308060 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3308060, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 09:38:01 client newly acked packets (2): [0 1] 2025/04/30 09:38:01 client updated RTT: 124.316ms (σ: 92.439ms) 2025/04/30 09:38:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:01 client Canceling loss detection timer. 2025/04/30 09:38:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000004c5fa9da8f, StatelessResetToken: 0x6c765a3c85063b114d5d1657524815bc} 2025/04/30 09:38:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:01 client Ignoring all packets below 3308059. 2025/04/30 09:38:01 client -> Sending packet 2 (35 bytes) for connection 907520814931a95ab5d2c188e2, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 40000053ac9f27d2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 3308060, LowestAcked: 3308060, DelayTime: 148.307µs} 2025/04/30 09:38:01 client <- Reading packet 3308063 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3308063, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 90.56ms} 2025/04/30 09:38:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:01 client -> Sending packet 3 (37 bytes) for connection 907520814931a95ab5d2c188e2, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 40000053ac9f27d2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.AckFrame{LargestAcked: 3308063, LowestAcked: 3308060, AckRanges: {{Largest: 3308063, Smallest: 3308063}, {Largest: 3308060, Smallest: 3308060}}, DelayTime: 118.12µs} 2025/04/30 09:38:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:01 client -> Sending packet 4 (30 bytes) for connection 907520814931a95ab5d2c188e2, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:01 client Short Header{DestConnectionID: 40000053ac9f27d2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:01 client Connection 907520814931a95ab5d2c188e2 closed. 2025/04/30 09:38:01 Requesting https://server4:443/ficporevct. 2025/04/30 09:38:01 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:01 Increased send buffer size to 14336 kiB 2025/04/30 09:38:01 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:01 Created qlog file: /logs/qlog/1df701005975062ed0a203.sqlog 2025/04/30 09:38:01 client Starting new connection to server4 ([::]:40933 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1df701005975062ed0a203, version v1 2025/04/30 09:38:01 Adding connection ID (empty). 2025/04/30 09:38:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:01 client -> Sending packet 0 (1280 bytes) for connection 1df701005975062ed0a203, Initial 2025/04/30 09:38:01 client Long Header{Type: Initial, DestConnectionID: 1df701005975062ed0a203, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:38:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:02 client -> Sending packet 1 (1280 bytes) for connection 1df701005975062ed0a203, Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: 1df701005975062ed0a203, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:02 client -> Sending packet 2 (1280 bytes) for connection 1df701005975062ed0a203, Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: 1df701005975062ed0a203, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:02 client <- Reading packet 3483781 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c4f67efcd3, Token: (empty), PacketNumber: 3483781, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:02 client Received first packet. Switching destination connection ID to: 400000c4f67efcd3 2025/04/30 09:38:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 808µs} 2025/04/30 09:38:02 client newly acked packets (1): [2] 2025/04/30 09:38:02 client updated RTT: 34.652039ms (σ: 17.326019ms) 2025/04/30 09:38:02 client -> Sending packet 3 (1280 bytes) for connection 1df701005975062ed0a203, Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: 400000c4f67efcd3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:02 client -> &wire.AckFrame{LargestAcked: 3483781, LowestAcked: 3483781, DelayTime: 0s} 2025/04/30 09:38:02 client <- Reading packet 3483781 (756 bytes) for connection (empty), Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c4f67efcd3, PacketNumber: 3483781, PacketNumberLen: 3, Length: 739, Version: v1} 2025/04/30 09:38:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:38:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1df701005975062ed0a203, InitialSourceConnectionID: 400000c4f67efcd3, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1d12c369383882f032bd03c27b28b6d7, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:02 client -> Sending packet 0 (82 bytes) for connection 1df701005975062ed0a203, Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: 400000c4f67efcd3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:02 client -> &wire.AckFrame{LargestAcked: 3483781, LowestAcked: 3483781, DelayTime: 0s} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:02 client Dropping Initial keys. 2025/04/30 09:38:02 client -> Sending packet 0 (46 bytes) for connection 1df701005975062ed0a203, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:02 client Short Header{DestConnectionID: 400000c4f67efcd3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:02 client -> Sending packet 1 (74 bytes) for connection 1df701005975062ed0a203, Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: 400000c4f67efcd3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:02 client -> Sending packet 2 (74 bytes) for connection 1df701005975062ed0a203, Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: 400000c4f67efcd3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:02 client <- Reading packet 3483783 (756 bytes) for connection (empty), Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c4f67efcd3, PacketNumber: 3483783, PacketNumberLen: 3, Length: 739, Version: v1} 2025/04/30 09:38:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:38:02 client -> Sending packet 3 (45 bytes) for connection 1df701005975062ed0a203, Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: 400000c4f67efcd3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:02 client -> &wire.AckFrame{LargestAcked: 3483783, LowestAcked: 3483781, AckRanges: {{Largest: 3483783, Smallest: 3483783}, {Largest: 3483781, Smallest: 3483781}}, DelayTime: 0s} 2025/04/30 09:38:02 client <- Reading packet 3483781 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3483781, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:02 client Dropping Handshake keys. 2025/04/30 09:38:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000da042eb740, StatelessResetToken: 0x82d99285216a002e11a874de64db6a44} 2025/04/30 09:38:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d9034ac7df, StatelessResetToken: 0x125d9afa370ea27b6e92704f8d05457a} 2025/04/30 09:38:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ce50cc3548, StatelessResetToken: 0x1bce1bc17d4ced943bdd2eb16d9e2d52} 2025/04/30 09:38:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:02 client -> Sending packet 2 (56 bytes) for connection 1df701005975062ed0a203, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:02 client Short Header{DestConnectionID: 400000da042eb740, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:02 client -> &wire.AckFrame{LargestAcked: 3483781, LowestAcked: 3483781, DelayTime: 128.179µs} 2025/04/30 09:38:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:02 client -> Sending packet 3 (48 bytes) for connection 1df701005975062ed0a203, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:02 client Short Header{DestConnectionID: 400000da042eb740, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:02 client <- Reading packet 3483783 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3483783, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:02 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 392µs} 2025/04/30 09:38:02 client newly acked packets (1): [3] 2025/04/30 09:38:02 client updated RTT: 34.318ms (σ: 13.661ms) 2025/04/30 09:38:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:02 client Canceling loss detection timer. 2025/04/30 09:38:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:02 client -> Sending packet 4 (37 bytes) for connection 1df701005975062ed0a203, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:02 client Short Header{DestConnectionID: 400000da042eb740, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:02 client -> &wire.AckFrame{LargestAcked: 3483783, LowestAcked: 3483781, AckRanges: {{Largest: 3483783, Smallest: 3483783}, {Largest: 3483781, Smallest: 3483781}}, DelayTime: 158.826µs} 2025/04/30 09:38:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:02 client -> Sending packet 5 (30 bytes) for connection 1df701005975062ed0a203, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:02 client Short Header{DestConnectionID: 400000da042eb740, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:02 client Connection 1df701005975062ed0a203 closed. 2025/04/30 09:38:02 Requesting https://server4:443/jmeuguanwc. 2025/04/30 09:38:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:02 Increased send buffer size to 14336 kiB 2025/04/30 09:38:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:02 Created qlog file: /logs/qlog/c580615e7d66966a.sqlog 2025/04/30 09:38:02 client Starting new connection to server4 ([::]:60250 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c580615e7d66966a, version v1 2025/04/30 09:38:02 Adding connection ID (empty). 2025/04/30 09:38:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:02 client -> Sending packet 0 (1280 bytes) for connection c580615e7d66966a, Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: c580615e7d66966a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:38:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:02 client Queueing packet (755 bytes) for later decryption 2025/04/30 09:38:02 client <- Reading packet 12299463 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000164abda93a, Token: (empty), PacketNumber: 12299463, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:02 client Received first packet. Switching destination connection ID to: 400000164abda93a 2025/04/30 09:38:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 110.984ms} 2025/04/30 09:38:02 client newly acked packets (1): [0] 2025/04/30 09:38:02 client updated RTT: 143.752595ms (σ: 71.876297ms) 2025/04/30 09:38:02 client -> Sending packet 1 (1280 bytes) for connection c580615e7d66966a, Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: 400000164abda93a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:02 client -> &wire.AckFrame{LargestAcked: 12299463, LowestAcked: 12299463, DelayTime: 0s} 2025/04/30 09:38:02 client <- Reading packet 12299461 (755 bytes) for connection (empty), Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000164abda93a, PacketNumber: 12299461, PacketNumberLen: 4, Length: 738, Version: v1} 2025/04/30 09:38:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:38:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c580615e7d66966a, InitialSourceConnectionID: 400000164abda93a, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xe0c783d3d6101dede8d4d6bbdcde8204, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:02 client <- Reading packet 12299463 (755 bytes) for connection (empty), Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000164abda93a, PacketNumber: 12299463, PacketNumberLen: 4, Length: 738, Version: v1} 2025/04/30 09:38:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:38:02 client -> Sending packet 0 (84 bytes) for connection c580615e7d66966a, Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: 400000164abda93a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:38:02 client -> &wire.AckFrame{LargestAcked: 12299463, LowestAcked: 12299461, AckRanges: {{Largest: 12299463, Smallest: 12299463}, {Largest: 12299461, Smallest: 12299461}}, DelayTime: 0s} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:02 client Dropping Initial keys. 2025/04/30 09:38:02 client -> Sending packet 0 (46 bytes) for connection c580615e7d66966a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:02 client Short Header{DestConnectionID: 400000164abda93a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:02 client <- Reading packet 12299464 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000164abda93a, PacketNumber: 12299464, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 09:38:02 client Peer doesn't await address validation any longer. 2025/04/30 09:38:02 client newly acked packets (1): [0] 2025/04/30 09:38:02 client updated RTT: 129.755ms (σ: 81.899ms) 2025/04/30 09:38:02 client Canceling loss detection timer. 2025/04/30 09:38:02 client <- Reading packet 12299461 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:02 client Short Header{DestConnectionID: (empty), PacketNumber: 12299461, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:02 client Dropping Handshake keys. 2025/04/30 09:38:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000003d2a3286, StatelessResetToken: 0xbb648e5d219ada3c08c02471bba50522} 2025/04/30 09:38:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000192fe5cb38, StatelessResetToken: 0x5d04c4f3aeb928703590d6af00d4e254} 2025/04/30 09:38:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000008ca0c06ce, StatelessResetToken: 0xe7d73a87e6b9b21c05953429a077fd4b} 2025/04/30 09:38:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:02 client -> Sending packet 1 (37 bytes) for connection c580615e7d66966a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:02 client Short Header{DestConnectionID: 400000003d2a3286, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:02 client -> &wire.AckFrame{LargestAcked: 12299461, LowestAcked: 12299461, DelayTime: 205.804µs} 2025/04/30 09:38:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:02 client <- Reading packet 12299462 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:02 client Short Header{DestConnectionID: (empty), PacketNumber: 12299462, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:38:02 client newly acked packets (1): [0] 2025/04/30 09:38:02 client updated RTT: 117.551ms (σ: 85.831ms) 2025/04/30 09:38:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:02 client -> Sending packet 2 (30 bytes) for connection c580615e7d66966a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:02 client Short Header{DestConnectionID: 400000003d2a3286, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:02 client Connection c580615e7d66966a closed. 2025/04/30 09:38:02 Requesting https://server4:443/odohqtjoox. 2025/04/30 09:38:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:02 Increased send buffer size to 14336 kiB 2025/04/30 09:38:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:02 Created qlog file: /logs/qlog/d17010917cde8c55e9fad037.sqlog 2025/04/30 09:38:02 client Starting new connection to server4 ([::]:45542 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d17010917cde8c55e9fad037, version v1 2025/04/30 09:38:02 Adding connection ID (empty). 2025/04/30 09:38:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:02 client -> Sending packet 0 (1280 bytes) for connection d17010917cde8c55e9fad037, Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: d17010917cde8c55e9fad037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:02 client -> Sending packet 1 (1280 bytes) for connection d17010917cde8c55e9fad037, Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: d17010917cde8c55e9fad037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:02 client -> Sending packet 2 (1280 bytes) for connection d17010917cde8c55e9fad037, Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: d17010917cde8c55e9fad037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:02 client Queueing packet (758 bytes) for later decryption 2025/04/30 09:38:02 client <- Reading packet 15730012 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005bca916398, Token: (empty), PacketNumber: 15730012, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:02 client Received first packet. Switching destination connection ID to: 4000005bca916398 2025/04/30 09:38:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 109.448ms} 2025/04/30 09:38:02 client newly acked packets (1): [2] 2025/04/30 09:38:02 client updated RTT: 143.467411ms (σ: 71.733705ms) 2025/04/30 09:38:02 client Queueing packet (758 bytes) for later decryption 2025/04/30 09:38:03 client Queueing packet (758 bytes) for later decryption 2025/04/30 09:38:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:03 client <- Reading packet 15730016 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005bca916398, Token: (empty), PacketNumber: 15730016, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 730.664ms} 2025/04/30 09:38:03 client -> Sending packet 3 (1280 bytes) for connection d17010917cde8c55e9fad037, Initial 2025/04/30 09:38:03 client Long Header{Type: Initial, DestConnectionID: 4000005bca916398, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:03 client -> &wire.AckFrame{LargestAcked: 15730016, LowestAcked: 15730012, AckRanges: {{Largest: 15730016, Smallest: 15730016}, {Largest: 15730012, Smallest: 15730012}}, DelayTime: 0s} 2025/04/30 09:38:03 client <- Reading packet 15730010 (758 bytes) for connection (empty), Handshake 2025/04/30 09:38:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005bca916398, PacketNumber: 15730010, PacketNumberLen: 4, Length: 741, Version: v1} 2025/04/30 09:38:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d17010917cde8c55e9fad037, InitialSourceConnectionID: 4000005bca916398, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf85abb9a61ec87b1cc33649791658f44, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:03 client <- Reading packet 15730012 (758 bytes) for connection (empty), Handshake 2025/04/30 09:38:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005bca916398, PacketNumber: 15730012, PacketNumberLen: 4, Length: 741, Version: v1} 2025/04/30 09:38:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:03 client <- Reading packet 15730014 (758 bytes) for connection (empty), Handshake 2025/04/30 09:38:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005bca916398, PacketNumber: 15730014, PacketNumberLen: 4, Length: 741, Version: v1} 2025/04/30 09:38:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:03 client -> Sending packet 0 (132 bytes) for connection d17010917cde8c55e9fad037, Handshake 2025/04/30 09:38:03 client Long Header{Type: Handshake, DestConnectionID: 4000005bca916398, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 69, Version: v1} 2025/04/30 09:38:03 client -> &wire.AckFrame{LargestAcked: 15730014, LowestAcked: 15730010, AckRanges: {{Largest: 15730014, Smallest: 15730014}, {Largest: 15730012, Smallest: 15730012}, {Largest: 15730010, Smallest: 15730010}}, DelayTime: 0s} 2025/04/30 09:38:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:03 client Short Header{DestConnectionID: 4000005bca916398, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:03 client -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:03 client Dropping Initial keys. 2025/04/30 09:38:03 client -> Sending packet 1 (30 bytes) for connection d17010917cde8c55e9fad037, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:03 client Short Header{DestConnectionID: 4000005bca916398, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 17, Data length: 0, Offset + Data length: 17} 2025/04/30 09:38:03 client <- Reading packet 15730017 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005bca916398, PacketNumber: 15730017, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 504µs} 2025/04/30 09:38:03 client Peer doesn't await address validation any longer. 2025/04/30 09:38:03 client newly acked packets (1): [0] 2025/04/30 09:38:03 client updated RTT: 129.45ms (σ: 81.832ms) 2025/04/30 09:38:03 client Canceling loss detection timer. 2025/04/30 09:38:03 client <- Reading packet 15730010 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:03 client Short Header{DestConnectionID: (empty), PacketNumber: 15730010, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 568µs} 2025/04/30 09:38:03 client newly acked packets (1): [0] 2025/04/30 09:38:03 client updated RTT: 117.188ms (σ: 85.896ms) 2025/04/30 09:38:03 client Dropping Handshake keys. 2025/04/30 09:38:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000004294532df3, StatelessResetToken: 0x9866503e23e2e4ebb7a7351667026f6b} 2025/04/30 09:38:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000539b66f4ba, StatelessResetToken: 0x6bd0da6ba08ef61ad0df19829c5c6798} 2025/04/30 09:38:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000042024f22ee, StatelessResetToken: 0xe912807c2c575079c543239c5046d2a1} 2025/04/30 09:38:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:03 client -> Sending packet 2 (37 bytes) for connection d17010917cde8c55e9fad037, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:03 client Short Header{DestConnectionID: 4000004294532df3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:03 client -> &wire.AckFrame{LargestAcked: 15730010, LowestAcked: 15730010, DelayTime: 215.032µs} 2025/04/30 09:38:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:03 client <- Reading packet 15730011 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:03 client Short Header{DestConnectionID: (empty), PacketNumber: 15730011, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 672µs} 2025/04/30 09:38:03 client newly acked packets (1): [1] 2025/04/30 09:38:03 client updated RTT: 106.478ms (σ: 85.84ms) 2025/04/30 09:38:03 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:03 client -> Sending packet 3 (30 bytes) for connection d17010917cde8c55e9fad037, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:03 client Short Header{DestConnectionID: 4000004294532df3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:03 client Connection d17010917cde8c55e9fad037 closed. 2025/04/30 09:38:03 Requesting https://server4:443/nvggvjpwpz. 2025/04/30 09:38:03 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:03 Increased send buffer size to 14336 kiB 2025/04/30 09:38:03 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:03 Created qlog file: /logs/qlog/2801dcd57e3d9473fde394bceb0a88.sqlog 2025/04/30 09:38:03 client Starting new connection to server4 ([::]:41577 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2801dcd57e3d9473fde394bceb0a88, version v1 2025/04/30 09:38:03 Adding connection ID (empty). 2025/04/30 09:38:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:03 client -> Sending packet 0 (1280 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, Initial 2025/04/30 09:38:03 client Long Header{Type: Initial, DestConnectionID: 2801dcd57e3d9473fde394bceb0a88, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:03 client Queueing packet (762 bytes) for later decryption 2025/04/30 09:38:03 client <- Reading packet 8774541 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000047a96700dc, Token: (empty), PacketNumber: 8774541, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:03 client Received first packet. Switching destination connection ID to: 40000047a96700dc 2025/04/30 09:38:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 110.136ms} 2025/04/30 09:38:03 client newly acked packets (1): [0] 2025/04/30 09:38:03 client updated RTT: 142.804964ms (σ: 71.402482ms) 2025/04/30 09:38:03 client -> Sending packet 1 (1280 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, Initial 2025/04/30 09:38:03 client Long Header{Type: Initial, DestConnectionID: 40000047a96700dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:03 client -> &wire.AckFrame{LargestAcked: 8774541, LowestAcked: 8774541, DelayTime: 0s} 2025/04/30 09:38:03 client <- Reading packet 8774539 (762 bytes) for connection (empty), Handshake 2025/04/30 09:38:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000047a96700dc, PacketNumber: 8774539, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:38:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2801dcd57e3d9473fde394bceb0a88, InitialSourceConnectionID: 40000047a96700dc, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xfe9786e8101f2391745e0ac0d821f24c, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:03 client -> Sending packet 0 (82 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, Handshake 2025/04/30 09:38:03 client Long Header{Type: Handshake, DestConnectionID: 40000047a96700dc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:03 client -> &wire.AckFrame{LargestAcked: 8774539, LowestAcked: 8774539, DelayTime: 0s} 2025/04/30 09:38:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:03 client Dropping Initial keys. 2025/04/30 09:38:03 client -> Sending packet 0 (46 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:03 client Short Header{DestConnectionID: 40000047a96700dc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:03 client <- Reading packet 8774539 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:03 client Short Header{DestConnectionID: (empty), PacketNumber: 8774539, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:03 client Dropping Handshake keys. 2025/04/30 09:38:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000046830cb6ff, StatelessResetToken: 0x418fcbb4ee1000b79d898313068d0895} 2025/04/30 09:38:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000535c806375, StatelessResetToken: 0x73c354c74517ba2563e7cf1f9fe0cec3} 2025/04/30 09:38:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000449cd79feb, StatelessResetToken: 0x945a9d4b96afa77f503b92877ad884c4} 2025/04/30 09:38:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:03 client -> Sending packet 1 (37 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:03 client Short Header{DestConnectionID: 40000046830cb6ff, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:03 client -> &wire.AckFrame{LargestAcked: 8774539, LowestAcked: 8774539, DelayTime: 177.321µs} 2025/04/30 09:38:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:03 client <- Reading packet 8774540 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:03 client Short Header{DestConnectionID: (empty), PacketNumber: 8774540, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 184µs} 2025/04/30 09:38:03 client newly acked packets (1): [1] 2025/04/30 09:38:03 client updated RTT: 128.804ms (σ: 81.55ms) 2025/04/30 09:38:03 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:03 client setting loss timer for packet 0 (1-RTT) to 144.9045ms (in 2025-04-30 09:38:03.783093716 +0000 UTC m=+7.007819205) 2025/04/30 09:38:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000005f2151fec1, StatelessResetToken: 0x160de4210dc6e0f4e9774b939364cdbc} 2025/04/30 09:38:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:03 client Ignoring all packets below 8774540. 2025/04/30 09:38:03 client Sending ACK because the ACK timer expired. 2025/04/30 09:38:03 client -> Sending packet 2 (36 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:03 client Short Header{DestConnectionID: 40000046830cb6ff, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:03 client -> &wire.AckFrame{LargestAcked: 8774540, LowestAcked: 8774540, DelayTime: 25.387668ms} 2025/04/30 09:38:03 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:38:03.783093716 +0000 UTC m=+7.007819205 2025/04/30 09:38:03 client lost packet 0 (time threshold) 2025/04/30 09:38:03 client Canceling loss detection timer. 2025/04/30 09:38:03 client -> Sending packet 3 (46 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:03 client Short Header{DestConnectionID: 40000046830cb6ff, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:04 client -> Sending packet 5 (46 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000046830cb6ff, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:04 client -> Sending packet 6 (46 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000046830cb6ff, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:04 client <- Reading packet 8774544 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:04 client Short Header{DestConnectionID: (empty), PacketNumber: 8774544, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 136µs} 2025/04/30 09:38:04 client <- Reading packet 8774545 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:04 client Short Header{DestConnectionID: (empty), PacketNumber: 8774545, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 20.28ms} 2025/04/30 09:38:04 client newly acked packets (1): [6] 2025/04/30 09:38:04 client updated RTT: 116.566ms (σ: 85.636ms) 2025/04/30 09:38:04 client Canceling loss detection timer. 2025/04/30 09:38:04 client -> Sending packet 7 (1366 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000046830cb6ff, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.PingFrame{} 2025/04/30 09:38:04 client <- Reading packet 8774547 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:04 client Short Header{DestConnectionID: (empty), PacketNumber: 8774547, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 80.48ms} 2025/04/30 09:38:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:04 client -> Sending packet 8 (39 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000046830cb6ff, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.AckFrame{LargestAcked: 8774547, LowestAcked: 8774540, AckRanges: {{Largest: 8774547, Smallest: 8774547}, {Largest: 8774545, Smallest: 8774544}, {Largest: 8774540, Smallest: 8774540}}, DelayTime: 173.253µs} 2025/04/30 09:38:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:04 client -> Sending packet 9 (30 bytes) for connection 2801dcd57e3d9473fde394bceb0a88, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000046830cb6ff, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:04 client Connection 2801dcd57e3d9473fde394bceb0a88 closed. 2025/04/30 09:38:04 Requesting https://server4:443/blnhocnhuo. 2025/04/30 09:38:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:04 Increased send buffer size to 14336 kiB 2025/04/30 09:38:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:04 Created qlog file: /logs/qlog/8d674b6113fe39e133556003ddf1.sqlog 2025/04/30 09:38:04 client Starting new connection to server4 ([::]:38578 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8d674b6113fe39e133556003ddf1, version v1 2025/04/30 09:38:04 Adding connection ID (empty). 2025/04/30 09:38:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:04 client -> Sending packet 0 (1280 bytes) for connection 8d674b6113fe39e133556003ddf1, Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: 8d674b6113fe39e133556003ddf1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:38:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:38:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:04 client -> Sending packet 1 (1280 bytes) for connection 8d674b6113fe39e133556003ddf1, Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: 8d674b6113fe39e133556003ddf1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:38:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:38:04 client -> Sending packet 2 (1280 bytes) for connection 8d674b6113fe39e133556003ddf1, Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: 8d674b6113fe39e133556003ddf1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:38:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:38:04 client <- Reading packet 3626684 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000056b962b2f6, Token: (empty), PacketNumber: 3626684, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:04 client Received first packet. Switching destination connection ID to: 40000056b962b2f6 2025/04/30 09:38:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 09:38:04 client -> Sending packet 3 (1280 bytes) for connection 8d674b6113fe39e133556003ddf1, Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: 40000056b962b2f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:04 client -> &wire.AckFrame{LargestAcked: 3626684, LowestAcked: 3626684, DelayTime: 0s} 2025/04/30 09:38:04 client <- Reading packet 3626684 (759 bytes) for connection (empty), Handshake 2025/04/30 09:38:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000056b962b2f6, PacketNumber: 3626684, PacketNumberLen: 3, Length: 742, Version: v1} 2025/04/30 09:38:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 09:38:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8d674b6113fe39e133556003ddf1, InitialSourceConnectionID: 40000056b962b2f6, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x2fc5783759dbbff71283f4200fcb35d6, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:04 client -> Sending packet 0 (82 bytes) for connection 8d674b6113fe39e133556003ddf1, Handshake 2025/04/30 09:38:04 client Long Header{Type: Handshake, DestConnectionID: 40000056b962b2f6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:04 client -> &wire.AckFrame{LargestAcked: 3626684, LowestAcked: 3626684, DelayTime: 0s} 2025/04/30 09:38:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:04 client Dropping Initial keys. 2025/04/30 09:38:04 client -> Sending packet 0 (46 bytes) for connection 8d674b6113fe39e133556003ddf1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000056b962b2f6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:04 client <- Reading packet 3626685 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000056b962b2f6, PacketNumber: 3626685, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 09:38:04 client Peer doesn't await address validation any longer. 2025/04/30 09:38:04 client newly acked packets (1): [0] 2025/04/30 09:38:04 client updated RTT: 31.275493ms (σ: 15.637746ms) 2025/04/30 09:38:04 client Canceling loss detection timer. 2025/04/30 09:38:04 client <- Reading packet 3626684 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3626684, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:04 client Dropping Handshake keys. 2025/04/30 09:38:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000571808ca9a, StatelessResetToken: 0x241ba0f77680091f3359bfdd6a158f2c} 2025/04/30 09:38:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000005d929c8f5f, StatelessResetToken: 0x63274ac92f2a4f03e186bd822af397f7} 2025/04/30 09:38:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000004a49d7aa86, StatelessResetToken: 0x933252e7986d4ce656490afd945d78fa} 2025/04/30 09:38:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:04 client -> Sending packet 1 (37 bytes) for connection 8d674b6113fe39e133556003ddf1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 400000571808ca9a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.AckFrame{LargestAcked: 3626684, LowestAcked: 3626684, DelayTime: 220.661µs} 2025/04/30 09:38:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:04 client <- Reading packet 3626685 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3626685, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 512µs} 2025/04/30 09:38:04 client newly acked packets (1): [0] 2025/04/30 09:38:04 client updated RTT: 31.299ms (σ: 11.776ms) 2025/04/30 09:38:04 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:04 client -> Sending packet 3 (29 bytes) for connection 8d674b6113fe39e133556003ddf1, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 400000571808ca9a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:04 client -> Sending packet 4 (29 bytes) for connection 8d674b6113fe39e133556003ddf1, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 400000571808ca9a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:04 client <- Reading packet 3626690 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3626690, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:04 client -> Sending packet 5 (37 bytes) for connection 8d674b6113fe39e133556003ddf1, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 400000571808ca9a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.AckFrame{LargestAcked: 3626690, LowestAcked: 3626684, AckRanges: {{Largest: 3626690, Smallest: 3626690}, {Largest: 3626685, Smallest: 3626684}}, DelayTime: 76.433µs} 2025/04/30 09:38:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:04 client -> Sending packet 6 (30 bytes) for connection 8d674b6113fe39e133556003ddf1, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 400000571808ca9a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:04 client Connection 8d674b6113fe39e133556003ddf1 closed. 