2025/12/13 09:44:48 Requesting https://server4:443/mild-subtropical-rom. 2025/12/13 09:44:48 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:48 Increased send buffer size to 14336 kiB 2025/12/13 09:44:48 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:48 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:48 Created qlog file: /logs/qlog/1dacaef8835afb0962d0eb3b2cc977ee.sqlog 2025/12/13 09:44:48 client Starting new connection to server4 ([::]:56086 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1dacaef8835afb0962d0eb3b2cc977ee, version v1 2025/12/13 09:44:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:48 client -> Sending packet 0 (1280 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: 1dacaef8835afb0962d0eb3b2cc977ee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:48 client -> Sending packet 1 (1280 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: 1dacaef8835afb0962d0eb3b2cc977ee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/12/13 09:44:48 client <- Reading packet 489 (43 bytes) for connection (empty), Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bbd9644c2f26e686e7a, Token: (empty), PacketNumber: 489, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:48 client Received first packet. Switching destination connection ID to: 8bbd9644c2f26e686e7a 2025/12/13 09:44:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:48 client newly acked packets (1): [0] 2025/12/13 09:44:48 client updated RTT: 38.79348ms (σ: 19.39674ms) 2025/12/13 09:44:48 client Parsed a coalesced packet. Part 1: 1225 bytes. Remaining: 7 bytes. 2025/12/13 09:44:48 client <- Reading packet 490 (1225 bytes) for connection (empty), Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bbd9644c2f26e686e7a, Token: (empty), PacketNumber: 490, PacketNumberLen: 2, Length: 1205, Version: v1} 2025/12/13 09:44:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:48 client newly acked packets (1): [1] 2025/12/13 09:44:48 client updated RTT: 39.142ms (σ: 15.246ms) 2025/12/13 09:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:48 client Queueing packet (7 bytes) for later decryption 2025/12/13 09:44:48 client -> Sending packet 2 (1280 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: 8bbd9644c2f26e686e7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:48 client -> &wire.AckFrame{LargestAcked: 490, LowestAcked: 489, DelayTime: 0s} 2025/12/13 09:44:48 client <- Reading packet 0 (776 bytes) for connection (empty), Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8bbd9644c2f26e686e7a, PacketNumber: 0, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:44:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1dacaef8835afb0962d0eb3b2cc977ee, InitialSourceConnectionID: 8bbd9644c2f26e686e7a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:48 client -> Sending packet 0 (81 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: 8bbd9644c2f26e686e7a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:48 client Dropping Initial keys. 2025/12/13 09:44:48 client Dropping 1RTT packet (7 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 6 2025/12/13 09:44:48 client -> Sending packet 0 (58 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:48 client Short Header{DestConnectionID: 8bbd9644c2f26e686e7a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 09:44:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:44:48 client -> Sending packet 1 (76 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: 8bbd9644c2f26e686e7a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:48 client -> Sending packet 2 (76 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: 8bbd9644c2f26e686e7a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:48 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1192 bytes. 2025/12/13 09:44:48 client Dropping initial packet (40 bytes) because we already dropped the keys. 2025/12/13 09:44:48 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 416 bytes. 2025/12/13 09:44:48 client <- Reading packet 1 (776 bytes) for connection (empty), Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8bbd9644c2f26e686e7a, PacketNumber: 1, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:44:48 client Dropping 1RTT packet (416 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:44:48 client -> Sending packet 3 (42 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: 8bbd9644c2f26e686e7a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:48 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:48 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8bbd9644c2f26e686e7a, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:48 client Peer doesn't await address validation any longer. 2025/12/13 09:44:48 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.32ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:48 client newly acked packets (1): [0] 2025/12/13 09:44:48 client updated RTT: 48.332ms (σ: 29.815ms) 2025/12/13 09:44:48 client ECN capability confirmed. 2025/12/13 09:44:48 client Canceling loss detection timer. 2025/12/13 09:44:48 client Dropping Handshake keys. 2025/12/13 09:44:48 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a51b5f94dae0f0fb844, StatelessResetToken: 0xbfc58b47e56e0e5126edda6dd80d3408} 2025/12/13 09:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 19049677c1f48adcd9ff, StatelessResetToken: 0x3ac1d7b0e47cf81d7a28fc9899121097} 2025/12/13 09:44:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a65265d9386dd0db27e, StatelessResetToken: 0x8cda1fa58715b620df8f4af6b48b43e9} 2025/12/13 09:44:48 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:48 client -> Sending packet 1 (39 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:48 client Short Header{DestConnectionID: 0a51b5f94dae0f0fb844, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 233.054µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:48 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:48 client <- &wire.PingFrame{} 2025/12/13 09:44:48 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:48 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:44:48 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:48 client -> Sending packet 2 (37 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:48 client Short Header{DestConnectionID: 0a51b5f94dae0f0fb844, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 110.085µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:48 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:48 client -> Sending packet 3 (32 bytes) for connection 1dacaef8835afb0962d0eb3b2cc977ee, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:48 client Short Header{DestConnectionID: 0a51b5f94dae0f0fb844, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:48 client Connection 1dacaef8835afb0962d0eb3b2cc977ee closed. 2025/12/13 09:44:48 Requesting https://server4:443/thrilled-black-elephant. 2025/12/13 09:44:48 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:48 Increased send buffer size to 14336 kiB 2025/12/13 09:44:48 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:48 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:48 Created qlog file: /logs/qlog/ad59b82453ec740aad13db59.sqlog 2025/12/13 09:44:48 client Starting new connection to server4 ([::]:45504 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ad59b82453ec740aad13db59, version v1 2025/12/13 09:44:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:48 client -> Sending packet 0 (1280 bytes) for connection ad59b82453ec740aad13db59, Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: ad59b82453ec740aad13db59, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 09:44:48 client -> Sending packet 1 (1280 bytes) for connection ad59b82453ec740aad13db59, Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: ad59b82453ec740aad13db59, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/12/13 09:44:48 client <- Reading packet 4 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9802b09f5a4c4f6f3773, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:48 client Received first packet. Switching destination connection ID to: 9802b09f5a4c4f6f3773 2025/12/13 09:44:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:48 client newly acked packets (1): [0] 2025/12/13 09:44:48 client updated RTT: 33.162481ms (σ: 16.58124ms) 2025/12/13 09:44:48 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:48 client <- Reading packet 5 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9802b09f5a4c4f6f3773, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:48 client newly acked packets (1): [1] 2025/12/13 09:44:48 client updated RTT: 33.495ms (σ: 13.103ms) 2025/12/13 09:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:48 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:48 client -> Sending packet 2 (1280 bytes) for connection ad59b82453ec740aad13db59, Initial 2025/12/13 09:44:48 client Long Header{Type: Initial, DestConnectionID: 9802b09f5a4c4f6f3773, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:48 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/12/13 09:44:48 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9802b09f5a4c4f6f3773, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:44:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ad59b82453ec740aad13db59, InitialSourceConnectionID: 9802b09f5a4c4f6f3773, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:48 client -> Sending packet 0 (81 bytes) for connection ad59b82453ec740aad13db59, Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: 9802b09f5a4c4f6f3773, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:48 client Dropping Initial keys. 2025/12/13 09:44:48 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:48 client -> Sending packet 0 (61 bytes) for connection ad59b82453ec740aad13db59, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:48 client Short Header{DestConnectionID: 9802b09f5a4c4f6f3773, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 09:44:48 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:48 client <- &wire.PingFrame{} 2025/12/13 09:44:48 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:48 client <- Reading packet 2 (372 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/12/13 09:44:48 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100f111b40912a2b4b18a419760b36b087461ec557ed0e57bfffa92072a1b4c7aa4fdd9663a} 2025/12/13 09:44:48 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:48 client -> Sending packet 1 (37 bytes) for connection ad59b82453ec740aad13db59, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:48 client Short Header{DestConnectionID: 9802b09f5a4c4f6f3773, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 111.655µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:44:48 client -> Sending packet 1 (76 bytes) for connection ad59b82453ec740aad13db59, Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: 9802b09f5a4c4f6f3773, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:48 client -> Sending packet 2 (76 bytes) for connection ad59b82453ec740aad13db59, Handshake 2025/12/13 09:44:48 client Long Header{Type: Handshake, DestConnectionID: 9802b09f5a4c4f6f3773, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:49 client <- Reading packet 3 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:49 client Dropping Handshake keys. 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a2e397973818aafec43, StatelessResetToken: 0x19f6c3f82ba6c94ace425e6d8bad937f} 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 659bac10a1e9538f7a57, StatelessResetToken: 0xd429b1eec0ce99cca2f8f1c4fa959280} 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44ef7bf929dc5289bd7d, StatelessResetToken: 0xcd0558cfcb29db72c7748285c576487d} 2025/12/13 09:44:49 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:49 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.PingFrame{} 2025/12/13 09:44:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:44:49 client -> Sending packet 3 (71 bytes) for connection ad59b82453ec740aad13db59, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 44ef7bf929dc5289bd7d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 143.206µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 09:44:49 client -> Sending packet 4 (63 bytes) for connection ad59b82453ec740aad13db59, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 44ef7bf929dc5289bd7d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 09:44:49 client <- Reading packet 5 (56 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client newly acked packets (1): [4] 2025/12/13 09:44:49 client updated RTT: 33.185ms (σ: 10.446ms) 2025/12/13 09:44:49 client ECN capability confirmed. 2025/12/13 09:44:49 client Canceling loss detection timer. 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 679c59fc27d3640282e4, StatelessResetToken: 0xd8e196b09c1d47529b4c6027148f03fb} 2025/12/13 09:44:49 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:49 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:49 client -> Sending packet 5 (37 bytes) for connection ad59b82453ec740aad13db59, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 44ef7bf929dc5289bd7d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, DelayTime: 71.794µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:49 client -> Sending packet 6 (32 bytes) for connection ad59b82453ec740aad13db59, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 44ef7bf929dc5289bd7d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:49 client Connection ad59b82453ec740aad13db59 closed. 2025/12/13 09:44:49 Requesting https://server4:443/envious-spicy-anteater. 2025/12/13 09:44:49 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:49 Increased send buffer size to 14336 kiB 2025/12/13 09:44:49 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:49 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:49 Created qlog file: /logs/qlog/b167d615757efd99fff7f4f5c7.sqlog 2025/12/13 09:44:49 client Starting new connection to server4 ([::]:47655 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b167d615757efd99fff7f4f5c7, version v1 2025/12/13 09:44:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:49 client -> Sending packet 0 (1280 bytes) for connection b167d615757efd99fff7f4f5c7, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: b167d615757efd99fff7f4f5c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:49 client -> Sending packet 1 (1280 bytes) for connection b167d615757efd99fff7f4f5c7, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: b167d615757efd99fff7f4f5c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/12/13 09:44:49 client <- Reading packet 28 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8fddd96dd0a12fc607de, Token: (empty), PacketNumber: 28, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:49 client Received first packet. Switching destination connection ID to: 8fddd96dd0a12fc607de 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client newly acked packets (1): [0] 2025/12/13 09:44:49 client updated RTT: 33.231374ms (σ: 16.615687ms) 2025/12/13 09:44:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:44:49 client -> Sending packet 2 (1280 bytes) for connection b167d615757efd99fff7f4f5c7, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/12/13 09:44:49 client -> Sending packet 3 (1280 bytes) for connection b167d615757efd99fff7f4f5c7, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/12/13 09:44:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:44:49 client -> Sending packet 4 (1280 bytes) for connection b167d615757efd99fff7f4f5c7, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:49 client -> Sending packet 5 (1280 bytes) for connection b167d615757efd99fff7f4f5c7, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/12/13 09:44:49 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:44:49 client <- Reading packet 29 (1226 bytes) for connection (empty), Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8fddd96dd0a12fc607de, Token: (empty), PacketNumber: 29, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:44:49 client -> Sending packet 6 (1280 bytes) for connection b167d615757efd99fff7f4f5c7, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 29, LowestAcked: 28, DelayTime: 0s} 2025/12/13 09:44:49 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8fddd96dd0a12fc607de, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:44:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b167d615757efd99fff7f4f5c7, InitialSourceConnectionID: 8fddd96dd0a12fc607de, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:49 client -> Sending packet 0 (81 bytes) for connection b167d615757efd99fff7f4f5c7, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:49 client Dropping Initial keys. 2025/12/13 09:44:49 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:44:49 client -> Sending packet 0 (60 bytes) for connection b167d615757efd99fff7f4f5c7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 8fddd96dd0a12fc607de, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:44:49 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8fddd96dd0a12fc607de, PacketNumber: 1, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:44:49 client -> Sending packet 1 (42 bytes) for connection b167d615757efd99fff7f4f5c7, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:44:49 client -> Sending packet 2 (76 bytes) for connection b167d615757efd99fff7f4f5c7, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:49 client -> Sending packet 3 (76 bytes) for connection b167d615757efd99fff7f4f5c7, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: 8fddd96dd0a12fc607de, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:49 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:49 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8fddd96dd0a12fc607de, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:49 client Peer doesn't await address validation any longer. 2025/12/13 09:44:49 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.104ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client newly acked packets (1): [0] 2025/12/13 09:44:49 client updated RTT: 43.2ms (σ: 32.4ms) 2025/12/13 09:44:49 client ECN capability confirmed. 2025/12/13 09:44:49 client Canceling loss detection timer. 2025/12/13 09:44:49 client Dropping Handshake keys. 2025/12/13 09:44:49 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 326a927684334209e280, StatelessResetToken: 0xf0d5c75eaedd7112c149082eca7f1044} 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b87c319b2111e70247c5, StatelessResetToken: 0x1d4bf172d4f33354a5ddfdbc09b9e830} 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e76703a195e5e7b5c001, StatelessResetToken: 0xdf4db119452d8c98256f89f394b8a10c} 2025/12/13 09:44:49 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:49 client -> Sending packet 1 (39 bytes) for connection b167d615757efd99fff7f4f5c7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 326a927684334209e280, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 165.708µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:49 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/12/13 09:44:49 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601002bb3a26a2ee7bee6211b6ccfc590b573c6c9aa39db94100857751134ec1bf059ac4912a1} 2025/12/13 09:44:49 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:49 client -> Sending packet 2 (39 bytes) for connection b167d615757efd99fff7f4f5c7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 326a927684334209e280, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 60.042µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client <- Reading packet 4 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.PingFrame{} 2025/12/13 09:44:49 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:49 client <- Reading packet 5 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:44:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:49 client -> Sending packet 3 (39 bytes) for connection b167d615757efd99fff7f4f5c7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 326a927684334209e280, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 80.099µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:49 client -> Sending packet 4 (32 bytes) for connection b167d615757efd99fff7f4f5c7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 326a927684334209e280, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:49 client Connection b167d615757efd99fff7f4f5c7 closed. 2025/12/13 09:44:49 Requesting https://server4:443/countless-overjoyed-motorcycle. 2025/12/13 09:44:49 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:49 Increased send buffer size to 14336 kiB 2025/12/13 09:44:49 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:49 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:49 Created qlog file: /logs/qlog/4d91c318a291d98b9116ac3fee0aa6301b.sqlog 2025/12/13 09:44:49 client Starting new connection to server4 ([::]:35968 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4d91c318a291d98b9116ac3fee0aa6301b, version v1 2025/12/13 09:44:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:49 client -> Sending packet 0 (1280 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: 4d91c318a291d98b9116ac3fee0aa6301b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:44:49 client -> Sending packet 1 (1280 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: 4d91c318a291d98b9116ac3fee0aa6301b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 279, Offset + Data length: 1510} 2025/12/13 09:44:49 client <- Reading packet 24 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ea8bd894e2725631ca38, Token: (empty), PacketNumber: 24, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:49 client Received first packet. Switching destination connection ID to: ea8bd894e2725631ca38 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client newly acked packets (1): [0] 2025/12/13 09:44:49 client updated RTT: 34.83504ms (σ: 17.41752ms) 2025/12/13 09:44:49 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:49 client <- Reading packet 25 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ea8bd894e2725631ca38, Token: (empty), PacketNumber: 25, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client newly acked packets (1): [1] 2025/12/13 09:44:49 client updated RTT: 35.149ms (σ: 13.691ms) 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:49 client -> Sending packet 2 (1280 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: ea8bd894e2725631ca38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 24, DelayTime: 0s} 2025/12/13 09:44:49 client <- Reading packet 0 (776 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ea8bd894e2725631ca38, PacketNumber: 0, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:44:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4d91c318a291d98b9116ac3fee0aa6301b, InitialSourceConnectionID: ea8bd894e2725631ca38, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:49 client -> Sending packet 0 (81 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: ea8bd894e2725631ca38, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:49 client Dropping Initial keys. 2025/12/13 09:44:49 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:49 client -> Sending packet 0 (68 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: ea8bd894e2725631ca38, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 37, Offset + Data length: 37} 2025/12/13 09:44:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:44:49 client -> Sending packet 1 (76 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: ea8bd894e2725631ca38, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:49 client -> Sending packet 2 (76 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: ea8bd894e2725631ca38, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:49 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1192 bytes. 2025/12/13 09:44:49 client Dropping initial packet (40 bytes) because we already dropped the keys. 2025/12/13 09:44:49 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 416 bytes. 2025/12/13 09:44:49 client <- Reading packet 1 (776 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ea8bd894e2725631ca38, PacketNumber: 1, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:44:49 client Dropping 1RTT packet (416 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:44:49 client -> Sending packet 3 (42 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: ea8bd894e2725631ca38, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:49 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ea8bd894e2725631ca38, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:49 client Peer doesn't await address validation any longer. 2025/12/13 09:44:49 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 89.776ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client newly acked packets (1): [0] 2025/12/13 09:44:49 client updated RTT: 43.557ms (σ: 27.084ms) 2025/12/13 09:44:49 client ECN capability confirmed. 2025/12/13 09:44:49 client Canceling loss detection timer. 2025/12/13 09:44:49 client Dropping Handshake keys. 2025/12/13 09:44:49 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 419c6e3b6ab2dbfc5623, StatelessResetToken: 0xb54accd7ccbee2596d2e868fe9f3cdb7} 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d44e508a5c14cf82d675, StatelessResetToken: 0x93f74adf482f7657575eec04a58fe632} 2025/12/13 09:44:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99707e0049b83264fb25, StatelessResetToken: 0x25852de5071d84b875b5637e3e3b0665} 2025/12/13 09:44:49 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:49 client -> Sending packet 1 (39 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 419c6e3b6ab2dbfc5623, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 188.183µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:49 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:44:49 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:49 client -> Sending packet 2 (39 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 419c6e3b6ab2dbfc5623, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 65.622µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:49 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:49 client -> Sending packet 3 (32 bytes) for connection 4d91c318a291d98b9116ac3fee0aa6301b, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 419c6e3b6ab2dbfc5623, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:49 client Connection 4d91c318a291d98b9116ac3fee0aa6301b closed. 2025/12/13 09:44:49 Requesting https://server4:443/small-zesty-rom. 2025/12/13 09:44:49 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:49 Increased send buffer size to 14336 kiB 2025/12/13 09:44:49 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:49 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:49 Created qlog file: /logs/qlog/d58a5b70d6ff6db8cc1ac90bc8.sqlog 2025/12/13 09:44:49 client Starting new connection to server4 ([::]:56894 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d58a5b70d6ff6db8cc1ac90bc8, version v1 2025/12/13 09:44:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:49 client -> Sending packet 0 (1280 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: d58a5b70d6ff6db8cc1ac90bc8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:49 client -> Sending packet 1 (1280 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: d58a5b70d6ff6db8cc1ac90bc8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:49 client Queueing packet (771 bytes) for later decryption 2025/12/13 09:44:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:44:49 client -> Sending packet 2 (1280 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: d58a5b70d6ff6db8cc1ac90bc8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:44:49 client -> Sending packet 3 (1280 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: d58a5b70d6ff6db8cc1ac90bc8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:49 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:49 client <- Reading packet 14 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5628b2af2c58049d4300, Token: (empty), PacketNumber: 14, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:49 client Received first packet. Switching destination connection ID to: 5628b2af2c58049d4300 2025/12/13 09:44:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client newly acked packets (1): [2] 2025/12/13 09:44:49 client updated RTT: 32.904699ms (σ: 16.452349ms) 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:49 client -> Sending packet 4 (1280 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, Initial 2025/12/13 09:44:49 client Long Header{Type: Initial, DestConnectionID: 5628b2af2c58049d4300, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 0s} 2025/12/13 09:44:49 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5628b2af2c58049d4300, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:44:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d58a5b70d6ff6db8cc1ac90bc8, InitialSourceConnectionID: 5628b2af2c58049d4300, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:49 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:49 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5628b2af2c58049d4300, PacketNumber: 1, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:44:49 client -> Sending packet 0 (81 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: 5628b2af2c58049d4300, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:49 client Dropping Initial keys. 2025/12/13 09:44:49 client -> Sending packet 0 (53 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:49 client Short Header{DestConnectionID: 5628b2af2c58049d4300, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 22, Offset + Data length: 22} 2025/12/13 09:44:49 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:49 client Dropping initial packet (1224 bytes) because we already dropped the keys. 2025/12/13 09:44:49 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:49 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5628b2af2c58049d4300, PacketNumber: 2, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:44:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:44:49 client -> Sending packet 1 (42 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, Handshake 2025/12/13 09:44:49 client Long Header{Type: Handshake, DestConnectionID: 5628b2af2c58049d4300, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:50 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:44:50 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:50 client <- &wire.PingFrame{} 2025/12/13 09:44:50 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:50 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:44:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:50 client -> Sending packet 1 (37 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:50 client Short Header{DestConnectionID: 5628b2af2c58049d4300, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 107.6µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:50 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:50 client -> Sending packet 2 (73 bytes) for connection d58a5b70d6ff6db8cc1ac90bc8, Handshake 2025/12/13 09:44:50 client Long Header{Type: Handshake, DestConnectionID: 5628b2af2c58049d4300, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/12/13 09:44:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:50 client Short Header{DestConnectionID: 5628b2af2c58049d4300, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:50 client Connection d58a5b70d6ff6db8cc1ac90bc8 closed. 