2025/04/30 09:36:15 Requesting https://server4:443/djtushuhez. 2025/04/30 09:36:15 Increased receive buffer size to 14336 kiB 2025/04/30 09:36:15 Increased send buffer size to 14336 kiB 2025/04/30 09:36:15 Setting DF for IPv4 and IPv6. 2025/04/30 09:36:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:36:15 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:36:15 Created qlog file: /logs/qlog/db93a55ed387e7852ef9e898.sqlog 2025/04/30 09:36:15 client Starting new connection to server4 ([::]:56165 -> 193.167.100.100:443), source connection ID (empty), destination connection ID db93a55ed387e7852ef9e898, version v1 2025/04/30 09:36:15 Adding connection ID (empty). 2025/04/30 09:36:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:36:15 client -> Sending packet 0 (1280 bytes) for connection db93a55ed387e7852ef9e898, Initial 2025/04/30 09:36:15 client Long Header{Type: Initial, DestConnectionID: db93a55ed387e7852ef9e898, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:36:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:36:15 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:36:15 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:36:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aab700068e60049c1357, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:36:15 client Received first packet. Switching destination connection ID to: aab700068e60049c1357 2025/04/30 09:36:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:36:15 client newly acked packets (1): [0] 2025/04/30 09:36:15 client updated RTT: 40.649853ms (σ: 20.324926ms) 2025/04/30 09:36:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:36:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:36:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:36:15 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 327 bytes. 2025/04/30 09:36:15 client <- Reading packet 0 (769 bytes) for connection (empty), Handshake 2025/04/30 09:36:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aab700068e60049c1357, PacketNumber: 0, PacketNumberLen: 1, Length: 750, Version: v1} 2025/04/30 09:36:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 09:36:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:36:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:36:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: db93a55ed387e7852ef9e898, InitialSourceConnectionID: aab700068e60049c1357, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:36:15 client Dropping %!s(logging.PacketType=5) packet (327 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:36:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection db93a55ed387e7852ef9e898 2025/04/30 09:36:15 client Long Header{Type: Initial, DestConnectionID: aab700068e60049c1357, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:36:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:36:15 client Long Header{Type: Handshake, DestConnectionID: aab700068e60049c1357, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:36:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:36:15 client Dropping Initial keys. 2025/04/30 09:36:15 client -> Sending packet 1 (45 bytes) for connection db93a55ed387e7852ef9e898, Handshake 2025/04/30 09:36:15 client Long Header{Type: Handshake, DestConnectionID: aab700068e60049c1357, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:36:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:36:15 client -> Sending packet 0 (48 bytes) for connection db93a55ed387e7852ef9e898, 1-RTT (ECN: ECT(0)) 2025/04/30 09:36:15 client Short Header{DestConnectionID: aab700068e60049c1357, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:36:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:36:15 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:36:15 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:36:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aab700068e60049c1357, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:36:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:36:15 client Peer doesn't await address validation any longer. 2025/04/30 09:36:15 client newly acked packets (1): [0] 2025/04/30 09:36:15 client updated RTT: 39.779ms (σ: 16.982ms) 2025/04/30 09:36:15 client Canceling loss detection timer. 2025/04/30 09:36:15 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:36:15 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:36:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:36:15 client Dropping Handshake keys. 2025/04/30 09:36:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 813259b9a4cc1cfd4df1, StatelessResetToken: 0xe3addbd17b0efc7161d2915c6da4ae75} 2025/04/30 09:36:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 67087122343206bc9759, StatelessResetToken: 0x74525b5788b690cba4195c35715f3c90} 2025/04/30 09:36:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 846e3a9082b66a522053, StatelessResetToken: 0x30328f71b80f8e300c75277473621653} 2025/04/30 09:36:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:36:15 client -> Sending packet 1 (39 bytes) for connection db93a55ed387e7852ef9e898, 1-RTT (ECN: ECT(0)) 2025/04/30 09:36:15 client Short Header{DestConnectionID: 813259b9a4cc1cfd4df1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:36:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 119.454µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:36:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:36:15 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:36:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:36:15 client <- &wire.PingFrame{} 2025/04/30 09:36:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:36:15 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:36:15 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:36:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:36:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:36:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:36:15 client -> Sending packet 2 (37 bytes) for connection db93a55ed387e7852ef9e898, 1-RTT (ECN: ECT(0)) 2025/04/30 09:36:15 client Short Header{DestConnectionID: 813259b9a4cc1cfd4df1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:36:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 102.182µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:36:15 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:36:15 client -> Sending packet 3 (32 bytes) for connection db93a55ed387e7852ef9e898, 1-RTT (ECN: ECT(0)) 2025/04/30 09:36:15 client Short Header{DestConnectionID: 813259b9a4cc1cfd4df1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:36:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:36:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:36:15 client Connection db93a55ed387e7852ef9e898 closed.