2025/04/30 09:38:04 Requesting https://server4:443/zbjlxmkswc. 2025/04/30 09:38:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:04 Increased send buffer size to 14336 kiB 2025/04/30 09:38:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:04 Created qlog file: /logs/qlog/7a4f617194cdccb231fdc9eec198f45c.sqlog 2025/04/30 09:38:04 client Starting new connection to server4 ([::]:35245 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7a4f617194cdccb231fdc9eec198f45c, version v1 2025/04/30 09:38:04 Adding connection ID (empty). 2025/04/30 09:38:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:04 client -> Sending packet 0 (1280 bytes) for connection 7a4f617194cdccb231fdc9eec198f45c, Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: 7a4f617194cdccb231fdc9eec198f45c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:38:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:38:04 client <- Reading packet 5750557 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000016540d59d9, Token: (empty), PacketNumber: 5750557, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:04 client Received first packet. Switching destination connection ID to: 40000016540d59d9 2025/04/30 09:38:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 560µs} 2025/04/30 09:38:04 client newly acked packets (1): [0] 2025/04/30 09:38:04 client updated RTT: 33.107642ms (σ: 16.553821ms) 2025/04/30 09:38:04 client -> Sending packet 1 (1280 bytes) for connection 7a4f617194cdccb231fdc9eec198f45c, Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: 40000016540d59d9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:04 client -> &wire.AckFrame{LargestAcked: 5750557, LowestAcked: 5750557, DelayTime: 0s} 2025/04/30 09:38:04 client <- Reading packet 5750557 (761 bytes) for connection (empty), Handshake 2025/04/30 09:38:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000016540d59d9, PacketNumber: 5750557, PacketNumberLen: 3, Length: 744, Version: v1} 2025/04/30 09:38:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7a4f617194cdccb231fdc9eec198f45c, InitialSourceConnectionID: 40000016540d59d9, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x336ca28e4e8b6dc40bc48cb8f8156c8d, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:04 client -> Sending packet 0 (82 bytes) for connection 7a4f617194cdccb231fdc9eec198f45c, Handshake 2025/04/30 09:38:04 client Long Header{Type: Handshake, DestConnectionID: 40000016540d59d9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:04 client -> &wire.AckFrame{LargestAcked: 5750557, LowestAcked: 5750557, DelayTime: 0s} 2025/04/30 09:38:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:04 client Dropping Initial keys. 2025/04/30 09:38:04 client -> Sending packet 0 (46 bytes) for connection 7a4f617194cdccb231fdc9eec198f45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000016540d59d9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:04 client <- Reading packet 5750558 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000016540d59d9, PacketNumber: 5750558, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 09:38:04 client Peer doesn't await address validation any longer. 2025/04/30 09:38:04 client newly acked packets (1): [0] 2025/04/30 09:38:04 client updated RTT: 32.88ms (σ: 12.867ms) 2025/04/30 09:38:04 client Canceling loss detection timer. 2025/04/30 09:38:04 client <- Reading packet 5750558 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5750558, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 488µs} 2025/04/30 09:38:04 client newly acked packets (1): [0] 2025/04/30 09:38:04 client updated RTT: 32.736ms (σ: 9.936ms) 2025/04/30 09:38:04 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:04 client Dropping Handshake keys. 2025/04/30 09:38:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:04 client -> Sending packet 1 (35 bytes) for connection 7a4f617194cdccb231fdc9eec198f45c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000016540d59d9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.AckFrame{LargestAcked: 5750558, LowestAcked: 5750558, DelayTime: 98.193µs} 2025/04/30 09:38:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:04 client -> Sending packet 2 (30 bytes) for connection 7a4f617194cdccb231fdc9eec198f45c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:04 client Short Header{DestConnectionID: 40000016540d59d9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:04 client Connection 7a4f617194cdccb231fdc9eec198f45c closed. 2025/04/30 09:38:04 Requesting https://server4:443/likmbrvobo. 2025/04/30 09:38:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:04 Increased send buffer size to 14336 kiB 2025/04/30 09:38:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:04 Created qlog file: /logs/qlog/6a549d83a758cafcf0f9.sqlog 2025/04/30 09:38:04 client Starting new connection to server4 ([::]:53465 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6a549d83a758cafcf0f9, version v1 2025/04/30 09:38:04 Adding connection ID (empty). 2025/04/30 09:38:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:04 client -> Sending packet 0 (1280 bytes) for connection 6a549d83a758cafcf0f9, Initial 2025/04/30 09:38:04 client Long Header{Type: Initial, DestConnectionID: 6a549d83a758cafcf0f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:05 client -> Sending packet 1 (1280 bytes) for connection 6a549d83a758cafcf0f9, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 6a549d83a758cafcf0f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:05 client -> Sending packet 2 (1280 bytes) for connection 6a549d83a758cafcf0f9, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 6a549d83a758cafcf0f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:05 client <- Reading packet 1940939 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000463921cc92, Token: (empty), PacketNumber: 1940939, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:05 client Received first packet. Switching destination connection ID to: 400000463921cc92 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 760µs} 2025/04/30 09:38:05 client -> Sending packet 3 (1280 bytes) for connection 6a549d83a758cafcf0f9, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 400000463921cc92, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 1940939, LowestAcked: 1940939, DelayTime: 0s} 2025/04/30 09:38:05 client <- Reading packet 1940939 (755 bytes) for connection (empty), Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000463921cc92, PacketNumber: 1940939, PacketNumberLen: 3, Length: 738, Version: v1} 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:38:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6a549d83a758cafcf0f9, InitialSourceConnectionID: 400000463921cc92, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x9a9a63a2dd576cfd25f902174f92946e, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:05 client -> Sending packet 0 (82 bytes) for connection 6a549d83a758cafcf0f9, Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: 400000463921cc92, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 1940939, LowestAcked: 1940939, DelayTime: 0s} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:05 client Dropping Initial keys. 2025/04/30 09:38:05 client -> Sending packet 0 (46 bytes) for connection 6a549d83a758cafcf0f9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 400000463921cc92, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:05 client <- Reading packet 1940940 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000463921cc92, PacketNumber: 1940940, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 09:38:05 client Peer doesn't await address validation any longer. 2025/04/30 09:38:05 client newly acked packets (1): [0] 2025/04/30 09:38:05 client updated RTT: 31.493ms (σ: 15.7465ms) 2025/04/30 09:38:05 client Canceling loss detection timer. 2025/04/30 09:38:05 client <- Reading packet 1940939 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1940939, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:05 client Dropping Handshake keys. 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000004a938b34eb, StatelessResetToken: 0xb1db92f798cb899bf590310f27ebe481} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000401c890d4d, StatelessResetToken: 0x0ad82f3a5950cbc4a1cf51047616b5c6} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000004e9e4e385f, StatelessResetToken: 0x26584e4660b01194d168e4d7bfed0e6d} 2025/04/30 09:38:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:05 client -> Sending packet 1 (37 bytes) for connection 6a549d83a758cafcf0f9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000004a938b34eb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 1940939, LowestAcked: 1940939, DelayTime: 207.626µs} 2025/04/30 09:38:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:05 client <- Reading packet 1940940 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1940940, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 200µs} 2025/04/30 09:38:05 client newly acked packets (1): [1] 2025/04/30 09:38:05 client updated RTT: 31.414ms (σ: 11.965ms) 2025/04/30 09:38:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:05 client lost packet 0 (time threshold) 2025/04/30 09:38:05 client Canceling loss detection timer. 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000049473a959f, StatelessResetToken: 0x26f4c41e0659a8d340710614607c4577} 2025/04/30 09:38:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:05 client Ignoring all packets below 1940940. 2025/04/30 09:38:05 client -> Sending packet 2 (54 bytes) for connection 6a549d83a758cafcf0f9, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000004a938b34eb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 1940940, LowestAcked: 1940940, DelayTime: 187.039µs} 2025/04/30 09:38:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:05 client <- Reading packet 1940941 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1940941, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 320µs} 2025/04/30 09:38:05 client newly acked packets (1): [2] 2025/04/30 09:38:05 client updated RTT: 31.437ms (σ: 9.021ms) 2025/04/30 09:38:05 client Canceling loss detection timer. 2025/04/30 09:38:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:05 client Ignoring all packets below 1940941. 2025/04/30 09:38:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:05 client -> Sending packet 3 (30 bytes) for connection 6a549d83a758cafcf0f9, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000004a938b34eb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:05 client Connection 6a549d83a758cafcf0f9 closed. 2025/04/30 09:38:05 Requesting https://server4:443/vnfvlvvajn. 2025/04/30 09:38:05 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:05 Increased send buffer size to 14336 kiB 2025/04/30 09:38:05 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:05 Created qlog file: /logs/qlog/2ffbea708b272030d444a9.sqlog 2025/04/30 09:38:05 client Starting new connection to server4 ([::]:56659 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2ffbea708b272030d444a9, version v1 2025/04/30 09:38:05 Adding connection ID (empty). 2025/04/30 09:38:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:05 client -> Sending packet 0 (1280 bytes) for connection 2ffbea708b272030d444a9, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 2ffbea708b272030d444a9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:38:05 client <- Reading packet 8600223 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000000bba057ed1, Token: (empty), PacketNumber: 8600223, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:05 client Received first packet. Switching destination connection ID to: 4000000bba057ed1 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 696µs} 2025/04/30 09:38:05 client newly acked packets (1): [0] 2025/04/30 09:38:05 client updated RTT: 33.359986ms (σ: 16.679993ms) 2025/04/30 09:38:05 client -> Sending packet 1 (1280 bytes) for connection 2ffbea708b272030d444a9, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 4000000bba057ed1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 8600223, LowestAcked: 8600223, DelayTime: 0s} 2025/04/30 09:38:05 client <- Reading packet 8600223 (756 bytes) for connection (empty), Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000bba057ed1, PacketNumber: 8600223, PacketNumberLen: 4, Length: 739, Version: v1} 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:38:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2ffbea708b272030d444a9, InitialSourceConnectionID: 4000000bba057ed1, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x677f04b16b2e7a0d6e395d9b865063fe, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:05 client -> Sending packet 0 (82 bytes) for connection 2ffbea708b272030d444a9, Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: 4000000bba057ed1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 8600223, LowestAcked: 8600223, DelayTime: 0s} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:05 client Dropping Initial keys. 2025/04/30 09:38:05 client -> Sending packet 0 (46 bytes) for connection 2ffbea708b272030d444a9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000000bba057ed1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:05 client <- Reading packet 8600223 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 8600223, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:05 client Dropping Handshake keys. 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001bc25e4733, StatelessResetToken: 0x88b5375e62ba710ff6b57bbf3a9aa9e4} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000000a29f83a84, StatelessResetToken: 0xcef15920b0051274e112cdde1a964752} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000b5e3c1116, StatelessResetToken: 0x09666aab08663f2b14fd160f80b2b8f3} 2025/04/30 09:38:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:05 client -> Sending packet 1 (37 bytes) for connection 2ffbea708b272030d444a9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001bc25e4733, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 8600223, LowestAcked: 8600223, DelayTime: 127.607µs} 2025/04/30 09:38:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:05 client <- Reading packet 8600224 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 8600224, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 656µs} 2025/04/30 09:38:05 client newly acked packets (1): [0] 2025/04/30 09:38:05 client updated RTT: 33.257ms (σ: 12.711ms) 2025/04/30 09:38:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:05 client -> Sending packet 2 (30 bytes) for connection 2ffbea708b272030d444a9, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001bc25e4733, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:05 client Connection 2ffbea708b272030d444a9 closed. 2025/04/30 09:38:05 Requesting https://server4:443/vsfmduidlj. 2025/04/30 09:38:05 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:05 Increased send buffer size to 14336 kiB 2025/04/30 09:38:05 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:05 Created qlog file: /logs/qlog/30eeb1a7dbf6d70c5af3b297.sqlog 2025/04/30 09:38:05 client Starting new connection to server4 ([::]:58850 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 30eeb1a7dbf6d70c5af3b297, version v1 2025/04/30 09:38:05 Adding connection ID (empty). 2025/04/30 09:38:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:05 client -> Sending packet 0 (1280 bytes) for connection 30eeb1a7dbf6d70c5af3b297, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 30eeb1a7dbf6d70c5af3b297, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:05 client <- Reading packet 10428389 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000001a70b8fe50, Token: (empty), PacketNumber: 10428389, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:05 client Received first packet. Switching destination connection ID to: 4000001a70b8fe50 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:38:05 client newly acked packets (1): [0] 2025/04/30 09:38:05 client updated RTT: 33.141279ms (σ: 16.570639ms) 2025/04/30 09:38:05 client -> Sending packet 1 (1280 bytes) for connection 30eeb1a7dbf6d70c5af3b297, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 4000001a70b8fe50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 10428389, LowestAcked: 10428389, DelayTime: 0s} 2025/04/30 09:38:05 client -> Sending packet 2 (1280 bytes) for connection 30eeb1a7dbf6d70c5af3b297, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 4000001a70b8fe50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:05 client -> &wire.PingFrame{} 2025/04/30 09:38:05 client <- Reading packet 10428391 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000001a70b8fe50, Token: (empty), PacketNumber: 10428391, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 119ms} 2025/04/30 09:38:05 client -> Sending packet 3 (1280 bytes) for connection 30eeb1a7dbf6d70c5af3b297, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 4000001a70b8fe50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 10428391, LowestAcked: 10428389, AckRanges: {{Largest: 10428391, Smallest: 10428391}, {Largest: 10428389, Smallest: 10428389}}, DelayTime: 0s} 2025/04/30 09:38:05 client <- Reading packet 10428391 (758 bytes) for connection (empty), Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001a70b8fe50, PacketNumber: 10428391, PacketNumberLen: 4, Length: 741, Version: v1} 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 30eeb1a7dbf6d70c5af3b297, InitialSourceConnectionID: 4000001a70b8fe50, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xced7166cc076a8ef4ed8063a8e718904, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:05 client -> Sending packet 0 (82 bytes) for connection 30eeb1a7dbf6d70c5af3b297, Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: 4000001a70b8fe50, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 10428391, LowestAcked: 10428391, DelayTime: 0s} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:05 client Dropping Initial keys. 2025/04/30 09:38:05 client -> Sending packet 0 (46 bytes) for connection 30eeb1a7dbf6d70c5af3b297, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001a70b8fe50, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:05 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:38:05 client <- Reading packet 10428392 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001a70b8fe50, PacketNumber: 10428392, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 224µs} 2025/04/30 09:38:05 client Peer doesn't await address validation any longer. 2025/04/30 09:38:05 client newly acked packets (1): [0] 2025/04/30 09:38:05 client updated RTT: 32.874ms (σ: 12.961ms) 2025/04/30 09:38:05 client Canceling loss detection timer. 2025/04/30 09:38:05 client <- Reading packet 10428389 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 10428389, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:05 client Dropping Handshake keys. 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001fa10a9ff4, StatelessResetToken: 0x183e58a06ea76d52e3b62155bbdbe7c7} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000001d9a5c4533, StatelessResetToken: 0x8c4469cec22a8f89cab7e436fdea94ab} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000001c5e1b35a9, StatelessResetToken: 0x50165c8b1d8128b4fa0e4b84e0bcc519} 2025/04/30 09:38:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:05 client -> Sending packet 1 (37 bytes) for connection 30eeb1a7dbf6d70c5af3b297, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001fa10a9ff4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 10428389, LowestAcked: 10428389, DelayTime: 130.969µs} 2025/04/30 09:38:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:05 client <- Reading packet 10428391 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 10428391, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001fa10a9ff4, StatelessResetToken: 0x183e58a06ea76d52e3b62155bbdbe7c7} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000001d9a5c4533, StatelessResetToken: 0x8c4469cec22a8f89cab7e436fdea94ab} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000001c5e1b35a9, StatelessResetToken: 0x50165c8b1d8128b4fa0e4b84e0bcc519} 2025/04/30 09:38:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:05 client -> Sending packet 2 (37 bytes) for connection 30eeb1a7dbf6d70c5af3b297, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001fa10a9ff4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 10428391, LowestAcked: 10428389, AckRanges: {{Largest: 10428391, Smallest: 10428391}, {Largest: 10428389, Smallest: 10428389}}, DelayTime: 151.311µs} 2025/04/30 09:38:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:05 client -> Sending packet 4 (46 bytes) for connection 30eeb1a7dbf6d70c5af3b297, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001fa10a9ff4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:05 client Skipping packet number 3 2025/04/30 09:38:05 client -> Sending packet 5 (29 bytes) for connection 30eeb1a7dbf6d70c5af3b297, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001fa10a9ff4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:05 client <- Reading packet 10428392 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 10428392, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 376µs} 2025/04/30 09:38:05 client newly acked packets (1): [4] 2025/04/30 09:38:05 client updated RTT: 32.656ms (σ: 10.156ms) 2025/04/30 09:38:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:05 client <- Reading packet 10428393 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 10428393, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 384µs} 2025/04/30 09:38:05 client newly acked packets (1): [5] 2025/04/30 09:38:05 client updated RTT: 32.466ms (σ: 7.995ms) 2025/04/30 09:38:05 client Canceling loss detection timer. 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000008188724a6, StatelessResetToken: 0x42b1c2b91e7d07ecdba9b3ebfd950ba5} 2025/04/30 09:38:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:05 client <- Reading packet 10428394 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 10428394, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:38:05 client -> Sending packet 6 (37 bytes) for connection 30eeb1a7dbf6d70c5af3b297, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001fa10a9ff4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 10428394, LowestAcked: 10428389, AckRanges: {{Largest: 10428394, Smallest: 10428391}, {Largest: 10428389, Smallest: 10428389}}, DelayTime: 69.76µs} 2025/04/30 09:38:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:05 client -> Sending packet 7 (30 bytes) for connection 30eeb1a7dbf6d70c5af3b297, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 4000001fa10a9ff4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:05 client Connection 30eeb1a7dbf6d70c5af3b297 closed. 2025/04/30 09:38:05 Requesting https://server4:443/tcgoecyiaz. 2025/04/30 09:38:05 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:05 Increased send buffer size to 14336 kiB 2025/04/30 09:38:05 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:05 Created qlog file: /logs/qlog/72e22a939e02a7c5120fb0313363b164.sqlog 2025/04/30 09:38:05 client Starting new connection to server4 ([::]:59014 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 72e22a939e02a7c5120fb0313363b164, version v1 2025/04/30 09:38:05 Adding connection ID (empty). 2025/04/30 09:38:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:05 client -> Sending packet 0 (1280 bytes) for connection 72e22a939e02a7c5120fb0313363b164, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 72e22a939e02a7c5120fb0313363b164, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:38:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:05 client <- Reading packet 9545141 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000082fe6be77b, Token: (empty), PacketNumber: 9545141, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:05 client Received first packet. Switching destination connection ID to: 40000082fe6be77b 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 752µs} 2025/04/30 09:38:05 client newly acked packets (1): [0] 2025/04/30 09:38:05 client updated RTT: 33.337028ms (σ: 16.668514ms) 2025/04/30 09:38:05 client -> Sending packet 1 (1280 bytes) for connection 72e22a939e02a7c5120fb0313363b164, Initial 2025/04/30 09:38:05 client Long Header{Type: Initial, DestConnectionID: 40000082fe6be77b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 9545141, LowestAcked: 9545141, DelayTime: 0s} 2025/04/30 09:38:05 client <- Reading packet 9545141 (761 bytes) for connection (empty), Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000082fe6be77b, PacketNumber: 9545141, PacketNumberLen: 4, Length: 744, Version: v1} 2025/04/30 09:38:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 72e22a939e02a7c5120fb0313363b164, InitialSourceConnectionID: 40000082fe6be77b, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x68e463a7e34eab7f79eb9ebfdb484f25, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:05 client -> Sending packet 0 (82 bytes) for connection 72e22a939e02a7c5120fb0313363b164, Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: 40000082fe6be77b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 9545141, LowestAcked: 9545141, DelayTime: 0s} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:05 client Dropping Initial keys. 2025/04/30 09:38:05 client -> Sending packet 0 (46 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 40000082fe6be77b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:05 client -> Sending packet 1 (74 bytes) for connection 72e22a939e02a7c5120fb0313363b164, Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: 40000082fe6be77b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:05 client -> Sending packet 2 (74 bytes) for connection 72e22a939e02a7c5120fb0313363b164, Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: 40000082fe6be77b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:05 client <- Reading packet 9545144 (41 bytes) for connection (empty), Handshake 2025/04/30 09:38:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000082fe6be77b, PacketNumber: 9545144, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 376µs} 2025/04/30 09:38:05 client Peer doesn't await address validation any longer. 2025/04/30 09:38:05 client <- Reading packet 9545141 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 9545141, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.52ms} 2025/04/30 09:38:05 client newly acked packets (1): [0] 2025/04/30 09:38:05 client updated RTT: 42.498ms (σ: 30.823ms) 2025/04/30 09:38:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:05 client Canceling loss detection timer. 2025/04/30 09:38:05 client Dropping Handshake keys. 2025/04/30 09:38:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000912a37765c, StatelessResetToken: 0x74f751dc4c6ea506b45f9842c75d8368} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008d7a4cce24, StatelessResetToken: 0xf82960923f7ed0f3223085141f672ba9} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000008d5a47e171, StatelessResetToken: 0x28f38f18accf0913e85f3dc5a6857718} 2025/04/30 09:38:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:05 client -> Sending packet 1 (37 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 9545141, LowestAcked: 9545141, DelayTime: 184.984µs} 2025/04/30 09:38:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:05 client -> Sending packet 3 (29 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:05 client -> Sending packet 4 (29 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:05 client Dropping %!s(logging.PacketType=1) packet (761 bytes) because we already dropped the keys. 2025/04/30 09:38:05 client <- Reading packet 9545144 (114 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 9545144, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000912a37765c, StatelessResetToken: 0x74f751dc4c6ea506b45f9842c75d8368} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008d7a4cce24, StatelessResetToken: 0xf82960923f7ed0f3223085141f672ba9} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000008d5a47e171, StatelessResetToken: 0x28f38f18accf0913e85f3dc5a6857718} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 301.304ms} 2025/04/30 09:38:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:05 client -> Sending packet 5 (37 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 9545144, LowestAcked: 9545141, AckRanges: {{Largest: 9545144, Smallest: 9545144}, {Largest: 9545141, Smallest: 9545141}}, DelayTime: 140.792µs} 2025/04/30 09:38:05 client <- Reading packet 9545145 (114 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 9545145, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000912a37765c, StatelessResetToken: 0x74f751dc4c6ea506b45f9842c75d8368} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008d7a4cce24, StatelessResetToken: 0xf82960923f7ed0f3223085141f672ba9} 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000008d5a47e171, StatelessResetToken: 0x28f38f18accf0913e85f3dc5a6857718} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 301.336ms} 2025/04/30 09:38:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:05 client <- Reading packet 9545146 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:05 client Short Header{DestConnectionID: (empty), PacketNumber: 9545146, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 144µs} 2025/04/30 09:38:05 client newly acked packets (1): [4] 2025/04/30 09:38:05 client updated RTT: 41.043ms (σ: 26.025ms) 2025/04/30 09:38:05 client Canceling loss detection timer. 2025/04/30 09:38:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000080186c424b, StatelessResetToken: 0x2825dba5f1655cadc4b10121cbb4250c} 2025/04/30 09:38:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:38:05 client -> Sending packet 6 (1366 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.PingFrame{} 2025/04/30 09:38:05 client -> Sending packet 7 (37 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:05 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:05 client -> &wire.AckFrame{LargestAcked: 9545146, LowestAcked: 9545141, AckRanges: {{Largest: 9545146, Smallest: 9545144}, {Largest: 9545141, Smallest: 9545141}}, DelayTime: 195.033µs} 2025/04/30 09:38:06 client Dropping %!s(logging.PacketType=1) packet (761 bytes) because we already dropped the keys. 2025/04/30 09:38:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:07 client Dropping %!s(logging.PacketType=1) packet (761 bytes) because we already dropped the keys. 2025/04/30 09:38:07 client <- Reading packet 9545151 (116 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:07 client Short Header{DestConnectionID: (empty), PacketNumber: 9545151, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000912a37765c, StatelessResetToken: 0x74f751dc4c6ea506b45f9842c75d8368} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008d7a4cce24, StatelessResetToken: 0xf82960923f7ed0f3223085141f672ba9} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000008d5a47e171, StatelessResetToken: 0x28f38f18accf0913e85f3dc5a6857718} 2025/04/30 09:38:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 1.202376s} 2025/04/30 09:38:07 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:07 client -> Sending packet 8 (39 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 9545151, LowestAcked: 9545141, AckRanges: {{Largest: 9545151, Smallest: 9545151}, {Largest: 9545146, Smallest: 9545144}, {Largest: 9545141, Smallest: 9545141}}, DelayTime: 152.013µs} 2025/04/30 09:38:07 client <- Reading packet 9545152 (116 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:07 client Short Header{DestConnectionID: (empty), PacketNumber: 9545152, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000912a37765c, StatelessResetToken: 0x74f751dc4c6ea506b45f9842c75d8368} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008d7a4cce24, StatelessResetToken: 0xf82960923f7ed0f3223085141f672ba9} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000008d5a47e171, StatelessResetToken: 0x28f38f18accf0913e85f3dc5a6857718} 2025/04/30 09:38:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 1.202448s} 2025/04/30 09:38:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:07 client Sending ACK because the ACK timer expired. 2025/04/30 09:38:07 client -> Sending packet 9 (40 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 9545152, LowestAcked: 9545141, AckRanges: {{Largest: 9545152, Smallest: 9545151}, {Largest: 9545146, Smallest: 9545144}, {Largest: 9545141, Smallest: 9545141}}, DelayTime: 25.336308ms} 2025/04/30 09:38:07 client <- Reading packet 9545155 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:07 client Short Header{DestConnectionID: (empty), PacketNumber: 9545155, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:07 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 8, DelayTime: 96.4ms} 2025/04/30 09:38:07 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:07 client -> Sending packet 10 (41 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 9545155, LowestAcked: 9545141, AckRanges: {{Largest: 9545155, Smallest: 9545155}, {Largest: 9545152, Smallest: 9545151}, {Largest: 9545146, Smallest: 9545144}, {Largest: 9545141, Smallest: 9545141}}, DelayTime: 144.299µs} 2025/04/30 09:38:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:07 client -> Sending packet 11 (30 bytes) for connection 72e22a939e02a7c5120fb0313363b164, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000912a37765c, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:07 client Connection 72e22a939e02a7c5120fb0313363b164 closed. 2025/04/30 09:38:07 Requesting https://server4:443/lodmzhpviw. 2025/04/30 09:38:07 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:07 Increased send buffer size to 14336 kiB 2025/04/30 09:38:07 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:07 Created qlog file: /logs/qlog/55f1a65da618926a7222f832c79a6ba5.sqlog 2025/04/30 09:38:07 client Starting new connection to server4 ([::]:40834 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 55f1a65da618926a7222f832c79a6ba5, version v1 2025/04/30 09:38:07 Adding connection ID (empty). 