2025/04/30 09:39:46 Requesting https://server4:443/ynooxovzxw. 2025/04/30 09:39:46 Increased receive buffer size to 14336 kiB 2025/04/30 09:39:46 Increased send buffer size to 14336 kiB 2025/04/30 09:39:46 Setting DF for IPv4 and IPv6. 2025/04/30 09:39:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:39:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:39:46 Created qlog file: /logs/qlog/6704156e4066c469415b555f45.sqlog 2025/04/30 09:39:46 client Starting new connection to server4 ([::]:58072 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6704156e4066c469415b555f45, version v1 2025/04/30 09:39:46 Adding connection ID (empty). 2025/04/30 09:39:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:39:46 client -> Sending packet 0 (1280 bytes) for connection 6704156e4066c469415b555f45, Initial 2025/04/30 09:39:46 client Long Header{Type: Initial, DestConnectionID: 6704156e4066c469415b555f45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:39:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:39:46 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:39:46 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:39:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:39:46 client Received first packet. Switching destination connection ID to: 001a0f9cbedfa3bd2486 2025/04/30 09:39:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:39:46 client newly acked packets (1): [0] 2025/04/30 09:39:46 client updated RTT: 43.350932ms (σ: 21.675466ms) 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:39:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:46 client Parsed a coalesced packet. Part 2: 1096 bytes. Remaining: 0 bytes. 2025/04/30 09:39:46 client <- Reading packet 0 (1096 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 0, PacketNumberLen: 1, Length: 1077, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 1056, Offset + Data length: 1056} 2025/04/30 09:39:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6704156e4066c469415b555f45, InitialSourceConnectionID: 001a0f9cbedfa3bd2486, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:39:46 client -> Sending packet 1 (1280 bytes) for connection 6704156e4066c469415b555f45, Initial 2025/04/30 09:39:46 client Long Header{Type: Initial, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client -> Sending packet 0 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client Dropping Initial keys. 2025/04/30 09:39:46 client <- Reading packet 1 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 1, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 1056, Data length: 1191, Offset + Data length: 2247} 2025/04/30 09:39:46 client -> Sending packet 1 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 2 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 2, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 2247, Data length: 1191, Offset + Data length: 3438} 2025/04/30 09:39:46 client -> Sending packet 2 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client -> Sending packet 3 (39 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 09:39:46 client -> &wire.PingFrame{} 2025/04/30 09:39:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:39:46 client -> Sending packet 4 (39 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 09:39:46 client -> &wire.PingFrame{} 2025/04/30 09:39:46 client -> Sending packet 5 (39 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 09:39:46 client -> &wire.PingFrame{} 2025/04/30 09:39:46 client <- Reading packet 3 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 3, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/04/30 09:39:46 client Peer doesn't await address validation any longer. 2025/04/30 09:39:46 client newly acked packets (1): [5] 2025/04/30 09:39:46 client updated RTT: 41.912ms (σ: 19.13ms) 2025/04/30 09:39:46 client Canceling loss detection timer. 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 1187, Offset + Data length: 1187} 2025/04/30 09:39:46 client -> Sending packet 6 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 4 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 4, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 1187, Data length: 1191, Offset + Data length: 2378} 2025/04/30 09:39:46 client -> Sending packet 7 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 5 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 5, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 2378, Data length: 1191, Offset + Data length: 3569} 2025/04/30 09:39:46 client -> Sending packet 8 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 6 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 6, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 3569, Data length: 1191, Offset + Data length: 4760} 2025/04/30 09:39:46 client -> Sending packet 9 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 7 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 7, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 4760, Data length: 1191, Offset + Data length: 5951} 2025/04/30 09:39:46 client -> Sending packet 10 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 8 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 8, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 5951, Data length: 1191, Offset + Data length: 7142} 2025/04/30 09:39:46 client -> Sending packet 11 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 0s, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 9 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 9, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 7142, Data length: 1191, Offset + Data length: 8333} 2025/04/30 09:39:46 client -> Sending packet 12 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, DelayTime: 0s, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 10 (1232 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 10, PacketNumberLen: 1, Length: 