2025/12/13 09:44:50 Requesting https://server4:443/unforgiving-bright-folder. 2025/12/13 09:44:50 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:50 Increased send buffer size to 14336 kiB 2025/12/13 09:44:50 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:50 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:50 Created qlog file: /logs/qlog/d899bc66e9a00fed628190f74f5b.sqlog 2025/12/13 09:44:50 client Starting new connection to server4 ([::]:42653 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d899bc66e9a00fed628190f74f5b, version v1 2025/12/13 09:44:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:50 client -> Sending packet 0 (1280 bytes) for connection d899bc66e9a00fed628190f74f5b, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: d899bc66e9a00fed628190f74f5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 09:44:50 client -> Sending packet 1 (1280 bytes) for connection d899bc66e9a00fed628190f74f5b, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: d899bc66e9a00fed628190f74f5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 1234, Data length: 274, Offset + Data length: 1508} 2025/12/13 09:44:50 client <- Reading packet 2 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d7c94e5c57b85e705f7, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:50 client Received first packet. Switching destination connection ID to: 4d7c94e5c57b85e705f7 2025/12/13 09:44:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:50 client newly acked packets (1): [0] 2025/12/13 09:44:50 client updated RTT: 33.139905ms (σ: 16.569952ms) 2025/12/13 09:44:50 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:50 client <- Reading packet 3 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d7c94e5c57b85e705f7, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:50 client newly acked packets (1): [1] 2025/12/13 09:44:50 client updated RTT: 33.478ms (σ: 13.104ms) 2025/12/13 09:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:50 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:50 client -> Sending packet 2 (1280 bytes) for connection d899bc66e9a00fed628190f74f5b, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: 4d7c94e5c57b85e705f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:44:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:50 client -> Sending packet 3 (1280 bytes) for connection d899bc66e9a00fed628190f74f5b, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: 4d7c94e5c57b85e705f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:50 client -> &wire.PingFrame{} 2025/12/13 09:44:50 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1192 bytes. 2025/12/13 09:44:50 client <- Reading packet 4 (40 bytes) for connection (empty), Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d7c94e5c57b85e705f7, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:50 client <- &wire.PingFrame{} 2025/12/13 09:44:50 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 419 bytes. 2025/12/13 09:44:50 client <- Reading packet 1 (773 bytes) for connection (empty), Handshake 2025/12/13 09:44:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d7c94e5c57b85e705f7, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:44:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d899bc66e9a00fed628190f74f5b, InitialSourceConnectionID: 4d7c94e5c57b85e705f7, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:50 client Dropping 1RTT packet (419 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:44:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d899bc66e9a00fed628190f74f5b 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: 4d7c94e5c57b85e705f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1179, Version: v1} 2025/12/13 09:44:50 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:44:50 client Long Header{Type: Handshake, DestConnectionID: 4d7c94e5c57b85e705f7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:50 client Dropping Initial keys. 2025/12/13 09:44:50 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:50 client -> Sending packet 0 (63 bytes) for connection d899bc66e9a00fed628190f74f5b, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:50 client Short Header{DestConnectionID: 4d7c94e5c57b85e705f7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 09:44:50 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:44:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:44:50 client -> Sending packet 1 (76 bytes) for connection d899bc66e9a00fed628190f74f5b, Handshake 2025/12/13 09:44:50 client Long Header{Type: Handshake, DestConnectionID: 4d7c94e5c57b85e705f7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:50 client -> Sending packet 2 (76 bytes) for connection d899bc66e9a00fed628190f74f5b, Handshake 2025/12/13 09:44:50 client Long Header{Type: Handshake, DestConnectionID: 4d7c94e5c57b85e705f7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:50 client Parsed a coalesced packet. Part 1: 778 bytes. Remaining: 554 bytes. 2025/12/13 09:44:50 client <- Reading packet 2 (778 bytes) for connection (empty), Handshake 2025/12/13 09:44:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d7c94e5c57b85e705f7, PacketNumber: 2, PacketNumberLen: 1, Length: 759, Version: v1} 2025/12/13 09:44:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:50 client Peer doesn't await address validation any longer. 2025/12/13 09:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:44:50 client <- Reading packet 0 (554 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 85.952ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:50 client newly acked packets (1): [0] 2025/12/13 09:44:50 client updated RTT: 41.729ms (σ: 26.33ms) 2025/12/13 09:44:50 client ECN capability confirmed. 2025/12/13 09:44:50 client Canceling loss detection timer. 2025/12/13 09:44:50 client Dropping Handshake keys. 2025/12/13 09:44:50 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c319f30954cc9951cd6d, StatelessResetToken: 0x2ace2e026c39a3df19d3a1679048a801} 2025/12/13 09:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adc4b046cc07bec8737, StatelessResetToken: 0x5a4ca37fe13e105fecbbf104276192d2} 2025/12/13 09:44:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2ee01d8679c222719f0c, StatelessResetToken: 0xfe3827188d92c9876126202115e5e4ed} 2025/12/13 09:44:50 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:50 client -> Sending packet 1 (39 bytes) for connection d899bc66e9a00fed628190f74f5b, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:50 client Short Header{DestConnectionID: c319f30954cc9951cd6d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 212.285µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:50 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:50 client <- &wire.PingFrame{} 2025/12/13 09:44:50 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:50 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:50 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:44:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:50 client -> Sending packet 2 (37 bytes) for connection d899bc66e9a00fed628190f74f5b, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:50 client Short Header{DestConnectionID: c319f30954cc9951cd6d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 68.087µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:50 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:50 client -> Sending packet 3 (32 bytes) for connection d899bc66e9a00fed628190f74f5b, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:50 client Short Header{DestConnectionID: c319f30954cc9951cd6d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:50 client Connection d899bc66e9a00fed628190f74f5b closed. 2025/12/13 09:44:50 Requesting https://server4:443/freezing-roasting-firefighter. 2025/12/13 09:44:50 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:50 Increased send buffer size to 14336 kiB 2025/12/13 09:44:50 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:50 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:50 Created qlog file: /logs/qlog/dc71925510a4024fd7ebe519d6e3858b3f48de0f.sqlog 2025/12/13 09:44:50 client Starting new connection to server4 ([::]:50020 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dc71925510a4024fd7ebe519d6e3858b3f48de0f, version v1 2025/12/13 09:44:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:50 client -> Sending packet 0 (1280 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: dc71925510a4024fd7ebe519d6e3858b3f48de0f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:50 client -> Sending packet 1 (1280 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: dc71925510a4024fd7ebe519d6e3858b3f48de0f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 1228, Data length: 291, Offset + Data length: 1519} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:44:50 client -> Sending packet 2 (1280 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: dc71925510a4024fd7ebe519d6e3858b3f48de0f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 09:44:50 client -> Sending packet 3 (1280 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: dc71925510a4024fd7ebe519d6e3858b3f48de0f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 1228, Data length: 291, Offset + Data length: 1519} 2025/12/13 09:44:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:44:50 client -> Sending packet 4 (1280 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: dc71925510a4024fd7ebe519d6e3858b3f48de0f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 09:44:50 client -> Sending packet 5 (1280 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Initial 2025/12/13 09:44:50 client Long Header{Type: Initial, DestConnectionID: dc71925510a4024fd7ebe519d6e3858b3f48de0f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:50 client -> &wire.CryptoFrame{Offset: 1228, Data length: 291, Offset + Data length: 1519} 2025/12/13 09:44:50 client Queueing packet (778 bytes) for later decryption 2025/12/13 09:44:51 client Parsed a coalesced packet. Part 1: 1229 bytes. Remaining: 3 bytes. 2025/12/13 09:44:51 client <- Reading packet 19 (1229 bytes) for connection (empty), Initial 2025/12/13 09:44:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, Token: (empty), PacketNumber: 19, PacketNumberLen: 1, Length: 1209, Version: v1} 2025/12/13 09:44:51 client Received first packet. Switching destination connection ID to: d0948d94572b687a2c13 2025/12/13 09:44:51 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 600.496ms} 2025/12/13 09:44:51 client newly acked packets (2): [4 5] 2025/12/13 09:44:51 client updated RTT: 635.656823ms (σ: 317.828411ms) 2025/12/13 09:44:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:51 client Queueing packet (3 bytes) for later decryption 2025/12/13 09:44:51 client <- Reading packet 2 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:51 client <- &wire.PingFrame{} 2025/12/13 09:44:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f 2025/12/13 09:44:51 client Long Header{Type: Initial, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1218, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 19, DelayTime: 0s} 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:44:51 client Dropping Initial keys. 2025/12/13 09:44:51 client <- Reading packet 1 (778 bytes) for connection (empty), Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 1, PacketNumberLen: 1, Length: 759, Version: v1} 2025/12/13 09:44:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/12/13 09:44:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dc71925510a4024fd7ebe519d6e3858b3f48de0f, InitialSourceConnectionID: d0948d94572b687a2c13, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:51 client Dropping 1RTT packet (3 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 2 2025/12/13 09:44:51 client -> Sending packet 1 (81 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:51 client -> Sending packet 0 (67 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:51 client Short Header{DestConnectionID: d0948d94572b687a2c13, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:51 client <- Reading packet 3 (778 bytes) for connection (empty), Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 3, PacketNumberLen: 1, Length: 759, Version: v1} 2025/12/13 09:44:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/12/13 09:44:51 client -> Sending packet 2 (42 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:51 client <- Reading packet 4 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 4, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:51 client <- &wire.PingFrame{} 2025/12/13 09:44:51 client -> Sending packet 3 (42 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:51 client <- Reading packet 5 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 5, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:51 client <- &wire.PingFrame{} 2025/12/13 09:44:51 client -> Sending packet 4 (42 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:51 client <- Reading packet 6 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 6, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:51 client <- &wire.PingFrame{} 2025/12/13 09:44:51 client -> Sending packet 5 (42 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:51 client <- Reading packet 8 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 8, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:51 client <- &wire.PingFrame{} 2025/12/13 09:44:51 client -> Sending packet 6 (44 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 25, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:51 client <- Reading packet 9 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 9, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:51 client <- &wire.PingFrame{} 2025/12/13 09:44:51 client -> Sending packet 7 (44 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:51 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 25, Version: v1} 2025/12/13 09:44:51 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:52 client <- Reading packet 11 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 11, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:52 client <- &wire.PingFrame{} 2025/12/13 09:44:52 client -> Sending packet 8 (46 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:52 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 27, Version: v1} 2025/12/13 09:44:52 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:52 client <- Reading packet 13 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 13, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:52 client <- &wire.PingFrame{} 2025/12/13 09:44:52 client -> Sending packet 9 (48 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:52 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 29, Version: v1} 2025/12/13 09:44:52 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 1, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:52 client <- Reading packet 14 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 14, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:52 client <- &wire.PingFrame{} 2025/12/13 09:44:52 client -> Sending packet 10 (48 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:52 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 29, Version: v1} 2025/12/13 09:44:52 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 1, AckRanges: {{Largest: 14, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:52 client <- Reading packet 15 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 15, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:52 client <- &wire.PingFrame{} 2025/12/13 09:44:52 client -> Sending packet 11 (48 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:52 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 29, Version: v1} 2025/12/13 09:44:52 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 1, AckRanges: {{Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:44:53 client -> Sending packet 12 (76 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:53 client -> Sending packet 13 (76 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:53 client <- Reading packet 19 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 19, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:53 client <- &wire.PingFrame{} 2025/12/13 09:44:53 client -> Sending packet 14 (50 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, Length: 31, Version: v1} 2025/12/13 09:44:53 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 1, AckRanges: {{Largest: 19, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:53 client <- Reading packet 20 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 20, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:53 client <- &wire.PingFrame{} 2025/12/13 09:44:53 client -> Sending packet 15 (50 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, Length: 31, Version: v1} 2025/12/13 09:44:53 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 1, AckRanges: {{Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:53 client <- Reading packet 22 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 22, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:53 client <- &wire.PingFrame{} 2025/12/13 09:44:53 client -> Sending packet 16 (52 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 09:44:53 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 1, AckRanges: {{Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:53 client <- Reading packet 23 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 23, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:53 client <- &wire.PingFrame{} 2025/12/13 09:44:53 client -> Sending packet 17 (52 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 09:44:53 client -> &wire.AckFrame{LargestAcked: 23, LowestAcked: 1, AckRanges: {{Largest: 23, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:53 client <- Reading packet 24 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 24, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:53 client <- &wire.PingFrame{} 2025/12/13 09:44:53 client -> Sending packet 18 (52 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 09:44:53 client -> &wire.AckFrame{LargestAcked: 24, LowestAcked: 1, AckRanges: {{Largest: 24, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:53 client <- Reading packet 25 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 25, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:53 client <- &wire.PingFrame{} 2025/12/13 09:44:53 client -> Sending packet 19 (52 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 09:44:53 client -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 1, AckRanges: {{Largest: 25, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:53 client <- Reading packet 26 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 26, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:53 client <- &wire.PingFrame{} 2025/12/13 09:44:53 client -> Sending packet 20 (52 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 09:44:53 client -> &wire.AckFrame{LargestAcked: 26, LowestAcked: 1, AckRanges: {{Largest: 26, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:53 client <- Reading packet 27 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 27, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:53 client <- &wire.PingFrame{} 2025/12/13 09:44:53 client -> Sending packet 21 (52 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:53 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 09:44:53 client -> &wire.AckFrame{LargestAcked: 27, LowestAcked: 1, AckRanges: {{Largest: 27, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:54 client <- Reading packet 28 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 28, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:54 client <- &wire.PingFrame{} 2025/12/13 09:44:54 client -> Sending packet 22 (52 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 09:44:54 client -> &wire.AckFrame{LargestAcked: 28, LowestAcked: 1, AckRanges: {{Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:54 client <- Reading packet 31 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 31, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:54 client <- &wire.PingFrame{} 2025/12/13 09:44:54 client -> Sending packet 23 (54 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, Length: 35, Version: v1} 2025/12/13 09:44:54 client -> &wire.AckFrame{LargestAcked: 31, LowestAcked: 1, AckRanges: {{Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:54 client <- Reading packet 35 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 35, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:54 client <- &wire.PingFrame{} 2025/12/13 09:44:54 client -> Sending packet 24 (56 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, Length: 37, Version: v1} 2025/12/13 09:44:54 client -> &wire.AckFrame{LargestAcked: 35, LowestAcked: 1, AckRanges: {{Largest: 35, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:54 client <- Reading packet 36 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 36, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:54 client <- &wire.PingFrame{} 2025/12/13 09:44:54 client -> Sending packet 25 (56 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, Length: 37, Version: v1} 2025/12/13 09:44:54 client -> &wire.AckFrame{LargestAcked: 36, LowestAcked: 1, AckRanges: {{Largest: 36, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:54 client <- Reading packet 37 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 37, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:54 client <- &wire.PingFrame{} 2025/12/13 09:44:54 client -> Sending packet 26 (56 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, Length: 37, Version: v1} 2025/12/13 09:44:54 client -> &wire.AckFrame{LargestAcked: 37, LowestAcked: 1, AckRanges: {{Largest: 37, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:54 client <- Reading packet 38 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 38, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:54 client <- &wire.PingFrame{} 2025/12/13 09:44:54 client -> Sending packet 27 (56 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, Length: 37, Version: v1} 2025/12/13 09:44:54 client -> &wire.AckFrame{LargestAcked: 38, LowestAcked: 1, AckRanges: {{Largest: 38, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:54 client <- Reading packet 39 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 39, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:54 client <- &wire.PingFrame{} 2025/12/13 09:44:54 client -> Sending packet 28 (56 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:54 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, Length: 37, Version: v1} 2025/12/13 09:44:54 client -> &wire.AckFrame{LargestAcked: 39, LowestAcked: 1, AckRanges: {{Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 41 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 41, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 29 (58 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, Length: 39, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 41, LowestAcked: 1, AckRanges: {{Largest: 41, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 42 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 42, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 30 (58 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, Length: 39, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 42, LowestAcked: 1, AckRanges: {{Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 44 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 44, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 31 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 44, LowestAcked: 1, AckRanges: {{Largest: 44, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 45 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 45, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 32 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 45, LowestAcked: 1, AckRanges: {{Largest: 45, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 46 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 46, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 33 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 33, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 46, LowestAcked: 1, AckRanges: {{Largest: 46, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 47 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 47, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 34 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 34, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 47, LowestAcked: 1, AckRanges: {{Largest: 47, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 48 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 48, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 35 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 35, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 48, LowestAcked: 1, AckRanges: {{Largest: 48, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 49 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 49, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 36 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 36, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 49, LowestAcked: 1, AckRanges: {{Largest: 49, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 50 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 50, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 37 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 37, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 50, LowestAcked: 1, AckRanges: {{Largest: 50, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:55 client <- Reading packet 51 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 51, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:55 client <- &wire.PingFrame{} 2025/12/13 09:44:55 client -> Sending packet 38 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:55 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 38, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:55 client -> &wire.AckFrame{LargestAcked: 51, LowestAcked: 1, AckRanges: {{Largest: 51, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 52 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 52, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 39 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 39, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 52, LowestAcked: 1, AckRanges: {{Largest: 52, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 53 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 53, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 40 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 40, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 53, LowestAcked: 1, AckRanges: {{Largest: 53, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 54 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 54, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 41 (60 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 41, PacketNumberLen: 2, Length: 41, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 54, LowestAcked: 1, AckRanges: {{Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 56 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 56, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 42 (62 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 42, PacketNumberLen: 2, Length: 43, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 56, LowestAcked: 1, AckRanges: {{Largest: 56, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 57 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 57, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 43 (62 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 43, PacketNumberLen: 2, Length: 43, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 57, LowestAcked: 1, AckRanges: {{Largest: 57, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 59 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 59, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 44 (64 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 44, PacketNumberLen: 2, Length: 45, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 59, LowestAcked: 1, AckRanges: {{Largest: 59, Smallest: 59}, {Largest: 57, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 60 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 60, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 45 (64 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 45, PacketNumberLen: 2, Length: 45, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 60, LowestAcked: 1, AckRanges: {{Largest: 60, Smallest: 59}, {Largest: 57, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 63 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 63, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 46 (66 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 46, PacketNumberLen: 2, Length: 47, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 63, LowestAcked: 1, AckRanges: {{Largest: 63, Smallest: 63}, {Largest: 60, Smallest: 59}, {Largest: 57, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 64 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 64, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 47 (67 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 47, PacketNumberLen: 2, Length: 48, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 64, LowestAcked: 1, AckRanges: {{Largest: 64, Smallest: 63}, {Largest: 60, Smallest: 59}, {Largest: 57, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 65 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 65, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 48 (67 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 48, PacketNumberLen: 2, Length: 48, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 65, LowestAcked: 1, AckRanges: {{Largest: 65, Smallest: 63}, {Largest: 60, Smallest: 59}, {Largest: 57, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 66 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 66, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 49 (67 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 49, PacketNumberLen: 2, Length: 48, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 66, LowestAcked: 1, AckRanges: {{Largest: 66, Smallest: 63}, {Largest: 60, Smallest: 59}, {Largest: 57, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:56 client <- Reading packet 67 (39 bytes) for connection (empty), Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 67, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:56 client <- &wire.PingFrame{} 2025/12/13 09:44:56 client -> Sending packet 50 (67 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:56 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 50, PacketNumberLen: 2, Length: 48, Version: v1} 2025/12/13 09:44:56 client -> &wire.AckFrame{LargestAcked: 67, LowestAcked: 1, AckRanges: {{Largest: 67, Smallest: 63}, {Largest: 60, Smallest: 59}, {Largest: 57, Smallest: 56}, {Largest: 54, Smallest: 44}, {Largest: 42, Smallest: 41}, {Largest: 39, Smallest: 35}, {Largest: 31, Smallest: 31}, {Largest: 28, Smallest: 22}, {Largest: 20, Smallest: 19}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:44:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/12/13 09:44:57 client -> Sending packet 51 (76 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 51, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:57 client -> Sending packet 52 (76 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: d0948d94572b687a2c13, SrcConnectionID: (empty), PacketNumber: 52, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:57 client Parsed a coalesced packet. Part 1: 63 bytes. Remaining: 1269 bytes. 