2025/04/30 09:38:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:07 client -> Sending packet 0 (1280 bytes) for connection 55f1a65da618926a7222f832c79a6ba5, Initial 2025/04/30 09:38:07 client Long Header{Type: Initial, DestConnectionID: 55f1a65da618926a7222f832c79a6ba5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:38:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:07 client <- Reading packet 11299842 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d9425378f7, Token: (empty), PacketNumber: 11299842, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:07 client Received first packet. Switching destination connection ID to: 400000d9425378f7 2025/04/30 09:38:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 624µs} 2025/04/30 09:38:07 client newly acked packets (1): [0] 2025/04/30 09:38:07 client updated RTT: 33.161041ms (σ: 16.58052ms) 2025/04/30 09:38:07 client -> Sending packet 1 (1280 bytes) for connection 55f1a65da618926a7222f832c79a6ba5, Initial 2025/04/30 09:38:07 client Long Header{Type: Initial, DestConnectionID: 400000d9425378f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 11299842, LowestAcked: 11299842, DelayTime: 0s} 2025/04/30 09:38:07 client <- Reading packet 11299842 (762 bytes) for connection (empty), Handshake 2025/04/30 09:38:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d9425378f7, PacketNumber: 11299842, PacketNumberLen: 4, Length: 745, Version: v1} 2025/04/30 09:38:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 55f1a65da618926a7222f832c79a6ba5, InitialSourceConnectionID: 400000d9425378f7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xbdca2280e34da296b96dd6ce62da61f7, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:07 client -> Sending packet 0 (82 bytes) for connection 55f1a65da618926a7222f832c79a6ba5, Handshake 2025/04/30 09:38:07 client Long Header{Type: Handshake, DestConnectionID: 400000d9425378f7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 11299842, LowestAcked: 11299842, DelayTime: 0s} 2025/04/30 09:38:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:07 client Dropping Initial keys. 2025/04/30 09:38:07 client -> Sending packet 0 (46 bytes) for connection 55f1a65da618926a7222f832c79a6ba5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000d9425378f7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:07 client <- Reading packet 11299843 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d9425378f7, PacketNumber: 11299843, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 09:38:07 client Peer doesn't await address validation any longer. 2025/04/30 09:38:07 client newly acked packets (1): [0] 2025/04/30 09:38:07 client updated RTT: 32.928ms (σ: 12.9ms) 2025/04/30 09:38:07 client Canceling loss detection timer. 2025/04/30 09:38:07 client <- Reading packet 11299844 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:07 client Short Header{DestConnectionID: (empty), PacketNumber: 11299844, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:07 client Dropping Handshake keys. 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000dd7a08bfec, StatelessResetToken: 0x16f65d0005a46119492f64640f36d83a} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d685d32c01, StatelessResetToken: 0x3fd110b69dfe39e40a53633f4d81a587} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000ceb9760ba7, StatelessResetToken: 0xbebf634c7f1ad199db5eb4209acefea8} 2025/04/30 09:38:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:07 client -> Sending packet 2 (56 bytes) for connection 55f1a65da618926a7222f832c79a6ba5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000dd7a08bfec, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 11299844, LowestAcked: 11299844, DelayTime: 171.7µs} 2025/04/30 09:38:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:07 client -> Sending packet 3 (48 bytes) for connection 55f1a65da618926a7222f832c79a6ba5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000dd7a08bfec, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:07 client <- Reading packet 11299845 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:07 client Short Header{DestConnectionID: (empty), PacketNumber: 11299845, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 328µs} 2025/04/30 09:38:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000d9095884a1, StatelessResetToken: 0xf363bc9875b3eacd080625beda48cce1} 2025/04/30 09:38:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:07 client <- Reading packet 11299846 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:07 client Short Header{DestConnectionID: (empty), PacketNumber: 11299846, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:07 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:38:07 client -> Sending packet 4 (35 bytes) for connection 55f1a65da618926a7222f832c79a6ba5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000dd7a08bfec, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 11299846, LowestAcked: 11299844, DelayTime: 103.414µs} 2025/04/30 09:38:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:07 client -> Sending packet 5 (30 bytes) for connection 55f1a65da618926a7222f832c79a6ba5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000dd7a08bfec, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:07 client Connection 55f1a65da618926a7222f832c79a6ba5 closed. 2025/04/30 09:38:07 Requesting https://server4:443/mjifdfiodb. 2025/04/30 09:38:07 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:07 Increased send buffer size to 14336 kiB 2025/04/30 09:38:07 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:07 Created qlog file: /logs/qlog/8a00c20a370b65959283eb862256ec97ff.sqlog 2025/04/30 09:38:07 client Starting new connection to server4 ([::]:39616 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8a00c20a370b65959283eb862256ec97ff, version v1 2025/04/30 09:38:07 Adding connection ID (empty). 2025/04/30 09:38:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:07 client -> Sending packet 0 (1280 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, Initial 2025/04/30 09:38:07 client Long Header{Type: Initial, DestConnectionID: 8a00c20a370b65959283eb862256ec97ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:38:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:07 client -> Sending packet 1 (1280 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, Initial 2025/04/30 09:38:07 client Long Header{Type: Initial, DestConnectionID: 8a00c20a370b65959283eb862256ec97ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:38:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:07 client -> Sending packet 2 (1280 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, Initial 2025/04/30 09:38:07 client Long Header{Type: Initial, DestConnectionID: 8a00c20a370b65959283eb862256ec97ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:38:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:07 client Queueing packet (763 bytes) for later decryption 2025/04/30 09:38:07 client <- Reading packet 4717257 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c45e1b2df8, Token: (empty), PacketNumber: 4717257, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:07 client Received first packet. Switching destination connection ID to: 400000c45e1b2df8 2025/04/30 09:38:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 109.992ms} 2025/04/30 09:38:07 client newly acked packets (1): [2] 2025/04/30 09:38:07 client updated RTT: 143.963704ms (σ: 71.981852ms) 2025/04/30 09:38:07 client -> Sending packet 3 (1280 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, Initial 2025/04/30 09:38:07 client Long Header{Type: Initial, DestConnectionID: 400000c45e1b2df8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 4717257, LowestAcked: 4717257, DelayTime: 0s} 2025/04/30 09:38:07 client <- Reading packet 4717255 (763 bytes) for connection (empty), Handshake 2025/04/30 09:38:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c45e1b2df8, PacketNumber: 4717255, PacketNumberLen: 3, Length: 746, Version: v1} 2025/04/30 09:38:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8a00c20a370b65959283eb862256ec97ff, InitialSourceConnectionID: 400000c45e1b2df8, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x4cff3746571a2890e6be512bdea0ea48, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:07 client -> Sending packet 0 (82 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, Handshake 2025/04/30 09:38:07 client Long Header{Type: Handshake, DestConnectionID: 400000c45e1b2df8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 4717255, LowestAcked: 4717255, DelayTime: 0s} 2025/04/30 09:38:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:07 client Dropping Initial keys. 2025/04/30 09:38:07 client -> Sending packet 0 (46 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:07 client Short Header{DestConnectionID: 400000c45e1b2df8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:07 client <- Reading packet 4717259 (763 bytes) for connection (empty), Handshake 2025/04/30 09:38:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c45e1b2df8, PacketNumber: 4717259, PacketNumberLen: 3, Length: 746, Version: v1} 2025/04/30 09:38:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:07 client -> Sending packet 1 (45 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, Handshake 2025/04/30 09:38:07 client Long Header{Type: Handshake, DestConnectionID: 400000c45e1b2df8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:07 client -> &wire.AckFrame{LargestAcked: 4717259, LowestAcked: 4717255, AckRanges: {{Largest: 4717259, Smallest: 4717259}, {Largest: 4717255, Smallest: 4717255}}, DelayTime: 0s} 2025/04/30 09:38:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:08 client -> Sending packet 2 (74 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: 400000c45e1b2df8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:08 client -> Sending packet 3 (74 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: 400000c45e1b2df8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:08 client <- Reading packet 4717262 (40 bytes) for connection (empty), Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c45e1b2df8, PacketNumber: 4717262, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:38:08 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 320µs} 2025/04/30 09:38:08 client Peer doesn't await address validation any longer. 2025/04/30 09:38:08 client <- Reading packet 4717263 (40 bytes) for connection (empty), Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c45e1b2df8, PacketNumber: 4717263, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:38:08 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 432µs} 2025/04/30 09:38:08 client newly acked packets (1): [3] 2025/04/30 09:38:08 client updated RTT: 129.876ms (σ: 82.158ms) 2025/04/30 09:38:08 client Canceling loss detection timer. 2025/04/30 09:38:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:08 client <- Reading packet 4717265 (763 bytes) for connection (empty), Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c45e1b2df8, PacketNumber: 4717265, PacketNumberLen: 3, Length: 746, Version: v1} 2025/04/30 09:38:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:08 client <- Reading packet 4717257 (106 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4717257, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:08 client Dropping Handshake keys. 2025/04/30 09:38:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000d50b8fadc5, StatelessResetToken: 0xa506e656eae8eddbdfd8d6e108004184} 2025/04/30 09:38:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000cb3c6e30fb, StatelessResetToken: 0xbe1a1eb64fe3cbdbd4fcb9cd6420e7c2} 2025/04/30 09:38:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000c7639c89be, StatelessResetToken: 0x768db6575db3a180f931514150a9902e} 2025/04/30 09:38:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:08 client -> Sending packet 2 (56 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:08 client Short Header{DestConnectionID: 400000d50b8fadc5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:08 client -> &wire.AckFrame{LargestAcked: 4717257, LowestAcked: 4717257, DelayTime: 222.265µs} 2025/04/30 09:38:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:08 client -> Sending packet 3 (48 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:08 client Short Header{DestConnectionID: 400000d50b8fadc5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:08 client <- Reading packet 4717258 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4717258, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:08 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 304µs} 2025/04/30 09:38:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000c558f7ad9e, StatelessResetToken: 0xf09e79ffba284ce28eaab1baad6bdd8d} 2025/04/30 09:38:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:08 client <- Reading packet 4717259 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4717259, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:08 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 336µs} 2025/04/30 09:38:08 client newly acked packets (1): [3] 2025/04/30 09:38:08 client updated RTT: 117.595ms (σ: 86.179ms) 2025/04/30 09:38:08 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:08 client Canceling loss detection timer. 2025/04/30 09:38:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:08 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:38:08 client -> Sending packet 4 (35 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:08 client Short Header{DestConnectionID: 400000d50b8fadc5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:08 client -> &wire.AckFrame{LargestAcked: 4717259, LowestAcked: 4717257, DelayTime: 132.276µs} 2025/04/30 09:38:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:08 client -> Sending packet 5 (30 bytes) for connection 8a00c20a370b65959283eb862256ec97ff, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:08 client Short Header{DestConnectionID: 400000d50b8fadc5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:08 client Connection 8a00c20a370b65959283eb862256ec97ff closed. 2025/04/30 09:38:08 Requesting https://server4:443/rtnqfmazpp. 2025/04/30 09:38:08 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:08 Increased send buffer size to 14336 kiB 2025/04/30 09:38:08 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:08 Created qlog file: /logs/qlog/96f4e0324d4f619bb1702de3f71d03ae427344.sqlog 2025/04/30 09:38:08 client Starting new connection to server4 ([::]:34165 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 96f4e0324d4f619bb1702de3f71d03ae427344, version v1 2025/04/30 09:38:08 Adding connection ID (empty). 2025/04/30 09:38:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:08 client -> Sending packet 0 (1280 bytes) for connection 96f4e0324d4f619bb1702de3f71d03ae427344, Initial 2025/04/30 09:38:08 client Long Header{Type: Initial, DestConnectionID: 96f4e0324d4f619bb1702de3f71d03ae427344, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:38:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:38:08 client <- Reading packet 1362204 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005bbe55bb3b, Token: (empty), PacketNumber: 1362204, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:08 client Received first packet. Switching destination connection ID to: 4000005bbe55bb3b 2025/04/30 09:38:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 712µs} 2025/04/30 09:38:08 client newly acked packets (1): [0] 2025/04/30 09:38:08 client updated RTT: 33.280745ms (σ: 16.640372ms) 2025/04/30 09:38:08 client -> Sending packet 1 (1280 bytes) for connection 96f4e0324d4f619bb1702de3f71d03ae427344, Initial 2025/04/30 09:38:08 client Long Header{Type: Initial, DestConnectionID: 4000005bbe55bb3b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:08 client -> &wire.AckFrame{LargestAcked: 1362204, LowestAcked: 1362204, DelayTime: 0s} 2025/04/30 09:38:08 client <- Reading packet 1362204 (763 bytes) for connection (empty), Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005bbe55bb3b, PacketNumber: 1362204, PacketNumberLen: 3, Length: 746, Version: v1} 2025/04/30 09:38:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 96f4e0324d4f619bb1702de3f71d03ae427344, InitialSourceConnectionID: 4000005bbe55bb3b, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1559aa59c82b6707c09264376a6139b7, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:08 client -> Sending packet 0 (82 bytes) for connection 96f4e0324d4f619bb1702de3f71d03ae427344, Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: 4000005bbe55bb3b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:08 client -> &wire.AckFrame{LargestAcked: 1362204, LowestAcked: 1362204, DelayTime: 0s} 2025/04/30 09:38:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:08 client Dropping Initial keys. 2025/04/30 09:38:08 client -> Sending packet 0 (46 bytes) for connection 96f4e0324d4f619bb1702de3f71d03ae427344, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:08 client Short Header{DestConnectionID: 4000005bbe55bb3b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:08 client -> Sending packet 1 (74 bytes) for connection 96f4e0324d4f619bb1702de3f71d03ae427344, Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: 4000005bbe55bb3b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:08 client -> Sending packet 2 (74 bytes) for connection 96f4e0324d4f619bb1702de3f71d03ae427344, Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: 4000005bbe55bb3b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:08 client <- Reading packet 1362207 (40 bytes) for connection (empty), Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005bbe55bb3b, PacketNumber: 1362207, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:38:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 264µs} 2025/04/30 09:38:08 client Peer doesn't await address validation any longer. 2025/04/30 09:38:08 client <- Reading packet 1362208 (40 bytes) for connection (empty), Handshake 2025/04/30 09:38:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005bbe55bb3b, PacketNumber: 1362208, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:38:08 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 448µs} 2025/04/30 09:38:08 client newly acked packets (1): [2] 2025/04/30 09:38:08 client updated RTT: 33.028ms (σ: 12.982ms) 2025/04/30 09:38:08 client Canceling loss detection timer. 2025/04/30 09:38:09 client <- Reading packet 1362210 (763 bytes) for connection (empty), Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005bbe55bb3b, PacketNumber: 1362210, PacketNumberLen: 3, Length: 746, Version: v1} 2025/04/30 09:38:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:09 client <- Reading packet 1362208 (114 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1362208, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:09 client Dropping Handshake keys. 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000004a7a65c74c, StatelessResetToken: 0xc6968e079e56c5757cfdaddef0b847b9} 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000054c4b44c82, StatelessResetToken: 0x146b3093ef14610783a48616c61c4f36} 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000054d616a10c, StatelessResetToken: 0x82b12dd23e0432758bd6772223a01cb3} 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 301.36ms} 2025/04/30 09:38:09 client newly acked packets (1): [0] 2025/04/30 09:38:09 client updated RTT: 67.38ms (σ: 78.44ms) 2025/04/30 09:38:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:09 client Canceling loss detection timer. 2025/04/30 09:38:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:09 client -> Sending packet 1 (37 bytes) for connection 96f4e0324d4f619bb1702de3f71d03ae427344, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 4000004a7a65c74c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 1362208, LowestAcked: 1362208, DelayTime: 253.834µs} 2025/04/30 09:38:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:09 client <- Reading packet 1362209 (1104 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1362209, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 208µs} 2025/04/30 09:38:09 client newly acked packets (1): [1] 2025/04/30 09:38:09 client updated RTT: 62.901ms (σ: 67.787ms) 2025/04/30 09:38:09 client Canceling loss detection timer. 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000050bfb811a5, StatelessResetToken: 0x6e51556a068d67af51802cd99c79c526} 2025/04/30 09:38:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:09 client Ignoring all packets below 1362209. 2025/04/30 09:38:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:09 client -> Sending packet 2 (30 bytes) for connection 96f4e0324d4f619bb1702de3f71d03ae427344, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 4000004a7a65c74c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:09 client Connection 96f4e0324d4f619bb1702de3f71d03ae427344 closed. 2025/04/30 09:38:09 Requesting https://server4:443/rytdaeqxeu. 2025/04/30 09:38:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:09 Increased send buffer size to 14336 kiB 2025/04/30 09:38:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:09 Created qlog file: /logs/qlog/37630a5fb3abff4a1bef4eb08c81384dc990cb40.sqlog 2025/04/30 09:38:09 client Starting new connection to server4 ([::]:57911 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 37630a5fb3abff4a1bef4eb08c81384dc990cb40, version v1 2025/04/30 09:38:09 Adding connection ID (empty). 2025/04/30 09:38:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:09 client -> Sending packet 0 (1280 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: 37630a5fb3abff4a1bef4eb08c81384dc990cb40, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:09 client <- Reading packet 2533639 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d23f8bf225, Token: (empty), PacketNumber: 2533639, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:09 client Received first packet. Switching destination connection ID to: 400000d23f8bf225 2025/04/30 09:38:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680µs} 2025/04/30 09:38:09 client newly acked packets (1): [0] 2025/04/30 09:38:09 client updated RTT: 33.283858ms (σ: 16.641929ms) 2025/04/30 09:38:09 client -> Sending packet 1 (1280 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: 400000d23f8bf225, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 2533639, LowestAcked: 2533639, DelayTime: 0s} 2025/04/30 09:38:09 client <- Reading packet 2533639 (765 bytes) for connection (empty), Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d23f8bf225, PacketNumber: 2533639, PacketNumberLen: 3, Length: 748, Version: v1} 2025/04/30 09:38:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 09:38:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 37630a5fb3abff4a1bef4eb08c81384dc990cb40, InitialSourceConnectionID: 400000d23f8bf225, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x6161fc72fb36174d76a8ea6c1bf14e1c, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:09 client -> Sending packet 0 (82 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: 400000d23f8bf225, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 2533639, LowestAcked: 2533639, DelayTime: 0s} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:09 client Dropping Initial keys. 2025/04/30 09:38:09 client -> Sending packet 0 (46 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 400000d23f8bf225, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:09 client -> Sending packet 1 (74 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: 400000d23f8bf225, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:09 client -> Sending packet 2 (74 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: 400000d23f8bf225, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:09 client <- Reading packet 2533639 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2533639, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.512ms} 2025/04/30 09:38:09 client Peer doesn't await address validation any longer. 2025/04/30 09:38:09 client newly acked packets (1): [0] 2025/04/30 09:38:09 client updated RTT: 42.458ms (σ: 30.831ms) 2025/04/30 09:38:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:09 client Canceling loss detection timer. 2025/04/30 09:38:09 client Dropping Handshake keys. 2025/04/30 09:38:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000c4493b223c, StatelessResetToken: 0x491b572cd4eee8842260a14cd7e124c0} 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000debf50ba8d, StatelessResetToken: 0xaad85e6efe4e0c10298f18cd1a3ee5a0} 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000d3dc25d7c7, StatelessResetToken: 0x6ef21534eae3c40e77f7e16405b11331} 2025/04/30 09:38:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:09 client Dropping %!s(logging.PacketType=1) packet (41 bytes) because we already dropped the keys. 2025/04/30 09:38:09 client -> Sending packet 1 (37 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 400000c4493b223c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 2533639, LowestAcked: 2533639, DelayTime: 172.852µs} 2025/04/30 09:38:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:09 client <- Reading packet 2533641 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2533641, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 136µs} 2025/04/30 09:38:09 client newly acked packets (1): [1] 2025/04/30 09:38:09 client updated RTT: 40.997ms (σ: 26.044ms) 2025/04/30 09:38:09 client Canceling loss detection timer. 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000cd118cbe9f, StatelessResetToken: 0xd39f1d09d7f72d881f29242b8d243d0c} 2025/04/30 09:38:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:09 client Ignoring all packets below 2533640. 2025/04/30 09:38:09 client -> Sending packet 2 (35 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 400000c4493b223c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 2533641, LowestAcked: 2533641, DelayTime: 105.236µs} 2025/04/30 09:38:09 client <- Reading packet 2533642 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2533642, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 104µs} 2025/04/30 09:38:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:09 client -> Sending packet 3 (30 bytes) for connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 400000c4493b223c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:09 client Connection 37630a5fb3abff4a1bef4eb08c81384dc990cb40 closed. 2025/04/30 09:38:09 Requesting https://server4:443/nkyblugwkn. 2025/04/30 09:38:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:09 Increased send buffer size to 14336 kiB 2025/04/30 09:38:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:09 Created qlog file: /logs/qlog/c64be460a744ad4f72b316048ba884.sqlog 2025/04/30 09:38:09 client Starting new connection to server4 ([::]:50004 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c64be460a744ad4f72b316048ba884, version v1 2025/04/30 09:38:09 Adding connection ID (empty). 2025/04/30 09:38:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:09 client -> Sending packet 0 (1280 bytes) for connection c64be460a744ad4f72b316048ba884, Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: c64be460a744ad4f72b316048ba884, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:09 client <- Reading packet 9900840 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000015f84c90af, Token: (empty), PacketNumber: 9900840, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:09 client Received first packet. Switching destination connection ID to: 40000015f84c90af 2025/04/30 09:38:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 09:38:09 client newly acked packets (1): [0] 2025/04/30 09:38:09 client updated RTT: 33.330466ms (σ: 16.665233ms) 2025/04/30 09:38:09 client -> Sending packet 1 (1280 bytes) for connection c64be460a744ad4f72b316048ba884, Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: 40000015f84c90af, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 9900840, LowestAcked: 9900840, DelayTime: 0s} 2025/04/30 09:38:09 client <- Reading packet 9900840 (761 bytes) for connection (empty), Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000015f84c90af, PacketNumber: 9900840, PacketNumberLen: 4, Length: 744, Version: v1} 2025/04/30 09:38:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c64be460a744ad4f72b316048ba884, InitialSourceConnectionID: 40000015f84c90af, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1188a1a727a5e920892593e953c3d747, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:09 client -> Sending packet 0 (82 bytes) for connection c64be460a744ad4f72b316048ba884, Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: 40000015f84c90af, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 9900840, LowestAcked: 9900840, DelayTime: 0s} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:09 client Dropping Initial keys. 2025/04/30 09:38:09 client -> Sending packet 0 (46 bytes) for connection c64be460a744ad4f72b316048ba884, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 40000015f84c90af, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:09 client <- Reading packet 9900841 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000015f84c90af, PacketNumber: 9900841, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 09:38:09 client Peer doesn't await address validation any longer. 2025/04/30 09:38:09 client newly acked packets (1): [0] 2025/04/30 09:38:09 client updated RTT: 33.107ms (σ: 12.944ms) 2025/04/30 09:38:09 client Canceling loss detection timer. 2025/04/30 09:38:09 client <- Reading packet 9900840 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9900840, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:09 client Dropping Handshake keys. 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000002dbfa0721, StatelessResetToken: 0x7b31f499c40e9fd2a2bd7417375023f9} 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000002612df6c8, StatelessResetToken: 0xe6a24b31b06543e0dfc4cfd9a4bf5e88} 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000007c697b382, StatelessResetToken: 0x5c817f71e30fc8fadf29ddb754270585} 2025/04/30 09:38:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:09 client -> Sending packet 1 (37 bytes) for connection c64be460a744ad4f72b316048ba884, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 40000002dbfa0721, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 9900840, LowestAcked: 9900840, DelayTime: 124.596µs} 2025/04/30 09:38:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:09 client <- Reading packet 9900842 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9900842, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 09:38:09 client newly acked packets (2): [0 1] 2025/04/30 09:38:09 client updated RTT: 32.808ms (σ: 10.305ms) 2025/04/30 09:38:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:09 client Canceling loss detection timer. 2025/04/30 09:38:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000001be9eabdee, StatelessResetToken: 0xad16f8ceaa6f2bf35b2b679d3b2bb942} 2025/04/30 09:38:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:09 client Ignoring all packets below 9900841. 2025/04/30 09:38:09 client -> Sending packet 2 (35 bytes) for connection c64be460a744ad4f72b316048ba884, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 40000002dbfa0721, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 9900842, LowestAcked: 9900842, DelayTime: 136.855µs} 2025/04/30 09:38:09 client <- Reading packet 9900847 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9900847, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 239.736ms} 2025/04/30 09:38:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:09 client -> Sending packet 3 (1366 bytes) for connection c64be460a744ad4f72b316048ba884, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 40000002dbfa0721, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.PingFrame{} 2025/04/30 09:38:09 client -> Sending packet 4 (37 bytes) for connection c64be460a744ad4f72b316048ba884, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 40000002dbfa0721, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 9900847, LowestAcked: 9900842, AckRanges: {{Largest: 9900847, Smallest: 9900847}, {Largest: 9900842, Smallest: 9900842}}, DelayTime: 170.408µs} 2025/04/30 09:38:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:09 client -> Sending packet 5 (30 bytes) for connection c64be460a744ad4f72b316048ba884, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 40000002dbfa0721, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:09 client Connection c64be460a744ad4f72b316048ba884 closed. 2025/04/30 09:38:09 Requesting https://server4:443/nqctqjmjzf. 2025/04/30 09:38:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:09 Increased send buffer size to 14336 kiB 2025/04/30 09:38:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:09 Created qlog file: /logs/qlog/760692483f54c5b88e4c3ff843.sqlog 2025/04/30 09:38:09 client Starting new connection to server4 ([::]:55087 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 760692483f54c5b88e4c3ff843, version v1 2025/04/30 09:38:09 Adding connection ID (empty). 2025/04/30 09:38:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:09 client -> Sending packet 0 (1280 bytes) for connection 760692483f54c5b88e4c3ff843, Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: 760692483f54c5b88e4c3ff843, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:09 client -> Sending packet 1 (1280 bytes) for connection 760692483f54c5b88e4c3ff843, Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: 760692483f54c5b88e4c3ff843, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:09 client -> Sending packet 2 (1280 bytes) for connection 760692483f54c5b88e4c3ff843, Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: 760692483f54c5b88e4c3ff843, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:09 client <- Reading packet 16481032 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000490cc61ffd, Token: (empty), PacketNumber: 16481032, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:09 client Received first packet. Switching destination connection ID to: 400000490cc61ffd 2025/04/30 09:38:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 664µs} 2025/04/30 09:38:09 client -> Sending packet 3 (1280 bytes) for connection 760692483f54c5b88e4c3ff843, Initial 2025/04/30 09:38:09 client Long Header{Type: Initial, DestConnectionID: 400000490cc61ffd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 16481032, LowestAcked: 16481032, DelayTime: 0s} 2025/04/30 09:38:09 client <- Reading packet 16481032 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000490cc61ffd, PacketNumber: 16481032, PacketNumberLen: 4, Length: 743, Version: v1} 2025/04/30 09:38:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 09:38:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 760692483f54c5b88e4c3ff843, InitialSourceConnectionID: 400000490cc61ffd, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xc005725bc6bac224c73d6b14d01a0425, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:09 client -> Sending packet 0 (82 bytes) for connection 760692483f54c5b88e4c3ff843, Handshake 2025/04/30 09:38:09 client Long Header{Type: Handshake, DestConnectionID: 400000490cc61ffd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:09 client -> &wire.AckFrame{LargestAcked: 16481032, LowestAcked: 16481032, DelayTime: 0s} 2025/04/30 09:38:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:09 client Dropping Initial keys. 2025/04/30 09:38:09 client -> Sending packet 0 (46 bytes) for connection 760692483f54c5b88e4c3ff843, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:09 client Short Header{DestConnectionID: 400000490cc61ffd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:10 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:10 client -> Sending packet 1 (74 bytes) for connection 760692483f54c5b88e4c3ff843, Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: 400000490cc61ffd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:10 client -> Sending packet 2 (74 bytes) for connection 760692483f54c5b88e4c3ff843, Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: 400000490cc61ffd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:10 client <- Reading packet 16481035 (41 bytes) for connection (empty), Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000490cc61ffd, PacketNumber: 16481035, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 336µs} 2025/04/30 09:38:10 client Peer doesn't await address validation any longer. 