1213, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 8333, Data length: 1191, Offset + Data length: 9524} 2025/04/30 09:39:46 client -> Sending packet 13 (45 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, DelayTime: 0s, ECT0: 11, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 11 (491 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 11, PacketNumberLen: 1, Length: 472, Version: v1} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 9524, Data length: 450, Offset + Data length: 9974} 2025/04/30 09:39:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:39:46 client -> Sending packet 14 (84 bytes) for connection 6704156e4066c469415b555f45, Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: 001a0f9cbedfa3bd2486, SrcConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, DelayTime: 0s, ECT0: 12, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:39:46 client -> Sending packet 0 (48 bytes) for connection 6704156e4066c469415b555f45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:46 client Short Header{DestConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:39:46 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:39:46 client <- Reading packet 12 (41 bytes) for connection (empty), Handshake 2025/04/30 09:39:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 001a0f9cbedfa3bd2486, PacketNumber: 12, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:39:46 client <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 5, DelayTime: 0s} 2025/04/30 09:39:46 client newly acked packets (1): [14] 2025/04/30 09:39:46 client updated RTT: 40.671ms (σ: 16.829ms) 2025/04/30 09:39:46 client Canceling loss detection timer. 2025/04/30 09:39:46 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:39:46 client Dropping Handshake keys. 2025/04/30 09:39:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b9c7ba57441a5fd12c9b, StatelessResetToken: 0x0e154c27c8b15c0e82a1497d32b4963e} 2025/04/30 09:39:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8ef232166d13041f5cbb, StatelessResetToken: 0x46fb0fa5dc583db8cac169c68895ad23} 2025/04/30 09:39:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6d6c930705a80ba3bfee, StatelessResetToken: 0xac79fcc5f932065abded2e1781549925} 2025/04/30 09:39:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:39:46 client -> Sending packet 1 (39 bytes) for connection 6704156e4066c469415b555f45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:46 client Short Header{DestConnectionID: b9c7ba57441a5fd12c9b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 147.828µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:39:46 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:46 client <- &wire.PingFrame{} 2025/04/30 09:39:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:46 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1212, Offset + Data length: 1212} 2025/04/30 09:39:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:39:46 client -> Sending packet 2 (37 bytes) for connection 6704156e4066c469415b555f45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:46 client Short Header{DestConnectionID: b9c7ba57441a5fd12c9b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 69.942µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 3 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1212, Data length: 1210, Offset + Data length: 2422} 2025/04/30 09:39:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:46 client <- Reading packet 4 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2422, Data length: 1210, Offset + Data length: 3632} 2025/04/30 09:39:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:39:46 client -> Sending packet 3 (37 bytes) for connection 6704156e4066c469415b555f45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:46 client Short Header{DestConnectionID: b9c7ba57441a5fd12c9b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 58.79µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client <- Reading packet 5 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3632, Data length: 1210, Offset + Data length: 4842} 2025/04/30 09:39:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:39:46 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:46 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.84ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client newly acked packets (1): [0] 2025/04/30 09:39:46 client updated RTT: 39.69ms (σ: 14.582ms) 2025/04/30 09:39:46 client ECN capability confirmed. 2025/04/30 09:39:46 client <- Reading packet 7 (672 bytes) for connection (empty), 1-RTT 2025/04/30 09:39:46 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:39:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 4842, Data length: 278, Offset + Data length: 5120} 2025/04/30 09:39:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:39:46 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601004c418c4f4db8c2ec63bf6ebf8873e6652a4db05d4516641d5566b7e77ef6c8f75a02d9ef} 2025/04/30 09:39:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:39:46 client -> Sending packet 4 (37 bytes) for connection 6704156e4066c469415b555f45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:46 client Short Header{DestConnectionID: b9c7ba57441a5fd12c9b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:46 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 60.744µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:39:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:39:46 client -> Sending packet 5 (32 bytes) for connection 6704156e4066c469415b555f45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:39:46 client Short Header{DestConnectionID: b9c7ba57441a5fd12c9b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:39:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:39:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:39:46 client Connection 6704156e4066c469415b555f45 closed.