2025/12/13 09:44:57 client <- Reading packet 71 (63 bytes) for connection (empty), Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0948d94572b687a2c13, PacketNumber: 71, PacketNumberLen: 1, Length: 44, Version: v1} 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 51, LowestAcked: 0, AckRanges: {{Largest: 51, Smallest: 49}, {Largest: 47, Smallest: 44}, {Largest: 42, Smallest: 39}, {Largest: 37, Smallest: 36}, {Largest: 32, Smallest: 32}, {Largest: 30, Smallest: 30}, {Largest: 28, Smallest: 26}, {Largest: 24, Smallest: 21}, {Largest: 19, Smallest: 18}, {Largest: 16, Smallest: 14}, {Largest: 10, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:44:57 client Peer doesn't await address validation any longer. 2025/12/13 09:44:57 client <- Reading packet 0 (1269 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 5.720856s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client newly acked packets (1): [0] 2025/12/13 09:44:57 client updated RTT: 1.273029s (σ: 1.513117s) 2025/12/13 09:44:57 client ECN capability confirmed. 2025/12/13 09:44:57 client Canceling loss detection timer. 2025/12/13 09:44:57 client Dropping Handshake keys. 2025/12/13 09:44:57 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40109ff9d5b25662b4e8, StatelessResetToken: 0x43ab83ef0db9c86b46a852b72af52dc5} 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d9a6ea5706ae24625ec, StatelessResetToken: 0x21790420faa086107216936f5c7a3bd1} 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5fb9b803410b9c2a5317, StatelessResetToken: 0x4501930e674015afd6bd5258b086a9dd} 2025/12/13 09:44:57 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:57 client -> Sending packet 1 (39 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 40109ff9d5b25662b4e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 213.057µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:57 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 282, Offset + Data length: 282} 2025/12/13 09:44:57 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:57 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:57 client -> Sending packet 2 (32 bytes) for connection dc71925510a4024fd7ebe519d6e3858b3f48de0f, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 40109ff9d5b25662b4e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:57 client Connection dc71925510a4024fd7ebe519d6e3858b3f48de0f closed. 2025/12/13 09:44:57 Requesting https://server4:443/frosty-dirty-platypus. 2025/12/13 09:44:57 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:57 Increased send buffer size to 14336 kiB 2025/12/13 09:44:57 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:57 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:57 Created qlog file: /logs/qlog/45ed414eeca78dcac62b7d4f22.sqlog 2025/12/13 09:44:57 client Starting new connection to server4 ([::]:49738 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 45ed414eeca78dcac62b7d4f22, version v1 2025/12/13 09:44:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:57 client -> Sending packet 0 (1280 bytes) for connection 45ed414eeca78dcac62b7d4f22, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 45ed414eeca78dcac62b7d4f22, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:44:57 client -> Sending packet 1 (1280 bytes) for connection 45ed414eeca78dcac62b7d4f22, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 45ed414eeca78dcac62b7d4f22, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 09:44:57 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:57 client <- Reading packet 5 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 540ab13f9f970a265b21, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:57 client Received first packet. Switching destination connection ID to: 540ab13f9f970a265b21 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:57 client newly acked packets (2): [0 1] 2025/12/13 09:44:57 client updated RTT: 35.690429ms (σ: 17.845214ms) 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:57 client -> Sending packet 2 (1280 bytes) for connection 45ed414eeca78dcac62b7d4f22, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 540ab13f9f970a265b21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/12/13 09:44:57 client <- Reading packet 0 (772 bytes) for connection (empty), Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 540ab13f9f970a265b21, PacketNumber: 0, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:44:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 45ed414eeca78dcac62b7d4f22, InitialSourceConnectionID: 540ab13f9f970a265b21, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:57 client -> Sending packet 0 (81 bytes) for connection 45ed414eeca78dcac62b7d4f22, Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: 540ab13f9f970a265b21, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:57 client Dropping Initial keys. 2025/12/13 09:44:57 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:57 client -> Sending packet 0 (59 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 540ab13f9f970a265b21, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:44:57 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:57 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 540ab13f9f970a265b21, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:57 client Peer doesn't await address validation any longer. 2025/12/13 09:44:57 client newly acked packets (1): [0] 2025/12/13 09:44:57 client updated RTT: 35.353ms (σ: 14.056ms) 2025/12/13 09:44:57 client Canceling loss detection timer. 2025/12/13 09:44:57 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:57 client Dropping Handshake keys. 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 033e6717a817bf439f8d, StatelessResetToken: 0x8e3d63ccf33fa280524389afe18bab8a} 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0a63371a085ee296a6b4, StatelessResetToken: 0xf096611d497a7248a71c9d455f91ec32} 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b29634783b71672c09dc, StatelessResetToken: 0x61de3a5148cdb596019db618216fdb24} 2025/12/13 09:44:57 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:57 client -> Sending packet 1 (39 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 033e6717a817bf439f8d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208.198µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:57 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/12/13 09:44:57 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010069c9c2d48f2c751a09f3beeb91eb24d2a0a20b5a5a85af3ab7ea5a303ab8d3ef580bcd42} 2025/12/13 09:44:57 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:57 client -> Sending packet 2 (39 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 033e6717a817bf439f8d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 60.814µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:44:57 client -> Sending packet 4 (59 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 033e6717a817bf439f8d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:44:57 client Skipping packet number 3 2025/12/13 09:44:57 client -> Sending packet 5 (31 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 033e6717a817bf439f8d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:57 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client newly acked packets (1): [5] 2025/12/13 09:44:57 client updated RTT: 34.791ms (σ: 11.665ms) 2025/12/13 09:44:57 client ECN capability confirmed. 2025/12/13 09:44:57 client setting loss timer for packet 4 (1-RTT) to 39.139875ms (in %!s(monotime.Time=3608830468538)) 2025/12/13 09:44:57 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3608830468538) 2025/12/13 09:44:57 client lost packet 4 (time threshold) 2025/12/13 09:44:57 client Canceling loss detection timer. 2025/12/13 09:44:57 client -> Sending packet 6 (59 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 033e6717a817bf439f8d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:44:57 client <- Reading packet 7 (28 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client newly acked packets (1): [6] 2025/12/13 09:44:57 client updated RTT: 34.292ms (σ: 9.745ms) 2025/12/13 09:44:57 client Canceling loss detection timer. 2025/12/13 09:44:57 client -> Sending packet 7 (1366 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 033e6717a817bf439f8d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.PingFrame{} 2025/12/13 09:44:57 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:57 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:57 client -> Sending packet 8 (41 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 033e6717a817bf439f8d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 57.638µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:57 client -> Sending packet 9 (32 bytes) for connection 45ed414eeca78dcac62b7d4f22, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 033e6717a817bf439f8d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:57 client Connection 45ed414eeca78dcac62b7d4f22 closed. 2025/12/13 09:44:57 Requesting https://server4:443/steaming-content-headphones. 2025/12/13 09:44:57 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:57 Increased send buffer size to 14336 kiB 2025/12/13 09:44:57 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:57 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:57 Created qlog file: /logs/qlog/f2a0f1def516a244.sqlog 2025/12/13 09:44:57 client Starting new connection to server4 ([::]:51781 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f2a0f1def516a244, version v1 2025/12/13 09:44:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:57 client -> Sending packet 0 (1280 bytes) for connection f2a0f1def516a244, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: f2a0f1def516a244, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:57 client -> Sending packet 1 (1280 bytes) for connection f2a0f1def516a244, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: f2a0f1def516a244, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 1240, Data length: 270, Offset + Data length: 1510} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:57 client <- Reading packet 11 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 74c6ea52544c6ab1b807, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:57 client Received first packet. Switching destination connection ID to: 74c6ea52544c6ab1b807 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:57 client newly acked packets (1): [1] 2025/12/13 09:44:57 client updated RTT: 33.954119ms (σ: 16.977059ms) 2025/12/13 09:44:57 client setting loss timer for packet 0 (Initial) to 38.198383ms (in %!s(monotime.Time=3608903455965)) 2025/12/13 09:44:57 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3608903455965) 2025/12/13 09:44:57 client lost packet 0 (time threshold) 2025/12/13 09:44:57 client -> Sending packet 2 (1280 bytes) for connection f2a0f1def516a244, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 74c6ea52544c6ab1b807, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 61, Offset + Data length: 61} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 09:44:57 client -> Sending packet 3 (1280 bytes) for connection f2a0f1def516a244, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 74c6ea52544c6ab1b807, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 61, Data length: 2, Offset + Data length: 63} 2025/12/13 09:44:57 client <- Reading packet 12 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 74c6ea52544c6ab1b807, Token: (empty), PacketNumber: 12, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:57 client newly acked packets (1): [2] 2025/12/13 09:44:57 client updated RTT: 33.703ms (σ: 13.233ms) 2025/12/13 09:44:57 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:57 client <- Reading packet 13 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 74c6ea52544c6ab1b807, Token: (empty), PacketNumber: 13, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:57 client newly acked packets (1): [3] 2025/12/13 09:44:57 client updated RTT: 33.939ms (σ: 10.396ms) 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:57 client -> Sending packet 4 (1280 bytes) for connection f2a0f1def516a244, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 74c6ea52544c6ab1b807, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 11, DelayTime: 0s} 2025/12/13 09:44:57 client <- Reading packet 0 (767 bytes) for connection (empty), Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 74c6ea52544c6ab1b807, PacketNumber: 0, PacketNumberLen: 1, Length: 748, Version: v1} 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/12/13 09:44:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f2a0f1def516a244, InitialSourceConnectionID: 74c6ea52544c6ab1b807, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:57 client -> Sending packet 0 (81 bytes) for connection f2a0f1def516a244, Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: 74c6ea52544c6ab1b807, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:57 client Dropping Initial keys. 2025/12/13 09:44:57 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:57 client -> Sending packet 0 (65 bytes) for connection f2a0f1def516a244, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 74c6ea52544c6ab1b807, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 09:44:57 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.PingFrame{} 2025/12/13 09:44:57 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:57 client Sending ACK because the ACK timer expired. 2025/12/13 09:44:57 client -> Sending packet 1 (38 bytes) for connection f2a0f1def516a244, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 74c6ea52544c6ab1b807, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.307201ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:44:57 client -> Sending packet 1 (76 bytes) for connection f2a0f1def516a244, Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: 74c6ea52544c6ab1b807, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:57 client -> Sending packet 2 (76 bytes) for connection f2a0f1def516a244, Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: 74c6ea52544c6ab1b807, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:57 client <- Reading packet 3 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.PingFrame{} 2025/12/13 09:44:57 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:57 client -> Sending packet 2 (39 bytes) for connection f2a0f1def516a244, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 74c6ea52544c6ab1b807, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 79.828µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client <- Reading packet 4 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:57 client Dropping Handshake keys. 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b0aca5fdbb2663aa3e07, StatelessResetToken: 0xc1bb89fddacccb94e780adffb4c1750d} 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 49c68c703fe6233ad164, StatelessResetToken: 0x4cccba9d355e8537ee73a046df4e8048} 2025/12/13 09:44:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2c67b6ddb3e5c1ca8d91, StatelessResetToken: 0x111c51d88aa9d07b69c70793a9fc99b4} 2025/12/13 09:44:57 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:44:57 client -> Sending packet 4 (77 bytes) for connection f2a0f1def516a244, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 2c67b6ddb3e5c1ca8d91, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 122.037µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 09:44:57 client -> Sending packet 5 (67 bytes) for connection f2a0f1def516a244, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 2c67b6ddb3e5c1ca8d91, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 09:44:57 client <- Reading packet 5 (1422 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.PingFrame{} 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/12/13 09:44:57 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010029e5c25c1463aa03bde1003e8c27d5aa8a65c6382b58d93759b4203c0eab98c8caba342f} 2025/12/13 09:44:57 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:57 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:57 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:57 client -> Sending packet 6 (41 bytes) for connection f2a0f1def516a244, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 2c67b6ddb3e5c1ca8d91, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 104.876µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:44:57 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:57 client -> Sending packet 7 (32 bytes) for connection f2a0f1def516a244, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: 2c67b6ddb3e5c1ca8d91, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:57 client Connection f2a0f1def516a244 closed. 2025/12/13 09:44:57 Requesting https://server4:443/hard-scared-wolverine. 2025/12/13 09:44:57 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:57 Increased send buffer size to 14336 kiB 2025/12/13 09:44:57 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:57 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:57 Created qlog file: /logs/qlog/2e027aa8c74934c2b6a24f5b7aa45e.sqlog 2025/12/13 09:44:57 client Starting new connection to server4 ([::]:34021 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2e027aa8c74934c2b6a24f5b7aa45e, version v1 2025/12/13 09:44:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:57 client -> Sending packet 0 (1280 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 2e027aa8c74934c2b6a24f5b7aa45e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 09:44:57 client -> Sending packet 1 (1280 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 2e027aa8c74934c2b6a24f5b7aa45e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/12/13 09:44:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:44:57 client -> Sending packet 2 (1280 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 2e027aa8c74934c2b6a24f5b7aa45e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:57 client -> Sending packet 3 (1280 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: 2e027aa8c74934c2b6a24f5b7aa45e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:57 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:44:57 client <- Reading packet 7 (1226 bytes) for connection (empty), Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d5731e8af15685220510, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:44:57 client Received first packet. Switching destination connection ID to: d5731e8af15685220510 2025/12/13 09:44:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:44:57 client newly acked packets (2): [2 3] 2025/12/13 09:44:57 client updated RTT: 35.793372ms (σ: 17.896686ms) 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:44:57 client -> Sending packet 4 (1280 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, Initial 2025/12/13 09:44:57 client Long Header{Type: Initial, DestConnectionID: d5731e8af15685220510, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s} 2025/12/13 09:44:57 client <- Reading packet 0 (775 bytes) for connection (empty), Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d5731e8af15685220510, PacketNumber: 0, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:44:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:44:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2e027aa8c74934c2b6a24f5b7aa45e, InitialSourceConnectionID: d5731e8af15685220510, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:57 client -> Sending packet 0 (81 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, Handshake 2025/12/13 09:44:57 client Long Header{Type: Handshake, DestConnectionID: d5731e8af15685220510, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:57 client Dropping Initial keys. 2025/12/13 09:44:57 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:44:57 client -> Sending packet 0 (59 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:57 client Short Header{DestConnectionID: d5731e8af15685220510, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:44:58 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:58 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d5731e8af15685220510, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client Peer doesn't await address validation any longer. 2025/12/13 09:44:58 client newly acked packets (1): [0] 2025/12/13 09:44:58 client updated RTT: 35.434ms (σ: 14.139ms) 2025/12/13 09:44:58 client Canceling loss detection timer. 2025/12/13 09:44:58 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:58 client Dropping Handshake keys. 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2dfc9f37e1060b77b4ab, StatelessResetToken: 0x18bc17f905cc1e10f371f056eaa767db} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c55b3d2731d4462efcde, StatelessResetToken: 0x8b0c57cb85a51195688b64cf61c228d7} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0f1f27530d11c572835f, StatelessResetToken: 0x514123aeac41d585f7daff987bf4dd94} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client -> Sending packet 1 (39 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 2dfc9f37e1060b77b4ab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 189.843µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:58 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.PingFrame{} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client Sending ACK because the ACK timer expired. 2025/12/13 09:44:58 client -> Sending packet 2 (38 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 2dfc9f37e1060b77b4ab, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.253885ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client newly acked packets (1): [1] 2025/12/13 09:44:58 client Ignoring all packets below 1. 2025/12/13 09:44:58 client updated RTT: 34.86ms (σ: 11.752ms) 2025/12/13 09:44:58 client ECN capability confirmed. 2025/12/13 09:44:58 client lost packet 0 (time threshold) 2025/12/13 09:44:58 client Canceling loss detection timer. 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f322b9d7fa63012a8da4, StatelessResetToken: 0xbff1d0748cc6a7b0680ff987ce33c55e} 2025/12/13 09:44:58 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:58 client -> Sending packet 3 (69 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 2dfc9f37e1060b77b4ab, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 136.014µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:44:58 client <- Reading packet 5 (388 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/12/13 09:44:58 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100a15abeba5bd4ee6c6c6d8f57525ab5bc9a3ce16858590165e010202d48f8c7898c4b224b} 2025/12/13 09:44:58 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:58 client -> Sending packet 4 (41 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 2dfc9f37e1060b77b4ab, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 101.429µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:58 client -> Sending packet 5 (32 bytes) for connection 2e027aa8c74934c2b6a24f5b7aa45e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 2dfc9f37e1060b77b4ab, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:58 client Connection 2e027aa8c74934c2b6a24f5b7aa45e closed. 2025/12/13 09:44:58 Requesting https://server4:443/freezing-satisfied-porcupine. 2025/12/13 09:44:58 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:58 Increased send buffer size to 14336 kiB 2025/12/13 09:44:58 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:58 Created qlog file: /logs/qlog/cd07f95900bbfbf7d3d9c005bb.sqlog 2025/12/13 09:44:58 client Starting new connection to server4 ([::]:59112 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cd07f95900bbfbf7d3d9c005bb, version v1 2025/12/13 09:44:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:58 client -> Sending packet 0 (1280 bytes) for connection cd07f95900bbfbf7d3d9c005bb, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: cd07f95900bbfbf7d3d9c005bb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:58 client -> Sending packet 1 (1280 bytes) for connection cd07f95900bbfbf7d3d9c005bb, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: cd07f95900bbfbf7d3d9c005bb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:58 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 343e88386ec817ec95f4, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:58 client Received first packet. Switching destination connection ID to: 343e88386ec817ec95f4 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client newly acked packets (1): [0] 2025/12/13 09:44:58 client updated RTT: 33.123367ms (σ: 16.561683ms) 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:58 client <- Reading packet 4 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 343e88386ec817ec95f4, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client newly acked packets (1): [1] 2025/12/13 09:44:58 client updated RTT: 33.455ms (σ: 13.085ms) 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:58 client -> Sending packet 2 (1280 bytes) for connection cd07f95900bbfbf7d3d9c005bb, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: 343e88386ec817ec95f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/12/13 09:44:58 client <- Reading packet 0 (772 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 343e88386ec817ec95f4, PacketNumber: 0, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:44:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cd07f95900bbfbf7d3d9c005bb, InitialSourceConnectionID: 343e88386ec817ec95f4, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:58 client -> Sending packet 0 (81 bytes) for connection cd07f95900bbfbf7d3d9c005bb, Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: 343e88386ec817ec95f4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:58 client Dropping Initial keys. 2025/12/13 09:44:58 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:58 client -> Sending packet 0 (66 bytes) for connection cd07f95900bbfbf7d3d9c005bb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 343e88386ec817ec95f4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 35, Offset + Data length: 35} 2025/12/13 09:44:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:44:58 client -> Sending packet 1 (76 bytes) for connection cd07f95900bbfbf7d3d9c005bb, Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: 343e88386ec817ec95f4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:58 client -> Sending packet 2 (76 bytes) for connection cd07f95900bbfbf7d3d9c005bb, Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: 343e88386ec817ec95f4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1192 bytes. 