2025/04/30 09:38:10 client <- Reading packet 16481032 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:10 client Short Header{DestConnectionID: (empty), PacketNumber: 16481032, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.904ms} 2025/04/30 09:38:10 client newly acked packets (1): [0] 2025/04/30 09:38:10 client updated RTT: 231.857029ms (σ: 115.928514ms) 2025/04/30 09:38:10 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:10 client Canceling loss detection timer. 2025/04/30 09:38:10 client Dropping Handshake keys. 2025/04/30 09:38:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000536334756b, StatelessResetToken: 0x398d698a2ea9ed28dea0c9664466c562} 2025/04/30 09:38:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000049c7fe3298, StatelessResetToken: 0x8c074d26cf16bcab9e626714ea764fc0} 2025/04/30 09:38:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000057bf67ca55, StatelessResetToken: 0x0018945720c1b1a229e5acf4c40219f9} 2025/04/30 09:38:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:10 client -> Sending packet 1 (37 bytes) for connection 760692483f54c5b88e4c3ff843, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 400000536334756b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 16481032, LowestAcked: 16481032, DelayTime: 132.287µs} 2025/04/30 09:38:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:10 client Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 09:38:10 client <- Reading packet 16481033 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:10 client Short Header{DestConnectionID: (empty), PacketNumber: 16481033, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:10 client -> Sending packet 2 (30 bytes) for connection 760692483f54c5b88e4c3ff843, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 400000536334756b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:10 client Connection 760692483f54c5b88e4c3ff843 closed. 2025/04/30 09:38:10 Requesting https://server4:443/pcpnszmptk. 2025/04/30 09:38:10 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:10 Increased send buffer size to 14336 kiB 2025/04/30 09:38:10 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:10 Created qlog file: /logs/qlog/9357666b027c94e216522c3c3003ab.sqlog 2025/04/30 09:38:10 client Starting new connection to server4 ([::]:38209 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9357666b027c94e216522c3c3003ab, version v1 2025/04/30 09:38:10 Adding connection ID (empty). 2025/04/30 09:38:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:10 client -> Sending packet 0 (1280 bytes) for connection 9357666b027c94e216522c3c3003ab, Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: 9357666b027c94e216522c3c3003ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:10 client -> Sending packet 1 (1280 bytes) for connection 9357666b027c94e216522c3c3003ab, Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: 9357666b027c94e216522c3c3003ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:10 client -> Sending packet 2 (1280 bytes) for connection 9357666b027c94e216522c3c3003ab, Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: 9357666b027c94e216522c3c3003ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:10 client <- Reading packet 8705518 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c29a1ce0d1, Token: (empty), PacketNumber: 8705518, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:10 client Received first packet. Switching destination connection ID to: 400000c29a1ce0d1 2025/04/30 09:38:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 109.968ms} 2025/04/30 09:38:10 client newly acked packets (1): [2] 2025/04/30 09:38:10 client updated RTT: 143.79251ms (σ: 71.896255ms) 2025/04/30 09:38:10 client -> Sending packet 3 (1280 bytes) for connection 9357666b027c94e216522c3c3003ab, Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: 400000c29a1ce0d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 8705518, LowestAcked: 8705518, DelayTime: 0s} 2025/04/30 09:38:10 client <- Reading packet 8705518 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c29a1ce0d1, PacketNumber: 8705518, PacketNumberLen: 4, Length: 743, Version: v1} 2025/04/30 09:38:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 09:38:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9357666b027c94e216522c3c3003ab, InitialSourceConnectionID: 400000c29a1ce0d1, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x7a5b4218f57d3ef0277fda59ca1d0cd6, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:10 client -> Sending packet 0 (82 bytes) for connection 9357666b027c94e216522c3c3003ab, Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: 400000c29a1ce0d1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 8705518, LowestAcked: 8705518, DelayTime: 0s} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:10 client Dropping Initial keys. 2025/04/30 09:38:10 client -> Sending packet 0 (46 bytes) for connection 9357666b027c94e216522c3c3003ab, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 400000c29a1ce0d1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:10 client <- Reading packet 8705519 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c29a1ce0d1, PacketNumber: 8705519, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 320µs} 2025/04/30 09:38:10 client Peer doesn't await address validation any longer. 2025/04/30 09:38:10 client newly acked packets (1): [0] 2025/04/30 09:38:10 client updated RTT: 129.743ms (σ: 82.018ms) 2025/04/30 09:38:10 client Canceling loss detection timer. 2025/04/30 09:38:10 client <- Reading packet 8705517 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:10 client Short Header{DestConnectionID: (empty), PacketNumber: 8705517, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 600µs} 2025/04/30 09:38:10 client newly acked packets (1): [0] 2025/04/30 09:38:10 client updated RTT: 117.493ms (σ: 86.013ms) 2025/04/30 09:38:10 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:10 client Dropping Handshake keys. 2025/04/30 09:38:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:10 client -> Sending packet 1 (35 bytes) for connection 9357666b027c94e216522c3c3003ab, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 400000c29a1ce0d1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 8705517, LowestAcked: 8705517, DelayTime: 84.457µs} 2025/04/30 09:38:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:10 client -> Sending packet 2 (30 bytes) for connection 9357666b027c94e216522c3c3003ab, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 400000c29a1ce0d1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:10 client Connection 9357666b027c94e216522c3c3003ab closed. 2025/04/30 09:38:10 Requesting https://server4:443/ikntzygkvi. 2025/04/30 09:38:10 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:10 Increased send buffer size to 14336 kiB 2025/04/30 09:38:10 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:10 Created qlog file: /logs/qlog/f221d76f872b9bc06d8d4a0685f951.sqlog 2025/04/30 09:38:10 client Starting new connection to server4 ([::]:46670 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f221d76f872b9bc06d8d4a0685f951, version v1 2025/04/30 09:38:10 Adding connection ID (empty). 2025/04/30 09:38:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:10 client -> Sending packet 0 (1280 bytes) for connection f221d76f872b9bc06d8d4a0685f951, Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: f221d76f872b9bc06d8d4a0685f951, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:10 client <- Reading packet 785777 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000085a6a25c3d, Token: (empty), PacketNumber: 785777, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:10 client Received first packet. Switching destination connection ID to: 40000085a6a25c3d 2025/04/30 09:38:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:38:10 client newly acked packets (1): [0] 2025/04/30 09:38:10 client updated RTT: 33.165219ms (σ: 16.582609ms) 2025/04/30 09:38:10 client -> Sending packet 1 (1280 bytes) for connection f221d76f872b9bc06d8d4a0685f951, Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: 40000085a6a25c3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 785777, LowestAcked: 785777, DelayTime: 0s} 2025/04/30 09:38:10 client <- Reading packet 785777 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000085a6a25c3d, PacketNumber: 785777, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:38:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f221d76f872b9bc06d8d4a0685f951, InitialSourceConnectionID: 40000085a6a25c3d, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x19601c38759bf0fa83147f5f82b8cb19, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:10 client -> Sending packet 0 (82 bytes) for connection f221d76f872b9bc06d8d4a0685f951, Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: 40000085a6a25c3d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 785777, LowestAcked: 785777, DelayTime: 0s} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:10 client Dropping Initial keys. 2025/04/30 09:38:10 client -> Sending packet 0 (46 bytes) for connection f221d76f872b9bc06d8d4a0685f951, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 40000085a6a25c3d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:10 client <- Reading packet 785778 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000085a6a25c3d, PacketNumber: 785778, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192µs} 2025/04/30 09:38:10 client Peer doesn't await address validation any longer. 2025/04/30 09:38:10 client newly acked packets (1): [0] 2025/04/30 09:38:10 client updated RTT: 32.914ms (σ: 12.938ms) 2025/04/30 09:38:10 client Canceling loss detection timer. 2025/04/30 09:38:10 client <- Reading packet 785777 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:10 client Short Header{DestConnectionID: (empty), PacketNumber: 785777, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:10 client Dropping Handshake keys. 2025/04/30 09:38:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000093f3995016, StatelessResetToken: 0xc5d3c259aba2a5400a963a5770f01927} 2025/04/30 09:38:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000830d937927, StatelessResetToken: 0x5b30bd23a86bc82825f3441c3c4af3af} 2025/04/30 09:38:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000093c8cd601c, StatelessResetToken: 0x399e3801951c8ebde65d21c9ad32c13a} 2025/04/30 09:38:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:10 client -> Sending packet 1 (37 bytes) for connection f221d76f872b9bc06d8d4a0685f951, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 40000093f3995016, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 785777, LowestAcked: 785777, DelayTime: 82.771µs} 2025/04/30 09:38:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:10 client <- Reading packet 785778 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:10 client Short Header{DestConnectionID: (empty), PacketNumber: 785778, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 80µs} 2025/04/30 09:38:10 client newly acked packets (1): [1] 2025/04/30 09:38:10 client updated RTT: 32.651ms (σ: 10.229ms) 2025/04/30 09:38:10 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:10 client lost packet 0 (time threshold) 2025/04/30 09:38:10 client Canceling loss detection timer. 2025/04/30 09:38:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000935dafefb0, StatelessResetToken: 0x3529bc660ffc309889ef8446ed2140a3} 2025/04/30 09:38:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:10 client Ignoring all packets below 785778. 2025/04/30 09:38:10 client -> Sending packet 2 (54 bytes) for connection f221d76f872b9bc06d8d4a0685f951, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 40000093f3995016, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 785778, LowestAcked: 785778, DelayTime: 128.459µs} 2025/04/30 09:38:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:10 client <- Reading packet 785780 (53 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:10 client Short Header{DestConnectionID: (empty), PacketNumber: 785780, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000935dafefb0, StatelessResetToken: 0x3529bc660ffc309889ef8446ed2140a3} 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 90.384ms} 2025/04/30 09:38:10 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:10 client -> Sending packet 3 (37 bytes) for connection f221d76f872b9bc06d8d4a0685f951, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 40000093f3995016, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.AckFrame{LargestAcked: 785780, LowestAcked: 785778, AckRanges: {{Largest: 785780, Smallest: 785780}, {Largest: 785778, Smallest: 785778}}, DelayTime: 108.783µs} 2025/04/30 09:38:10 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:10 client -> Sending packet 5 (46 bytes) for connection f221d76f872b9bc06d8d4a0685f951, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 40000093f3995016, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:10 client -> Sending packet 6 (46 bytes) for connection f221d76f872b9bc06d8d4a0685f951, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 40000093f3995016, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:10 client <- Reading packet 785781 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:10 client Short Header{DestConnectionID: (empty), PacketNumber: 785781, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:10 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 1}}, DelayTime: 240µs} 2025/04/30 09:38:10 client newly acked packets (1): [6] 2025/04/30 09:38:10 client updated RTT: 32.436ms (σ: 8.1ms) 2025/04/30 09:38:10 client Canceling loss detection timer. 2025/04/30 09:38:10 client <- Reading packet 785782 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:10 client Short Header{DestConnectionID: (empty), PacketNumber: 785782, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:10 client -> Sending packet 7 (1366 bytes) for connection f221d76f872b9bc06d8d4a0685f951, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 40000093f3995016, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.PingFrame{} 2025/04/30 09:38:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:10 client -> Sending packet 8 (30 bytes) for connection f221d76f872b9bc06d8d4a0685f951, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:10 client Short Header{DestConnectionID: 40000093f3995016, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:10 client Connection f221d76f872b9bc06d8d4a0685f951 closed. 2025/04/30 09:38:10 Requesting https://server4:443/srwjvorxrr. 2025/04/30 09:38:10 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:10 Increased send buffer size to 14336 kiB 2025/04/30 09:38:10 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:10 Created qlog file: /logs/qlog/461478f5f1d59afc2fd089.sqlog 2025/04/30 09:38:10 client Starting new connection to server4 ([::]:45433 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 461478f5f1d59afc2fd089, version v1 2025/04/30 09:38:10 Adding connection ID (empty). 2025/04/30 09:38:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:10 client -> Sending packet 0 (1280 bytes) for connection 461478f5f1d59afc2fd089, Initial 2025/04/30 09:38:10 client Long Header{Type: Initial, DestConnectionID: 461478f5f1d59afc2fd089, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:38:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:11 client -> Sending packet 1 (1280 bytes) for connection 461478f5f1d59afc2fd089, Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: 461478f5f1d59afc2fd089, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:11 client -> Sending packet 2 (1280 bytes) for connection 461478f5f1d59afc2fd089, Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: 461478f5f1d59afc2fd089, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:38:11 client <- Reading packet 5631716 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000d4f4090a4f, Token: (empty), PacketNumber: 5631716, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:11 client Received first packet. Switching destination connection ID to: 400000d4f4090a4f 2025/04/30 09:38:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 656µs} 2025/04/30 09:38:11 client -> Sending packet 3 (1280 bytes) for connection 461478f5f1d59afc2fd089, Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: 400000d4f4090a4f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:11 client -> &wire.AckFrame{LargestAcked: 5631716, LowestAcked: 5631716, DelayTime: 0s} 2025/04/30 09:38:11 client <- Reading packet 5631716 (757 bytes) for connection (empty), Handshake 2025/04/30 09:38:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d4f4090a4f, PacketNumber: 5631716, PacketNumberLen: 3, Length: 740, Version: v1} 2025/04/30 09:38:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 461478f5f1d59afc2fd089, InitialSourceConnectionID: 400000d4f4090a4f, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x84736c9aaf1351c37ef37b5dabad9123, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:11 client -> Sending packet 0 (82 bytes) for connection 461478f5f1d59afc2fd089, Handshake 2025/04/30 09:38:11 client Long Header{Type: Handshake, DestConnectionID: 400000d4f4090a4f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:11 client -> &wire.AckFrame{LargestAcked: 5631716, LowestAcked: 5631716, DelayTime: 0s} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:11 client Dropping Initial keys. 2025/04/30 09:38:11 client -> Sending packet 0 (46 bytes) for connection 461478f5f1d59afc2fd089, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:11 client Short Header{DestConnectionID: 400000d4f4090a4f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:11 client <- Reading packet 5631718 (757 bytes) for connection (empty), Handshake 2025/04/30 09:38:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d4f4090a4f, PacketNumber: 5631718, PacketNumberLen: 3, Length: 740, Version: v1} 2025/04/30 09:38:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:11 client -> Sending packet 1 (45 bytes) for connection 461478f5f1d59afc2fd089, Handshake 2025/04/30 09:38:11 client Long Header{Type: Handshake, DestConnectionID: 400000d4f4090a4f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:11 client -> &wire.AckFrame{LargestAcked: 5631718, LowestAcked: 5631716, AckRanges: {{Largest: 5631718, Smallest: 5631718}, {Largest: 5631716, Smallest: 5631716}}, DelayTime: 0s} 2025/04/30 09:38:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:11 client -> Sending packet 2 (74 bytes) for connection 461478f5f1d59afc2fd089, Handshake 2025/04/30 09:38:11 client Long Header{Type: Handshake, DestConnectionID: 400000d4f4090a4f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:11 client -> Sending packet 3 (74 bytes) for connection 461478f5f1d59afc2fd089, Handshake 2025/04/30 09:38:11 client Long Header{Type: Handshake, DestConnectionID: 400000d4f4090a4f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:11 client <- Reading packet 5631719 (40 bytes) for connection (empty), Handshake 2025/04/30 09:38:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000d4f4090a4f, PacketNumber: 5631719, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:38:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 336µs} 2025/04/30 09:38:11 client Peer doesn't await address validation any longer. 2025/04/30 09:38:11 client <- Reading packet 5631716 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:11 client Short Header{DestConnectionID: (empty), PacketNumber: 5631716, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.584ms} 2025/04/30 09:38:11 client newly acked packets (1): [0] 2025/04/30 09:38:11 client updated RTT: 231.599273ms (σ: 115.799636ms) 2025/04/30 09:38:11 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:11 client Canceling loss detection timer. 2025/04/30 09:38:11 client Dropping Handshake keys. 2025/04/30 09:38:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000d03184b6bc, StatelessResetToken: 0x55e01717392852885701995d93a96e6a} 2025/04/30 09:38:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d96265c057, StatelessResetToken: 0xe11bb82f0d531cd54151258b7fa6bf61} 2025/04/30 09:38:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000c680fe65d0, StatelessResetToken: 0x42580ad135c47b81a936353bbd1d2adc} 2025/04/30 09:38:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:11 client -> Sending packet 1 (37 bytes) for connection 461478f5f1d59afc2fd089, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:11 client Short Header{DestConnectionID: 400000d03184b6bc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:11 client -> &wire.AckFrame{LargestAcked: 5631716, LowestAcked: 5631716, DelayTime: 144.65µs} 2025/04/30 09:38:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:11 client <- Reading packet 5631717 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:11 client Short Header{DestConnectionID: (empty), PacketNumber: 5631717, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:11 client -> Sending packet 2 (30 bytes) for connection 461478f5f1d59afc2fd089, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:11 client Short Header{DestConnectionID: 400000d03184b6bc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:11 client Connection 461478f5f1d59afc2fd089 closed. 2025/04/30 09:38:11 Requesting https://server4:443/vvhnwzlwrw. 2025/04/30 09:38:11 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:11 Increased send buffer size to 14336 kiB 2025/04/30 09:38:11 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:11 Created qlog file: /logs/qlog/4d25d1210e8883a533bbde77907780.sqlog 2025/04/30 09:38:11 client Starting new connection to server4 ([::]:50841 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4d25d1210e8883a533bbde77907780, version v1 2025/04/30 09:38:11 Adding connection ID (empty). 2025/04/30 09:38:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:11 client -> Sending packet 0 (1280 bytes) for connection 4d25d1210e8883a533bbde77907780, Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: 4d25d1210e8883a533bbde77907780, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:11 client Queueing packet (760 bytes) for later decryption 2025/04/30 09:38:11 client Queueing packet (760 bytes) for later decryption 2025/04/30 09:38:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:11 client -> Sending packet 1 (1280 bytes) for connection 4d25d1210e8883a533bbde77907780, Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: 4d25d1210e8883a533bbde77907780, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:11 client -> Sending packet 2 (1280 bytes) for connection 4d25d1210e8883a533bbde77907780, Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: 4d25d1210e8883a533bbde77907780, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:11 client Queueing packet (760 bytes) for later decryption 2025/04/30 09:38:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:38:11 client -> Sending packet 3 (1280 bytes) for connection 4d25d1210e8883a533bbde77907780, Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: 4d25d1210e8883a533bbde77907780, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:11 client -> Sending packet 4 (1280 bytes) for connection 4d25d1210e8883a533bbde77907780, Initial 2025/04/30 09:38:11 client Long Header{Type: Initial, DestConnectionID: 4d25d1210e8883a533bbde77907780, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:12 client <- Reading packet 3852097 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000008f189d5fe4, Token: (empty), PacketNumber: 3852097, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:12 client Received first packet. Switching destination connection ID to: 4000008f189d5fe4 2025/04/30 09:38:12 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 130.528ms} 2025/04/30 09:38:12 client Queueing packet (760 bytes) for later decryption 2025/04/30 09:38:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:38:12 client -> Sending packet 5 (1280 bytes) for connection 4d25d1210e8883a533bbde77907780, Initial 2025/04/30 09:38:12 client Long Header{Type: Initial, DestConnectionID: 4000008f189d5fe4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:12 client -> Sending packet 6 (1280 bytes) for connection 4d25d1210e8883a533bbde77907780, Initial 2025/04/30 09:38:12 client Long Header{Type: Initial, DestConnectionID: 4000008f189d5fe4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:12 client <- Reading packet 3852099 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000008f189d5fe4, Token: (empty), PacketNumber: 3852099, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:12 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 941.68ms} 2025/04/30 09:38:12 client -> Sending packet 7 (1280 bytes) for connection 4d25d1210e8883a533bbde77907780, Initial 2025/04/30 09:38:12 client Long Header{Type: Initial, DestConnectionID: 4000008f189d5fe4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:12 client -> &wire.AckFrame{LargestAcked: 3852099, LowestAcked: 3852097, AckRanges: {{Largest: 3852099, Smallest: 3852099}, {Largest: 3852097, Smallest: 3852097}}, DelayTime: 0s} 2025/04/30 09:38:12 client <- Reading packet 3852091 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008f189d5fe4, PacketNumber: 3852091, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:38:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4d25d1210e8883a533bbde77907780, InitialSourceConnectionID: 4000008f189d5fe4, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xbbd87419fdf9284f096dafcf78741d9b, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:12 client <- Reading packet 3852093 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008f189d5fe4, PacketNumber: 3852093, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:38:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:12 client <- Reading packet 3852095 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008f189d5fe4, PacketNumber: 3852095, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:38:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:12 client <- Reading packet 3852097 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008f189d5fe4, PacketNumber: 3852097, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:38:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:12 client <- Reading packet 3852099 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008f189d5fe4, PacketNumber: 3852099, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:38:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:12 client -> Sending packet 0 (90 bytes) for connection 4d25d1210e8883a533bbde77907780, Handshake 2025/04/30 09:38:12 client Long Header{Type: Handshake, DestConnectionID: 4000008f189d5fe4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 73, Version: v1} 2025/04/30 09:38:12 client -> &wire.AckFrame{LargestAcked: 3852099, LowestAcked: 3852091, AckRanges: {{Largest: 3852099, Smallest: 3852099}, {Largest: 3852097, Smallest: 3852097}, {Largest: 3852095, Smallest: 3852095}, {Largest: 3852093, Smallest: 3852093}, {Largest: 3852091, Smallest: 3852091}}, DelayTime: 0s} 2025/04/30 09:38:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:12 client Dropping Initial keys. 2025/04/30 09:38:12 client -> Sending packet 0 (46 bytes) for connection 4d25d1210e8883a533bbde77907780, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:12 client Short Header{DestConnectionID: 4000008f189d5fe4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:12 client <- Reading packet 3852091 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:12 client Short Header{DestConnectionID: (empty), PacketNumber: 3852091, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:12 client Dropping Handshake keys. 2025/04/30 09:38:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000009a83a10962, StatelessResetToken: 0xe7977ed10a626f62983562b6521fd364} 2025/04/30 09:38:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000091a902ee98, StatelessResetToken: 0x198740349541adfc47e663abff080c2c} 2025/04/30 09:38:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000973d04b874, StatelessResetToken: 0x4bc87ebdadd392c853b701e45d3862db} 2025/04/30 09:38:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:12 client <- Reading packet 3852092 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:12 client Short Header{DestConnectionID: (empty), PacketNumber: 3852092, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 488µs} 2025/04/30 09:38:12 client newly acked packets (1): [0] 2025/04/30 09:38:12 client updated RTT: 31.773634ms (σ: 15.886817ms) 2025/04/30 09:38:12 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:12 client Canceling loss detection timer. 2025/04/30 09:38:12 client -> Sending packet 1 (37 bytes) for connection 4d25d1210e8883a533bbde77907780, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:12 client Short Header{DestConnectionID: 4000009a83a10962, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:12 client -> &wire.AckFrame{LargestAcked: 3852092, LowestAcked: 3852091, DelayTime: 146.784µs} 2025/04/30 09:38:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:12 client <- Reading packet 3852093 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:12 client Short Header{DestConnectionID: (empty), PacketNumber: 3852093, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:12 client -> Sending packet 2 (30 bytes) for connection 4d25d1210e8883a533bbde77907780, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:12 client Short Header{DestConnectionID: 4000009a83a10962, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:12 client Connection 4d25d1210e8883a533bbde77907780 closed. 2025/04/30 09:38:12 Requesting https://server4:443/bpwpzuokld. 2025/04/30 09:38:12 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:12 Increased send buffer size to 14336 kiB 2025/04/30 09:38:12 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:12 Created qlog file: /logs/qlog/22e401e39d294a3aafd88496.sqlog 2025/04/30 09:38:12 client Starting new connection to server4 ([::]:54010 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 22e401e39d294a3aafd88496, version v1 2025/04/30 09:38:12 Adding connection ID (empty). 2025/04/30 09:38:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:12 client -> Sending packet 0 (1280 bytes) for connection 22e401e39d294a3aafd88496, Initial 2025/04/30 09:38:12 client Long Header{Type: Initial, DestConnectionID: 22e401e39d294a3aafd88496, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:12 client <- Reading packet 7916671 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000008339c25294, Token: (empty), PacketNumber: 7916671, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:12 client Received first packet. Switching destination connection ID to: 4000008339c25294 2025/04/30 09:38:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:38:12 client newly acked packets (1): [0] 2025/04/30 09:38:12 client updated RTT: 33.146108ms (σ: 16.573054ms) 2025/04/30 09:38:12 client -> Sending packet 1 (1280 bytes) for connection 22e401e39d294a3aafd88496, Initial 2025/04/30 09:38:12 client Long Header{Type: Initial, DestConnectionID: 4000008339c25294, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:12 client -> &wire.AckFrame{LargestAcked: 7916671, LowestAcked: 7916671, DelayTime: 0s} 2025/04/30 09:38:13 client -> Sending packet 2 (1280 bytes) for connection 22e401e39d294a3aafd88496, Initial 2025/04/30 09:38:13 client Long Header{Type: Initial, DestConnectionID: 4000008339c25294, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:13 client -> &wire.PingFrame{} 2025/04/30 09:38:13 client <- Reading packet 7916673 (758 bytes) for connection (empty), Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008339c25294, PacketNumber: 7916673, PacketNumberLen: 3, Length: 741, Version: v1} 2025/04/30 09:38:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 09:38:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 22e401e39d294a3aafd88496, InitialSourceConnectionID: 4000008339c25294, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x820b6d350cbf53c24c4aa864c00e4749, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:13 client -> Sending packet 0 (82 bytes) for connection 22e401e39d294a3aafd88496, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000008339c25294, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 7916673, LowestAcked: 7916673, DelayTime: 0s} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:13 client Dropping Initial keys. 2025/04/30 09:38:13 client -> Sending packet 0 (46 bytes) for connection 22e401e39d294a3aafd88496, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 4000008339c25294, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:13 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:13 client -> Sending packet 1 (74 bytes) for connection 22e401e39d294a3aafd88496, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000008339c25294, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:13 client -> Sending packet 2 (74 bytes) for connection 22e401e39d294a3aafd88496, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000008339c25294, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:13 client <- Reading packet 7916671 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:13 client Short Header{DestConnectionID: (empty), PacketNumber: 7916671, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.952ms} 2025/04/30 09:38:13 client Peer doesn't await address validation any longer. 2025/04/30 09:38:13 client newly acked packets (1): [0] 2025/04/30 09:38:13 client updated RTT: 42.337ms (σ: 30.813ms) 2025/04/30 09:38:13 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:13 client Canceling loss detection timer. 2025/04/30 09:38:13 client Dropping Handshake keys. 2025/04/30 09:38:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000088f17dfc72, StatelessResetToken: 0x96a4ca85ae73c23d4b6ce95884f52ddc} 2025/04/30 09:38:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008378f148f5, StatelessResetToken: 0x269877ebe047a018e13cc657358600c3} 2025/04/30 09:38:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000095f7de586e, StatelessResetToken: 0xbd212c9efa6eabc16ee1e32297eef1c0} 2025/04/30 09:38:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:13 client -> Sending packet 1 (37 bytes) for connection 22e401e39d294a3aafd88496, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 40000088f17dfc72, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 7916671, LowestAcked: 7916671, DelayTime: 178.584µs} 2025/04/30 09:38:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:13 client <- Reading packet 7916672 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:13 client Short Header{DestConnectionID: (empty), PacketNumber: 7916672, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:13 client -> Sending packet 2 (30 bytes) for connection 22e401e39d294a3aafd88496, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 40000088f17dfc72, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:13 client Connection 22e401e39d294a3aafd88496 closed. 