2025/12/13 09:44:58 client Dropping initial packet (40 bytes) because we already dropped the keys. 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 420 bytes. 2025/12/13 09:44:58 client <- Reading packet 1 (772 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 343e88386ec817ec95f4, PacketNumber: 1, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:44:58 client Dropping 1RTT packet (420 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:44:58 client -> Sending packet 3 (42 bytes) for connection cd07f95900bbfbf7d3d9c005bb, Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: 343e88386ec817ec95f4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:58 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 343e88386ec817ec95f4, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:44:58 client Peer doesn't await address validation any longer. 2025/12/13 09:44:58 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:58 client Dropping Handshake keys. 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc067e7b02ffcd2df38a, StatelessResetToken: 0x4acdfe8d656def862ecb8c47729b0120} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0787aae5f5fb131b0c2, StatelessResetToken: 0x804d5a87920133024a8afc4d13f11218} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2eaad9b5b50532ec4823, StatelessResetToken: 0x8cdb286ae67256e6fe9a432da10fe560} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:44:58 client -> Sending packet 2 (76 bytes) for connection cd07f95900bbfbf7d3d9c005bb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: cc067e7b02ffcd2df38a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 148.557µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 35, Offset + Data length: 35} 2025/12/13 09:44:58 client -> Sending packet 3 (68 bytes) for connection cd07f95900bbfbf7d3d9c005bb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: cc067e7b02ffcd2df38a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 35, Offset + Data length: 35} 2025/12/13 09:44:58 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/12/13 09:44:58 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601004d72e43cd632968ae3e359d7a8f1efa601d88dc0fabfb6280fd1aeeae1ef733c0c90bac6} 2025/12/13 09:44:58 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:58 client -> Sending packet 4 (39 bytes) for connection cd07f95900bbfbf7d3d9c005bb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: cc067e7b02ffcd2df38a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 70.862µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 68fd33b970407a28c969, StatelessResetToken: 0xc8d0450a7fabb20ed725a08a36c05f85} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:58 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:58 client -> Sending packet 5 (39 bytes) for connection cd07f95900bbfbf7d3d9c005bb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: cc067e7b02ffcd2df38a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 87.203µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:58 client -> Sending packet 6 (32 bytes) for connection cd07f95900bbfbf7d3d9c005bb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: cc067e7b02ffcd2df38a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:58 client Connection cd07f95900bbfbf7d3d9c005bb closed. 2025/12/13 09:44:58 Requesting https://server4:443/proud-dirty-rom. 2025/12/13 09:44:58 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:58 Increased send buffer size to 14336 kiB 2025/12/13 09:44:58 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:58 Created qlog file: /logs/qlog/0d4bb2c63721dceb236e.sqlog 2025/12/13 09:44:58 client Starting new connection to server4 ([::]:42926 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0d4bb2c63721dceb236e, version v1 2025/12/13 09:44:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:58 client -> Sending packet 0 (1280 bytes) for connection 0d4bb2c63721dceb236e, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: 0d4bb2c63721dceb236e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:58 client -> Sending packet 1 (1280 bytes) for connection 0d4bb2c63721dceb236e, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: 0d4bb2c63721dceb236e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 1238, Data length: 266, Offset + Data length: 1504} 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:58 client <- Reading packet 11 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d660efc28e64c551b56, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:58 client Received first packet. Switching destination connection ID to: 4d660efc28e64c551b56 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client newly acked packets (2): [0 1] 2025/12/13 09:44:58 client updated RTT: 35.783336ms (σ: 17.891668ms) 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:58 client -> Sending packet 2 (1280 bytes) for connection 0d4bb2c63721dceb236e, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: 4d660efc28e64c551b56, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 0s} 2025/12/13 09:44:58 client <- Reading packet 0 (769 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d660efc28e64c551b56, PacketNumber: 0, PacketNumberLen: 1, Length: 750, Version: v1} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/12/13 09:44:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0d4bb2c63721dceb236e, InitialSourceConnectionID: 4d660efc28e64c551b56, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:58 client -> Sending packet 0 (81 bytes) for connection 0d4bb2c63721dceb236e, Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: 4d660efc28e64c551b56, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:58 client Dropping Initial keys. 2025/12/13 09:44:58 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:58 client -> Sending packet 0 (53 bytes) for connection 0d4bb2c63721dceb236e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 4d660efc28e64c551b56, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 22, Offset + Data length: 22} 2025/12/13 09:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:58 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d660efc28e64c551b56, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client Peer doesn't await address validation any longer. 2025/12/13 09:44:58 client newly acked packets (1): [0] 2025/12/13 09:44:58 client updated RTT: 35.373ms (σ: 14.237ms) 2025/12/13 09:44:58 client Canceling loss detection timer. 2025/12/13 09:44:58 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:58 client Dropping Handshake keys. 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff161b5148795c3128ab, StatelessResetToken: 0x531f7135d11c8f4d6f53f941f6dbdf4b} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 22248226746669cc729c, StatelessResetToken: 0xc3f8fdb94fad4b9772a17f5c790069e1} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 65142d955165b936953c, StatelessResetToken: 0x0f4fec4fd6bf1f66bf3b63997379271b} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client -> Sending packet 1 (39 bytes) for connection 0d4bb2c63721dceb236e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: ff161b5148795c3128ab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 146.513µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:44:58 client -> Sending packet 3 (53 bytes) for connection 0d4bb2c63721dceb236e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: ff161b5148795c3128ab, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 22, Offset + Data length: 22} 2025/12/13 09:44:58 client Skipping packet number 2 2025/12/13 09:44:58 client -> Sending packet 4 (31 bytes) for connection 0d4bb2c63721dceb236e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: ff161b5148795c3128ab, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:58 client <- Reading packet 4 (402 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4275974566f394333bc8, StatelessResetToken: 0x4ca6df54e34755015dc8a83303a5f0a8} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/12/13 09:44:58 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601001e83216cecbbcf675588a78f031aef4589a7c96abbfc160f7545d65f2562461d28c35f2f} 2025/12/13 09:44:58 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:58 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.PingFrame{} 2025/12/13 09:44:58 client -> Sending packet 5 (39 bytes) for connection 0d4bb2c63721dceb236e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: ff161b5148795c3128ab, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 164.346µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client newly acked packets (1): [3] 2025/12/13 09:44:58 client updated RTT: 34.796ms (σ: 11.83ms) 2025/12/13 09:44:58 client ECN capability confirmed. 2025/12/13 09:44:58 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:58 client -> Sending packet 6 (32 bytes) for connection 0d4bb2c63721dceb236e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: ff161b5148795c3128ab, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:58 client Connection 0d4bb2c63721dceb236e closed. 2025/12/13 09:44:58 Requesting https://server4:443/microscopic-moderate-bicycle. 2025/12/13 09:44:58 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:58 Increased send buffer size to 14336 kiB 2025/12/13 09:44:58 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:58 Created qlog file: /logs/qlog/7b0e522f44a0f4efdb2ca9c5.sqlog 2025/12/13 09:44:58 client Starting new connection to server4 ([::]:56391 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7b0e522f44a0f4efdb2ca9c5, version v1 2025/12/13 09:44:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:58 client -> Sending packet 0 (1280 bytes) for connection 7b0e522f44a0f4efdb2ca9c5, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: 7b0e522f44a0f4efdb2ca9c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 09:44:58 client -> Sending packet 1 (1280 bytes) for connection 7b0e522f44a0f4efdb2ca9c5, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: 7b0e522f44a0f4efdb2ca9c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 1236, Data length: 269, Offset + Data length: 1505} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:58 client <- Reading packet 26 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 85912fed8971be93f8c6, Token: (empty), PacketNumber: 26, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:58 client Received first packet. Switching destination connection ID to: 85912fed8971be93f8c6 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client newly acked packets (2): [0 1] 2025/12/13 09:44:58 client updated RTT: 35.700821ms (σ: 17.85041ms) 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:58 client -> Sending packet 2 (1280 bytes) for connection 7b0e522f44a0f4efdb2ca9c5, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: 85912fed8971be93f8c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 26, LowestAcked: 26, DelayTime: 0s} 2025/12/13 09:44:58 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 85912fed8971be93f8c6, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:44:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7b0e522f44a0f4efdb2ca9c5, InitialSourceConnectionID: 85912fed8971be93f8c6, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:58 client -> Sending packet 0 (81 bytes) for connection 7b0e522f44a0f4efdb2ca9c5, Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: 85912fed8971be93f8c6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:58 client Dropping Initial keys. 2025/12/13 09:44:58 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:58 client -> Sending packet 0 (66 bytes) for connection 7b0e522f44a0f4efdb2ca9c5, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 85912fed8971be93f8c6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 35, Offset + Data length: 35} 2025/12/13 09:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:58 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 85912fed8971be93f8c6, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client Peer doesn't await address validation any longer. 2025/12/13 09:44:58 client newly acked packets (1): [0] 2025/12/13 09:44:58 client updated RTT: 35.305ms (σ: 14.176ms) 2025/12/13 09:44:58 client Canceling loss detection timer. 2025/12/13 09:44:58 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:58 client Dropping Handshake keys. 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e6d4fc05a4bd80f511e8, StatelessResetToken: 0xd856a9172110e67a35acfe22bd0bdbe1} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cac6dd1c685561d1f015, StatelessResetToken: 0x4c7fc7c66362621423c01c34fa685acd} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d8a9ede4ec26e0250b6d, StatelessResetToken: 0x227b71d7f6b83ab2aba198fbaf5848f4} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client -> Sending packet 1 (39 bytes) for connection 7b0e522f44a0f4efdb2ca9c5, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: e6d4fc05a4bd80f511e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 149.498µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:58 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.PingFrame{} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:44:58 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:58 client -> Sending packet 2 (37 bytes) for connection 7b0e522f44a0f4efdb2ca9c5, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: e6d4fc05a4bd80f511e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 78.567µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:58 client -> Sending packet 3 (32 bytes) for connection 7b0e522f44a0f4efdb2ca9c5, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: e6d4fc05a4bd80f511e8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:58 client Connection 7b0e522f44a0f4efdb2ca9c5 closed. 2025/12/13 09:44:58 Requesting https://server4:443/embarrassed-arctic-mongoose. 2025/12/13 09:44:58 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:58 Increased send buffer size to 14336 kiB 2025/12/13 09:44:58 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:58 Created qlog file: /logs/qlog/bde349818ac30141fa29ad2dfb0a02.sqlog 2025/12/13 09:44:58 client Starting new connection to server4 ([::]:37356 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bde349818ac30141fa29ad2dfb0a02, version v1 2025/12/13 09:44:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:58 client -> Sending packet 0 (1280 bytes) for connection bde349818ac30141fa29ad2dfb0a02, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: bde349818ac30141fa29ad2dfb0a02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:58 client -> Sending packet 1 (1280 bytes) for connection bde349818ac30141fa29ad2dfb0a02, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: bde349818ac30141fa29ad2dfb0a02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 1233, Data length: 274, Offset + Data length: 1507} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:58 client <- Reading packet 11 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98b3dd2ac7fe885d91ff, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:58 client Received first packet. Switching destination connection ID to: 98b3dd2ac7fe885d91ff 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client newly acked packets (1): [0] 2025/12/13 09:44:58 client updated RTT: 32.881087ms (σ: 16.440543ms) 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:44:58 client <- Reading packet 12 (1224 bytes) for connection (empty), Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98b3dd2ac7fe885d91ff, Token: (empty), PacketNumber: 12, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client newly acked packets (1): [1] 2025/12/13 09:44:58 client updated RTT: 33.245ms (σ: 13.059ms) 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:44:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:44:58 client -> Sending packet 2 (1280 bytes) for connection bde349818ac30141fa29ad2dfb0a02, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: 98b3dd2ac7fe885d91ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 11, DelayTime: 0s} 2025/12/13 09:44:58 client <- Reading packet 0 (774 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98b3dd2ac7fe885d91ff, PacketNumber: 0, PacketNumberLen: 1, Length: 755, Version: v1} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/12/13 09:44:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:44:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bde349818ac30141fa29ad2dfb0a02, InitialSourceConnectionID: 98b3dd2ac7fe885d91ff, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:44:58 client -> Sending packet 0 (81 bytes) for connection bde349818ac30141fa29ad2dfb0a02, Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: 98b3dd2ac7fe885d91ff, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:44:58 client Dropping Initial keys. 2025/12/13 09:44:58 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:44:58 client -> Sending packet 0 (65 bytes) for connection bde349818ac30141fa29ad2dfb0a02, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 98b3dd2ac7fe885d91ff, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 09:44:58 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:44:58 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:44:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98b3dd2ac7fe885d91ff, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:44:58 client Peer doesn't await address validation any longer. 2025/12/13 09:44:58 client newly acked packets (1): [0] 2025/12/13 09:44:58 client updated RTT: 33.182ms (σ: 9.918ms) 2025/12/13 09:44:58 client Canceling loss detection timer. 2025/12/13 09:44:58 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:44:58 client Dropping Handshake keys. 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0be974e0d8bfe5d43836, StatelessResetToken: 0xae4ab2b584c4ea18b14e64fc1dfb8b9e} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e827c1a8855c9f905381, StatelessResetToken: 0xee76749556c1db227f0821637878204e} 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 309a5bd463763ed24ebb, StatelessResetToken: 0xdedeea58789a756d3ed10bdd2bcb9b2a} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client -> Sending packet 1 (39 bytes) for connection bde349818ac30141fa29ad2dfb0a02, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 0be974e0d8bfe5d43836, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 169.075µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:44:58 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.PingFrame{} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/12/13 09:44:58 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601005ed82d8a6aff3033496bd0cc071983f21822d8b7843c527073d827b74a2f3015f3a92717} 2025/12/13 09:44:58 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:44:58 client -> Sending packet 2 (37 bytes) for connection bde349818ac30141fa29ad2dfb0a02, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 0be974e0d8bfe5d43836, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 69.82µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client newly acked packets (1): [1] 2025/12/13 09:44:58 client Ignoring all packets below 1. 2025/12/13 09:44:58 client updated RTT: 32.886ms (σ: 8.028ms) 2025/12/13 09:44:58 client ECN capability confirmed. 2025/12/13 09:44:58 client lost packet 0 (time threshold) 2025/12/13 09:44:58 client Canceling loss detection timer. 2025/12/13 09:44:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0b5af554b47b45a4391e, StatelessResetToken: 0x3fc0930b9849345b5d2e6d1b119505f0} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client -> Sending packet 3 (73 bytes) for connection bde349818ac30141fa29ad2dfb0a02, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 0be974e0d8bfe5d43836, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 131.185µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 09:44:58 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 21.392ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client newly acked packets (1): [3] 2025/12/13 09:44:58 client Ignoring all packets below 4. 2025/12/13 09:44:58 client updated RTT: 32.789ms (σ: 6.214ms) 2025/12/13 09:44:58 client Canceling loss detection timer. 2025/12/13 09:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:58 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.PingFrame{} 2025/12/13 09:44:58 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:44:58 client -> Sending packet 4 (39 bytes) for connection bde349818ac30141fa29ad2dfb0a02, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 0be974e0d8bfe5d43836, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 59.912µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:44:58 client <- Reading packet 9 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:44:58 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:44:58 client <- &wire.PingFrame{} 2025/12/13 09:44:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:44:58 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:44:58 client -> Sending packet 5 (1366 bytes) for connection bde349818ac30141fa29ad2dfb0a02, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 0be974e0d8bfe5d43836, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.PingFrame{} 2025/12/13 09:44:58 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:44:58 client -> Sending packet 6 (32 bytes) for connection bde349818ac30141fa29ad2dfb0a02, 1-RTT (ECN: ECT(0)) 2025/12/13 09:44:58 client Short Header{DestConnectionID: 0be974e0d8bfe5d43836, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:44:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:44:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:44:58 client Connection bde349818ac30141fa29ad2dfb0a02 closed. 2025/12/13 09:44:58 Requesting https://server4:443/colossal-orange-soldier. 2025/12/13 09:44:58 Increased receive buffer size to 14336 kiB 2025/12/13 09:44:58 Increased send buffer size to 14336 kiB 2025/12/13 09:44:58 Setting DF for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:44:58 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:44:58 Created qlog file: /logs/qlog/aa056dae7966b5cb604e6764a5.sqlog 2025/12/13 09:44:58 client Starting new connection to server4 ([::]:39683 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aa056dae7966b5cb604e6764a5, version v1 2025/12/13 09:44:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:44:58 client -> Sending packet 0 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: aa056dae7966b5cb604e6764a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:44:58 client -> Sending packet 1 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:58 client Long Header{Type: Initial, DestConnectionID: aa056dae7966b5cb604e6764a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:58 client -> &wire.CryptoFrame{Offset: 1235, Data length: 283, Offset + Data length: 1518} 2025/12/13 09:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:44:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:44:59 client -> Sending packet 2 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: aa056dae7966b5cb604e6764a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:44:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:44:59 client -> Sending packet 3 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: aa056dae7966b5cb604e6764a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:44:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:59 client -> &wire.CryptoFrame{Offset: 1235, Data length: 283, Offset + Data length: 1518} 2025/12/13 09:44:59 client Parsed a coalesced packet. Part 1: 46 bytes. Remaining: 1186 bytes. 2025/12/13 09:44:59 client <- Reading packet 25 (46 bytes) for connection (empty), Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, Token: (empty), PacketNumber: 25, PacketNumberLen: 1, Length: 26, Version: v1} 2025/12/13 09:44:59 client Received first packet. Switching destination connection ID to: 3917e48f8bf3f15ef485 2025/12/13 09:44:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 100.92ms} 2025/12/13 09:44:59 client newly acked packets (1): [2] 2025/12/13 09:44:59 client updated RTT: 133.794425ms (σ: 66.897212ms) 2025/12/13 09:44:59 client <- &wire.PingFrame{} 2025/12/13 09:44:59 client Queueing packet (1186 bytes) for later decryption 2025/12/13 09:44:59 client -> Sending packet 4 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: 3917e48f8bf3f15ef485, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:59 client -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 25, DelayTime: 0s} 2025/12/13 09:44:59 client <- Reading packet 26 (42 bytes) for connection (empty), Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, Token: (empty), PacketNumber: 26, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:44:59 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/12/13 09:44:59 client Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1188 bytes. 2025/12/13 09:44:59 client <- Reading packet 27 (44 bytes) for connection (empty), Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, Token: (empty), PacketNumber: 27, PacketNumberLen: 1, Length: 24, Version: v1} 2025/12/13 09:44:59 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 67.56ms} 2025/12/13 09:44:59 client <- &wire.PingFrame{} 2025/12/13 09:44:59 client Queueing packet (1188 bytes) for later decryption 2025/12/13 09:44:59 client -> Sending packet 5 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: 3917e48f8bf3f15ef485, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:59 client -> &wire.AckFrame{LargestAcked: 27, LowestAcked: 25, DelayTime: 0s} 2025/12/13 09:44:59 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1192 bytes. 2025/12/13 09:44:59 client <- Reading packet 29 (40 bytes) for connection (empty), Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, Token: (empty), PacketNumber: 29, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:44:59 client <- &wire.PingFrame{} 2025/12/13 09:44:59 client Queueing packet (1192 bytes) for later decryption 2025/12/13 09:44:59 client -> Sending packet 6 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: 3917e48f8bf3f15ef485, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:59 client -> &wire.AckFrame{LargestAcked: 29, LowestAcked: 25, AckRanges: {{Largest: 29, Smallest: 29}, {Largest: 27, Smallest: 25}}, DelayTime: 0s} 2025/12/13 09:44:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:44:59 client -> Sending packet 7 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: 3917e48f8bf3f15ef485, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:59 client -> &wire.CryptoFrame{Offset: 1235, Data length: 283, Offset + Data length: 1518} 2025/12/13 09:44:59 client -> Sending packet 8 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:44:59 client Long Header{Type: Initial, DestConnectionID: 3917e48f8bf3f15ef485, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:44:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:44:59 client -> &wire.CryptoFrame{Offset: 1235, Data length: 283, Offset + Data length: 1518} 2025/12/13 09:44:59 client Queueing packet (772 bytes) for later decryption 2025/12/13 09:45:00 client Parsed a coalesced packet. Part 1: 48 bytes. Remaining: 1184 bytes. 2025/12/13 09:45:00 client <- Reading packet 32 (48 bytes) for connection (empty), Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, Token: (empty), PacketNumber: 32, PacketNumberLen: 1, Length: 28, Version: v1} 2025/12/13 09:45:00 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 788.84ms} 2025/12/13 09:45:00 client newly acked packets (1): [8] 2025/12/13 09:45:00 client updated RTT: 220.1ms (σ: 222.785ms) 2025/12/13 09:45:00 client <- &wire.PingFrame{} 2025/12/13 09:45:00 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 412 bytes. 2025/12/13 09:45:00 client Queueing packet (772 bytes) for later decryption 2025/12/13 09:45:00 client Queueing packet (412 bytes) for later decryption 2025/12/13 09:45:00 client -> Sending packet 9 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: 3917e48f8bf3f15ef485, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 32, LowestAcked: 25, AckRanges: {{Largest: 32, Smallest: 32}, {Largest: 29, Smallest: 29}, {Largest: 27, Smallest: 25}}, DelayTime: 0s} 2025/12/13 09:45:00 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:00 client <- Reading packet 33 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, Token: (empty), PacketNumber: 33, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:00 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, DelayTime: 0s} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:00 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:00 client -> Sending packet 10 (1280 bytes) for connection aa056dae7966b5cb604e6764a5, Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: 3917e48f8bf3f15ef485, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 33, LowestAcked: 25, AckRanges: {{Largest: 33, Smallest: 32}, {Largest: 29, Smallest: 29}, {Largest: 27, Smallest: 25}}, DelayTime: 0s} 2025/12/13 09:45:00 client Queueing packet (1186 bytes) for later decryption 2025/12/13 09:45:00 client Queueing packet (1188 bytes) for later decryption 2025/12/13 09:45:00 client Queueing packet (1192 bytes) for later decryption 2025/12/13 09:45:00 client <- Reading packet 0 (772 bytes) for connection (empty), Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, PacketNumber: 0, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:45:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aa056dae7966b5cb604e6764a5, InitialSourceConnectionID: 3917e48f8bf3f15ef485, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:00 client <- Reading packet 2 (772 bytes) for connection (empty), Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, PacketNumber: 2, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:45:00 client Dropping 1RTT packet (412 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:00 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:00 client Dropping 1RTT packet (1186 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:00 client Dropping 1RTT packet (1188 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:00 client Dropping 1RTT packet (1192 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:00 client -> Sending packet 0 (83 bytes) for connection aa056dae7966b5cb604e6764a5, Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: 3917e48f8bf3f15ef485, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 64, Version: v1} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:00 client Dropping Initial keys. 2025/12/13 09:45:00 client -> Sending packet 0 (61 bytes) for connection aa056dae7966b5cb604e6764a5, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: 3917e48f8bf3f15ef485, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 09:45:00 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:00 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3917e48f8bf3f15ef485, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:00 client Peer doesn't await address validation any longer. 