2025/04/30 09:38:13 Requesting https://server4:443/uehexnifze. 2025/04/30 09:38:13 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:13 Increased send buffer size to 14336 kiB 2025/04/30 09:38:13 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:13 Created qlog file: /logs/qlog/e4c82dab08f297d89d1d93e5ac0a00b1e70b710d.sqlog 2025/04/30 09:38:13 client Starting new connection to server4 ([::]:36779 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, version v1 2025/04/30 09:38:13 Adding connection ID (empty). 2025/04/30 09:38:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:13 client -> Sending packet 0 (1280 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, Initial 2025/04/30 09:38:13 client Long Header{Type: Initial, DestConnectionID: e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:13 client <- Reading packet 8927730 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000009550254ab9, Token: (empty), PacketNumber: 8927730, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:13 client Received first packet. Switching destination connection ID to: 4000009550254ab9 2025/04/30 09:38:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:38:13 client newly acked packets (1): [0] 2025/04/30 09:38:13 client updated RTT: 33.154194ms (σ: 16.577097ms) 2025/04/30 09:38:13 client -> Sending packet 1 (1280 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, Initial 2025/04/30 09:38:13 client Long Header{Type: Initial, DestConnectionID: 4000009550254ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 8927730, LowestAcked: 8927730, DelayTime: 0s} 2025/04/30 09:38:13 client <- Reading packet 8927730 (766 bytes) for connection (empty), Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009550254ab9, PacketNumber: 8927730, PacketNumberLen: 4, Length: 749, Version: v1} 2025/04/30 09:38:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 09:38:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, InitialSourceConnectionID: 4000009550254ab9, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x032e3e12c162082be2813c4d1f28dcb8, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:13 client -> Sending packet 0 (82 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000009550254ab9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 8927730, LowestAcked: 8927730, DelayTime: 0s} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:13 client Dropping Initial keys. 2025/04/30 09:38:13 client -> Sending packet 0 (46 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 4000009550254ab9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:13 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:13 client -> Sending packet 1 (74 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000009550254ab9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:13 client -> Sending packet 2 (74 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000009550254ab9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:13 client <- Reading packet 8927732 (766 bytes) for connection (empty), Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009550254ab9, PacketNumber: 8927732, PacketNumberLen: 4, Length: 749, Version: v1} 2025/04/30 09:38:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 09:38:13 client -> Sending packet 3 (45 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000009550254ab9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 8927732, LowestAcked: 8927730, AckRanges: {{Largest: 8927732, Smallest: 8927732}, {Largest: 8927730, Smallest: 8927730}}, DelayTime: 0s} 2025/04/30 09:38:13 client <- Reading packet 8927733 (41 bytes) for connection (empty), Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009550254ab9, PacketNumber: 8927733, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:38:13 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 296µs} 2025/04/30 09:38:13 client Peer doesn't await address validation any longer. 2025/04/30 09:38:13 client newly acked packets (1): [2] 2025/04/30 09:38:13 client updated RTT: 32.908ms (σ: 12.923ms) 2025/04/30 09:38:13 client Canceling loss detection timer. 2025/04/30 09:38:13 client <- Reading packet 8927730 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:13 client Short Header{DestConnectionID: (empty), PacketNumber: 8927730, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:13 client Dropping Handshake keys. 2025/04/30 09:38:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000861deb0929, StatelessResetToken: 0x15f48d87ffe3b7792983376e142409b7} 2025/04/30 09:38:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000009f95c52009, StatelessResetToken: 0x038bf48e0c155cc36b1ed1358650670a} 2025/04/30 09:38:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000804ecdbf4a, StatelessResetToken: 0x76abbfdf1e612a6c41192a500a975191} 2025/04/30 09:38:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:13 client -> Sending packet 2 (56 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 400000861deb0929, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 8927730, LowestAcked: 8927730, DelayTime: 178.332µs} 2025/04/30 09:38:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:13 client -> Sending packet 3 (48 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 400000861deb0929, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:13 client <- Reading packet 8927734 (53 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:13 client Short Header{DestConnectionID: (empty), PacketNumber: 8927734, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000009b05f1aba9, StatelessResetToken: 0xfdc904b4b6b6cb487c9603ff2e05b491} 2025/04/30 09:38:13 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 96.928ms} 2025/04/30 09:38:13 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:13 client <- Reading packet 8927735 (53 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:13 client Short Header{DestConnectionID: (empty), PacketNumber: 8927735, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000009b05f1aba9, StatelessResetToken: 0xfdc904b4b6b6cb487c9603ff2e05b491} 2025/04/30 09:38:13 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 97.024ms} 2025/04/30 09:38:13 client -> Sending packet 4 (37 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 400000861deb0929, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 8927735, LowestAcked: 8927730, AckRanges: {{Largest: 8927735, Smallest: 8927734}, {Largest: 8927730, Smallest: 8927730}}, DelayTime: 155.28µs} 2025/04/30 09:38:13 client <- Reading packet 8927736 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:13 client Short Header{DestConnectionID: (empty), PacketNumber: 8927736, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:13 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 184µs} 2025/04/30 09:38:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:13 client -> Sending packet 5 (30 bytes) for connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 400000861deb0929, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:13 client Connection e4c82dab08f297d89d1d93e5ac0a00b1e70b710d closed. 2025/04/30 09:38:13 Requesting https://server4:443/gvlzoquctf. 2025/04/30 09:38:13 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:13 Increased send buffer size to 14336 kiB 2025/04/30 09:38:13 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:13 Created qlog file: /logs/qlog/bb59b8f94e66d0a240a6f4a08a30f5990e8c.sqlog 2025/04/30 09:38:13 client Starting new connection to server4 ([::]:37476 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bb59b8f94e66d0a240a6f4a08a30f5990e8c, version v1 2025/04/30 09:38:13 Adding connection ID (empty). 2025/04/30 09:38:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:13 client -> Sending packet 0 (1280 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, Initial 2025/04/30 09:38:13 client Long Header{Type: Initial, DestConnectionID: bb59b8f94e66d0a240a6f4a08a30f5990e8c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:13 client Queueing packet (765 bytes) for later decryption 2025/04/30 09:38:13 client <- Reading packet 11628552 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004d66c2e34d, Token: (empty), PacketNumber: 11628552, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:13 client Received first packet. Switching destination connection ID to: 4000004d66c2e34d 2025/04/30 09:38:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.976ms} 2025/04/30 09:38:13 client newly acked packets (1): [0] 2025/04/30 09:38:13 client updated RTT: 142.753679ms (σ: 71.376839ms) 2025/04/30 09:38:13 client -> Sending packet 1 (1280 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, Initial 2025/04/30 09:38:13 client Long Header{Type: Initial, DestConnectionID: 4000004d66c2e34d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 11628552, LowestAcked: 11628552, DelayTime: 0s} 2025/04/30 09:38:13 client <- Reading packet 11628550 (765 bytes) for connection (empty), Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004d66c2e34d, PacketNumber: 11628550, PacketNumberLen: 4, Length: 748, Version: v1} 2025/04/30 09:38:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:38:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bb59b8f94e66d0a240a6f4a08a30f5990e8c, InitialSourceConnectionID: 4000004d66c2e34d, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1eb745da0b62046c01296b290ca5e071, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:13 client <- Reading packet 11628552 (765 bytes) for connection (empty), Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004d66c2e34d, PacketNumber: 11628552, PacketNumberLen: 4, Length: 748, Version: v1} 2025/04/30 09:38:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:38:13 client -> Sending packet 0 (84 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000004d66c2e34d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 11628552, LowestAcked: 11628550, AckRanges: {{Largest: 11628552, Smallest: 11628552}, {Largest: 11628550, Smallest: 11628550}}, DelayTime: 0s} 2025/04/30 09:38:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:13 client Dropping Initial keys. 2025/04/30 09:38:13 client -> Sending packet 0 (46 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:13 client Short Header{DestConnectionID: 4000004d66c2e34d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:13 client <- Reading packet 11628554 (765 bytes) for connection (empty), Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004d66c2e34d, PacketNumber: 11628554, PacketNumberLen: 4, Length: 748, Version: v1} 2025/04/30 09:38:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:38:13 client -> Sending packet 1 (47 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, Handshake 2025/04/30 09:38:13 client Long Header{Type: Handshake, DestConnectionID: 4000004d66c2e34d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 09:38:13 client -> &wire.AckFrame{LargestAcked: 11628554, LowestAcked: 11628550, AckRanges: {{Largest: 11628554, Smallest: 11628554}, {Largest: 11628552, Smallest: 11628552}, {Largest: 11628550, Smallest: 11628550}}, DelayTime: 0s} 2025/04/30 09:38:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:14 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:14 client -> Sending packet 2 (74 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, Handshake 2025/04/30 09:38:14 client Long Header{Type: Handshake, DestConnectionID: 4000004d66c2e34d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:14 client -> Sending packet 3 (74 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, Handshake 2025/04/30 09:38:14 client Long Header{Type: Handshake, DestConnectionID: 4000004d66c2e34d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:14 client <- Reading packet 11628550 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:14 client Short Header{DestConnectionID: (empty), PacketNumber: 11628550, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 428.888ms} 2025/04/30 09:38:14 client Peer doesn't await address validation any longer. 2025/04/30 09:38:14 client newly acked packets (1): [0] 2025/04/30 09:38:14 client updated RTT: 179.302ms (σ: 126.631ms) 2025/04/30 09:38:14 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:14 client Canceling loss detection timer. 2025/04/30 09:38:14 client Dropping Handshake keys. 2025/04/30 09:38:14 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000041031e3c73, StatelessResetToken: 0xf1d66f3e633c4faa511306b163156562} 2025/04/30 09:38:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000005ba57d43cc, StatelessResetToken: 0x9dd81ade361c2b0f3b292a963e671b31} 2025/04/30 09:38:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000005bbc2bf1f6, StatelessResetToken: 0x43d401f80cdc9f8f873b7479a567a6f9} 2025/04/30 09:38:14 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:14 client -> Sending packet 1 (37 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:14 client Short Header{DestConnectionID: 40000041031e3c73, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:14 client -> &wire.AckFrame{LargestAcked: 11628550, LowestAcked: 11628550, DelayTime: 268.661µs} 2025/04/30 09:38:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:14 client <- Reading packet 11628551 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:14 client Short Header{DestConnectionID: (empty), PacketNumber: 11628551, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:14 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:14 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:14 client -> Sending packet 2 (30 bytes) for connection bb59b8f94e66d0a240a6f4a08a30f5990e8c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:14 client Short Header{DestConnectionID: 40000041031e3c73, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:14 client Connection bb59b8f94e66d0a240a6f4a08a30f5990e8c closed. 2025/04/30 09:38:14 Requesting https://server4:443/hrzhtlwzye. 2025/04/30 09:38:14 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:14 Increased send buffer size to 14336 kiB 2025/04/30 09:38:14 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:14 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:14 Created qlog file: /logs/qlog/a36ec57e7465c69bedefacb03b41c544bc36.sqlog 2025/04/30 09:38:14 client Starting new connection to server4 ([::]:47957 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a36ec57e7465c69bedefacb03b41c544bc36, version v1 2025/04/30 09:38:14 Adding connection ID (empty). 2025/04/30 09:38:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:14 client -> Sending packet 0 (1280 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, Initial 2025/04/30 09:38:14 client Long Header{Type: Initial, DestConnectionID: a36ec57e7465c69bedefacb03b41c544bc36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:38:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:14 client -> Sending packet 1 (1280 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, Initial 2025/04/30 09:38:14 client Long Header{Type: Initial, DestConnectionID: a36ec57e7465c69bedefacb03b41c544bc36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:38:14 client -> Sending packet 2 (1280 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, Initial 2025/04/30 09:38:14 client Long Header{Type: Initial, DestConnectionID: a36ec57e7465c69bedefacb03b41c544bc36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:38:14 client <- Reading packet 9895071 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000917f1270bd, Token: (empty), PacketNumber: 9895071, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:14 client Received first packet. Switching destination connection ID to: 400000917f1270bd 2025/04/30 09:38:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:14 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:14 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 744µs} 2025/04/30 09:38:14 client -> Sending packet 3 (1280 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, Initial 2025/04/30 09:38:14 client Long Header{Type: Initial, DestConnectionID: 400000917f1270bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:14 client -> &wire.AckFrame{LargestAcked: 9895071, LowestAcked: 9895071, DelayTime: 0s} 2025/04/30 09:38:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:14 client <- Reading packet 9895073 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000917f1270bd, Token: (empty), PacketNumber: 9895073, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:14 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 111.432ms} 2025/04/30 09:38:14 client newly acked packets (1): [2] 2025/04/30 09:38:14 client updated RTT: 145.345722ms (σ: 72.672861ms) 2025/04/30 09:38:14 client <- Reading packet 9895073 (764 bytes) for connection (empty), Handshake 2025/04/30 09:38:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000917f1270bd, PacketNumber: 9895073, PacketNumberLen: 4, Length: 747, Version: v1} 2025/04/30 09:38:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:14 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:14 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a36ec57e7465c69bedefacb03b41c544bc36, InitialSourceConnectionID: 400000917f1270bd, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x067b02e1937f945929687fc8ea41e7d2, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:14 client -> Sending packet 0 (82 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, Handshake 2025/04/30 09:38:14 client Long Header{Type: Handshake, DestConnectionID: 400000917f1270bd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:14 client -> &wire.AckFrame{LargestAcked: 9895073, LowestAcked: 9895073, DelayTime: 0s} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:14 client Dropping Initial keys. 2025/04/30 09:38:14 client -> Sending packet 0 (46 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:14 client Short Header{DestConnectionID: 400000917f1270bd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:14 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:38:14 client <- Reading packet 9895075 (764 bytes) for connection (empty), Handshake 2025/04/30 09:38:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000917f1270bd, PacketNumber: 9895075, PacketNumberLen: 4, Length: 747, Version: v1} 2025/04/30 09:38:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:14 client -> Sending packet 1 (45 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, Handshake 2025/04/30 09:38:14 client Long Header{Type: Handshake, DestConnectionID: 400000917f1270bd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:14 client -> &wire.AckFrame{LargestAcked: 9895075, LowestAcked: 9895073, AckRanges: {{Largest: 9895075, Smallest: 9895075}, {Largest: 9895073, Smallest: 9895073}}, DelayTime: 0s} 2025/04/30 09:38:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:14 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:14 client -> Sending packet 2 (74 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, Handshake 2025/04/30 09:38:14 client Long Header{Type: Handshake, DestConnectionID: 400000917f1270bd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:14 client -> Sending packet 3 (74 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, Handshake 2025/04/30 09:38:14 client Long Header{Type: Handshake, DestConnectionID: 400000917f1270bd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:14 client <- Reading packet 9895071 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:14 client Short Header{DestConnectionID: (empty), PacketNumber: 9895071, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 437.264ms} 2025/04/30 09:38:14 client Peer doesn't await address validation any longer. 2025/04/30 09:38:14 client newly acked packets (1): [0] 2025/04/30 09:38:14 client updated RTT: 182.539ms (σ: 128.892ms) 2025/04/30 09:38:14 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:14 client Canceling loss detection timer. 2025/04/30 09:38:14 client Dropping Handshake keys. 2025/04/30 09:38:14 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000008a6767f6f9, StatelessResetToken: 0xf23813527462a6b175fb2ebd7f2078f5} 2025/04/30 09:38:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008fc6b12487, StatelessResetToken: 0x772dcc2adc8f7c3336d95f24cd99a38e} 2025/04/30 09:38:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000990ad305c0, StatelessResetToken: 0xec194f15f4215aa1a9ee5ae9c64a045a} 2025/04/30 09:38:14 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:14 client -> Sending packet 1 (37 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:14 client Short Header{DestConnectionID: 4000008a6767f6f9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:14 client -> &wire.AckFrame{LargestAcked: 9895071, LowestAcked: 9895071, DelayTime: 169.427µs} 2025/04/30 09:38:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:14 client <- Reading packet 9895072 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:14 client Short Header{DestConnectionID: (empty), PacketNumber: 9895072, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:14 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:14 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:14 client -> Sending packet 2 (30 bytes) for connection a36ec57e7465c69bedefacb03b41c544bc36, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:14 client Short Header{DestConnectionID: 4000008a6767f6f9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:14 client Connection a36ec57e7465c69bedefacb03b41c544bc36 closed. 2025/04/30 09:38:14 Requesting https://server4:443/zfrrifrdub. 2025/04/30 09:38:14 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:14 Increased send buffer size to 14336 kiB 2025/04/30 09:38:14 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:14 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:14 Created qlog file: /logs/qlog/98d22ccb4ecdab8f93ac357d8e.sqlog 2025/04/30 09:38:14 client Starting new connection to server4 ([::]:34094 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 98d22ccb4ecdab8f93ac357d8e, version v1 2025/04/30 09:38:14 Adding connection ID (empty). 2025/04/30 09:38:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:14 client -> Sending packet 0 (1280 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, Initial 2025/04/30 09:38:14 client Long Header{Type: Initial, DestConnectionID: 98d22ccb4ecdab8f93ac357d8e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:38:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:38:14 client Queueing packet (759 bytes) for later decryption 2025/04/30 09:38:15 client <- Reading packet 4294118 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000059c154245, Token: (empty), PacketNumber: 4294118, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:15 client Received first packet. Switching destination connection ID to: 400000059c154245 2025/04/30 09:38:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 111.064ms} 2025/04/30 09:38:15 client newly acked packets (1): [0] 2025/04/30 09:38:15 client updated RTT: 143.678474ms (σ: 71.839237ms) 2025/04/30 09:38:15 client -> Sending packet 1 (1280 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, Initial 2025/04/30 09:38:15 client Long Header{Type: Initial, DestConnectionID: 400000059c154245, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:15 client -> &wire.AckFrame{LargestAcked: 4294118, LowestAcked: 4294118, DelayTime: 0s} 2025/04/30 09:38:15 client <- Reading packet 4294116 (759 bytes) for connection (empty), Handshake 2025/04/30 09:38:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000059c154245, PacketNumber: 4294116, PacketNumberLen: 3, Length: 742, Version: v1} 2025/04/30 09:38:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 09:38:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 98d22ccb4ecdab8f93ac357d8e, InitialSourceConnectionID: 400000059c154245, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x021c24bbbc304a03788d035e7b285621, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:15 client -> Sending packet 0 (82 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, Handshake 2025/04/30 09:38:15 client Long Header{Type: Handshake, DestConnectionID: 400000059c154245, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:15 client -> &wire.AckFrame{LargestAcked: 4294116, LowestAcked: 4294116, DelayTime: 0s} 2025/04/30 09:38:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:15 client Dropping Initial keys. 2025/04/30 09:38:15 client -> Sending packet 0 (46 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:15 client Short Header{DestConnectionID: 400000059c154245, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:15 client <- Reading packet 4294119 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000059c154245, PacketNumber: 4294119, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 09:38:15 client Peer doesn't await address validation any longer. 2025/04/30 09:38:15 client newly acked packets (1): [0] 2025/04/30 09:38:15 client updated RTT: 129.665ms (σ: 81.903ms) 2025/04/30 09:38:15 client Canceling loss detection timer. 2025/04/30 09:38:15 client <- Reading packet 4294116 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:15 client Short Header{DestConnectionID: (empty), PacketNumber: 4294116, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:15 client Dropping Handshake keys. 2025/04/30 09:38:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000053934c2a4, StatelessResetToken: 0x05f4341b0c7a2a46fe5d5ecc5a7589b5} 2025/04/30 09:38:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000000f55b740db, StatelessResetToken: 0x41e961630d80f288a8c12c67e4485526} 2025/04/30 09:38:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000212bac7d0, StatelessResetToken: 0xcbd490293be9efd568e25c92b51380be} 2025/04/30 09:38:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:15 client -> Sending packet 1 (37 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:15 client Short Header{DestConnectionID: 400000053934c2a4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:15 client -> &wire.AckFrame{LargestAcked: 4294116, LowestAcked: 4294116, DelayTime: 173.674µs} 2025/04/30 09:38:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:15 client <- Reading packet 4294119 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:15 client Short Header{DestConnectionID: (empty), PacketNumber: 4294119, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000005cfde2425, StatelessResetToken: 0xc801b0b6e28ab4fa00a766f600e1a2d0} 2025/04/30 09:38:15 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 190.512ms} 2025/04/30 09:38:15 client newly acked packets (1): [1] 2025/04/30 09:38:15 client updated RTT: 137.994ms (σ: 78.085ms) 2025/04/30 09:38:15 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:15 client lost packet 0 (time threshold) 2025/04/30 09:38:15 client Canceling loss detection timer. 2025/04/30 09:38:15 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:15 client Ignoring all packets below 4294117. 2025/04/30 09:38:15 client -> Sending packet 2 (54 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:15 client Short Header{DestConnectionID: 400000053934c2a4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:15 client -> &wire.AckFrame{LargestAcked: 4294119, LowestAcked: 4294119, DelayTime: 183.092µs} 2025/04/30 09:38:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:15 client -> Sending packet 4 (46 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:15 client Short Header{DestConnectionID: 400000053934c2a4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:15 client -> Sending packet 5 (46 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:15 client Short Header{DestConnectionID: 400000053934c2a4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:15 client -> Sending packet 6 (1366 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:15 client Short Header{DestConnectionID: 400000053934c2a4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:15 client -> &wire.PingFrame{} 2025/04/30 09:38:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:15 client <- Reading packet 4294122 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:15 client Short Header{DestConnectionID: (empty), PacketNumber: 4294122, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:15 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 280µs} 2025/04/30 09:38:15 client newly acked packets (1): [5] 2025/04/30 09:38:15 client updated RTT: 124.621ms (σ: 85.307ms) 2025/04/30 09:38:15 client Canceling loss detection timer. 2025/04/30 09:38:15 client <- Reading packet 4294124 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:15 client Short Header{DestConnectionID: (empty), PacketNumber: 4294124, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:15 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 19.272ms} 2025/04/30 09:38:15 client newly acked packets (1): [6] 2025/04/30 09:38:15 client updated RTT: 113.033ms (σ: 87.155ms) 2025/04/30 09:38:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:16 client <- Reading packet 4294126 (57 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4294126, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000005cfde2425, StatelessResetToken: 0xc801b0b6e28ab4fa00a766f600e1a2d0} 2025/04/30 09:38:16 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 730.168ms} 2025/04/30 09:38:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:16 client <- Reading packet 4294127 (57 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4294127, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000005cfde2425, StatelessResetToken: 0xc801b0b6e28ab4fa00a766f600e1a2d0} 2025/04/30 09:38:16 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 730.272ms} 2025/04/30 09:38:16 client -> Sending packet 7 (1409 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 400000053934c2a4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.PingFrame{} 2025/04/30 09:38:16 client -> Sending packet 8 (41 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 400000053934c2a4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.AckFrame{LargestAcked: 4294127, LowestAcked: 4294119, AckRanges: {{Largest: 4294127, Smallest: 4294126}, {Largest: 4294124, Smallest: 4294124}, {Largest: 4294122, Smallest: 4294122}, {Largest: 4294119, Smallest: 4294119}}, DelayTime: 239.758µs} 2025/04/30 09:38:16 client <- Reading packet 4294128 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4294128, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:16 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 272µs} 2025/04/30 09:38:16 client newly acked packets (1): [7] 2025/04/30 09:38:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:16 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:16 client -> Sending packet 9 (30 bytes) for connection 98d22ccb4ecdab8f93ac357d8e, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 400000053934c2a4, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:16 client Connection 98d22ccb4ecdab8f93ac357d8e closed. 2025/04/30 09:38:16 Requesting https://server4:443/thjmmcsadw. 2025/04/30 09:38:16 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:16 Increased send buffer size to 14336 kiB 2025/04/30 09:38:16 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:16 Created qlog file: /logs/qlog/33e1dce00053c1ccf46b1dbd95deb4.sqlog 2025/04/30 09:38:16 client Starting new connection to server4 ([::]:45553 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 33e1dce00053c1ccf46b1dbd95deb4, version v1 2025/04/30 09:38:16 Adding connection ID (empty). 2025/04/30 09:38:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:16 client -> Sending packet 0 (1280 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, Initial 2025/04/30 09:38:16 client Long Header{Type: Initial, DestConnectionID: 33e1dce00053c1ccf46b1dbd95deb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:38:16 client <- Reading packet 7230938 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004403e40569, Token: (empty), PacketNumber: 7230938, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:16 client Received first packet. Switching destination connection ID to: 4000004403e40569 2025/04/30 09:38:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 616µs} 2025/04/30 09:38:16 client newly acked packets (1): [0] 2025/04/30 09:38:16 client updated RTT: 33.220028ms (σ: 16.610014ms) 2025/04/30 09:38:16 client -> Sending packet 1 (1280 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, Initial 2025/04/30 09:38:16 client Long Header{Type: Initial, DestConnectionID: 4000004403e40569, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:16 client -> &wire.AckFrame{LargestAcked: 7230938, LowestAcked: 7230938, DelayTime: 0s} 2025/04/30 09:38:16 client -> Sending packet 2 (1280 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, Initial 2025/04/30 09:38:16 client Long Header{Type: Initial, DestConnectionID: 4000004403e40569, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:16 client -> &wire.PingFrame{} 2025/04/30 09:38:16 client <- Reading packet 7230940 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004403e40569, Token: (empty), PacketNumber: 7230940, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 111.032ms} 2025/04/30 09:38:16 client -> Sending packet 3 (1280 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, Initial 2025/04/30 09:38:16 client Long Header{Type: Initial, DestConnectionID: 4000004403e40569, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:16 client -> &wire.AckFrame{LargestAcked: 7230940, LowestAcked: 7230938, AckRanges: {{Largest: 7230940, Smallest: 7230940}, {Largest: 7230938, Smallest: 7230938}}, DelayTime: 0s} 2025/04/30 09:38:16 client <- Reading packet 7230940 (759 bytes) for connection (empty), Handshake 2025/04/30 09:38:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004403e40569, PacketNumber: 7230940, PacketNumberLen: 3, Length: 742, Version: v1} 2025/04/30 09:38:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 09:38:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 33e1dce00053c1ccf46b1dbd95deb4, InitialSourceConnectionID: 4000004403e40569, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x39ec2f51f562fa160b469bed1112e700, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:16 client -> Sending packet 0 (82 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, Handshake 2025/04/30 09:38:16 client Long Header{Type: Handshake, DestConnectionID: 4000004403e40569, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:16 client -> &wire.AckFrame{LargestAcked: 7230940, LowestAcked: 7230940, DelayTime: 0s} 2025/04/30 09:38:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:16 client Dropping Initial keys. 2025/04/30 09:38:16 client -> Sending packet 0 (46 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 4000004403e40569, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:16 client <- Reading packet 7230941 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004403e40569, PacketNumber: 7230941, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 09:38:16 client Peer doesn't await address validation any longer. 