2025/12/13 09:45:00 client newly acked packets (1): [0] 2025/12/13 09:45:00 client updated RTT: 196.712ms (σ: 213.863ms) 2025/12/13 09:45:00 client Canceling loss detection timer. 2025/12/13 09:45:00 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:00 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:00 client Dropping Handshake keys. 2025/12/13 09:45:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f56961a5f5d2211d60ac, StatelessResetToken: 0x194a49b59b5abbf7c68440bfb06cf6e7} 2025/12/13 09:45:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 09864d74d70d8d8b737f, StatelessResetToken: 0x4e79caedff99a7e7872e857029fbb34f} 2025/12/13 09:45:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e7c7ce13d9a96ac12857, StatelessResetToken: 0xe4c91ef75e527e09adc1cb5906123df2} 2025/12/13 09:45:00 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:00 client -> Sending packet 1 (39 bytes) for connection aa056dae7966b5cb604e6764a5, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: f56961a5f5d2211d60ac, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 171.189µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:00 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:00 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:00 client -> Sending packet 2 (39 bytes) for connection aa056dae7966b5cb604e6764a5, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: f56961a5f5d2211d60ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 63.589µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:00 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:00 client -> Sending packet 3 (32 bytes) for connection aa056dae7966b5cb604e6764a5, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: f56961a5f5d2211d60ac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:00 client Connection aa056dae7966b5cb604e6764a5 closed. 2025/12/13 09:45:00 Requesting https://server4:443/massive-enough-spaceship. 2025/12/13 09:45:00 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:00 Increased send buffer size to 14336 kiB 2025/12/13 09:45:00 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:00 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:00 Created qlog file: /logs/qlog/4ff56c2aa3f6d13a63.sqlog 2025/12/13 09:45:00 client Starting new connection to server4 ([::]:38949 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4ff56c2aa3f6d13a63, version v1 2025/12/13 09:45:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:00 client -> Sending packet 0 (1280 bytes) for connection 4ff56c2aa3f6d13a63, Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: 4ff56c2aa3f6d13a63, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 09:45:00 client -> Sending packet 1 (1280 bytes) for connection 4ff56c2aa3f6d13a63, Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: 4ff56c2aa3f6d13a63, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:00 client <- Reading packet 29 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5fabf38bf4dc36f0eeb6, Token: (empty), PacketNumber: 29, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:00 client Received first packet. Switching destination connection ID to: 5fabf38bf4dc36f0eeb6 2025/12/13 09:45:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:00 client newly acked packets (1): [0] 2025/12/13 09:45:00 client updated RTT: 33.117285ms (σ: 16.558642ms) 2025/12/13 09:45:00 client Queueing packet (768 bytes) for later decryption 2025/12/13 09:45:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:00 client -> Sending packet 2 (1280 bytes) for connection 4ff56c2aa3f6d13a63, Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: 5fabf38bf4dc36f0eeb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/12/13 09:45:00 client -> Sending packet 3 (1280 bytes) for connection 4ff56c2aa3f6d13a63, Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: 5fabf38bf4dc36f0eeb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:00 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:00 client <- Reading packet 31 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5fabf38bf4dc36f0eeb6, Token: (empty), PacketNumber: 31, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:00 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:00 client -> Sending packet 4 (1280 bytes) for connection 4ff56c2aa3f6d13a63, Initial 2025/12/13 09:45:00 client Long Header{Type: Initial, DestConnectionID: 5fabf38bf4dc36f0eeb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 31, LowestAcked: 29, AckRanges: {{Largest: 31, Smallest: 31}, {Largest: 29, Smallest: 29}}, DelayTime: 0s} 2025/12/13 09:45:00 client <- Reading packet 0 (768 bytes) for connection (empty), Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5fabf38bf4dc36f0eeb6, PacketNumber: 0, PacketNumberLen: 1, Length: 749, Version: v1} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/12/13 09:45:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4ff56c2aa3f6d13a63, InitialSourceConnectionID: 5fabf38bf4dc36f0eeb6, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:00 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:00 client <- Reading packet 1 (768 bytes) for connection (empty), Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5fabf38bf4dc36f0eeb6, PacketNumber: 1, PacketNumberLen: 1, Length: 749, Version: v1} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/12/13 09:45:00 client -> Sending packet 0 (81 bytes) for connection 4ff56c2aa3f6d13a63, Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: 5fabf38bf4dc36f0eeb6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:00 client Dropping Initial keys. 2025/12/13 09:45:00 client -> Sending packet 0 (62 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: 5fabf38bf4dc36f0eeb6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 31, Offset + Data length: 31} 2025/12/13 09:45:00 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:00 client Dropping initial packet (1224 bytes) because we already dropped the keys. 2025/12/13 09:45:00 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:00 client <- Reading packet 2 (768 bytes) for connection (empty), Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5fabf38bf4dc36f0eeb6, PacketNumber: 2, PacketNumberLen: 1, Length: 749, Version: v1} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/12/13 09:45:00 client -> Sending packet 1 (42 bytes) for connection 4ff56c2aa3f6d13a63, Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: 5fabf38bf4dc36f0eeb6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:00 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:00 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5fabf38bf4dc36f0eeb6, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:00 client Peer doesn't await address validation any longer. 2025/12/13 09:45:00 client newly acked packets (1): [0] 2025/12/13 09:45:00 client updated RTT: 33.09ms (σ: 12.47ms) 2025/12/13 09:45:00 client Canceling loss detection timer. 2025/12/13 09:45:00 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:00 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:00 client Dropping Handshake keys. 2025/12/13 09:45:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fbae4068f3bca0945e9f, StatelessResetToken: 0x0d7c8346f83bd0e0171cbda9885bc646} 2025/12/13 09:45:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 552e03a442908f99bbc1, StatelessResetToken: 0x4837bc432f599fb1802609feaeace194} 2025/12/13 09:45:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c19c717d0217bef3277c, StatelessResetToken: 0x04accc5aa2bd0405f1627617314a8611} 2025/12/13 09:45:00 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:00 client -> Sending packet 1 (39 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 189.743µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:00 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:00 client <- &wire.PingFrame{} 2025/12/13 09:45:00 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:00 client <- Reading packet 2 (372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/12/13 09:45:00 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100e64460e6b6d77fac5cfd8e82d990f75a6ff8b8714c0a4225371701c1d148f68489b1faac} 2025/12/13 09:45:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:00 client -> Sending packet 2 (37 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 81.171µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:00 client -> Sending packet 4 (62 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 31, Offset + Data length: 31} 2025/12/13 09:45:00 client Skipping packet number 3 2025/12/13 09:45:00 client -> Sending packet 5 (31 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:00 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:01 client <- Reading packet 4 (48 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a236b79bfc29940612e3, StatelessResetToken: 0xbf6b22e6a52e02d4b330b66301f4c560} 2025/12/13 09:45:01 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:01 client -> Sending packet 6 (39 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 58.93µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client <- Reading packet 7 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.PingFrame{} 2025/12/13 09:45:01 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:01 client -> Sending packet 7 (1366 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.PingFrame{} 2025/12/13 09:45:01 client -> Sending packet 8 (41 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 138.608µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client <- Reading packet 9 (1422 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.PingFrame{} 2025/12/13 09:45:01 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:01 client -> Sending packet 9 (43 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 60.663µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/12/13 09:45:01 client -> Sending packet 11 (62 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 31, Offset + Data length: 31} 2025/12/13 09:45:01 client Skipping packet number 10 2025/12/13 09:45:01 client -> Sending packet 12 (31 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: Not-ECT) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:01 client <- Reading packet 11 (28 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 4, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 4}}, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client newly acked packets (2): [7 11] 2025/12/13 09:45:01 client updated RTT: 32.852ms (σ: 9.826ms) 2025/12/13 09:45:01 client ECN capability confirmed. 2025/12/13 09:45:01 client -> Sending packet 13 (1409 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.PingFrame{} 2025/12/13 09:45:01 client <- Reading packet 13 (28 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 4, AckRanges: {{Largest: 13, Smallest: 11}, {Largest: 9, Smallest: 4}}, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client newly acked packets (2): [12 13] 2025/12/13 09:45:01 client updated RTT: 32.734ms (σ: 7.604ms) 2025/12/13 09:45:01 client Canceling loss detection timer. 2025/12/13 09:45:01 client <- Reading packet 14 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:01 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:01 client -> Sending packet 14 (1430 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.PingFrame{} 2025/12/13 09:45:01 client -> Sending packet 15 (47 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 194.382µs, ECT0: 9, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:01 client -> Sending packet 16 (32 bytes) for connection 4ff56c2aa3f6d13a63, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: fbae4068f3bca0945e9f, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:01 client Connection 4ff56c2aa3f6d13a63 closed. 2025/12/13 09:45:01 Requesting https://server4:443/white-warm-purse. 2025/12/13 09:45:01 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:01 Increased send buffer size to 14336 kiB 2025/12/13 09:45:01 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:01 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:01 Created qlog file: /logs/qlog/d18c5b013dc2bc3d184414e33098f969454f4036.sqlog 2025/12/13 09:45:01 client Starting new connection to server4 ([::]:46753 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d18c5b013dc2bc3d184414e33098f969454f4036, version v1 2025/12/13 09:45:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:01 client -> Sending packet 0 (1280 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036, Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: d18c5b013dc2bc3d184414e33098f969454f4036, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 09:45:01 client -> Sending packet 1 (1280 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036, Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: d18c5b013dc2bc3d184414e33098f969454f4036, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 1228, Data length: 283, Offset + Data length: 1511} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:01 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 968fff1abb7c38256e26, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:01 client Received first packet. Switching destination connection ID to: 968fff1abb7c38256e26 2025/12/13 09:45:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:01 client newly acked packets (1): [0] 2025/12/13 09:45:01 client updated RTT: 33.457749ms (σ: 16.728874ms) 2025/12/13 09:45:01 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:01 client <- Reading packet 4 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 968fff1abb7c38256e26, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:01 client newly acked packets (1): [1] 2025/12/13 09:45:01 client updated RTT: 33.812ms (σ: 13.256ms) 2025/12/13 09:45:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:01 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:01 client -> Sending packet 2 (1280 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036, Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: 968fff1abb7c38256e26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/12/13 09:45:01 client -> Sending packet 3 (1280 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036, Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: 968fff1abb7c38256e26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:01 client -> &wire.PingFrame{} 2025/12/13 09:45:01 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1192 bytes. 2025/12/13 09:45:01 client <- Reading packet 5 (40 bytes) for connection (empty), Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 968fff1abb7c38256e26, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:45:01 client <- &wire.PingFrame{} 2025/12/13 09:45:01 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 413 bytes. 2025/12/13 09:45:01 client <- Reading packet 1 (779 bytes) for connection (empty), Handshake 2025/12/13 09:45:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 968fff1abb7c38256e26, PacketNumber: 1, PacketNumberLen: 1, Length: 760, Version: v1} 2025/12/13 09:45:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/12/13 09:45:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d18c5b013dc2bc3d184414e33098f969454f4036, InitialSourceConnectionID: 968fff1abb7c38256e26, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:01 client Dropping 1RTT packet (413 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: 968fff1abb7c38256e26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1179, Version: v1} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/12/13 09:45:01 client Long Header{Type: Handshake, DestConnectionID: 968fff1abb7c38256e26, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:01 client Dropping Initial keys. 2025/12/13 09:45:01 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:01 client -> Sending packet 0 (54 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: 968fff1abb7c38256e26, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 23, Offset + Data length: 23} 2025/12/13 09:45:01 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:01 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 968fff1abb7c38256e26, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:01 client Peer doesn't await address validation any longer. 2025/12/13 09:45:01 client newly acked packets (1): [0] 2025/12/13 09:45:01 client updated RTT: 33.773ms (σ: 10.018ms) 2025/12/13 09:45:01 client Canceling loss detection timer. 2025/12/13 09:45:01 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:01 client Dropping Handshake keys. 2025/12/13 09:45:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b8a5553451908f115dd, StatelessResetToken: 0x46ae68bac990c9a98133890b3845656e} 2025/12/13 09:45:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fa73cef0a72bb14a0ed8, StatelessResetToken: 0xaa2d84a7fcc62e70954d8edea23a358b} 2025/12/13 09:45:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3423b999c27528907eb2, StatelessResetToken: 0xf2b0030457c2e6212f718d75cc937e8e} 2025/12/13 09:45:01 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:01 client -> Sending packet 1 (39 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: 7b8a5553451908f115dd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 214.229µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:01 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.PingFrame{} 2025/12/13 09:45:01 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:01 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:01 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:01 client -> Sending packet 2 (37 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: 7b8a5553451908f115dd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 80.921µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:01 client -> Sending packet 3 (32 bytes) for connection d18c5b013dc2bc3d184414e33098f969454f4036, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: 7b8a5553451908f115dd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:01 client Connection d18c5b013dc2bc3d184414e33098f969454f4036 closed. 2025/12/13 09:45:01 Requesting https://server4:443/fast-salty-celebi. 2025/12/13 09:45:01 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:01 Increased send buffer size to 14336 kiB 2025/12/13 09:45:01 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:01 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:01 Created qlog file: /logs/qlog/b148bc848b6a2054df.sqlog 2025/12/13 09:45:01 client Starting new connection to server4 ([::]:37011 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b148bc848b6a2054df, version v1 2025/12/13 09:45:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:01 client -> Sending packet 0 (1280 bytes) for connection b148bc848b6a2054df, Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: b148bc848b6a2054df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:01 client -> Sending packet 1 (1280 bytes) for connection b148bc848b6a2054df, Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: b148bc848b6a2054df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/12/13 09:45:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:01 client <- Reading packet 21 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec8ed1a0123222d65e34, Token: (empty), PacketNumber: 21, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:01 client Received first packet. Switching destination connection ID to: ec8ed1a0123222d65e34 2025/12/13 09:45:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:01 client newly acked packets (1): [0] 2025/12/13 09:45:01 client updated RTT: 33.15678ms (σ: 16.57839ms) 2025/12/13 09:45:01 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:01 client <- Reading packet 22 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec8ed1a0123222d65e34, Token: (empty), PacketNumber: 22, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:01 client newly acked packets (1): [1] 2025/12/13 09:45:01 client updated RTT: 33.534ms (σ: 13.189ms) 2025/12/13 09:45:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:01 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:01 client -> Sending packet 2 (1280 bytes) for connection b148bc848b6a2054df, Initial 2025/12/13 09:45:01 client Long Header{Type: Initial, DestConnectionID: ec8ed1a0123222d65e34, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 21, DelayTime: 0s} 2025/12/13 09:45:01 client <- Reading packet 0 (768 bytes) for connection (empty), Handshake 2025/12/13 09:45:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ec8ed1a0123222d65e34, PacketNumber: 0, PacketNumberLen: 1, Length: 749, Version: v1} 2025/12/13 09:45:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/12/13 09:45:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b148bc848b6a2054df, InitialSourceConnectionID: ec8ed1a0123222d65e34, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:01 client -> Sending packet 0 (81 bytes) for connection b148bc848b6a2054df, Handshake 2025/12/13 09:45:01 client Long Header{Type: Handshake, DestConnectionID: ec8ed1a0123222d65e34, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:01 client Dropping Initial keys. 2025/12/13 09:45:01 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:01 client -> Sending packet 0 (55 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: ec8ed1a0123222d65e34, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 09:45:01 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.752ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client Peer doesn't await address validation any longer. 2025/12/13 09:45:01 client newly acked packets (1): [0] 2025/12/13 09:45:01 client updated RTT: 35.956ms (σ: 14.735ms) 2025/12/13 09:45:01 client ECN capability confirmed. 2025/12/13 09:45:01 client Canceling loss detection timer. 2025/12/13 09:45:01 client Dropping Handshake keys. 2025/12/13 09:45:01 client <- Reading packet 5 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 246f3558d564cf8dbf9b, StatelessResetToken: 0x9bb467dec0039c8488d72842e73d61cd} 2025/12/13 09:45:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3c6718b974065b4168fe, StatelessResetToken: 0x4b784530ad740d142007787184837647} 2025/12/13 09:45:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a26a4d832b172612b257, StatelessResetToken: 0xb0e9e426d7c0df7bab7d3e1bfa6f22ce} 2025/12/13 09:45:01 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:01 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:01 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:01 client <- &wire.PingFrame{} 2025/12/13 09:45:01 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:01 client -> Sending packet 1 (39 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:01 client Short Header{DestConnectionID: a26a4d832b172612b257, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:01 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 182.84µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:02 client -> Sending packet 3 (31 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: a26a4d832b172612b257, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:02 client -> Sending packet 4 (31 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: a26a4d832b172612b257, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:02 client -> Sending packet 5 (1366 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: a26a4d832b172612b257, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.PingFrame{} 2025/12/13 09:45:02 client <- Reading packet 7 (58 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6de0fa728ab05ef0d349, StatelessResetToken: 0x27f27f4712c77d4d6fa11acde98b11af} 2025/12/13 09:45:02 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:02 client <- Reading packet 8 (28 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client newly acked packets (2): [4 5] 2025/12/13 09:45:02 client updated RTT: 35.489ms (σ: 11.985ms) 2025/12/13 09:45:02 client Canceling loss detection timer. 2025/12/13 09:45:02 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:02 client -> Sending packet 6 (38 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: a26a4d832b172612b257, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, DelayTime: 24.314308ms, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client <- Reading packet 10 (183 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 190, Data length: 115, Offset + Data length: 305} 2025/12/13 09:45:02 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010042fe110d94d6a8577b887181975d760ea9ddbd120529c5af8fce588bf159395ee14e5c77} 2025/12/13 09:45:02 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:02 client -> Sending packet 7 (39 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: a26a4d832b172612b257, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 4}}, DelayTime: 145.701µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client <- Reading packet 12 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 246f3558d564cf8dbf9b, StatelessResetToken: 0x9bb467dec0039c8488d72842e73d61cd} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3c6718b974065b4168fe, StatelessResetToken: 0x4b784530ad740d142007787184837647} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a26a4d832b172612b257, StatelessResetToken: 0xb0e9e426d7c0df7bab7d3e1bfa6f22ce} 2025/12/13 09:45:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 91, Offset + Data length: 91} 2025/12/13 09:45:02 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:02 client <- Reading packet 13 (122 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 91, Data length: 99, Offset + Data length: 190} 2025/12/13 09:45:02 client -> Sending packet 8 (1409 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: a26a4d832b172612b257, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.PingFrame{} 2025/12/13 09:45:02 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:02 client -> Sending packet 9 (32 bytes) for connection b148bc848b6a2054df, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: a26a4d832b172612b257, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:02 client Connection b148bc848b6a2054df closed. 2025/12/13 09:45:02 Requesting https://server4:443/medium-full-uxie. 2025/12/13 09:45:02 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:02 Increased send buffer size to 14336 kiB 2025/12/13 09:45:02 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:02 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:02 Created qlog file: /logs/qlog/747fdc2343b62a51e63f47.sqlog 2025/12/13 09:45:02 client Starting new connection to server4 ([::]:49641 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 747fdc2343b62a51e63f47, version v1 2025/12/13 09:45:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:02 client -> Sending packet 0 (1280 bytes) for connection 747fdc2343b62a51e63f47, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 747fdc2343b62a51e63f47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:02 client -> Sending packet 1 (1280 bytes) for connection 747fdc2343b62a51e63f47, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 747fdc2343b62a51e63f47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 1237, Data length: 278, Offset + Data length: 1515} 2025/12/13 09:45:02 client Parsed a coalesced packet. Part 1: 1225 bytes. Remaining: 7 bytes. 2025/12/13 09:45:02 client <- Reading packet 510 (1225 bytes) for connection (empty), Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 265aab9dbc740d20e8ef, Token: (empty), PacketNumber: 510, PacketNumberLen: 2, Length: 1205, Version: v1} 2025/12/13 09:45:02 client Received first packet. Switching destination connection ID to: 265aab9dbc740d20e8ef 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:02 client newly acked packets (2): [0 1] 2025/12/13 09:45:02 client updated RTT: 36.454043ms (σ: 18.227021ms) 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:02 client Queueing packet (7 bytes) for later decryption 2025/12/13 09:45:02 client -> Sending packet 2 (1280 bytes) for connection 747fdc2343b62a51e63f47, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 265aab9dbc740d20e8ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 510, LowestAcked: 510, DelayTime: 0s} 2025/12/13 09:45:02 client -> Sending packet 3 (1280 bytes) for connection 747fdc2343b62a51e63f47, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 265aab9dbc740d20e8ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.PingFrame{} 2025/12/13 09:45:02 client Parsed a coalesced packet. Part 1: 1227 bytes. Remaining: 5 bytes. 2025/12/13 09:45:02 client <- Reading packet 511 (1227 bytes) for connection (empty), Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 265aab9dbc740d20e8ef, Token: (empty), PacketNumber: 511, PacketNumberLen: 2, Length: 1207, Version: v1} 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:02 client newly acked packets (1): [3] 2025/12/13 09:45:02 client updated RTT: 36.065ms (σ: 14.446ms) 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:02 client Queueing packet (5 bytes) for later decryption 2025/12/13 09:45:02 client -> Sending packet 4 (1280 bytes) for connection 747fdc2343b62a51e63f47, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 265aab9dbc740d20e8ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 511, LowestAcked: 510, DelayTime: 0s} 2025/12/13 09:45:02 client Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 770 bytes. 2025/12/13 09:45:02 client <- Reading packet 512 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 265aab9dbc740d20e8ef, Token: (empty), PacketNumber: 512, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/12/13 09:45:02 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 0 bytes. 2025/12/13 09:45:02 client <- Reading packet 1 (770 bytes) for connection (empty), Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 265aab9dbc740d20e8ef, PacketNumber: 1, PacketNumberLen: 1, Length: 751, Version: v1} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/12/13 09:45:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 747fdc2343b62a51e63f47, InitialSourceConnectionID: 265aab9dbc740d20e8ef, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:02 client -> Sending packet 0 (81 bytes) for connection 747fdc2343b62a51e63f47, Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: 265aab9dbc740d20e8ef, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:02 client Dropping Initial keys. 2025/12/13 09:45:02 client Dropping 1RTT packet (7 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 6 2025/12/13 09:45:02 client Dropping 1RTT packet (5 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 4 2025/12/13 09:45:02 client -> Sending packet 0 (54 bytes) for connection 747fdc2343b62a51e63f47, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: 265aab9dbc740d20e8ef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 23, Offset + Data length: 23} 2025/12/13 09:45:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:02 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:02 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:02 client <- Reading packet 3 (191 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 182, Data length: 123, Offset + Data length: 305} 2025/12/13 09:45:02 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100c87eea080472bf557acec3064cf6e6ca041417c5e3ca7b53792f206b62fb1260fe2b6ed8} 2025/12/13 09:45:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:02 client -> Sending packet 1 (37 bytes) for connection 747fdc2343b62a51e63f47, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: 265aab9dbc740d20e8ef, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 146.423µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:02 client -> Sending packet 1 (73 bytes) for connection 747fdc2343b62a51e63f47, Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: 265aab9dbc740d20e8ef, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/12/13 09:45:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:02 client Short Header{DestConnectionID: 265aab9dbc740d20e8ef, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:02 client Connection 747fdc2343b62a51e63f47 closed. 2025/12/13 09:45:02 Requesting https://server4:443/hard-bored-deoxys. 2025/12/13 09:45:02 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:02 Increased send buffer size to 14336 kiB 2025/12/13 09:45:02 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:02 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:02 Created qlog file: /logs/qlog/631887173d53d4ec34d96b60d865aecb.sqlog 2025/12/13 09:45:02 client Starting new connection to server4 ([::]:40717 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 631887173d53d4ec34d96b60d865aecb, version v1 2025/12/13 09:45:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:02 client -> Sending packet 0 (1280 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 631887173d53d4ec34d96b60d865aecb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 09:45:02 client -> Sending packet 1 (1280 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 631887173d53d4ec34d96b60d865aecb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:02 client <- Reading packet 30 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4160d1464ea30edbcc44, Token: (empty), PacketNumber: 30, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:02 client Received first packet. Switching destination connection ID to: 4160d1464ea30edbcc44 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:02 client newly acked packets (1): [0] 2025/12/13 09:45:02 client updated RTT: 33.269374ms (σ: 16.634687ms) 2025/12/13 09:45:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:02 client -> Sending packet 2 (1280 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 4160d1464ea30edbcc44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/12/13 09:45:02 client -> Sending packet 3 (1280 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 4160d1464ea30edbcc44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:02 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:02 client <- Reading packet 31 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4160d1464ea30edbcc44, Token: (empty), PacketNumber: 31, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:02 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:02 client -> Sending packet 4 (1280 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: 4160d1464ea30edbcc44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 31, LowestAcked: 30, DelayTime: 0s} 2025/12/13 09:45:02 client <- Reading packet 0 (775 bytes) for connection (empty), Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4160d1464ea30edbcc44, PacketNumber: 0, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 631887173d53d4ec34d96b60d865aecb, InitialSourceConnectionID: 4160d1464ea30edbcc44, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:02 client -> Sending packet 0 (81 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: 4160d1464ea30edbcc44, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:02 client Dropping Initial keys. 2025/12/13 09:45:02 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:02 client -> Sending packet 0 (55 bytes) for connection 631887173d53d4ec34d96b60d865aecb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: 4160d1464ea30edbcc44, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 09:45:02 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:02 client Dropping initial packet (1226 bytes) because we already dropped the keys. 2025/12/13 09:45:02 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:02 client <- Reading packet 1 (775 bytes) for connection (empty), Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4160d1464ea30edbcc44, PacketNumber: 1, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:02 client -> Sending packet 1 (42 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: 4160d1464ea30edbcc44, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:02 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.PingFrame{} 2025/12/13 09:45:02 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:02 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:02 client -> Sending packet 1 (38 bytes) for connection 631887173d53d4ec34d96b60d865aecb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: 4160d1464ea30edbcc44, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.297137ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:02 client -> Sending packet 2 (76 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: 4160d1464ea30edbcc44, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:02 client -> Sending packet 3 (76 bytes) for connection 631887173d53d4ec34d96b60d865aecb, Handshake 2025/12/13 09:45:02 client Long Header{Type: Handshake, DestConnectionID: 4160d1464ea30edbcc44, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:02 client <- Reading packet 3 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:02 client Dropping Handshake keys. 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4e833b69c3dd16b37132, StatelessResetToken: 0x2f00290dec4993ecf969ee951bc3532c} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6ad1877f1229f448249c, StatelessResetToken: 0x2ea6232b820e6e1737a8c9e0210d1202} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d77710606b34c1d0aa0, StatelessResetToken: 0x91b8e0c67ff46ff4392419e4c3802d02} 2025/12/13 09:45:02 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:02 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.PingFrame{} 2025/12/13 09:45:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:02 client -> Sending packet 3 (67 bytes) for connection 631887173d53d4ec34d96b60d865aecb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: 7d77710606b34c1d0aa0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 176.879µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 09:45:02 client -> Sending packet 4 (57 bytes) for connection 631887173d53d4ec34d96b60d865aecb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: 7d77710606b34c1d0aa0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 09:45:02 client <- Reading packet 5 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client <- &wire.PingFrame{} 2025/12/13 09:45:02 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4e833b69c3dd16b37132, StatelessResetToken: 0x2f00290dec4993ecf969ee951bc3532c} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6ad1877f1229f448249c, StatelessResetToken: 0x2ea6232b820e6e1737a8c9e0210d1202} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d77710606b34c1d0aa0, StatelessResetToken: 0x91b8e0c67ff46ff4392419e4c3802d02} 2025/12/13 09:45:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fdc025f9db58bfcdeb64, StatelessResetToken: 0x1217994ceb942fdfcb1f99ecb9761b62} 2025/12/13 09:45:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/12/13 09:45:02 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100c650da868c1cfc5f89dcc7d0cec4d09fb66f0ad2896f19d2c7ad305392856119bae2d194} 2025/12/13 09:45:02 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:02 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:02 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:02 client -> Sending packet 5 (39 bytes) for connection 631887173d53d4ec34d96b60d865aecb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: 7d77710606b34c1d0aa0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 79.317µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:02 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:02 client -> Sending packet 6 (32 bytes) for connection 631887173d53d4ec34d96b60d865aecb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:02 client Short Header{DestConnectionID: 7d77710606b34c1d0aa0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:02 client Connection 631887173d53d4ec34d96b60d865aecb closed. 2025/12/13 09:45:02 Requesting https://server4:443/slow-many-car. 2025/12/13 09:45:02 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:02 Increased send buffer size to 14336 kiB 2025/12/13 09:45:02 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:02 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:02 Created qlog file: /logs/qlog/d9451e8e240c993cdf54af18a6.sqlog 2025/12/13 09:45:02 client Starting new connection to server4 ([::]:32835 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d9451e8e240c993cdf54af18a6, version v1 2025/12/13 09:45:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:02 client -> Sending packet 0 (1280 bytes) for connection d9451e8e240c993cdf54af18a6, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: d9451e8e240c993cdf54af18a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:45:02 client -> Sending packet 1 (1280 bytes) for connection d9451e8e240c993cdf54af18a6, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: d9451e8e240c993cdf54af18a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 1235, Data length: 279, Offset + Data length: 1514} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:02 client <- Reading packet 28 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eeabdf46c60e61e0c9cd, Token: (empty), PacketNumber: 28, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:02 client Received first packet. Switching destination connection ID to: eeabdf46c60e61e0c9cd 2025/12/13 09:45:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:02 client newly acked packets (1): [1] 2025/12/13 09:45:02 client updated RTT: 33.93016ms (σ: 16.96508ms) 2025/12/13 09:45:02 client setting loss timer for packet 0 (Initial) to 38.17143ms (in %!s(monotime.Time=3614213186192)) 2025/12/13 09:45:02 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3614213186192) 2025/12/13 09:45:02 client lost packet 0 (time threshold) 2025/12/13 09:45:02 client -> Sending packet 2 (1280 bytes) for connection d9451e8e240c993cdf54af18a6, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: eeabdf46c60e61e0c9cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:02 client Queueing packet (773 bytes) for later decryption 2025/12/13 09:45:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:02 client -> Sending packet 3 (1280 bytes) for connection d9451e8e240c993cdf54af18a6, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: eeabdf46c60e61e0c9cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:02 client -> Sending packet 4 (1280 bytes) for connection d9451e8e240c993cdf54af18a6, Initial 2025/12/13 09:45:02 client Long Header{Type: Initial, DestConnectionID: eeabdf46c60e61e0c9cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:03 client <- Reading packet 30 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eeabdf46c60e61e0c9cd, Token: (empty), PacketNumber: 30, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:03 client -> Sending packet 5 (1280 bytes) for connection d9451e8e240c993cdf54af18a6, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: eeabdf46c60e61e0c9cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 30, LowestAcked: 28, AckRanges: {{Largest: 30, Smallest: 30}, {Largest: 28, Smallest: 28}}, DelayTime: 0s} 2025/12/13 09:45:03 client <- Reading packet 0 (773 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eeabdf46c60e61e0c9cd, PacketNumber: 0, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:45:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d9451e8e240c993cdf54af18a6, InitialSourceConnectionID: eeabdf46c60e61e0c9cd, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:03 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:03 client <- Reading packet 1 (773 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eeabdf46c60e61e0c9cd, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:45:03 client -> Sending packet 0 (81 bytes) for connection d9451e8e240c993cdf54af18a6, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: eeabdf46c60e61e0c9cd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:03 client Dropping Initial keys. 2025/12/13 09:45:03 client -> Sending packet 0 (51 bytes) for connection d9451e8e240c993cdf54af18a6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: eeabdf46c60e61e0c9cd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 20, Offset + Data length: 20} 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:03 client Dropping initial packet (1224 bytes) because we already dropped the keys. 2025/12/13 09:45:03 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:03 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eeabdf46c60e61e0c9cd, PacketNumber: 2, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:45:03 client -> Sending packet 1 (42 bytes) for connection d9451e8e240c993cdf54af18a6, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: eeabdf46c60e61e0c9cd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:03 client -> Sending packet 2 (76 bytes) for connection d9451e8e240c993cdf54af18a6, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: eeabdf46c60e61e0c9cd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:03 client -> Sending packet 3 (76 bytes) for connection d9451e8e240c993cdf54af18a6, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: eeabdf46c60e61e0c9cd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:03 client <- Reading packet 4 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eeabdf46c60e61e0c9cd, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:03 client Peer doesn't await address validation any longer. 2025/12/13 09:45:03 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 101.8ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client newly acked packets (1): [0] 2025/12/13 09:45:03 client updated RTT: 44.069ms (σ: 33.003ms) 2025/12/13 09:45:03 client ECN capability confirmed. 2025/12/13 09:45:03 client Canceling loss detection timer. 2025/12/13 09:45:03 client Dropping Handshake keys. 2025/12/13 09:45:03 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3a11ee8349477d3bb1ca, StatelessResetToken: 0xcbfdfba000f09102b173a8851a67bf11} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 22e7edd2d8fbc6e7bcdd, StatelessResetToken: 0x6a14173c43c31de725df03b222a77d0c} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: beedc4cf48ff726cdc75, StatelessResetToken: 0x31725702478b3689e2dfe7de2367b0b7} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client -> Sending packet 1 (39 bytes) for connection d9451e8e240c993cdf54af18a6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: 3a11ee8349477d3bb1ca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 226.743µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:03 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:03 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:03 client -> Sending packet 2 (39 bytes) for connection d9451e8e240c993cdf54af18a6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: 3a11ee8349477d3bb1ca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 87.142µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:03 client -> Sending packet 3 (32 bytes) for connection d9451e8e240c993cdf54af18a6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: 3a11ee8349477d3bb1ca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:03 client Connection d9451e8e240c993cdf54af18a6 closed. 2025/12/13 09:45:03 Requesting https://server4:443/slow-cool-golfcart. 2025/12/13 09:45:03 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:03 Increased send buffer size to 14336 kiB 2025/12/13 09:45:03 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:03 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:03 Created qlog file: /logs/qlog/545086aedb255b6494021c0589b994.sqlog 2025/12/13 09:45:03 client Starting new connection to server4 ([::]:57503 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 545086aedb255b6494021c0589b994, version v1 2025/12/13 09:45:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:03 client -> Sending packet 0 (1280 bytes) for connection 545086aedb255b6494021c0589b994, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 545086aedb255b6494021c0589b994, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:03 client -> Sending packet 1 (1280 bytes) for connection 545086aedb255b6494021c0589b994, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 545086aedb255b6494021c0589b994, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 1233, Data length: 286, Offset + Data length: 1519} 2025/12/13 09:45:03 client <- Reading packet 582 (43 bytes) for connection (empty), Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 869b717e950b4d253825, Token: (empty), PacketNumber: 582, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:03 client Received first packet. Switching destination connection ID to: 869b717e950b4d253825 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client newly acked packets (1): [0] 2025/12/13 09:45:03 client updated RTT: 32.974972ms (σ: 16.487486ms) 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 1225 bytes. Remaining: 7 bytes. 2025/12/13 09:45:03 client <- Reading packet 583 (1225 bytes) for connection (empty), Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 869b717e950b4d253825, Token: (empty), PacketNumber: 583, PacketNumberLen: 2, Length: 1205, Version: v1} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client newly acked packets (1): [1] 2025/12/13 09:45:03 client updated RTT: 33.356ms (σ: 13.13ms) 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Queueing packet (7 bytes) for later decryption 2025/12/13 09:45:03 client -> Sending packet 2 (1280 bytes) for connection 545086aedb255b6494021c0589b994, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 869b717e950b4d253825, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 583, LowestAcked: 582, DelayTime: 0s} 2025/12/13 09:45:03 client <- Reading packet 0 (773 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 869b717e950b4d253825, PacketNumber: 0, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:45:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 545086aedb255b6494021c0589b994, InitialSourceConnectionID: 869b717e950b4d253825, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:03 client -> Sending packet 0 (81 bytes) for connection 545086aedb255b6494021c0589b994, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: 869b717e950b4d253825, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:03 client Dropping Initial keys. 2025/12/13 09:45:03 client Dropping 1RTT packet (7 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 6 2025/12/13 09:45:03 client -> Sending packet 0 (56 bytes) for connection 545086aedb255b6494021c0589b994, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: 869b717e950b4d253825, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:03 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 869b717e950b4d253825, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client Peer doesn't await address validation any longer. 2025/12/13 09:45:03 client newly acked packets (1): [0] 2025/12/13 09:45:03 client updated RTT: 33.348ms (σ: 9.861ms) 2025/12/13 09:45:03 client Canceling loss detection timer. 2025/12/13 09:45:03 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:03 client Dropping Handshake keys. 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a5f5f85445edcc041dca, StatelessResetToken: 0x988f256da101828239b53a1815233003} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae9e57e33dc06ce9d666, StatelessResetToken: 0xd193094b5bd6bbc8294415942ec13cc5} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 036cb8510eefd17d060d, StatelessResetToken: 0x4efdb06f6099e61e245be70737badf65} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client -> Sending packet 1 (39 bytes) for connection 545086aedb255b6494021c0589b994, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: a5f5f85445edcc041dca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 263.852µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:03 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.PingFrame{} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/12/13 09:45:03 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010085cacfb00187656ddcef364b33cc590561e08451b47b9ee61995c34e3ddd25a49f35901d} 2025/12/13 09:45:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:03 client -> Sending packet 2 (39 bytes) for connection 545086aedb255b6494021c0589b994, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: a5f5f85445edcc041dca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 112.14µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.512ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client newly acked packets (1): [0] 2025/12/13 09:45:03 client updated RTT: 33.427ms (σ: 7.555ms) 2025/12/13 09:45:03 client ECN capability confirmed. 2025/12/13 09:45:03 client <- Reading packet 5 (48 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 988b5f08022040f81d1d, StatelessResetToken: 0x621e132d7c9c70da67107e4577abd4b7} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 20.88ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client newly acked packets (1): [1] 2025/12/13 09:45:03 client Ignoring all packets below 1. 2025/12/13 09:45:03 client updated RTT: 35.739ms (σ: 10.29ms) 2025/12/13 09:45:03 client Canceling loss detection timer. 2025/12/13 09:45:03 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:03 client -> Sending packet 3 (40 bytes) for connection 545086aedb255b6494021c0589b994, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: a5f5f85445edcc041dca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 4.343062ms, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client <- Reading packet 7 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.PingFrame{} 2025/12/13 09:45:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:03 client -> Sending packet 4 (32 bytes) for connection 545086aedb255b6494021c0589b994, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: a5f5f85445edcc041dca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:03 client Connection 545086aedb255b6494021c0589b994 closed. 2025/12/13 09:45:03 Requesting https://server4:443/red-exhilarated-student. 2025/12/13 09:45:03 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:03 Increased send buffer size to 14336 kiB 2025/12/13 09:45:03 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:03 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:03 Created qlog file: /logs/qlog/04ba6090102a31f92b15a30a6601.sqlog 2025/12/13 09:45:03 client Starting new connection to server4 ([::]:39337 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 04ba6090102a31f92b15a30a6601, version v1 2025/12/13 09:45:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:03 client -> Sending packet 0 (1280 bytes) for connection 04ba6090102a31f92b15a30a6601, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 04ba6090102a31f92b15a30a6601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 09:45:03 client -> Sending packet 1 (1280 bytes) for connection 04ba6090102a31f92b15a30a6601, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 04ba6090102a31f92b15a30a6601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 1234, Data length: 285, Offset + Data length: 1519} 2025/12/13 09:45:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:03 client -> Sending packet 2 (1280 bytes) for connection 04ba6090102a31f92b15a30a6601, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 04ba6090102a31f92b15a30a6601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:03 client -> Sending packet 3 (1280 bytes) for connection 04ba6090102a31f92b15a30a6601, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 04ba6090102a31f92b15a30a6601, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 1234, Data length: 285, Offset + Data length: 1519} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:03 client <- Reading packet 9 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 823c7996ba0ab7db6149, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:03 client Received first packet. Switching destination connection ID to: 823c7996ba0ab7db6149 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:03 client newly acked packets (2): [2 3] 2025/12/13 09:45:03 client updated RTT: 35.904384ms (σ: 17.952192ms) 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:03 client -> Sending packet 4 (1280 bytes) for connection 04ba6090102a31f92b15a30a6601, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 823c7996ba0ab7db6149, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 0s} 2025/12/13 09:45:03 client <- Reading packet 0 (772 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 823c7996ba0ab7db6149, PacketNumber: 0, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:45:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 04ba6090102a31f92b15a30a6601, InitialSourceConnectionID: 823c7996ba0ab7db6149, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:03 client -> Sending packet 0 (81 bytes) for connection 04ba6090102a31f92b15a30a6601, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: 823c7996ba0ab7db6149, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:03 client Dropping Initial keys. 2025/12/13 09:45:03 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:03 client -> Sending packet 0 (61 bytes) for connection 04ba6090102a31f92b15a30a6601, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: 823c7996ba0ab7db6149, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 09:45:03 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:03 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 823c7996ba0ab7db6149, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client Peer doesn't await address validation any longer. 2025/12/13 09:45:03 client newly acked packets (1): [0] 2025/12/13 09:45:03 client updated RTT: 35.559ms (σ: 14.153ms) 2025/12/13 09:45:03 client Canceling loss detection timer. 2025/12/13 09:45:03 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:03 client Dropping Handshake keys. 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a7992484c2b76625459c, StatelessResetToken: 0x372835b7b42f878adda99fecc398d7d5} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a1fa686f524369dce6be, StatelessResetToken: 0x3a8c58c0bfdf6039cfc8be36d0043b32} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2c0b05104a7d2eb2cb42, StatelessResetToken: 0xdbeac304c2dfb106ab1471003b32d430} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client -> Sending packet 1 (39 bytes) for connection 04ba6090102a31f92b15a30a6601, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: a7992484c2b76625459c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 159.206µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:03 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.PingFrame{} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/12/13 09:45:03 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010056b395eea1bd439bbe4ef9e1ef1ca3de99757d798d587368d177e8bc7890e61a23443aa3} 2025/12/13 09:45:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:03 client -> Sending packet 2 (39 bytes) for connection 04ba6090102a31f92b15a30a6601, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: a7992484c2b76625459c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 60.483µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.192ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client newly acked packets (1): [0] 2025/12/13 09:45:03 client updated RTT: 35.317ms (σ: 11.097ms) 2025/12/13 09:45:03 client ECN capability confirmed. 