2025/04/30 09:38:16 client newly acked packets (1): [0] 2025/04/30 09:38:16 client updated RTT: 32.956ms (σ: 12.984ms) 2025/04/30 09:38:16 client Canceling loss detection timer. 2025/04/30 09:38:16 client <- Reading packet 7230938 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:16 client Short Header{DestConnectionID: (empty), PacketNumber: 7230938, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:16 client Dropping Handshake keys. 2025/04/30 09:38:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000005f9ed3c25e, StatelessResetToken: 0x308ce15d3aebf7f2ebc5d6780c1c664e} 2025/04/30 09:38:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000050c4df538b, StatelessResetToken: 0x118c7577ec571260b46c80df4cd25e95} 2025/04/30 09:38:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000043cd584296, StatelessResetToken: 0x42fcc94e22b42dc62164020c53e357ce} 2025/04/30 09:38:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:16 client -> Sending packet 1 (37 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 4000005f9ed3c25e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.AckFrame{LargestAcked: 7230938, LowestAcked: 7230938, DelayTime: 72.774µs} 2025/04/30 09:38:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:16 client <- Reading packet 7230940 (106 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:16 client Short Header{DestConnectionID: (empty), PacketNumber: 7230940, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000005f9ed3c25e, StatelessResetToken: 0x308ce15d3aebf7f2ebc5d6780c1c664e} 2025/04/30 09:38:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000050c4df538b, StatelessResetToken: 0x118c7577ec571260b46c80df4cd25e95} 2025/04/30 09:38:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000043cd584296, StatelessResetToken: 0x42fcc94e22b42dc62164020c53e357ce} 2025/04/30 09:38:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:16 client -> Sending packet 2 (37 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 4000005f9ed3c25e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.AckFrame{LargestAcked: 7230940, LowestAcked: 7230938, AckRanges: {{Largest: 7230940, Smallest: 7230940}, {Largest: 7230938, Smallest: 7230938}}, DelayTime: 111.498µs} 2025/04/30 09:38:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:16 client -> Sending packet 4 (46 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 4000005f9ed3c25e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:16 client Skipping packet number 3 2025/04/30 09:38:16 client -> Sending packet 5 (29 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 4000005f9ed3c25e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:16 client <- Reading packet 7230942 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:16 client Short Header{DestConnectionID: (empty), PacketNumber: 7230942, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:16 client -> Sending packet 6 (39 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 4000005f9ed3c25e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.AckFrame{LargestAcked: 7230942, LowestAcked: 7230938, AckRanges: {{Largest: 7230942, Smallest: 7230942}, {Largest: 7230940, Smallest: 7230940}, {Largest: 7230938, Smallest: 7230938}}, DelayTime: 77.885µs} 2025/04/30 09:38:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:16 client -> Sending packet 7 (30 bytes) for connection 33e1dce00053c1ccf46b1dbd95deb4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:16 client Short Header{DestConnectionID: 4000005f9ed3c25e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:16 client Connection 33e1dce00053c1ccf46b1dbd95deb4 closed. 2025/04/30 09:38:16 Requesting https://server4:443/xrsgehkgpk. 2025/04/30 09:38:16 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:16 Increased send buffer size to 14336 kiB 2025/04/30 09:38:16 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:16 Created qlog file: /logs/qlog/0e531a3b2efcd722.sqlog 2025/04/30 09:38:16 client Starting new connection to server4 ([::]:41753 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0e531a3b2efcd722, version v1 2025/04/30 09:38:16 Adding connection ID (empty). 2025/04/30 09:38:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:16 client -> Sending packet 0 (1280 bytes) for connection 0e531a3b2efcd722, Initial 2025/04/30 09:38:16 client Long Header{Type: Initial, DestConnectionID: 0e531a3b2efcd722, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:38:16 client Queueing packet (754 bytes) for later decryption 2025/04/30 09:38:17 client <- Reading packet 6619282 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000562f66f7cb, Token: (empty), PacketNumber: 6619282, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:17 client Received first packet. Switching destination connection ID to: 400000562f66f7cb 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.976ms} 2025/04/30 09:38:17 client newly acked packets (1): [0] 2025/04/30 09:38:17 client updated RTT: 142.752313ms (σ: 71.376156ms) 2025/04/30 09:38:17 client -> Sending packet 1 (1280 bytes) for connection 0e531a3b2efcd722, Initial 2025/04/30 09:38:17 client Long Header{Type: Initial, DestConnectionID: 400000562f66f7cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6619282, LowestAcked: 6619282, DelayTime: 0s} 2025/04/30 09:38:17 client <- Reading packet 6619280 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000562f66f7cb, PacketNumber: 6619280, PacketNumberLen: 3, Length: 737, Version: v1} 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:38:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0e531a3b2efcd722, InitialSourceConnectionID: 400000562f66f7cb, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xee070ed0ad5f511268cbb01157146530, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:17 client <- Reading packet 6619282 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000562f66f7cb, PacketNumber: 6619282, PacketNumberLen: 3, Length: 737, Version: v1} 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:38:17 client -> Sending packet 0 (130 bytes) for connection 0e531a3b2efcd722, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 400000562f66f7cb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6619282, LowestAcked: 6619280, AckRanges: {{Largest: 6619282, Smallest: 6619282}, {Largest: 6619280, Smallest: 6619280}}, DelayTime: 0s} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:17 client Short Header{DestConnectionID: 400000562f66f7cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:17 client Dropping Initial keys. 2025/04/30 09:38:17 client <- Reading packet 6619284 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000562f66f7cb, PacketNumber: 6619284, PacketNumberLen: 3, Length: 737, Version: v1} 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:38:17 client -> Sending packet 1 (47 bytes) for connection 0e531a3b2efcd722, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 400000562f66f7cb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6619284, LowestAcked: 6619280, AckRanges: {{Largest: 6619284, Smallest: 6619284}, {Largest: 6619282, Smallest: 6619282}, {Largest: 6619280, Smallest: 6619280}}, DelayTime: 0s} 2025/04/30 09:38:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:17 client -> Sending packet 2 (74 bytes) for connection 0e531a3b2efcd722, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 400000562f66f7cb, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:17 client -> Sending packet 3 (74 bytes) for connection 0e531a3b2efcd722, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 400000562f66f7cb, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:17 client <- Reading packet 6619280 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:17 client Short Header{DestConnectionID: (empty), PacketNumber: 6619280, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:17 client Dropping Handshake keys. 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000004483f0776c, StatelessResetToken: 0x758548a238493e2aac89d26bc27bbdfc} 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000005def8f6917, StatelessResetToken: 0x250564aee6b82e0f71c58ab6586aa19c} 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000496dfc48ad, StatelessResetToken: 0xde243ea479f4478599e6e88a6d76d4ce} 2025/04/30 09:38:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:17 client -> Sending packet 2 (56 bytes) for connection 0e531a3b2efcd722, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 4000004483f0776c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6619280, LowestAcked: 6619280, DelayTime: 146.794µs} 2025/04/30 09:38:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:17 client -> Sending packet 3 (48 bytes) for connection 0e531a3b2efcd722, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 4000004483f0776c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:17 client <- Reading packet 6619281 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:17 client Short Header{DestConnectionID: (empty), PacketNumber: 6619281, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 368µs} 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000422aa63ef5, StatelessResetToken: 0x453e53bfea49fbc3c2faef07e3777b83} 2025/04/30 09:38:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:17 client <- Reading packet 6619282 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:17 client Short Header{DestConnectionID: (empty), PacketNumber: 6619282, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:17 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 432µs} 2025/04/30 09:38:17 client newly acked packets (1): [3] 2025/04/30 09:38:17 client updated RTT: 128.916ms (σ: 81.203ms) 2025/04/30 09:38:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:17 client Canceling loss detection timer. 2025/04/30 09:38:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:38:17 client -> Sending packet 4 (35 bytes) for connection 0e531a3b2efcd722, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 4000004483f0776c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6619282, LowestAcked: 6619280, DelayTime: 128.039µs} 2025/04/30 09:38:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:17 client -> Sending packet 5 (30 bytes) for connection 0e531a3b2efcd722, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 4000004483f0776c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:17 client Connection 0e531a3b2efcd722 closed. 2025/04/30 09:38:17 Requesting https://server4:443/zqcbxurmgz. 2025/04/30 09:38:17 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:17 Increased send buffer size to 14336 kiB 2025/04/30 09:38:17 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:17 Created qlog file: /logs/qlog/2915c5db22fedf3dff9817a90324be.sqlog 2025/04/30 09:38:17 client Starting new connection to server4 ([::]:58019 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2915c5db22fedf3dff9817a90324be, version v1 2025/04/30 09:38:17 Adding connection ID (empty). 2025/04/30 09:38:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:17 client -> Sending packet 0 (1280 bytes) for connection 2915c5db22fedf3dff9817a90324be, Initial 2025/04/30 09:38:17 client Long Header{Type: Initial, DestConnectionID: 2915c5db22fedf3dff9817a90324be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:38:17 client <- Reading packet 14037772 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000000ee1634ea3, Token: (empty), PacketNumber: 14037772, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:17 client Received first packet. Switching destination connection ID to: 4000000ee1634ea3 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 119.976ms} 2025/04/30 09:38:17 client newly acked packets (1): [0] 2025/04/30 09:38:17 client updated RTT: 152.783764ms (σ: 76.391882ms) 2025/04/30 09:38:17 client -> Sending packet 1 (1280 bytes) for connection 2915c5db22fedf3dff9817a90324be, Initial 2025/04/30 09:38:17 client Long Header{Type: Initial, DestConnectionID: 4000000ee1634ea3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 14037772, LowestAcked: 14037772, DelayTime: 0s} 2025/04/30 09:38:17 client <- Reading packet 14037774 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000ee1634ea3, PacketNumber: 14037774, PacketNumberLen: 4, Length: 743, Version: v1} 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 09:38:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2915c5db22fedf3dff9817a90324be, InitialSourceConnectionID: 4000000ee1634ea3, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x3321a5feea1cf97428d9a6b06ea342b0, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:17 client -> Sending packet 0 (82 bytes) for connection 2915c5db22fedf3dff9817a90324be, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 4000000ee1634ea3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 14037774, LowestAcked: 14037774, DelayTime: 0s} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:17 client Dropping Initial keys. 2025/04/30 09:38:17 client -> Sending packet 0 (46 bytes) for connection 2915c5db22fedf3dff9817a90324be, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 4000000ee1634ea3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:17 client <- Reading packet 14037770 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:17 client Short Header{DestConnectionID: (empty), PacketNumber: 14037770, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:17 client Dropping Handshake keys. 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000000f747673a, StatelessResetToken: 0xb90740c265408facd321e08f790ae17a} 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000016904aa9d9, StatelessResetToken: 0xfdb89b033aeb17e86b1df1e8a7b2fd2a} 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000002bc13241a, StatelessResetToken: 0xfebbeecf5ca16dba63b1882eaa38c85a} 2025/04/30 09:38:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:17 client -> Sending packet 1 (37 bytes) for connection 2915c5db22fedf3dff9817a90324be, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 40000000f747673a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 14037770, LowestAcked: 14037770, DelayTime: 115.435µs} 2025/04/30 09:38:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:17 client <- Reading packet 14037771 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:17 client Short Header{DestConnectionID: (empty), PacketNumber: 14037771, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/04/30 09:38:17 client newly acked packets (1): [0] 2025/04/30 09:38:17 client updated RTT: 137.667ms (σ: 87.525ms) 2025/04/30 09:38:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:17 client -> Sending packet 2 (30 bytes) for connection 2915c5db22fedf3dff9817a90324be, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 40000000f747673a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:17 client Connection 2915c5db22fedf3dff9817a90324be closed. 2025/04/30 09:38:17 Requesting https://server4:443/nehudsbema. 2025/04/30 09:38:17 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:17 Increased send buffer size to 14336 kiB 2025/04/30 09:38:17 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:17 Created qlog file: /logs/qlog/c97c116cd0ff15ffdce275eae81702ff7abf.sqlog 2025/04/30 09:38:17 client Starting new connection to server4 ([::]:36424 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c97c116cd0ff15ffdce275eae81702ff7abf, version v1 2025/04/30 09:38:17 Adding connection ID (empty). 2025/04/30 09:38:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:17 client -> Sending packet 0 (1280 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, Initial 2025/04/30 09:38:17 client Long Header{Type: Initial, DestConnectionID: c97c116cd0ff15ffdce275eae81702ff7abf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:38:17 client <- Reading packet 6603166 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004137136240, Token: (empty), PacketNumber: 6603166, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:17 client Received first packet. Switching destination connection ID to: 4000004137136240 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 544µs} 2025/04/30 09:38:17 client newly acked packets (1): [0] 2025/04/30 09:38:17 client updated RTT: 33.076913ms (σ: 16.538456ms) 2025/04/30 09:38:17 client -> Sending packet 1 (1280 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, Initial 2025/04/30 09:38:17 client Long Header{Type: Initial, DestConnectionID: 4000004137136240, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6603166, LowestAcked: 6603166, DelayTime: 0s} 2025/04/30 09:38:17 client <- Reading packet 6603166 (763 bytes) for connection (empty), Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004137136240, PacketNumber: 6603166, PacketNumberLen: 3, Length: 746, Version: v1} 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c97c116cd0ff15ffdce275eae81702ff7abf, InitialSourceConnectionID: 4000004137136240, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5ac9d11d5ed8d38c97f0e72d22309ce5, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:17 client -> Sending packet 0 (82 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 4000004137136240, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6603166, LowestAcked: 6603166, DelayTime: 0s} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:17 client Dropping Initial keys. 2025/04/30 09:38:17 client -> Sending packet 0 (46 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 4000004137136240, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:17 client -> Sending packet 1 (74 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 4000004137136240, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:17 client -> Sending packet 2 (74 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 4000004137136240, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:17 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:38:17 client <- Reading packet 6603168 (763 bytes) for connection (empty), Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004137136240, PacketNumber: 6603168, PacketNumberLen: 3, Length: 746, Version: v1} 2025/04/30 09:38:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:17 client -> Sending packet 3 (45 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: 4000004137136240, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6603168, LowestAcked: 6603166, AckRanges: {{Largest: 6603168, Smallest: 6603168}, {Largest: 6603166, Smallest: 6603166}}, DelayTime: 0s} 2025/04/30 09:38:17 client <- Reading packet 6603169 (40 bytes) for connection (empty), Handshake 2025/04/30 09:38:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004137136240, PacketNumber: 6603169, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:38:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 296µs} 2025/04/30 09:38:17 client Peer doesn't await address validation any longer. 2025/04/30 09:38:17 client <- Reading packet 6603166 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:17 client Short Header{DestConnectionID: (empty), PacketNumber: 6603166, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 99.408ms} 2025/04/30 09:38:17 client newly acked packets (1): [0] 2025/04/30 09:38:17 client updated RTT: 42.126ms (σ: 30.503ms) 2025/04/30 09:38:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:17 client Canceling loss detection timer. 2025/04/30 09:38:17 client Dropping Handshake keys. 2025/04/30 09:38:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000004224e66cf5, StatelessResetToken: 0xeb55a9ae5e254b6e9003aec73292f77c} 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000052e68bef29, StatelessResetToken: 0x48de32bb0f3c44a3f021d110e2e20f91} 2025/04/30 09:38:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000059c5d07e75, StatelessResetToken: 0x7b0c016d7273514c3f945b1f8ebce017} 2025/04/30 09:38:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:17 client -> Sending packet 1 (37 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:17 client Short Header{DestConnectionID: 4000004224e66cf5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:17 client -> &wire.AckFrame{LargestAcked: 6603166, LowestAcked: 6603166, DelayTime: 171.474µs} 2025/04/30 09:38:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:17 client Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 09:38:18 client <- Reading packet 6603168 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6603168, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112µs} 2025/04/30 09:38:18 client newly acked packets (1): [1] 2025/04/30 09:38:18 client updated RTT: 40.709ms (σ: 25.71ms) 2025/04/30 09:38:18 client Canceling loss detection timer. 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000005c3ebfd95c, StatelessResetToken: 0x6491830cd6b6541d608fdec4d13998cf} 2025/04/30 09:38:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:18 client Ignoring all packets below 6603167. 2025/04/30 09:38:18 client -> Sending packet 2 (35 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 4000004224e66cf5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 6603168, LowestAcked: 6603168, DelayTime: 120.645µs} 2025/04/30 09:38:18 client <- Reading packet 6603171 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6603171, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:18 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 80.44ms} 2025/04/30 09:38:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:18 client -> Sending packet 3 (37 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 4000004224e66cf5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 6603171, LowestAcked: 6603168, AckRanges: {{Largest: 6603171, Smallest: 6603171}, {Largest: 6603168, Smallest: 6603168}}, DelayTime: 120.194µs} 2025/04/30 09:38:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:18 client -> Sending packet 4 (30 bytes) for connection c97c116cd0ff15ffdce275eae81702ff7abf, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 4000004224e66cf5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:18 client Connection c97c116cd0ff15ffdce275eae81702ff7abf closed. 2025/04/30 09:38:18 Requesting https://server4:443/xnowhnfmwp. 2025/04/30 09:38:18 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:18 Increased send buffer size to 14336 kiB 2025/04/30 09:38:18 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:18 Created qlog file: /logs/qlog/41a38702576624b8959f.sqlog 2025/04/30 09:38:18 client Starting new connection to server4 ([::]:36271 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 41a38702576624b8959f, version v1 2025/04/30 09:38:18 Adding connection ID (empty). 2025/04/30 09:38:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:18 client -> Sending packet 0 (1280 bytes) for connection 41a38702576624b8959f, Initial 2025/04/30 09:38:18 client Long Header{Type: Initial, DestConnectionID: 41a38702576624b8959f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:18 client -> Sending packet 1 (1280 bytes) for connection 41a38702576624b8959f, Initial 2025/04/30 09:38:18 client Long Header{Type: Initial, DestConnectionID: 41a38702576624b8959f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:18 client -> Sending packet 2 (1280 bytes) for connection 41a38702576624b8959f, Initial 2025/04/30 09:38:18 client Long Header{Type: Initial, DestConnectionID: 41a38702576624b8959f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:38:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:18 client <- Reading packet 5107761 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c03ae55b36, Token: (empty), PacketNumber: 5107761, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:18 client Received first packet. Switching destination connection ID to: 400000c03ae55b36 2025/04/30 09:38:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:18 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 632µs} 2025/04/30 09:38:18 client newly acked packets (1): [2] 2025/04/30 09:38:18 client updated RTT: 34.44578ms (σ: 17.22289ms) 2025/04/30 09:38:18 client -> Sending packet 3 (1280 bytes) for connection 41a38702576624b8959f, Initial 2025/04/30 09:38:18 client Long Header{Type: Initial, DestConnectionID: 400000c03ae55b36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 5107761, LowestAcked: 5107761, DelayTime: 0s} 2025/04/30 09:38:18 client <- Reading packet 5107761 (755 bytes) for connection (empty), Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c03ae55b36, PacketNumber: 5107761, PacketNumberLen: 3, Length: 738, Version: v1} 2025/04/30 09:38:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:38:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 41a38702576624b8959f, InitialSourceConnectionID: 400000c03ae55b36, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf742bed76eaf06aefd366ef2c1936f78, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:18 client -> Sending packet 0 (82 bytes) for connection 41a38702576624b8959f, Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: 400000c03ae55b36, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 5107761, LowestAcked: 5107761, DelayTime: 0s} 2025/04/30 09:38:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:18 client Dropping Initial keys. 2025/04/30 09:38:18 client -> Sending packet 0 (46 bytes) for connection 41a38702576624b8959f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 400000c03ae55b36, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:18 client -> Sending packet 1 (74 bytes) for connection 41a38702576624b8959f, Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: 400000c03ae55b36, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:18 client -> Sending packet 2 (74 bytes) for connection 41a38702576624b8959f, Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: 400000c03ae55b36, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:18 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:38:18 client <- Reading packet 5107763 (755 bytes) for connection (empty), Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c03ae55b36, PacketNumber: 5107763, PacketNumberLen: 3, Length: 738, Version: v1} 2025/04/30 09:38:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:38:18 client -> Sending packet 3 (45 bytes) for connection 41a38702576624b8959f, Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: 400000c03ae55b36, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 5107763, LowestAcked: 5107761, AckRanges: {{Largest: 5107763, Smallest: 5107763}, {Largest: 5107761, Smallest: 5107761}}, DelayTime: 0s} 2025/04/30 09:38:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:18 client <- Reading packet 5107764 (40 bytes) for connection (empty), Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c03ae55b36, PacketNumber: 5107764, PacketNumberLen: 3, Length: 24, Version: v1} 2025/04/30 09:38:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 288µs} 2025/04/30 09:38:18 client Peer doesn't await address validation any longer. 2025/04/30 09:38:18 client <- Reading packet 5107761 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:18 client Short Header{DestConnectionID: (empty), PacketNumber: 5107761, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104.328ms} 2025/04/30 09:38:18 client newly acked packets (1): [0] 2025/04/30 09:38:18 client updated RTT: 43.932ms (σ: 31.891ms) 2025/04/30 09:38:18 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:18 client Canceling loss detection timer. 2025/04/30 09:38:18 client Dropping Handshake keys. 2025/04/30 09:38:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000cf900c2f44, StatelessResetToken: 0x7ea3b97fedf1aad3af6cd548110bd10b} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000d45f1def76, StatelessResetToken: 0xbd98fb333af045b5191131321687c1ed} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000cf62234ff1, StatelessResetToken: 0xe6fb9c5c163966ba1186571334c9d1f1} 2025/04/30 09:38:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:18 client -> Sending packet 1 (37 bytes) for connection 41a38702576624b8959f, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 400000cf900c2f44, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 5107761, LowestAcked: 5107761, DelayTime: 137.539µs} 2025/04/30 09:38:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:18 client Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 09:38:18 client <- Reading packet 5107762 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:18 client Short Header{DestConnectionID: (empty), PacketNumber: 5107762, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:18 client -> Sending packet 2 (30 bytes) for connection 41a38702576624b8959f, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 400000cf900c2f44, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:18 client Connection 41a38702576624b8959f closed. 2025/04/30 09:38:18 Requesting https://server4:443/mvamvwfemk. 2025/04/30 09:38:18 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:18 Increased send buffer size to 14336 kiB 2025/04/30 09:38:18 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:18 Created qlog file: /logs/qlog/16a2f439c6bbc0b887.sqlog 2025/04/30 09:38:18 client Starting new connection to server4 ([::]:44602 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 16a2f439c6bbc0b887, version v1 2025/04/30 09:38:18 Adding connection ID (empty). 2025/04/30 09:38:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:18 client -> Sending packet 0 (1280 bytes) for connection 16a2f439c6bbc0b887, Initial 2025/04/30 09:38:18 client Long Header{Type: Initial, DestConnectionID: 16a2f439c6bbc0b887, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:38:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:38:18 client <- Reading packet 10260115 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000008fefcd948e, Token: (empty), PacketNumber: 10260115, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:18 client Received first packet. Switching destination connection ID to: 4000008fefcd948e 2025/04/30 09:38:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 600µs} 2025/04/30 09:38:18 client newly acked packets (1): [0] 2025/04/30 09:38:18 client updated RTT: 33.131631ms (σ: 16.565815ms) 2025/04/30 09:38:18 client -> Sending packet 1 (1280 bytes) for connection 16a2f439c6bbc0b887, Initial 2025/04/30 09:38:18 client Long Header{Type: Initial, DestConnectionID: 4000008fefcd948e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 10260115, LowestAcked: 10260115, DelayTime: 0s} 2025/04/30 09:38:18 client <- Reading packet 10260115 (755 bytes) for connection (empty), Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008fefcd948e, PacketNumber: 10260115, PacketNumberLen: 4, Length: 738, Version: v1} 2025/04/30 09:38:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 09:38:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 16a2f439c6bbc0b887, InitialSourceConnectionID: 4000008fefcd948e, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1e01ca7e7c6d857d5b8fcf29b9a7be35, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:18 client -> Sending packet 0 (82 bytes) for connection 16a2f439c6bbc0b887, Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: 4000008fefcd948e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 10260115, LowestAcked: 10260115, DelayTime: 0s} 2025/04/30 09:38:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:18 client Dropping Initial keys. 2025/04/30 09:38:18 client -> Sending packet 0 (46 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 4000008fefcd948e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:18 client <- Reading packet 10260116 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000008fefcd948e, PacketNumber: 10260116, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 184µs} 2025/04/30 09:38:18 client Peer doesn't await address validation any longer. 2025/04/30 09:38:18 client newly acked packets (1): [0] 2025/04/30 09:38:18 client updated RTT: 32.889ms (σ: 12.906ms) 2025/04/30 09:38:18 client Canceling loss detection timer. 2025/04/30 09:38:18 client <- Reading packet 10260117 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:18 client Short Header{DestConnectionID: (empty), PacketNumber: 10260117, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:18 client Dropping Handshake keys. 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000095bd7d9692, StatelessResetToken: 0xc341b055d9f9dfd1d8eaa0c8698f145b} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008cffdbb873, StatelessResetToken: 0x468100d4f8c9be35366022aeaf0633f3} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000087961c335c, StatelessResetToken: 0x86aa6f5104cd4869f53b58a521387a6c} 2025/04/30 09:38:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:18 client -> Sending packet 2 (56 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 10260117, LowestAcked: 10260117, DelayTime: 139.52µs} 2025/04/30 09:38:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:18 client -> Sending packet 3 (48 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:18 client <- Reading packet 10260121 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:18 client Short Header{DestConnectionID: (empty), PacketNumber: 10260121, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000095bd7d9692, StatelessResetToken: 0xc341b055d9f9dfd1d8eaa0c8698f145b} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008cffdbb873, StatelessResetToken: 0x468100d4f8c9be35366022aeaf0633f3} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000087961c335c, StatelessResetToken: 0x86aa6f5104cd4869f53b58a521387a6c} 2025/04/30 09:38:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:18 client <- Reading packet 10260122 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:18 client Short Header{DestConnectionID: (empty), PacketNumber: 10260122, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000095bd7d9692, StatelessResetToken: 0xc341b055d9f9dfd1d8eaa0c8698f145b} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008cffdbb873, StatelessResetToken: 0x468100d4f8c9be35366022aeaf0633f3} 2025/04/30 09:38:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000087961c335c, StatelessResetToken: 0x86aa6f5104cd4869f53b58a521387a6c} 2025/04/30 09:38:18 client -> Sending packet 4 (1366 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.PingFrame{} 2025/04/30 09:38:18 client -> Sending packet 5 (37 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:18 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:18 client -> &wire.AckFrame{LargestAcked: 10260122, LowestAcked: 10260117, AckRanges: {{Largest: 10260122, Smallest: 10260121}, {Largest: 10260117, Smallest: 10260117}}, DelayTime: 294.678µs} 2025/04/30 09:38:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:38:19 client -> Sending packet 7 (48 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:19 client -> Sending packet 8 (48 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:19 client <- Reading packet 10260123 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 10260123, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 144µs} 2025/04/30 09:38:19 client <- Reading packet 10260126 (107 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 10260126, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000095bd7d9692, StatelessResetToken: 0xc341b055d9f9dfd1d8eaa0c8698f145b} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008cffdbb873, StatelessResetToken: 0x468100d4f8c9be35366022aeaf0633f3} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000087961c335c, StatelessResetToken: 0x86aa6f5104cd4869f53b58a521387a6c} 2025/04/30 09:38:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:19 client -> Sending packet 9 (39 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 10260126, LowestAcked: 10260117, AckRanges: {{Largest: 10260126, Smallest: 10260126}, {Largest: 10260123, Smallest: 10260121}, {Largest: 10260117, Smallest: 10260117}}, DelayTime: 114.062µs} 2025/04/30 09:38:19 client <- Reading packet 10260129 (1085 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 10260129, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 400000987cb2b2ce, StatelessResetToken: 0x14fec51ece49309febf1e5eb93fb0c88} 2025/04/30 09:38:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 80.76ms} 2025/04/30 09:38:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:19 client -> Sending packet 10 (41 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 10260129, LowestAcked: 10260117, AckRanges: {{Largest: 10260129, Smallest: 10260129}, {Largest: 10260126, Smallest: 10260126}, {Largest: 10260123, Smallest: 10260121}, {Largest: 10260117, Smallest: 10260117}}, DelayTime: 145.832µs} 2025/04/30 09:38:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:19 client -> Sending packet 11 (30 bytes) for connection 16a2f439c6bbc0b887, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 40000095bd7d9692, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:19 client Connection 16a2f439c6bbc0b887 closed. 