2025/12/13 09:45:03 client <- Reading packet 5 (48 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 24290ebce00386a987b1, StatelessResetToken: 0x8b42576fa9df251b6c334b41deaacc4c} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client <- Reading packet 7 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:03 client -> Sending packet 3 (41 bytes) for connection 04ba6090102a31f92b15a30a6601, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: a7992484c2b76625459c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 108.112µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:03 client -> Sending packet 4 (32 bytes) for connection 04ba6090102a31f92b15a30a6601, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: a7992484c2b76625459c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:03 client Connection 04ba6090102a31f92b15a30a6601 closed. 2025/12/13 09:45:03 Requesting https://server4:443/toasty-frozen-lynx. 2025/12/13 09:45:03 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:03 Increased send buffer size to 14336 kiB 2025/12/13 09:45:03 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:03 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:03 Created qlog file: /logs/qlog/690c855a99e8b94fa1.sqlog 2025/12/13 09:45:03 client Starting new connection to server4 ([::]:34318 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 690c855a99e8b94fa1, version v1 2025/12/13 09:45:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:03 client -> Sending packet 0 (1280 bytes) for connection 690c855a99e8b94fa1, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 690c855a99e8b94fa1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:03 client -> Sending packet 1 (1280 bytes) for connection 690c855a99e8b94fa1, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: 690c855a99e8b94fa1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 1239, Data length: 279, Offset + Data length: 1518} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:03 client <- Reading packet 30 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5842e47f5a338e2c6cd, Token: (empty), PacketNumber: 30, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:03 client Received first packet. Switching destination connection ID to: e5842e47f5a338e2c6cd 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client newly acked packets (1): [0] 2025/12/13 09:45:03 client updated RTT: 33.058587ms (σ: 16.529293ms) 2025/12/13 09:45:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:03 client -> Sending packet 2 (1280 bytes) for connection 690c855a99e8b94fa1, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: e5842e47f5a338e2c6cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 1239, Data length: 279, Offset + Data length: 1518} 2025/12/13 09:45:03 client -> Sending packet 3 (1280 bytes) for connection 690c855a99e8b94fa1, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: e5842e47f5a338e2c6cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 1239, Data length: 279, Offset + Data length: 1518} 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:03 client <- Reading packet 31 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5842e47f5a338e2c6cd, Token: (empty), PacketNumber: 31, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:03 client -> Sending packet 4 (1280 bytes) for connection 690c855a99e8b94fa1, Initial 2025/12/13 09:45:03 client Long Header{Type: Initial, DestConnectionID: e5842e47f5a338e2c6cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 31, LowestAcked: 30, DelayTime: 0s} 2025/12/13 09:45:03 client <- Reading packet 0 (767 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5842e47f5a338e2c6cd, PacketNumber: 0, PacketNumberLen: 1, Length: 748, Version: v1} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/12/13 09:45:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 690c855a99e8b94fa1, InitialSourceConnectionID: e5842e47f5a338e2c6cd, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:03 client -> Sending packet 0 (81 bytes) for connection 690c855a99e8b94fa1, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: e5842e47f5a338e2c6cd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:03 client Dropping Initial keys. 2025/12/13 09:45:03 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:03 client -> Sending packet 0 (56 bytes) for connection 690c855a99e8b94fa1, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: e5842e47f5a338e2c6cd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 09:45:03 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:03 client Dropping initial packet (1226 bytes) because we already dropped the keys. 2025/12/13 09:45:03 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:03 client <- Reading packet 1 (767 bytes) for connection (empty), Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5842e47f5a338e2c6cd, PacketNumber: 1, PacketNumberLen: 1, Length: 748, Version: v1} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/12/13 09:45:03 client -> Sending packet 1 (42 bytes) for connection 690c855a99e8b94fa1, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: e5842e47f5a338e2c6cd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:03 client <- Reading packet 2 (372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/12/13 09:45:03 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100d093df7fb5c31719937a799caf2da8e7774e905a2f24202de38a315d2d062b6d9fdc7dc0} 2025/12/13 09:45:03 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:03 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:03 client -> Sending packet 1 (38 bytes) for connection 690c855a99e8b94fa1, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: e5842e47f5a338e2c6cd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 25.237469ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:03 client -> Sending packet 2 (76 bytes) for connection 690c855a99e8b94fa1, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: e5842e47f5a338e2c6cd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:03 client -> Sending packet 3 (76 bytes) for connection 690c855a99e8b94fa1, Handshake 2025/12/13 09:45:03 client Long Header{Type: Handshake, DestConnectionID: e5842e47f5a338e2c6cd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:03 client <- Reading packet 4 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:03 client Dropping Handshake keys. 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e45088f8588e272422d, StatelessResetToken: 0x172bbf1d122e9ba11c18a31530ba0f1b} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b7f83857a5a473e9f72f, StatelessResetToken: 0xad708069099f121052f74d6cd45027ed} 2025/12/13 09:45:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 64e143548be13f6ab9ca, StatelessResetToken: 0x4354389feab94f425abf124cb579b9d4} 2025/12/13 09:45:03 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:03 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:03 client <- &wire.PingFrame{} 2025/12/13 09:45:03 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:03 client -> Sending packet 3 (68 bytes) for connection 690c855a99e8b94fa1, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: 8e45088f8588e272422d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 131.545µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 09:45:03 client -> Sending packet 4 (58 bytes) for connection 690c855a99e8b94fa1, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:03 client Short Header{DestConnectionID: 8e45088f8588e272422d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 09:45:04 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:04 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:04 client -> Sending packet 5 (41 bytes) for connection 690c855a99e8b94fa1, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 8e45088f8588e272422d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 65.542µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:04 client -> Sending packet 6 (32 bytes) for connection 690c855a99e8b94fa1, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 8e45088f8588e272422d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:04 client Connection 690c855a99e8b94fa1 closed. 2025/12/13 09:45:04 Requesting https://server4:443/zippy-brown-programmer. 2025/12/13 09:45:04 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:04 Increased send buffer size to 14336 kiB 2025/12/13 09:45:04 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:04 Created qlog file: /logs/qlog/fdce1393ff0ee62b0bff3cdb94772f438561.sqlog 2025/12/13 09:45:04 client Starting new connection to server4 ([::]:52979 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fdce1393ff0ee62b0bff3cdb94772f438561, version v1 2025/12/13 09:45:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:04 client -> Sending packet 0 (1280 bytes) for connection fdce1393ff0ee62b0bff3cdb94772f438561, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: fdce1393ff0ee62b0bff3cdb94772f438561, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:04 client -> Sending packet 1 (1280 bytes) for connection fdce1393ff0ee62b0bff3cdb94772f438561, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: fdce1393ff0ee62b0bff3cdb94772f438561, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1230, Data length: 275, Offset + Data length: 1505} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client <- Reading packet 27 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4baa95f2a446188a6bbd, Token: (empty), PacketNumber: 27, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:04 client Received first packet. Switching destination connection ID to: 4baa95f2a446188a6bbd 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client newly acked packets (1): [0] 2025/12/13 09:45:04 client updated RTT: 33.010134ms (σ: 16.505067ms) 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:04 client <- Reading packet 28 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4baa95f2a446188a6bbd, Token: (empty), PacketNumber: 28, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client newly acked packets (1): [1] 2025/12/13 09:45:04 client updated RTT: 33.372ms (σ: 13.103ms) 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:04 client -> Sending packet 2 (1280 bytes) for connection fdce1393ff0ee62b0bff3cdb94772f438561, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: 4baa95f2a446188a6bbd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 28, LowestAcked: 27, DelayTime: 0s} 2025/12/13 09:45:04 client <- Reading packet 0 (777 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4baa95f2a446188a6bbd, PacketNumber: 0, PacketNumberLen: 1, Length: 758, Version: v1} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/12/13 09:45:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fdce1393ff0ee62b0bff3cdb94772f438561, InitialSourceConnectionID: 4baa95f2a446188a6bbd, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:04 client -> Sending packet 0 (81 bytes) for connection fdce1393ff0ee62b0bff3cdb94772f438561, Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: 4baa95f2a446188a6bbd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:04 client Dropping Initial keys. 2025/12/13 09:45:04 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:04 client -> Sending packet 0 (60 bytes) for connection fdce1393ff0ee62b0bff3cdb94772f438561, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 4baa95f2a446188a6bbd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:04 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4baa95f2a446188a6bbd, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client Peer doesn't await address validation any longer. 2025/12/13 09:45:04 client newly acked packets (1): [0] 2025/12/13 09:45:04 client updated RTT: 33.318ms (σ: 9.933ms) 2025/12/13 09:45:04 client Canceling loss detection timer. 2025/12/13 09:45:04 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:04 client Dropping Handshake keys. 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e0d73cb17b294293ee9a, StatelessResetToken: 0x99d1e3af103b605218f07c5a7428d1ad} 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1bd144d84c011d5ea773, StatelessResetToken: 0xbcfe6b1f7a853719d3226becca423d88} 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8ff2e3a6b6f3e8c02617, StatelessResetToken: 0x0516145a3125153b6af238bb6c3f817e} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client -> Sending packet 1 (39 bytes) for connection fdce1393ff0ee62b0bff3cdb94772f438561, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: e0d73cb17b294293ee9a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 171.139µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.PingFrame{} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:04 client -> Sending packet 2 (37 bytes) for connection fdce1393ff0ee62b0bff3cdb94772f438561, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: e0d73cb17b294293ee9a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 72.345µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:04 client -> Sending packet 3 (32 bytes) for connection fdce1393ff0ee62b0bff3cdb94772f438561, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: e0d73cb17b294293ee9a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:04 client Connection fdce1393ff0ee62b0bff3cdb94772f438561 closed. 2025/12/13 09:45:04 Requesting https://server4:443/extreme-black-platypus. 2025/12/13 09:45:04 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:04 Increased send buffer size to 14336 kiB 2025/12/13 09:45:04 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:04 Created qlog file: /logs/qlog/bb7957e83c76332ebd2bc7598847011124.sqlog 2025/12/13 09:45:04 client Starting new connection to server4 ([::]:56744 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bb7957e83c76332ebd2bc7598847011124, version v1 2025/12/13 09:45:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:04 client -> Sending packet 0 (1280 bytes) for connection bb7957e83c76332ebd2bc7598847011124, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: bb7957e83c76332ebd2bc7598847011124, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:45:04 client -> Sending packet 1 (1280 bytes) for connection bb7957e83c76332ebd2bc7598847011124, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: bb7957e83c76332ebd2bc7598847011124, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1231, Data length: 284, Offset + Data length: 1515} 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:04 client <- Reading packet 25 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 22718ef62f7dbbf2fc61, Token: (empty), PacketNumber: 25, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:04 client Received first packet. Switching destination connection ID to: 22718ef62f7dbbf2fc61 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client newly acked packets (2): [0 1] 2025/12/13 09:45:04 client updated RTT: 35.744607ms (σ: 17.872303ms) 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:04 client -> Sending packet 2 (1280 bytes) for connection bb7957e83c76332ebd2bc7598847011124, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: 22718ef62f7dbbf2fc61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 25, DelayTime: 0s} 2025/12/13 09:45:04 client <- Reading packet 0 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 22718ef62f7dbbf2fc61, PacketNumber: 0, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bb7957e83c76332ebd2bc7598847011124, InitialSourceConnectionID: 22718ef62f7dbbf2fc61, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:04 client -> Sending packet 0 (81 bytes) for connection bb7957e83c76332ebd2bc7598847011124, Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: 22718ef62f7dbbf2fc61, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:04 client Dropping Initial keys. 2025/12/13 09:45:04 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:04 client -> Sending packet 0 (60 bytes) for connection bb7957e83c76332ebd2bc7598847011124, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 22718ef62f7dbbf2fc61, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:04 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 22718ef62f7dbbf2fc61, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client Peer doesn't await address validation any longer. 2025/12/13 09:45:04 client newly acked packets (1): [0] 2025/12/13 09:45:04 client updated RTT: 35.386ms (σ: 14.118ms) 2025/12/13 09:45:04 client Canceling loss detection timer. 2025/12/13 09:45:04 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:04 client Dropping Handshake keys. 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 81ce5c15be5235b910d5, StatelessResetToken: 0xe5252f419ff8e9faaf5a509ed6b65a31} 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0f734f24f61720d8fe98, StatelessResetToken: 0x164612f6015ed850389eed2b681a4894} 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 97a3747a71e72160fcf5, StatelessResetToken: 0x0f29fba1a9a1cb29b29622d693a8a749} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client -> Sending packet 1 (39 bytes) for connection bb7957e83c76332ebd2bc7598847011124, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 81ce5c15be5235b910d5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 195.734µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.PingFrame{} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/12/13 09:45:04 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601005718818c7627971db992b1e4eb890365663ed0a98609e69787d51a84257712ea3d80ef01} 2025/12/13 09:45:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:04 client -> Sending packet 2 (37 bytes) for connection bb7957e83c76332ebd2bc7598847011124, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 81ce5c15be5235b910d5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 70.4µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client <- Reading packet 3 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.PingFrame{} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:04 client -> Sending packet 3 (38 bytes) for connection bb7957e83c76332ebd2bc7598847011124, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 81ce5c15be5235b910d5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 25.235658ms, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:04 client -> Sending packet 5 (60 bytes) for connection bb7957e83c76332ebd2bc7598847011124, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 81ce5c15be5235b910d5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:04 client Skipping packet number 4 2025/12/13 09:45:04 client -> Sending packet 6 (31 bytes) for connection bb7957e83c76332ebd2bc7598847011124, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 81ce5c15be5235b910d5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:04 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.PingFrame{} 2025/12/13 09:45:04 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:04 client -> Sending packet 7 (39 bytes) for connection bb7957e83c76332ebd2bc7598847011124, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 81ce5c15be5235b910d5, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 59.861µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client newly acked packets (1): [5] 2025/12/13 09:45:04 client updated RTT: 34.807ms (σ: 11.744ms) 2025/12/13 09:45:04 client ECN capability confirmed. 2025/12/13 09:45:04 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:04 client -> Sending packet 8 (32 bytes) for connection bb7957e83c76332ebd2bc7598847011124, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 81ce5c15be5235b910d5, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:04 client Connection bb7957e83c76332ebd2bc7598847011124 closed. 2025/12/13 09:45:04 Requesting https://server4:443/merciless-silver-koala. 2025/12/13 09:45:04 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:04 Increased send buffer size to 14336 kiB 2025/12/13 09:45:04 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:04 Created qlog file: /logs/qlog/ac1af232e904cda159c777fca255487998.sqlog 2025/12/13 09:45:04 client Starting new connection to server4 ([::]:41860 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ac1af232e904cda159c777fca255487998, version v1 2025/12/13 09:45:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:04 client -> Sending packet 0 (1280 bytes) for connection ac1af232e904cda159c777fca255487998, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: ac1af232e904cda159c777fca255487998, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:04 client -> Sending packet 1 (1280 bytes) for connection ac1af232e904cda159c777fca255487998, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: ac1af232e904cda159c777fca255487998, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1231, Data length: 277, Offset + Data length: 1508} 2025/12/13 09:45:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:04 client Queueing packet (777 bytes) for later decryption 2025/12/13 09:45:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:04 client -> Sending packet 2 (1280 bytes) for connection ac1af232e904cda159c777fca255487998, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: ac1af232e904cda159c777fca255487998, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:45:04 client -> Sending packet 3 (1280 bytes) for connection ac1af232e904cda159c777fca255487998, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: ac1af232e904cda159c777fca255487998, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1231, Data length: 277, Offset + Data length: 1508} 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:04 client <- Reading packet 29 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: df9b785f356c03a50ba6, Token: (empty), PacketNumber: 29, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:04 client Received first packet. Switching destination connection ID to: df9b785f356c03a50ba6 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client newly acked packets (1): [2] 2025/12/13 09:45:04 client updated RTT: 33.099516ms (σ: 16.549758ms) 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:04 client -> Sending packet 4 (1280 bytes) for connection ac1af232e904cda159c777fca255487998, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: df9b785f356c03a50ba6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 29, LowestAcked: 29, DelayTime: 0s} 2025/12/13 09:45:04 client <- Reading packet 0 (777 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: df9b785f356c03a50ba6, PacketNumber: 0, PacketNumberLen: 1, Length: 758, Version: v1} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/12/13 09:45:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ac1af232e904cda159c777fca255487998, InitialSourceConnectionID: df9b785f356c03a50ba6, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:04 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:04 client -> Sending packet 0 (81 bytes) for connection ac1af232e904cda159c777fca255487998, Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: df9b785f356c03a50ba6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:04 client Dropping Initial keys. 2025/12/13 09:45:04 client -> Sending packet 0 (60 bytes) for connection ac1af232e904cda159c777fca255487998, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: df9b785f356c03a50ba6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:04 client Dropping initial packet (1224 bytes) because we already dropped the keys. 2025/12/13 09:45:04 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:04 client <- Reading packet 2 (777 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: df9b785f356c03a50ba6, PacketNumber: 2, PacketNumberLen: 1, Length: 758, Version: v1} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/12/13 09:45:04 client -> Sending packet 1 (44 bytes) for connection ac1af232e904cda159c777fca255487998, Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: df9b785f356c03a50ba6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:04 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: df9b785f356c03a50ba6, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client Peer doesn't await address validation any longer. 2025/12/13 09:45:04 client newly acked packets (1): [0] 2025/12/13 09:45:04 client updated RTT: 33.112ms (σ: 12.439ms) 2025/12/13 09:45:04 client Canceling loss detection timer. 2025/12/13 09:45:04 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:04 client Dropping Handshake keys. 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 71ee4410c7e3bd74b774, StatelessResetToken: 0x85937f80b4e4b873b9d4f0f5cc6896d2} 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 894815ad6ba210024744, StatelessResetToken: 0x135ed32608a663e88ef1eeaf2aae60ba} 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 993efee4235af7c818fa, StatelessResetToken: 0x2878fce9c4679922ae2d3b644ad6b43a} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client -> Sending packet 1 (39 bytes) for connection ac1af232e904cda159c777fca255487998, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 71ee4410c7e3bd74b774, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 214.249µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.PingFrame{} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/12/13 09:45:04 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100ed48356edfbb55b0e8cbff1af2a859092ca52d00171b994de2df6b3946e7e86ceadd7aac} 2025/12/13 09:45:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:04 client -> Sending packet 2 (37 bytes) for connection ac1af232e904cda159c777fca255487998, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 71ee4410c7e3bd74b774, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 67.916µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client newly acked packets (1): [1] 2025/12/13 09:45:04 client Ignoring all packets below 1. 2025/12/13 09:45:04 client updated RTT: 32.831ms (σ: 9.891ms) 2025/12/13 09:45:04 client ECN capability confirmed. 2025/12/13 09:45:04 client lost packet 0 (time threshold) 2025/12/13 09:45:04 client Canceling loss detection timer. 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7137a65585c9a858c08d, StatelessResetToken: 0x5151fa921415b577ef0cfcdde173dcb7} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client -> Sending packet 3 (68 bytes) for connection ac1af232e904cda159c777fca255487998, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 71ee4410c7e3bd74b774, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 108.472µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:04 client -> Sending packet 5 (60 bytes) for connection ac1af232e904cda159c777fca255487998, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 71ee4410c7e3bd74b774, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:04 client -> Sending packet 6 (60 bytes) for connection ac1af232e904cda159c777fca255487998, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 71ee4410c7e3bd74b774, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:04 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:04 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:04 client -> Sending packet 7 (39 bytes) for connection ac1af232e904cda159c777fca255487998, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 71ee4410c7e3bd74b774, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 80.87µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:04 client -> Sending packet 8 (32 bytes) for connection ac1af232e904cda159c777fca255487998, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 71ee4410c7e3bd74b774, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:04 client Connection ac1af232e904cda159c777fca255487998 closed. 2025/12/13 09:45:04 Requesting https://server4:443/pink-bitter-cassette. 