2025/04/30 09:38:19 Requesting https://server4:443/lujkfckgew. 2025/04/30 09:38:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:19 Increased send buffer size to 14336 kiB 2025/04/30 09:38:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:19 Created qlog file: /logs/qlog/1d39923717a31889cb2c710ba40b.sqlog 2025/04/30 09:38:19 client Starting new connection to server4 ([::]:35382 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1d39923717a31889cb2c710ba40b, version v1 2025/04/30 09:38:19 Adding connection ID (empty). 2025/04/30 09:38:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:19 client -> Sending packet 0 (1280 bytes) for connection 1d39923717a31889cb2c710ba40b, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 1d39923717a31889cb2c710ba40b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:38:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:19 client -> Sending packet 1 (1280 bytes) for connection 1d39923717a31889cb2c710ba40b, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 1d39923717a31889cb2c710ba40b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:38:19 client -> Sending packet 2 (1280 bytes) for connection 1d39923717a31889cb2c710ba40b, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 1d39923717a31889cb2c710ba40b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:38:19 client <- Reading packet 2426358 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000063fcb5f6b, Token: (empty), PacketNumber: 2426358, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:19 client Received first packet. Switching destination connection ID to: 400000063fcb5f6b 2025/04/30 09:38:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 864µs} 2025/04/30 09:38:19 client -> Sending packet 3 (1280 bytes) for connection 1d39923717a31889cb2c710ba40b, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 400000063fcb5f6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 2426358, LowestAcked: 2426358, DelayTime: 0s} 2025/04/30 09:38:19 client <- Reading packet 2426358 (760 bytes) for connection (empty), Handshake 2025/04/30 09:38:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000063fcb5f6b, PacketNumber: 2426358, PacketNumberLen: 3, Length: 743, Version: v1} 2025/04/30 09:38:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 09:38:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1d39923717a31889cb2c710ba40b, InitialSourceConnectionID: 400000063fcb5f6b, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x6eccae487c5ba1b23cce775e9653d789, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:19 client -> Sending packet 0 (82 bytes) for connection 1d39923717a31889cb2c710ba40b, Handshake 2025/04/30 09:38:19 client Long Header{Type: Handshake, DestConnectionID: 400000063fcb5f6b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 2426358, LowestAcked: 2426358, DelayTime: 0s} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:19 client Dropping Initial keys. 2025/04/30 09:38:19 client -> Sending packet 0 (46 bytes) for connection 1d39923717a31889cb2c710ba40b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 400000063fcb5f6b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:19 client <- Reading packet 2426359 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000063fcb5f6b, PacketNumber: 2426359, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/04/30 09:38:19 client Peer doesn't await address validation any longer. 2025/04/30 09:38:19 client newly acked packets (1): [0] 2025/04/30 09:38:19 client updated RTT: 31.158256ms (σ: 15.579128ms) 2025/04/30 09:38:19 client Canceling loss detection timer. 2025/04/30 09:38:19 client <- Reading packet 2426358 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2426358, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:19 client Dropping Handshake keys. 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000001bbd17138a, StatelessResetToken: 0x65ee6ccac4263193543adea4fc7a9589} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000019f0237d7, StatelessResetToken: 0x7dcc8f741da7f0aaab9e8aa577602c22} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000001c378b437, StatelessResetToken: 0x3f7e1f7187ed0e9769114acb4ab97d69} 2025/04/30 09:38:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:19 client -> Sending packet 1 (37 bytes) for connection 1d39923717a31889cb2c710ba40b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 4000001bbd17138a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 2426358, LowestAcked: 2426358, DelayTime: 82.355µs} 2025/04/30 09:38:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:19 client <- Reading packet 2426361 (53 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2426361, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000000c02bb665d, StatelessResetToken: 0x2ee0a6bd84b0b09615d9527fa69c2567} 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 87.456ms} 2025/04/30 09:38:19 client newly acked packets (1): [1] 2025/04/30 09:38:19 client updated RTT: 38.901ms (σ: 27.17ms) 2025/04/30 09:38:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:19 client lost packet 0 (time threshold) 2025/04/30 09:38:19 client Canceling loss detection timer. 2025/04/30 09:38:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:19 client Ignoring all packets below 2426359. 2025/04/30 09:38:19 client -> Sending packet 2 (54 bytes) for connection 1d39923717a31889cb2c710ba40b, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 4000001bbd17138a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 2426361, LowestAcked: 2426361, DelayTime: 168.254µs} 2025/04/30 09:38:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:19 client <- Reading packet 2426362 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2426362, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 288µs} 2025/04/30 09:38:19 client newly acked packets (1): [2] 2025/04/30 09:38:19 client updated RTT: 37.975ms (σ: 22.229ms) 2025/04/30 09:38:19 client Canceling loss detection timer. 2025/04/30 09:38:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:19 client Ignoring all packets below 2426362. 2025/04/30 09:38:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:19 client -> Sending packet 3 (30 bytes) for connection 1d39923717a31889cb2c710ba40b, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 4000001bbd17138a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:19 client Connection 1d39923717a31889cb2c710ba40b closed. 2025/04/30 09:38:19 Requesting https://server4:443/znkemlsltv. 2025/04/30 09:38:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:19 Increased send buffer size to 14336 kiB 2025/04/30 09:38:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:19 Created qlog file: /logs/qlog/57079e74510bcbf342.sqlog 2025/04/30 09:38:19 client Starting new connection to server4 ([::]:49201 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 57079e74510bcbf342, version v1 2025/04/30 09:38:19 Adding connection ID (empty). 2025/04/30 09:38:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:19 client -> Sending packet 0 (1280 bytes) for connection 57079e74510bcbf342, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 57079e74510bcbf342, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:38:19 client <- Reading packet 10615157 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000001aa4b48c11, Token: (empty), PacketNumber: 10615157, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:19 client Received first packet. Switching destination connection ID to: 4000001aa4b48c11 2025/04/30 09:38:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 560µs} 2025/04/30 09:38:19 client newly acked packets (1): [0] 2025/04/30 09:38:19 client updated RTT: 33.172589ms (σ: 16.586294ms) 2025/04/30 09:38:19 client -> Sending packet 1 (1280 bytes) for connection 57079e74510bcbf342, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 4000001aa4b48c11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 10615157, LowestAcked: 10615157, DelayTime: 0s} 2025/04/30 09:38:19 client <- Reading packet 10615157 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001aa4b48c11, PacketNumber: 10615157, PacketNumberLen: 4, Length: 737, Version: v1} 2025/04/30 09:38:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:38:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 57079e74510bcbf342, InitialSourceConnectionID: 4000001aa4b48c11, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x059ff53e9b04c28a51eb9ca4b852b824, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:19 client -> Sending packet 0 (82 bytes) for connection 57079e74510bcbf342, Handshake 2025/04/30 09:38:19 client Long Header{Type: Handshake, DestConnectionID: 4000001aa4b48c11, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 10615157, LowestAcked: 10615157, DelayTime: 0s} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:19 client Dropping Initial keys. 2025/04/30 09:38:19 client -> Sending packet 0 (46 bytes) for connection 57079e74510bcbf342, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 4000001aa4b48c11, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:19 client <- Reading packet 10615158 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000001aa4b48c11, PacketNumber: 10615158, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 224µs} 2025/04/30 09:38:19 client Peer doesn't await address validation any longer. 2025/04/30 09:38:19 client newly acked packets (1): [0] 2025/04/30 09:38:19 client updated RTT: 32.931ms (σ: 12.919ms) 2025/04/30 09:38:19 client Canceling loss detection timer. 2025/04/30 09:38:19 client <- Reading packet 10615157 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 10615157, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:19 client Dropping Handshake keys. 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000187a4d7b4a, StatelessResetToken: 0xcd961ad7deb6de43ea376de482541ae3} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000009a8b792e5, StatelessResetToken: 0xe5e1f765efebdc5b59b998b3a9de43ef} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000007c4b96de4, StatelessResetToken: 0x567d8b8ed92335aa75cd42c5e32c34bb} 2025/04/30 09:38:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:19 client -> Sending packet 1 (37 bytes) for connection 57079e74510bcbf342, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 400000187a4d7b4a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 10615157, LowestAcked: 10615157, DelayTime: 57.742µs} 2025/04/30 09:38:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:19 client <- Reading packet 10615158 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 10615158, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 09:38:19 client newly acked packets (1): [0] 2025/04/30 09:38:19 client updated RTT: 32.792ms (σ: 9.965ms) 2025/04/30 09:38:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:19 client -> Sending packet 2 (30 bytes) for connection 57079e74510bcbf342, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 400000187a4d7b4a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:19 client Connection 57079e74510bcbf342 closed. 2025/04/30 09:38:19 Requesting https://server4:443/escixfaxyt. 2025/04/30 09:38:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:19 Increased send buffer size to 14336 kiB 2025/04/30 09:38:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:19 Created qlog file: /logs/qlog/5200401842010274f1249ba4d9133909ffa3f180.sqlog 2025/04/30 09:38:19 client Starting new connection to server4 ([::]:41728 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5200401842010274f1249ba4d9133909ffa3f180, version v1 2025/04/30 09:38:19 Adding connection ID (empty). 2025/04/30 09:38:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:19 client -> Sending packet 0 (1280 bytes) for connection 5200401842010274f1249ba4d9133909ffa3f180, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 5200401842010274f1249ba4d9133909ffa3f180, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:38:19 client <- Reading packet 15630148 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000c31b29a0d6, Token: (empty), PacketNumber: 15630148, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:19 client Received first packet. Switching destination connection ID to: 400000c31b29a0d6 2025/04/30 09:38:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 496µs} 2025/04/30 09:38:19 client newly acked packets (1): [0] 2025/04/30 09:38:19 client updated RTT: 33.056253ms (σ: 16.528126ms) 2025/04/30 09:38:19 client -> Sending packet 1 (1280 bytes) for connection 5200401842010274f1249ba4d9133909ffa3f180, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 400000c31b29a0d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 15630148, LowestAcked: 15630148, DelayTime: 0s} 2025/04/30 09:38:19 client <- Reading packet 15630148 (766 bytes) for connection (empty), Handshake 2025/04/30 09:38:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000c31b29a0d6, PacketNumber: 15630148, PacketNumberLen: 4, Length: 749, Version: v1} 2025/04/30 09:38:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 09:38:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5200401842010274f1249ba4d9133909ffa3f180, InitialSourceConnectionID: 400000c31b29a0d6, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x4825c2f388a25ab37a88d0d627e98eb5, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:19 client -> Sending packet 0 (82 bytes) for connection 5200401842010274f1249ba4d9133909ffa3f180, Handshake 2025/04/30 09:38:19 client Long Header{Type: Handshake, DestConnectionID: 400000c31b29a0d6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 15630148, LowestAcked: 15630148, DelayTime: 0s} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:19 client Dropping Initial keys. 2025/04/30 09:38:19 client -> Sending packet 0 (46 bytes) for connection 5200401842010274f1249ba4d9133909ffa3f180, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 400000c31b29a0d6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:19 client <- Reading packet 15630148 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 15630148, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:19 client Dropping Handshake keys. 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000d83f740dc1, StatelessResetToken: 0x5496cda2a6032d33d9281179fc1a0cf9} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000c3e3bcefa2, StatelessResetToken: 0x87b87705fc22520e1cff66fbda05a202} 2025/04/30 09:38:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000dae120247c, StatelessResetToken: 0xfdc6a3da741cc8cbc8921197f9ac42a9} 2025/04/30 09:38:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:19 client -> Sending packet 1 (37 bytes) for connection 5200401842010274f1249ba4d9133909ffa3f180, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 400000d83f740dc1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.AckFrame{LargestAcked: 15630148, LowestAcked: 15630148, DelayTime: 132.367µs} 2025/04/30 09:38:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:19 client <- Reading packet 15630149 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:19 client Short Header{DestConnectionID: (empty), PacketNumber: 15630149, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs} 2025/04/30 09:38:19 client newly acked packets (1): [0] 2025/04/30 09:38:19 client updated RTT: 32.936ms (σ: 12.635ms) 2025/04/30 09:38:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:19 client -> Sending packet 2 (30 bytes) for connection 5200401842010274f1249ba4d9133909ffa3f180, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:19 client Short Header{DestConnectionID: 400000d83f740dc1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:19 client Connection 5200401842010274f1249ba4d9133909ffa3f180 closed. 2025/04/30 09:38:19 Requesting https://server4:443/urdxdqipnw. 2025/04/30 09:38:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:19 Increased send buffer size to 14336 kiB 2025/04/30 09:38:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:19 Created qlog file: /logs/qlog/8277479ffda75eeb.sqlog 2025/04/30 09:38:19 client Starting new connection to server4 ([::]:50762 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8277479ffda75eeb, version v1 2025/04/30 09:38:19 Adding connection ID (empty). 2025/04/30 09:38:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:19 client -> Sending packet 0 (1280 bytes) for connection 8277479ffda75eeb, Initial 2025/04/30 09:38:19 client Long Header{Type: Initial, DestConnectionID: 8277479ffda75eeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:19 client Queueing packet (754 bytes) for later decryption 2025/04/30 09:38:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:20 client Queueing packet (754 bytes) for later decryption 2025/04/30 09:38:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:20 client -> Sending packet 1 (1280 bytes) for connection 8277479ffda75eeb, Initial 2025/04/30 09:38:20 client Long Header{Type: Initial, DestConnectionID: 8277479ffda75eeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:20 client -> Sending packet 2 (1280 bytes) for connection 8277479ffda75eeb, Initial 2025/04/30 09:38:20 client Long Header{Type: Initial, DestConnectionID: 8277479ffda75eeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:38:20 client <- Reading packet 15145917 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004f9bc65a26, Token: (empty), PacketNumber: 15145917, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:20 client Received first packet. Switching destination connection ID to: 4000004f9bc65a26 2025/04/30 09:38:20 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 120.432ms} 2025/04/30 09:38:20 client newly acked packets (1): [2] 2025/04/30 09:38:20 client updated RTT: 154.382369ms (σ: 77.191184ms) 2025/04/30 09:38:20 client Queueing packet (754 bytes) for later decryption 2025/04/30 09:38:20 client <- Reading packet 15145919 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000004f9bc65a26, Token: (empty), PacketNumber: 15145919, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:20 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 531.112ms} 2025/04/30 09:38:20 client -> Sending packet 3 (1280 bytes) for connection 8277479ffda75eeb, Initial 2025/04/30 09:38:20 client Long Header{Type: Initial, DestConnectionID: 4000004f9bc65a26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:20 client -> &wire.AckFrame{LargestAcked: 15145919, LowestAcked: 15145917, AckRanges: {{Largest: 15145919, Smallest: 15145919}, {Largest: 15145917, Smallest: 15145917}}, DelayTime: 0s} 2025/04/30 09:38:20 client <- Reading packet 15145913 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004f9bc65a26, PacketNumber: 15145913, PacketNumberLen: 4, Length: 737, Version: v1} 2025/04/30 09:38:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:38:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8277479ffda75eeb, InitialSourceConnectionID: 4000004f9bc65a26, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xe0f5bb8ea206145e107ad052aa667494, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:20 client <- Reading packet 15145915 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004f9bc65a26, PacketNumber: 15145915, PacketNumberLen: 4, Length: 737, Version: v1} 2025/04/30 09:38:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:38:20 client <- Reading packet 15145917 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004f9bc65a26, PacketNumber: 15145917, PacketNumberLen: 4, Length: 737, Version: v1} 2025/04/30 09:38:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:38:20 client <- Reading packet 15145919 (754 bytes) for connection (empty), Handshake 2025/04/30 09:38:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004f9bc65a26, PacketNumber: 15145919, PacketNumberLen: 4, Length: 737, Version: v1} 2025/04/30 09:38:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:38:20 client -> Sending packet 0 (134 bytes) for connection 8277479ffda75eeb, Handshake 2025/04/30 09:38:20 client Long Header{Type: Handshake, DestConnectionID: 4000004f9bc65a26, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 71, Version: v1} 2025/04/30 09:38:20 client -> &wire.AckFrame{LargestAcked: 15145919, LowestAcked: 15145913, AckRanges: {{Largest: 15145919, Smallest: 15145919}, {Largest: 15145917, Smallest: 15145917}, {Largest: 15145915, Smallest: 15145915}, {Largest: 15145913, Smallest: 15145913}}, DelayTime: 0s} 2025/04/30 09:38:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:20 client Short Header{DestConnectionID: 4000004f9bc65a26, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:20 client Dropping Initial keys. 2025/04/30 09:38:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:21 client -> Sending packet 1 (74 bytes) for connection 8277479ffda75eeb, Handshake 2025/04/30 09:38:21 client Long Header{Type: Handshake, DestConnectionID: 4000004f9bc65a26, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:21 client -> Sending packet 2 (74 bytes) for connection 8277479ffda75eeb, Handshake 2025/04/30 09:38:21 client Long Header{Type: Handshake, DestConnectionID: 4000004f9bc65a26, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:21 client <- Reading packet 15145924 (41 bytes) for connection (empty), Handshake 2025/04/30 09:38:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000004f9bc65a26, PacketNumber: 15145924, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:38:21 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 376µs} 2025/04/30 09:38:21 client Peer doesn't await address validation any longer. 2025/04/30 09:38:21 client <- Reading packet 15145913 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:21 client Short Header{DestConnectionID: (empty), PacketNumber: 15145913, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:21 client Dropping Handshake keys. 2025/04/30 09:38:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000005238210396, StatelessResetToken: 0x63674afa800abe73a753d4185adb3ff9} 2025/04/30 09:38:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000004a565e3feb, StatelessResetToken: 0x6891221e1674b7258cf5543bc69f9726} 2025/04/30 09:38:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000046fb5e5d8f, StatelessResetToken: 0x8f77616e00e948f5d1cb40c4ef9ae80d} 2025/04/30 09:38:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:21 client Dropping %!s(logging.PacketType=1) packet (41 bytes) because we already dropped the keys. 2025/04/30 09:38:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:21 client -> Sending packet 2 (56 bytes) for connection 8277479ffda75eeb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:21 client Short Header{DestConnectionID: 4000005238210396, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:21 client -> &wire.AckFrame{LargestAcked: 15145913, LowestAcked: 15145913, DelayTime: 102.361µs} 2025/04/30 09:38:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:21 client -> Sending packet 3 (48 bytes) for connection 8277479ffda75eeb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:21 client Short Header{DestConnectionID: 4000005238210396, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:21 client Dropping %!s(logging.PacketType=1) packet (754 bytes) because we already dropped the keys. 2025/04/30 09:38:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:21 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 09:38:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:38:22 client -> Sending packet 5 (48 bytes) for connection 8277479ffda75eeb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000005238210396, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:22 client -> Sending packet 6 (48 bytes) for connection 8277479ffda75eeb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000005238210396, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:22 client -> Sending packet 7 (1366 bytes) for connection 8277479ffda75eeb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000005238210396, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.PingFrame{} 2025/04/30 09:38:22 client <- Reading packet 15145916 (26 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:22 client Short Header{DestConnectionID: (empty), PacketNumber: 15145916, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:22 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 328µs} 2025/04/30 09:38:22 client newly acked packets (1): [6] 2025/04/30 09:38:22 client updated RTT: 138.977ms (σ: 88.702ms) 2025/04/30 09:38:22 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:22 client Canceling loss detection timer. 2025/04/30 09:38:22 client Dropping %!s(logging.PacketType=1) packet (754 bytes) because we already dropped the keys. 2025/04/30 09:38:22 client <- Reading packet 15145919 (1104 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:22 client Short Header{DestConnectionID: (empty), PacketNumber: 15145919, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000004007b47aa7, StatelessResetToken: 0x665bc29697002e7b9efdbbac0f7ede6d} 2025/04/30 09:38:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:22 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:22 client -> Sending packet 8 (39 bytes) for connection 8277479ffda75eeb, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000005238210396, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 15145919, LowestAcked: 15145913, AckRanges: {{Largest: 15145919, Smallest: 15145919}, {Largest: 15145916, Smallest: 15145916}, {Largest: 15145913, Smallest: 15145913}}, DelayTime: 111.388µs} 2025/04/30 09:38:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:22 client -> Sending packet 9 (30 bytes) for connection 8277479ffda75eeb, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000005238210396, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:22 client Connection 8277479ffda75eeb closed. 2025/04/30 09:38:22 Requesting https://server4:443/pukxkfsthw. 2025/04/30 09:38:22 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:22 Increased send buffer size to 14336 kiB 2025/04/30 09:38:22 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:22 Created qlog file: /logs/qlog/4ace9cea9c04f00093e8cafd972e3f210d89.sqlog 2025/04/30 09:38:22 client Starting new connection to server4 ([::]:59436 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4ace9cea9c04f00093e8cafd972e3f210d89, version v1 2025/04/30 09:38:22 Adding connection ID (empty). 2025/04/30 09:38:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:22 client -> Sending packet 0 (1280 bytes) for connection 4ace9cea9c04f00093e8cafd972e3f210d89, Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: 4ace9cea9c04f00093e8cafd972e3f210d89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:22 client Queueing packet (763 bytes) for later decryption 2025/04/30 09:38:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:22 client -> Sending packet 1 (1280 bytes) for connection 4ace9cea9c04f00093e8cafd972e3f210d89, Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: 4ace9cea9c04f00093e8cafd972e3f210d89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:22 client -> Sending packet 2 (1280 bytes) for connection 4ace9cea9c04f00093e8cafd972e3f210d89, Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: 4ace9cea9c04f00093e8cafd972e3f210d89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:38:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:22 client <- Reading packet 2863366 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000000c17704e7d, Token: (empty), PacketNumber: 2863366, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:22 client Received first packet. Switching destination connection ID to: 4000000c17704e7d 2025/04/30 09:38:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 119.552ms} 2025/04/30 09:38:22 client newly acked packets (1): [2] 2025/04/30 09:38:22 client updated RTT: 153.444347ms (σ: 76.722173ms) 2025/04/30 09:38:22 client -> Sending packet 3 (1280 bytes) for connection 4ace9cea9c04f00093e8cafd972e3f210d89, Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: 4000000c17704e7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 2863366, LowestAcked: 2863366, DelayTime: 0s} 2025/04/30 09:38:22 client <- Reading packet 2863361 (763 bytes) for connection (empty), Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000000c17704e7d, PacketNumber: 2863361, PacketNumberLen: 3, Length: 746, Version: v1} 2025/04/30 09:38:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4ace9cea9c04f00093e8cafd972e3f210d89, InitialSourceConnectionID: 4000000c17704e7d, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xfadc7bf2de4d0ac79317205978c3fdbb, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:22 client -> Sending packet 0 (82 bytes) for connection 4ace9cea9c04f00093e8cafd972e3f210d89, Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: 4000000c17704e7d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 2863361, LowestAcked: 2863361, DelayTime: 0s} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:22 client Dropping Initial keys. 2025/04/30 09:38:22 client -> Sending packet 0 (46 bytes) for connection 4ace9cea9c04f00093e8cafd972e3f210d89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000000c17704e7d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:22 client <- Reading packet 2863361 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2863361, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:22 client Dropping Handshake keys. 2025/04/30 09:38:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40000004de8045ac, StatelessResetToken: 0x17c10b4311fa070fe20d8cbce545258b} 2025/04/30 09:38:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000004335cbf31, StatelessResetToken: 0x17e1f910fbb0b56546a826f88c97135c} 2025/04/30 09:38:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000ce08a2444, StatelessResetToken: 0x63639c46bde991fe97412a3bb11337ef} 2025/04/30 09:38:22 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:22 client -> Sending packet 1 (37 bytes) for connection 4ace9cea9c04f00093e8cafd972e3f210d89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 40000004de8045ac, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 2863361, LowestAcked: 2863361, DelayTime: 139.37µs} 2025/04/30 09:38:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:22 client <- Reading packet 2863362 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2863362, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 560µs} 2025/04/30 09:38:22 client newly acked packets (1): [0] 2025/04/30 09:38:22 client updated RTT: 138.348ms (σ: 87.732ms) 2025/04/30 09:38:22 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:22 client -> Sending packet 2 (30 bytes) for connection 4ace9cea9c04f00093e8cafd972e3f210d89, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 40000004de8045ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:22 client Connection 4ace9cea9c04f00093e8cafd972e3f210d89 closed. 2025/04/30 09:38:22 Requesting https://server4:443/uklkuimbqp. 2025/04/30 09:38:22 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:22 Increased send buffer size to 14336 kiB 2025/04/30 09:38:22 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:22 Created qlog file: /logs/qlog/67566b1d3d6b4980d1211caf3a03c02a1063a9.sqlog 2025/04/30 09:38:22 client Starting new connection to server4 ([::]:37414 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 67566b1d3d6b4980d1211caf3a03c02a1063a9, version v1 2025/04/30 09:38:22 Adding connection ID (empty). 2025/04/30 09:38:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:22 client -> Sending packet 0 (1280 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: 67566b1d3d6b4980d1211caf3a03c02a1063a9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:38:22 client <- Reading packet 13822706 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000009676de4ae3, Token: (empty), PacketNumber: 13822706, PacketNumberLen: 4, Length: 1214, Version: v1} 2025/04/30 09:38:22 client Received first packet. Switching destination connection ID to: 4000009676de4ae3 2025/04/30 09:38:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 560µs} 2025/04/30 09:38:22 client newly acked packets (1): [0] 2025/04/30 09:38:22 client updated RTT: 33.087569ms (σ: 16.543784ms) 2025/04/30 09:38:22 client -> Sending packet 1 (1280 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: 4000009676de4ae3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 13822706, LowestAcked: 13822706, DelayTime: 0s} 2025/04/30 09:38:22 client <- Reading packet 13822706 (764 bytes) for connection (empty), Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009676de4ae3, PacketNumber: 13822706, PacketNumberLen: 4, Length: 747, Version: v1} 2025/04/30 09:38:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 67566b1d3d6b4980d1211caf3a03c02a1063a9, InitialSourceConnectionID: 4000009676de4ae3, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x119e02d123c44f0cb528070829900355, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:22 client -> Sending packet 0 (82 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: 4000009676de4ae3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 13822706, LowestAcked: 13822706, DelayTime: 0s} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:22 client Dropping Initial keys. 2025/04/30 09:38:22 client -> Sending packet 0 (46 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000009676de4ae3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:22 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:22 client -> Sending packet 1 (74 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: 4000009676de4ae3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:22 client -> Sending packet 2 (74 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: 4000009676de4ae3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:22 client <- Reading packet 13822708 (764 bytes) for connection (empty), Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009676de4ae3, PacketNumber: 13822708, PacketNumberLen: 4, Length: 747, Version: v1} 2025/04/30 09:38:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 09:38:22 client -> Sending packet 3 (45 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: 4000009676de4ae3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 13822708, LowestAcked: 13822706, AckRanges: {{Largest: 13822708, Smallest: 13822708}, {Largest: 13822706, Smallest: 13822706}}, DelayTime: 0s} 2025/04/30 09:38:22 client <- Reading packet 13822709 (41 bytes) for connection (empty), Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000009676de4ae3, PacketNumber: 13822709, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 09:38:22 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 264µs} 2025/04/30 09:38:22 client Peer doesn't await address validation any longer. 2025/04/30 09:38:22 client <- Reading packet 13822706 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:22 client Short Header{DestConnectionID: (empty), PacketNumber: 13822706, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 09:38:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:22 client Dropping Handshake keys. 2025/04/30 09:38:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000009e2b331bcb, StatelessResetToken: 0x7198ae48fdd43f16cf624a5fdf9f1b62} 2025/04/30 09:38:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000008a827e22b8, StatelessResetToken: 0x702fe300b6fc800965c3901f8ff2a4bf} 2025/04/30 09:38:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 40000093a1c12279, StatelessResetToken: 0x1ef21846b8c02cbe72f16989144dee39} 2025/04/30 09:38:22 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:22 client -> Sending packet 2 (56 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000009e2b331bcb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 13822706, LowestAcked: 13822706, DelayTime: 92.753µs} 2025/04/30 09:38:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:22 client -> Sending packet 3 (48 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000009e2b331bcb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:22 client <- Reading packet 13822707 (80 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:22 client Short Header{DestConnectionID: (empty), PacketNumber: 13822707, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:22 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 280µs} 2025/04/30 09:38:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4000008d2d3150f7, StatelessResetToken: 0x04083b3824e4c5a584c78b10309372a8} 2025/04/30 09:38:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:22 client <- Reading packet 13822708 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:22 client Short Header{DestConnectionID: (empty), PacketNumber: 13822708, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:22 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:38:22 client -> Sending packet 4 (35 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000009e2b331bcb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 13822708, LowestAcked: 13822706, DelayTime: 68.297µs} 2025/04/30 09:38:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:22 client -> Sending packet 5 (30 bytes) for connection 67566b1d3d6b4980d1211caf3a03c02a1063a9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 4000009e2b331bcb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:22 client Connection 67566b1d3d6b4980d1211caf3a03c02a1063a9 closed. 2025/04/30 09:38:22 Requesting https://server4:443/lkzpymnmyw. 2025/04/30 09:38:22 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:22 Increased send buffer size to 14336 kiB 2025/04/30 09:38:22 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:22 Created qlog file: /logs/qlog/03a388fe216caadeba.sqlog 2025/04/30 09:38:22 client Starting new connection to server4 ([::]:41549 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 03a388fe216caadeba, version v1 2025/04/30 09:38:22 Adding connection ID (empty). 2025/04/30 09:38:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:22 client -> Sending packet 0 (1280 bytes) for connection 03a388fe216caadeba, Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: 03a388fe216caadeba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:38:22 client <- Reading packet 7925910 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000575cedb760, Token: (empty), PacketNumber: 7925910, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:22 client Received first packet. Switching destination connection ID to: 400000575cedb760 2025/04/30 09:38:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 576µs} 2025/04/30 09:38:22 client newly acked packets (1): [0] 2025/04/30 09:38:22 client updated RTT: 33.107213ms (σ: 16.553606ms) 2025/04/30 09:38:22 client -> Sending packet 1 (1280 bytes) for connection 03a388fe216caadeba, Initial 2025/04/30 09:38:22 client Long Header{Type: Initial, DestConnectionID: 400000575cedb760, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 7925910, LowestAcked: 7925910, DelayTime: 0s} 2025/04/30 09:38:22 client <- Reading packet 7925910 (755 bytes) for connection (empty), Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000575cedb760, PacketNumber: 7925910, PacketNumberLen: 3, Length: 738, Version: v1} 2025/04/30 09:38:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:38:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 03a388fe216caadeba, InitialSourceConnectionID: 400000575cedb760, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x9d05dea7e74501c5247b5d667c630f6f, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:22 client -> Sending packet 0 (82 bytes) for connection 03a388fe216caadeba, Handshake 2025/04/30 09:38:22 client Long Header{Type: Handshake, DestConnectionID: 400000575cedb760, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:22 client -> &wire.AckFrame{LargestAcked: 7925910, LowestAcked: 7925910, DelayTime: 0s} 2025/04/30 09:38:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:22 client Dropping Initial keys. 2025/04/30 09:38:22 client -> Sending packet 0 (46 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:22 client Short Header{DestConnectionID: 400000575cedb760, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:23 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:23 client -> Sending packet 1 (74 bytes) for connection 03a388fe216caadeba, Handshake 2025/04/30 09:38:23 client Long Header{Type: Handshake, DestConnectionID: 400000575cedb760, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:23 client -> Sending packet 2 (74 bytes) for connection 03a388fe216caadeba, Handshake 2025/04/30 09:38:23 client Long Header{Type: Handshake, DestConnectionID: 400000575cedb760, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:23 client <- Reading packet 7925912 (106 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:23 client Short Header{DestConnectionID: (empty), PacketNumber: 7925912, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:23 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:23 client Dropping Handshake keys. 2025/04/30 09:38:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000413760d041, StatelessResetToken: 0xd0f2a76e5140bdb7176b691853b16a31} 2025/04/30 09:38:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000040d3d0d4c2, StatelessResetToken: 0x9340a47c3cd2782f848eabe26611512b} 2025/04/30 09:38:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000416f951d06, StatelessResetToken: 0x0bd07c51f6a30cf4d2f15f8a10e40476} 2025/04/30 09:38:23 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:23 client -> Sending packet 1 (37 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 400000413760d041, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.AckFrame{LargestAcked: 7925912, LowestAcked: 7925912, DelayTime: 130.714µs} 2025/04/30 09:38:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:23 client <- Reading packet 7925915 (53 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:23 client Short Header{DestConnectionID: (empty), PacketNumber: 7925915, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000048d8836083, StatelessResetToken: 0x34fa84bc6ecc8d432e04852dfe67ac09} 2025/04/30 09:38:23 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 80.448ms} 2025/04/30 09:38:23 client newly acked packets (1): [1] 2025/04/30 09:38:23 client updated RTT: 39.741ms (σ: 25.683ms) 2025/04/30 09:38:23 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:23 client lost packet 0 (time threshold) 2025/04/30 09:38:23 client Canceling loss detection timer. 2025/04/30 09:38:23 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:23 client Ignoring all packets below 7925913. 2025/04/30 09:38:23 client -> Sending packet 2 (54 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 400000413760d041, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.AckFrame{LargestAcked: 7925915, LowestAcked: 7925915, DelayTime: 172.221µs} 2025/04/30 09:38:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:23 client <- Reading packet 7925917 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:23 client Short Header{DestConnectionID: (empty), PacketNumber: 7925917, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40000048d8836083, StatelessResetToken: 0x34fa84bc6ecc8d432e04852dfe67ac09} 2025/04/30 09:38:23 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 230.776ms} 2025/04/30 09:38:23 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:23 client -> Sending packet 3 (1366 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 400000413760d041, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.PingFrame{} 2025/04/30 09:38:23 client -> Sending packet 4 (37 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 400000413760d041, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.AckFrame{LargestAcked: 7925917, LowestAcked: 7925915, AckRanges: {{Largest: 7925917, Smallest: 7925917}, {Largest: 7925915, Smallest: 7925915}}, DelayTime: 195.535µs} 2025/04/30 09:38:23 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:38:23 client -> Sending packet 6 (46 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 400000413760d041, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:23 client -> Sending packet 7 (46 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 400000413760d041, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:23 client <- Reading packet 7925918 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:23 client Short Header{DestConnectionID: (empty), PacketNumber: 7925918, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:23 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 264µs} 2025/04/30 09:38:23 client <- Reading packet 7925921 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:23 client Short Header{DestConnectionID: (empty), PacketNumber: 7925921, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:38:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:23 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:38:23 client -> Sending packet 8 (39 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 400000413760d041, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.AckFrame{LargestAcked: 7925921, LowestAcked: 7925915, AckRanges: {{Largest: 7925921, Smallest: 7925921}, {Largest: 7925918, Smallest: 7925917}, {Largest: 7925915, Smallest: 7925915}}, DelayTime: 94.346µs} 2025/04/30 09:38:23 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:23 client -> Sending packet 9 (30 bytes) for connection 03a388fe216caadeba, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 400000413760d041, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:23 client Connection 03a388fe216caadeba closed. 2025/04/30 09:38:23 Requesting https://server4:443/yakmyribrt. 2025/04/30 09:38:23 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:23 Increased send buffer size to 14336 kiB 2025/04/30 09:38:23 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:23 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:23 Created qlog file: /logs/qlog/9d2927ee2f827ee73a91c3a91c31a9f907.sqlog 2025/04/30 09:38:23 client Starting new connection to server4 ([::]:57736 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9d2927ee2f827ee73a91c3a91c31a9f907, version v1 2025/04/30 09:38:23 Adding connection ID (empty). 2025/04/30 09:38:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:23 client -> Sending packet 0 (1280 bytes) for connection 9d2927ee2f827ee73a91c3a91c31a9f907, Initial 2025/04/30 09:38:23 client Long Header{Type: Initial, DestConnectionID: 9d2927ee2f827ee73a91c3a91c31a9f907, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:38:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:23 client Queueing packet (761 bytes) for later decryption 2025/04/30 09:38:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:38:23 client -> Sending packet 1 (1280 bytes) for connection 9d2927ee2f827ee73a91c3a91c31a9f907, Initial 2025/04/30 09:38:23 client Long Header{Type: Initial, DestConnectionID: 9d2927ee2f827ee73a91c3a91c31a9f907, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:38:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:23 client -> Sending packet 2 (1280 bytes) for connection 9d2927ee2f827ee73a91c3a91c31a9f907, Initial 2025/04/30 09:38:23 client Long Header{Type: Initial, DestConnectionID: 9d2927ee2f827ee73a91c3a91c31a9f907, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:38:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:23 client <- Reading packet 4424182 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000045602d56e7, Token: (empty), PacketNumber: 4424182, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:23 client Received first packet. Switching destination connection ID to: 40000045602d56e7 2025/04/30 09:38:23 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 184µs} 2025/04/30 09:38:23 client newly acked packets (1): [2] 2025/04/30 09:38:23 client updated RTT: 33.957488ms (σ: 16.978744ms) 2025/04/30 09:38:23 client <- Reading packet 4424184 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000045602d56e7, Token: (empty), PacketNumber: 4424184, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:23 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 119.536ms} 2025/04/30 09:38:23 client -> Sending packet 3 (1280 bytes) for connection 9d2927ee2f827ee73a91c3a91c31a9f907, Initial 2025/04/30 09:38:23 client Long Header{Type: Initial, DestConnectionID: 40000045602d56e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:23 client -> &wire.AckFrame{LargestAcked: 4424184, LowestAcked: 4424182, AckRanges: {{Largest: 4424184, Smallest: 4424184}, {Largest: 4424182, Smallest: 4424182}}, DelayTime: 0s} 2025/04/30 09:38:23 client <- Reading packet 4424179 (761 bytes) for connection (empty), Handshake 2025/04/30 09:38:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000045602d56e7, PacketNumber: 4424179, PacketNumberLen: 3, Length: 744, Version: v1} 2025/04/30 09:38:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9d2927ee2f827ee73a91c3a91c31a9f907, InitialSourceConnectionID: 40000045602d56e7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xfc5b403c4eeb6863772cd8843c528a77, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:23 client <- Reading packet 4424183 (761 bytes) for connection (empty), Handshake 2025/04/30 09:38:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000045602d56e7, PacketNumber: 4424183, PacketNumberLen: 3, Length: 744, Version: v1} 2025/04/30 09:38:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 09:38:23 client -> Sending packet 0 (84 bytes) for connection 9d2927ee2f827ee73a91c3a91c31a9f907, Handshake 2025/04/30 09:38:23 client Long Header{Type: Handshake, DestConnectionID: 40000045602d56e7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:38:23 client -> &wire.AckFrame{LargestAcked: 4424183, LowestAcked: 4424179, AckRanges: {{Largest: 4424183, Smallest: 4424183}, {Largest: 4424179, Smallest: 4424179}}, DelayTime: 0s} 2025/04/30 09:38:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:23 client Dropping Initial keys. 2025/04/30 09:38:23 client -> Sending packet 0 (46 bytes) for connection 9d2927ee2f827ee73a91c3a91c31a9f907, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 40000045602d56e7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:23 client <- Reading packet 4424184 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000045602d56e7, PacketNumber: 4424184, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/04/30 09:38:23 client Peer doesn't await address validation any longer. 2025/04/30 09:38:23 client newly acked packets (1): [0] 2025/04/30 09:38:23 client updated RTT: 33.648ms (σ: 13.351ms) 2025/04/30 09:38:23 client Canceling loss detection timer. 2025/04/30 09:38:23 client <- Reading packet 4424179 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:23 client Short Header{DestConnectionID: (empty), PacketNumber: 4424179, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:23 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:23 client Dropping Handshake keys. 2025/04/30 09:38:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000005a3138714a, StatelessResetToken: 0x35919b26f538eafcef6e1e58083aa5c5} 2025/04/30 09:38:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4000005995b7bc9c, StatelessResetToken: 0xf9bae962c7f3b6cca8b0437ae93096ba} 2025/04/30 09:38:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 400000423e5d0960, StatelessResetToken: 0x8787034948832c0e34124806396d924e} 2025/04/30 09:38:23 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:23 client -> Sending packet 1 (37 bytes) for connection 9d2927ee2f827ee73a91c3a91c31a9f907, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 4000005a3138714a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.AckFrame{LargestAcked: 4424179, LowestAcked: 4424179, DelayTime: 141.912µs} 2025/04/30 09:38:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:23 client <- Reading packet 4424180 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:23 client Short Header{DestConnectionID: (empty), PacketNumber: 4424180, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs} 2025/04/30 09:38:23 client newly acked packets (1): [0] 2025/04/30 09:38:23 client updated RTT: 33.442ms (σ: 10.423ms) 2025/04/30 09:38:23 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:23 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:23 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:23 client -> Sending packet 2 (30 bytes) for connection 9d2927ee2f827ee73a91c3a91c31a9f907, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:23 client Short Header{DestConnectionID: 4000005a3138714a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:23 client Connection 9d2927ee2f827ee73a91c3a91c31a9f907 closed. 2025/04/30 09:38:23 Requesting https://server4:443/vfqgexdmin. 2025/04/30 09:38:23 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:23 Increased send buffer size to 14336 kiB 2025/04/30 09:38:23 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:23 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:23 Created qlog file: /logs/qlog/1c79e7522ba372320abe704d67d0.sqlog 2025/04/30 09:38:23 client Starting new connection to server4 ([::]:42751 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1c79e7522ba372320abe704d67d0, version v1 2025/04/30 09:38:23 Adding connection ID (empty). 2025/04/30 09:38:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:23 client -> Sending packet 0 (1280 bytes) for connection 1c79e7522ba372320abe704d67d0, Initial 2025/04/30 09:38:23 client Long Header{Type: Initial, DestConnectionID: 1c79e7522ba372320abe704d67d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:38:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:38:24 client <- Reading packet 115989 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4000005d9462ba73, Token: (empty), PacketNumber: 115989, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:24 client Received first packet. Switching destination connection ID to: 4000005d9462ba73 2025/04/30 09:38:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 592µs} 2025/04/30 09:38:24 client newly acked packets (1): [0] 2025/04/30 09:38:24 client updated RTT: 33.133749ms (σ: 16.566874ms) 2025/04/30 09:38:24 client -> Sending packet 1 (1280 bytes) for connection 1c79e7522ba372320abe704d67d0, Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: 4000005d9462ba73, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 115989, LowestAcked: 115989, DelayTime: 0s} 2025/04/30 09:38:24 client <- Reading packet 115989 (759 bytes) for connection (empty), Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4000005d9462ba73, PacketNumber: 115989, PacketNumberLen: 3, Length: 742, Version: v1} 2025/04/30 09:38:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 09:38:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1c79e7522ba372320abe704d67d0, InitialSourceConnectionID: 4000005d9462ba73, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf96f7a3c7dd48a2ae8d110c4642867d0, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:24 client -> Sending packet 0 (82 bytes) for connection 1c79e7522ba372320abe704d67d0, Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: 4000005d9462ba73, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 115989, LowestAcked: 115989, DelayTime: 0s} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:24 client Dropping Initial keys. 2025/04/30 09:38:24 client -> Sending packet 0 (46 bytes) for connection 1c79e7522ba372320abe704d67d0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 4000005d9462ba73, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:24 client <- Reading packet 115990 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:24 client Short Header{DestConnectionID: (empty), PacketNumber: 115990, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 520µs} 2025/04/30 09:38:24 client Peer doesn't await address validation any longer. 2025/04/30 09:38:24 client newly acked packets (1): [0] 2025/04/30 09:38:24 client updated RTT: 33.022ms (σ: 12.644ms) 2025/04/30 09:38:24 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:24 client Canceling loss detection timer. 2025/04/30 09:38:24 client Dropping Handshake keys. 2025/04/30 09:38:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:24 client -> Sending packet 1 (35 bytes) for connection 1c79e7522ba372320abe704d67d0, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 4000005d9462ba73, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 115990, LowestAcked: 115990, DelayTime: 166.871µs} 2025/04/30 09:38:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:24 client -> Sending packet 2 (30 bytes) for connection 1c79e7522ba372320abe704d67d0, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 4000005d9462ba73, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:24 client Connection 1c79e7522ba372320abe704d67d0 closed. 2025/04/30 09:38:24 Requesting https://server4:443/crvnqgycma. 2025/04/30 09:38:24 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:24 Increased send buffer size to 14336 kiB 2025/04/30 09:38:24 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:24 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:24 Created qlog file: /logs/qlog/59998fc5d6ef479d6b48435c.sqlog 2025/04/30 09:38:24 client Starting new connection to server4 ([::]:50449 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 59998fc5d6ef479d6b48435c, version v1 2025/04/30 09:38:24 Adding connection ID (empty). 2025/04/30 09:38:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:24 client -> Sending packet 0 (1280 bytes) for connection 59998fc5d6ef479d6b48435c, Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: 59998fc5d6ef479d6b48435c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:38:24 client <- Reading packet 2486150 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000008c914c7d7, Token: (empty), PacketNumber: 2486150, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:24 client Received first packet. Switching destination connection ID to: 40000008c914c7d7 2025/04/30 09:38:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 584µs} 2025/04/30 09:38:24 client newly acked packets (1): [0] 2025/04/30 09:38:24 client updated RTT: 33.125467ms (σ: 16.562733ms) 2025/04/30 09:38:24 client -> Sending packet 1 (1280 bytes) for connection 59998fc5d6ef479d6b48435c, Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: 40000008c914c7d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 2486150, LowestAcked: 2486150, DelayTime: 0s} 2025/04/30 09:38:24 client -> Sending packet 2 (1280 bytes) for connection 59998fc5d6ef479d6b48435c, Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: 40000008c914c7d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:24 client -> &wire.PingFrame{} 2025/04/30 09:38:24 client <- Reading packet 2486152 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 40000008c914c7d7, Token: (empty), PacketNumber: 2486152, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.912ms} 2025/04/30 09:38:24 client -> Sending packet 3 (1280 bytes) for connection 59998fc5d6ef479d6b48435c, Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: 40000008c914c7d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 2486152, LowestAcked: 2486150, AckRanges: {{Largest: 2486152, Smallest: 2486152}, {Largest: 2486150, Smallest: 2486150}}, DelayTime: 0s} 2025/04/30 09:38:24 client <- Reading packet 2486152 (757 bytes) for connection (empty), Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000008c914c7d7, PacketNumber: 2486152, PacketNumberLen: 3, Length: 740, Version: v1} 2025/04/30 09:38:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 09:38:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 59998fc5d6ef479d6b48435c, InitialSourceConnectionID: 40000008c914c7d7, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xb4f9f692aa410d39dd4006073d3054f5, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:24 client -> Sending packet 0 (82 bytes) for connection 59998fc5d6ef479d6b48435c, Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: 40000008c914c7d7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 2486152, LowestAcked: 2486152, DelayTime: 0s} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:24 client Dropping Initial keys. 2025/04/30 09:38:24 client -> Sending packet 0 (46 bytes) for connection 59998fc5d6ef479d6b48435c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 40000008c914c7d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:24 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/04/30 09:38:24 client <- Reading packet 2486153 (38 bytes) for connection (empty), Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 40000008c914c7d7, PacketNumber: 2486153, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:38:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/04/30 09:38:24 client Peer doesn't await address validation any longer. 2025/04/30 09:38:24 client newly acked packets (1): [0] 2025/04/30 09:38:24 client updated RTT: 32.859ms (σ: 12.951ms) 2025/04/30 09:38:24 client Canceling loss detection timer. 2025/04/30 09:38:24 client <- Reading packet 2486150 (112 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:24 client Short Header{DestConnectionID: (empty), PacketNumber: 2486150, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:24 client Dropping Handshake keys. 2025/04/30 09:38:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 400000098ba500c1, StatelessResetToken: 0x59edc3618d368953ff17c2d45dec8cd8} 2025/04/30 09:38:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 400000125ee3c633, StatelessResetToken: 0x9ec9f52bafe79aae53f56cdfc6a2e66b} 2025/04/30 09:38:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000000fc545ea6a, StatelessResetToken: 0x6e23df01650a268f7563d0dea46cbff5} 2025/04/30 09:38:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:24 client -> Sending packet 1 (37 bytes) for connection 59998fc5d6ef479d6b48435c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 400000098ba500c1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 2486150, LowestAcked: 2486150, DelayTime: 97.351µs} 2025/04/30 09:38:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:24 client <- Reading packet 2486151 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:24 client Short Header{DestConnectionID: (empty), PacketNumber: 2486151, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/04/30 09:38:24 client newly acked packets (1): [0] 2025/04/30 09:38:24 client updated RTT: 32.704ms (σ: 10.022ms) 2025/04/30 09:38:24 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:24 client -> Sending packet 2 (30 bytes) for connection 59998fc5d6ef479d6b48435c, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 400000098ba500c1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:24 client Connection 59998fc5d6ef479d6b48435c closed. 2025/04/30 09:38:24 Requesting https://server4:443/ofbkkhffuy. 2025/04/30 09:38:24 Increased receive buffer size to 14336 kiB 2025/04/30 09:38:24 Increased send buffer size to 14336 kiB 2025/04/30 09:38:24 Setting DF for IPv4 and IPv6. 2025/04/30 09:38:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:38:24 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:38:24 Created qlog file: /logs/qlog/fb4df4a59cd5a621bdb41d.sqlog 2025/04/30 09:38:24 client Starting new connection to server4 ([::]:42353 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fb4df4a59cd5a621bdb41d, version v1 2025/04/30 09:38:24 Adding connection ID (empty). 2025/04/30 09:38:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:38:24 client -> Sending packet 0 (1280 bytes) for connection fb4df4a59cd5a621bdb41d, Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: fb4df4a59cd5a621bdb41d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:38:24 client <- Reading packet 6334458 (1232 bytes) for connection (empty), Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 400000474fbb0391, Token: (empty), PacketNumber: 6334458, PacketNumberLen: 3, Length: 1214, Version: v1} 2025/04/30 09:38:24 client Received first packet. Switching destination connection ID to: 400000474fbb0391 2025/04/30 09:38:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:38:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 512µs} 2025/04/30 09:38:24 client newly acked packets (1): [0] 2025/04/30 09:38:24 client updated RTT: 33.013353ms (σ: 16.506676ms) 2025/04/30 09:38:24 client -> Sending packet 1 (1280 bytes) for connection fb4df4a59cd5a621bdb41d, Initial 2025/04/30 09:38:24 client Long Header{Type: Initial, DestConnectionID: 400000474fbb0391, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 6334458, LowestAcked: 6334458, DelayTime: 0s} 2025/04/30 09:38:24 client <- Reading packet 6334458 (756 bytes) for connection (empty), Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000474fbb0391, PacketNumber: 6334458, PacketNumberLen: 3, Length: 739, Version: v1} 2025/04/30 09:38:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:38:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:38:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fb4df4a59cd5a621bdb41d, InitialSourceConnectionID: 400000474fbb0391, InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x2ea099a4bb4d0c31d3d73f4536bb9819, MaxDatagramFrameSize: 65535} 2025/04/30 09:38:24 client -> Sending packet 0 (82 bytes) for connection fb4df4a59cd5a621bdb41d, Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: 400000474fbb0391, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 6334458, LowestAcked: 6334458, DelayTime: 0s} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:24 client Dropping Initial keys. 2025/04/30 09:38:24 client -> Sending packet 0 (46 bytes) for connection fb4df4a59cd5a621bdb41d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 400000474fbb0391, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:38:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:38:24 client <- Reading packet 6334460 (756 bytes) for connection (empty), Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 400000474fbb0391, PacketNumber: 6334460, PacketNumberLen: 3, Length: 739, Version: v1} 2025/04/30 09:38:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 09:38:24 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:38:24 client -> Sending packet 1 (84 bytes) for connection fb4df4a59cd5a621bdb41d, Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: 400000474fbb0391, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 6334460, LowestAcked: 6334458, AckRanges: {{Largest: 6334460, Smallest: 6334460}, {Largest: 6334458, Smallest: 6334458}}, DelayTime: 0s} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:24 client -> Sending packet 2 (74 bytes) for connection fb4df4a59cd5a621bdb41d, Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: 400000474fbb0391, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:24 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:38:24 client -> Sending packet 3 (74 bytes) for connection fb4df4a59cd5a621bdb41d, Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: 400000474fbb0391, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:24 client -> Sending packet 4 (74 bytes) for connection fb4df4a59cd5a621bdb41d, Handshake 2025/04/30 09:38:24 client Long Header{Type: Handshake, DestConnectionID: 400000474fbb0391, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:38:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:38:24 client <- Reading packet 6334458 (144 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:24 client Short Header{DestConnectionID: (empty), PacketNumber: 6334458, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 297.928ms} 2025/04/30 09:38:24 client Peer doesn't await address validation any longer. 2025/04/30 09:38:24 client newly acked packets (1): [0] 2025/04/30 09:38:24 client updated RTT: 66.865ms (σ: 80.083ms) 2025/04/30 09:38:24 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:38:24 client Canceling loss detection timer. 2025/04/30 09:38:24 client Dropping Handshake keys. 2025/04/30 09:38:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:38:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4000005ec6b3f27b, StatelessResetToken: 0xddae9e24a148e68d13c110ba5b667c3c} 2025/04/30 09:38:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40000059152c80e8, StatelessResetToken: 0x63e5cc15e937de781271283a84664025} 2025/04/30 09:38:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4000005b70e362a5, StatelessResetToken: 0x39ca72b65dd29fd03eb5998b814e2602} 2025/04/30 09:38:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:38:24 client -> Sending packet 1 (37 bytes) for connection fb4df4a59cd5a621bdb41d, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 4000005ec6b3f27b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.AckFrame{LargestAcked: 6334458, LowestAcked: 6334458, DelayTime: 188.191µs} 2025/04/30 09:38:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:38:24 client <- Reading packet 6334459 (1072 bytes) for connection (empty), 1-RTT 2025/04/30 09:38:24 client Short Header{DestConnectionID: (empty), PacketNumber: 6334459, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 09:38:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:38:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:38:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:38:24 client -> Sending packet 2 (30 bytes) for connection fb4df4a59cd5a621bdb41d, 1-RTT (ECN: Not-ECT) 2025/04/30 09:38:24 client Short Header{DestConnectionID: 4000005ec6b3f27b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:38:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:38:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:38:24 client Connection fb4df4a59cd5a621bdb41d closed.