2025/12/13 09:45:04 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:04 Increased send buffer size to 14336 kiB 2025/12/13 09:45:04 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:04 Created qlog file: /logs/qlog/543746549bd2b403dc1b608edecb5f9b486c.sqlog 2025/12/13 09:45:04 client Starting new connection to server4 ([::]:60561 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 543746549bd2b403dc1b608edecb5f9b486c, version v1 2025/12/13 09:45:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:04 client -> Sending packet 0 (1280 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: 543746549bd2b403dc1b608edecb5f9b486c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:04 client -> Sending packet 1 (1280 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: 543746549bd2b403dc1b608edecb5f9b486c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1230, Data length: 282, Offset + Data length: 1512} 2025/12/13 09:45:04 client <- Reading packet 9 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fb459eab284dd830962d, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:04 client Received first packet. Switching destination connection ID to: fb459eab284dd830962d 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client newly acked packets (1): [0] 2025/12/13 09:45:04 client updated RTT: 33.569268ms (σ: 16.784634ms) 2025/12/13 09:45:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:04 client -> Sending packet 2 (1280 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: fb459eab284dd830962d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1230, Data length: 282, Offset + Data length: 1512} 2025/12/13 09:45:04 client -> Sending packet 3 (1280 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: fb459eab284dd830962d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1230, Data length: 282, Offset + Data length: 1512} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:04 client <- Reading packet 11 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fb459eab284dd830962d, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:04 client newly acked packets (1): [3] 2025/12/13 09:45:04 client updated RTT: 33.632ms (σ: 12.715ms) 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:04 client -> Sending packet 4 (1280 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: fb459eab284dd830962d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 9, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}}, DelayTime: 0s} 2025/12/13 09:45:04 client <- Reading packet 1 (778 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fb459eab284dd830962d, PacketNumber: 1, PacketNumberLen: 1, Length: 759, Version: v1} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/12/13 09:45:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 543746549bd2b403dc1b608edecb5f9b486c, InitialSourceConnectionID: fb459eab284dd830962d, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:04 client -> Sending packet 0 (81 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: fb459eab284dd830962d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:04 client Dropping Initial keys. 2025/12/13 09:45:04 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:04 client -> Sending packet 0 (58 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: fb459eab284dd830962d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 09:45:04 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:04 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fb459eab284dd830962d, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client Peer doesn't await address validation any longer. 2025/12/13 09:45:04 client newly acked packets (1): [0] 2025/12/13 09:45:04 client updated RTT: 33.571ms (σ: 9.658ms) 2025/12/13 09:45:04 client Canceling loss detection timer. 2025/12/13 09:45:04 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:04 client Dropping Handshake keys. 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 43dd860b9ea67b89e7a6, StatelessResetToken: 0x09bc576da8196666d6da16a6d5656d50} 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2324f096591d6e115042, StatelessResetToken: 0x58ca3fbb2cd959891d7c57db0893d6f5} 2025/12/13 09:45:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c1fb921a26da0748733e, StatelessResetToken: 0x8943f6d61e32f39b1b4dcf35a3261fe5} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client -> Sending packet 1 (39 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 43dd860b9ea67b89e7a6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208.959µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.PingFrame{} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:04 client -> Sending packet 2 (37 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 43dd860b9ea67b89e7a6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 69.85µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:04 client -> Sending packet 3 (32 bytes) for connection 543746549bd2b403dc1b608edecb5f9b486c, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: 43dd860b9ea67b89e7a6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:04 client Connection 543746549bd2b403dc1b608edecb5f9b486c closed. 2025/12/13 09:45:04 Requesting https://server4:443/intense-countless-bag. 2025/12/13 09:45:04 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:04 Increased send buffer size to 14336 kiB 2025/12/13 09:45:04 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:04 Created qlog file: /logs/qlog/2c5eb98e6c9bbaef1f3c2378.sqlog 2025/12/13 09:45:04 client Starting new connection to server4 ([::]:49155 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2c5eb98e6c9bbaef1f3c2378, version v1 2025/12/13 09:45:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:04 client -> Sending packet 0 (1280 bytes) for connection 2c5eb98e6c9bbaef1f3c2378, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: 2c5eb98e6c9bbaef1f3c2378, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 09:45:04 client -> Sending packet 1 (1280 bytes) for connection 2c5eb98e6c9bbaef1f3c2378, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: 2c5eb98e6c9bbaef1f3c2378, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1236, Data length: 272, Offset + Data length: 1508} 2025/12/13 09:45:04 client <- Reading packet 17 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a587cbcf6ce405d9fba9, Token: (empty), PacketNumber: 17, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:04 client Received first packet. Switching destination connection ID to: a587cbcf6ce405d9fba9 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client newly acked packets (1): [0] 2025/12/13 09:45:04 client updated RTT: 33.157282ms (σ: 16.578641ms) 2025/12/13 09:45:04 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:04 client <- Reading packet 18 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a587cbcf6ce405d9fba9, Token: (empty), PacketNumber: 18, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client newly acked packets (1): [1] 2025/12/13 09:45:04 client updated RTT: 33.531ms (σ: 13.182ms) 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:04 client -> Sending packet 2 (1280 bytes) for connection 2c5eb98e6c9bbaef1f3c2378, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: a587cbcf6ce405d9fba9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 17, DelayTime: 0s} 2025/12/13 09:45:04 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a587cbcf6ce405d9fba9, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:45:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2c5eb98e6c9bbaef1f3c2378, InitialSourceConnectionID: a587cbcf6ce405d9fba9, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:04 client -> Sending packet 0 (81 bytes) for connection 2c5eb98e6c9bbaef1f3c2378, Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: a587cbcf6ce405d9fba9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:04 client Dropping Initial keys. 2025/12/13 09:45:04 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:04 client -> Sending packet 0 (59 bytes) for connection 2c5eb98e6c9bbaef1f3c2378, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: a587cbcf6ce405d9fba9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:45:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.PingFrame{} 2025/12/13 09:45:04 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:04 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:04 client -> Sending packet 1 (37 bytes) for connection 2c5eb98e6c9bbaef1f3c2378, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:04 client Short Header{DestConnectionID: a587cbcf6ce405d9fba9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 70.111µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:04 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:04 client -> Sending packet 1 (73 bytes) for connection 2c5eb98e6c9bbaef1f3c2378, Handshake 2025/12/13 09:45:04 client Long Header{Type: Handshake, DestConnectionID: a587cbcf6ce405d9fba9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/12/13 09:45:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:04 client Short Header{DestConnectionID: a587cbcf6ce405d9fba9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:04 client Connection 2c5eb98e6c9bbaef1f3c2378 closed. 2025/12/13 09:45:04 Requesting https://server4:443/mild-turquoise-scarf. 2025/12/13 09:45:04 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:04 Increased send buffer size to 14336 kiB 2025/12/13 09:45:04 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:04 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:04 Created qlog file: /logs/qlog/ef72433361ba53a161a2bc137a.sqlog 2025/12/13 09:45:04 client Starting new connection to server4 ([::]:58895 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ef72433361ba53a161a2bc137a, version v1 2025/12/13 09:45:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:04 client -> Sending packet 0 (1280 bytes) for connection ef72433361ba53a161a2bc137a, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: ef72433361ba53a161a2bc137a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:04 client -> Sending packet 1 (1280 bytes) for connection ef72433361ba53a161a2bc137a, Initial 2025/12/13 09:45:04 client Long Header{Type: Initial, DestConnectionID: ef72433361ba53a161a2bc137a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:04 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 09:45:05 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6b34bd3f183b10c2e384, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:05 client Received first packet. Switching destination connection ID to: 6b34bd3f183b10c2e384 2025/12/13 09:45:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:05 client newly acked packets (1): [0] 2025/12/13 09:45:05 client updated RTT: 33.276175ms (σ: 16.638087ms) 2025/12/13 09:45:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:05 client -> Sending packet 2 (1280 bytes) for connection ef72433361ba53a161a2bc137a, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 6b34bd3f183b10c2e384, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client -> Sending packet 3 (1280 bytes) for connection ef72433361ba53a161a2bc137a, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 6b34bd3f183b10c2e384, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client Queueing packet (772 bytes) for later decryption 2025/12/13 09:45:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:45:05 client -> Sending packet 4 (1280 bytes) for connection ef72433361ba53a161a2bc137a, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 6b34bd3f183b10c2e384, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client -> Sending packet 5 (1280 bytes) for connection ef72433361ba53a161a2bc137a, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 6b34bd3f183b10c2e384, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client Parsed a coalesced packet. Part 1: 1228 bytes. Remaining: 4 bytes. 2025/12/13 09:45:05 client <- Reading packet 5 (1228 bytes) for connection (empty), Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6b34bd3f183b10c2e384, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1208, Version: v1} 2025/12/13 09:45:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:05 client Queueing packet (4 bytes) for later decryption 2025/12/13 09:45:05 client -> Sending packet 6 (1280 bytes) for connection ef72433361ba53a161a2bc137a, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 6b34bd3f183b10c2e384, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/12/13 09:45:05 client <- Reading packet 0 (772 bytes) for connection (empty), Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6b34bd3f183b10c2e384, PacketNumber: 0, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:45:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ef72433361ba53a161a2bc137a, InitialSourceConnectionID: 6b34bd3f183b10c2e384, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:05 client Dropping 1RTT packet (4 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 3 2025/12/13 09:45:05 client <- Reading packet 1 (772 bytes) for connection (empty), Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6b34bd3f183b10c2e384, PacketNumber: 1, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:45:05 client -> Sending packet 0 (81 bytes) for connection ef72433361ba53a161a2bc137a, Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: 6b34bd3f183b10c2e384, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:05 client Dropping Initial keys. 2025/12/13 09:45:05 client -> Sending packet 0 (58 bytes) for connection ef72433361ba53a161a2bc137a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: 6b34bd3f183b10c2e384, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 09:45:05 client <- Reading packet 2 (772 bytes) for connection (empty), Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6b34bd3f183b10c2e384, PacketNumber: 2, PacketNumberLen: 1, Length: 753, Version: v1} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/12/13 09:45:05 client -> Sending packet 1 (42 bytes) for connection ef72433361ba53a161a2bc137a, Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: 6b34bd3f183b10c2e384, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:05 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:05 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6b34bd3f183b10c2e384, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:05 client Peer doesn't await address validation any longer. 2025/12/13 09:45:05 client newly acked packets (1): [0] 2025/12/13 09:45:05 client updated RTT: 33.212ms (σ: 12.604ms) 2025/12/13 09:45:05 client Canceling loss detection timer. 2025/12/13 09:45:05 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:05 client Dropping Handshake keys. 2025/12/13 09:45:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12bdc214a9a1600eb17d, StatelessResetToken: 0xbee59383401e72378a176d2dbb8310cc} 2025/12/13 09:45:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 724370fb109bca0fb324, StatelessResetToken: 0xf04edae024f1330aa416a76315da1b00} 2025/12/13 09:45:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 95a444f44a9c8777c07d, StatelessResetToken: 0xc03669c6a217a23a6a48b851bcf6d545} 2025/12/13 09:45:05 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:05 client -> Sending packet 1 (39 bytes) for connection ef72433361ba53a161a2bc137a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: 12bdc214a9a1600eb17d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 163.344µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:05 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.PingFrame{} 2025/12/13 09:45:05 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:05 client <- Reading packet 3 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.328ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:05 client newly acked packets (1): [0] 2025/12/13 09:45:05 client updated RTT: 35.601ms (σ: 14.232ms) 2025/12/13 09:45:05 client ECN capability confirmed. 2025/12/13 09:45:05 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:05 client -> Sending packet 2 (40 bytes) for connection ef72433361ba53a161a2bc137a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: 12bdc214a9a1600eb17d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 7.157051ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:05 client <- Reading packet 4 (237 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: eac4be3f9470421f2c47, StatelessResetToken: 0x35624d7f0afa1c97eae15c9acdea3a2b} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/12/13 09:45:05 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601002bcb5602d16243fd4a873b34c8a566cd059793a17e13bd0b7dc21a0f865993fd7c206601} 2025/12/13 09:45:05 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:05 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 21.688ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:05 client newly acked packets (1): [1] 2025/12/13 09:45:05 client Ignoring all packets below 1. 2025/12/13 09:45:05 client updated RTT: 37.701ms (σ: 14.874ms) 2025/12/13 09:45:05 client Canceling loss detection timer. 2025/12/13 09:45:05 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:05 client -> Sending packet 3 (40 bytes) for connection ef72433361ba53a161a2bc137a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: 12bdc214a9a1600eb17d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 4.156058ms, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:05 client <- Reading packet 6 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.PingFrame{} 2025/12/13 09:45:05 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:05 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:05 client -> Sending packet 4 (40 bytes) for connection ef72433361ba53a161a2bc137a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: 12bdc214a9a1600eb17d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.241361ms, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:45:05 client <- Reading packet 7 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:05 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:05 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:05 client -> Sending packet 5 (32 bytes) for connection ef72433361ba53a161a2bc137a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: 12bdc214a9a1600eb17d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:05 client Connection ef72433361ba53a161a2bc137a closed. 2025/12/13 09:45:05 Requesting https://server4:443/rough-merry-file. 2025/12/13 09:45:05 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:05 Increased send buffer size to 14336 kiB 2025/12/13 09:45:05 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:05 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:05 Created qlog file: /logs/qlog/a9b6d708793f95cd31ebc158.sqlog 2025/12/13 09:45:05 client Starting new connection to server4 ([::]:55207 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a9b6d708793f95cd31ebc158, version v1 2025/12/13 09:45:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:05 client -> Sending packet 0 (1280 bytes) for connection a9b6d708793f95cd31ebc158, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: a9b6d708793f95cd31ebc158, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 09:45:05 client -> Sending packet 1 (1280 bytes) for connection a9b6d708793f95cd31ebc158, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: a9b6d708793f95cd31ebc158, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1236, Data length: 282, Offset + Data length: 1518} 2025/12/13 09:45:05 client <- Reading packet 11 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9f3133e4bf250f7660a8, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:05 client Received first packet. Switching destination connection ID to: 9f3133e4bf250f7660a8 2025/12/13 09:45:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:05 client newly acked packets (1): [0] 2025/12/13 09:45:05 client updated RTT: 33.074159ms (σ: 16.537079ms) 2025/12/13 09:45:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:05 client -> Sending packet 2 (1280 bytes) for connection a9b6d708793f95cd31ebc158, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 9f3133e4bf250f7660a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1236, Data length: 282, Offset + Data length: 1518} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client -> Sending packet 3 (1280 bytes) for connection a9b6d708793f95cd31ebc158, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 9f3133e4bf250f7660a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1236, Data length: 282, Offset + Data length: 1518} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client Queueing packet (771 bytes) for later decryption 2025/12/13 09:45:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:45:05 client -> Sending packet 4 (1280 bytes) for connection a9b6d708793f95cd31ebc158, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 9f3133e4bf250f7660a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1236, Data length: 282, Offset + Data length: 1518} 2025/12/13 09:45:05 client -> Sending packet 5 (1280 bytes) for connection a9b6d708793f95cd31ebc158, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 9f3133e4bf250f7660a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1236, Data length: 282, Offset + Data length: 1518} 2025/12/13 09:45:05 client Parsed a coalesced packet. Part 1: 1228 bytes. Remaining: 4 bytes. 2025/12/13 09:45:05 client <- Reading packet 13 (1228 bytes) for connection (empty), Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9f3133e4bf250f7660a8, Token: (empty), PacketNumber: 13, PacketNumberLen: 1, Length: 1208, Version: v1} 2025/12/13 09:45:05 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:05 client newly acked packets (1): [5] 2025/12/13 09:45:05 client updated RTT: 33.188ms (σ: 12.63ms) 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:05 client Queueing packet (4 bytes) for later decryption 2025/12/13 09:45:05 client -> Sending packet 6 (1280 bytes) for connection a9b6d708793f95cd31ebc158, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: 9f3133e4bf250f7660a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 11, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 11}}, DelayTime: 0s} 2025/12/13 09:45:05 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9f3133e4bf250f7660a8, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:45:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a9b6d708793f95cd31ebc158, InitialSourceConnectionID: 9f3133e4bf250f7660a8, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:05 client Dropping 1RTT packet (4 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 3 2025/12/13 09:45:05 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9f3133e4bf250f7660a8, PacketNumber: 1, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:45:05 client -> Sending packet 0 (81 bytes) for connection a9b6d708793f95cd31ebc158, Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: 9f3133e4bf250f7660a8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:05 client Dropping Initial keys. 2025/12/13 09:45:05 client -> Sending packet 0 (54 bytes) for connection a9b6d708793f95cd31ebc158, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: 9f3133e4bf250f7660a8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 23, Offset + Data length: 23} 2025/12/13 09:45:05 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:05 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:05 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9f3133e4bf250f7660a8, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:05 client Peer doesn't await address validation any longer. 2025/12/13 09:45:05 client newly acked packets (1): [0] 2025/12/13 09:45:05 client updated RTT: 33.208ms (σ: 9.514ms) 2025/12/13 09:45:05 client Canceling loss detection timer. 2025/12/13 09:45:05 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:05 client Dropping Handshake keys. 2025/12/13 09:45:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad8885919b69c1918dd9, StatelessResetToken: 0x0539b127c51f4fa7972312e4f943ae08} 2025/12/13 09:45:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e7843c9c4bef81aadbe2, StatelessResetToken: 0x303aca27f23587e23717b988cca3e909} 2025/12/13 09:45:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e27b0b21a2520bff7238, StatelessResetToken: 0x4d0dfe71700b78f7082b30eb9c4ccffa} 2025/12/13 09:45:05 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:05 client -> Sending packet 1 (39 bytes) for connection a9b6d708793f95cd31ebc158, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: ad8885919b69c1918dd9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 194.492µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:05 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.PingFrame{} 2025/12/13 09:45:05 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:05 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:05 client -> Sending packet 2 (37 bytes) for connection a9b6d708793f95cd31ebc158, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: ad8885919b69c1918dd9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 60.343µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:05 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:05 client -> Sending packet 3 (32 bytes) for connection a9b6d708793f95cd31ebc158, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:05 client Short Header{DestConnectionID: ad8885919b69c1918dd9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:05 Received 1 packets after sending CONNECTION_CLOSE. Retransmitting. 2025/12/13 09:45:05 client Connection a9b6d708793f95cd31ebc158 closed. 2025/12/13 09:45:05 Requesting https://server4:443/sufficient-frosty-watch. 2025/12/13 09:45:05 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:05 Increased send buffer size to 14336 kiB 2025/12/13 09:45:05 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:05 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:05 Created qlog file: /logs/qlog/a7f10de40e14b791eb7c387a64c2676a98eb.sqlog 2025/12/13 09:45:05 client Starting new connection to server4 ([::]:59510 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a7f10de40e14b791eb7c387a64c2676a98eb, version v1 2025/12/13 09:45:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:05 client -> Sending packet 0 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: a7f10de40e14b791eb7c387a64c2676a98eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:05 client -> Sending packet 1 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:05 client Long Header{Type: Initial, DestConnectionID: a7f10de40e14b791eb7c387a64c2676a98eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 1230, Data length: 285, Offset + Data length: 1515} 2025/12/13 09:45:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:06 client -> Sending packet 2 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: a7f10de40e14b791eb7c387a64c2676a98eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:06 client -> Sending packet 3 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: a7f10de40e14b791eb7c387a64c2676a98eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 1230, Data length: 285, Offset + Data length: 1515} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:06 client <- Reading packet 15 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ad4f3ad329f6461bc0e2, Token: (empty), PacketNumber: 15, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:06 client Received first packet. Switching destination connection ID to: ad4f3ad329f6461bc0e2 2025/12/13 09:45:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:45:06 client newly acked packets (1): [2] 2025/12/13 09:45:06 client updated RTT: 33.443728ms (σ: 16.721864ms) 2025/12/13 09:45:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:45:06 client -> Sending packet 4 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: ad4f3ad329f6461bc0e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 1230, Data length: 285, Offset + Data length: 1515} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:06 client -> Sending packet 5 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: ad4f3ad329f6461bc0e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 1230, Data length: 285, Offset + Data length: 1515} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:06 client Queueing packet (777 bytes) for later decryption 2025/12/13 09:45:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/12/13 09:45:06 client -> Sending packet 6 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: ad4f3ad329f6461bc0e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 1230, Data length: 285, Offset + Data length: 1515} 2025/12/13 09:45:06 client -> Sending packet 7 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: ad4f3ad329f6461bc0e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 1230, Data length: 285, Offset + Data length: 1515} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:06 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:06 client <- Reading packet 18 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ad4f3ad329f6461bc0e2, Token: (empty), PacketNumber: 18, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:06 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/12/13 09:45:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:06 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:06 client -> Sending packet 8 (1280 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Initial 2025/12/13 09:45:06 client Long Header{Type: Initial, DestConnectionID: ad4f3ad329f6461bc0e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:06 client -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 15, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 15, Smallest: 15}}, DelayTime: 0s} 2025/12/13 09:45:06 client <- Reading packet 1 (777 bytes) for connection (empty), Handshake 2025/12/13 09:45:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ad4f3ad329f6461bc0e2, PacketNumber: 1, PacketNumberLen: 1, Length: 758, Version: v1} 2025/12/13 09:45:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/12/13 09:45:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a7f10de40e14b791eb7c387a64c2676a98eb, InitialSourceConnectionID: ad4f3ad329f6461bc0e2, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:06 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:06 client <- Reading packet 2 (777 bytes) for connection (empty), Handshake 2025/12/13 09:45:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ad4f3ad329f6461bc0e2, PacketNumber: 2, PacketNumberLen: 1, Length: 758, Version: v1} 2025/12/13 09:45:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/12/13 09:45:06 client -> Sending packet 0 (81 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, Handshake 2025/12/13 09:45:06 client Long Header{Type: Handshake, DestConnectionID: ad4f3ad329f6461bc0e2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:06 client Dropping Initial keys. 2025/12/13 09:45:06 client -> Sending packet 0 (61 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:06 client Short Header{DestConnectionID: ad4f3ad329f6461bc0e2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 09:45:06 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:06 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ad4f3ad329f6461bc0e2, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:06 client Peer doesn't await address validation any longer. 2025/12/13 09:45:06 client newly acked packets (1): [0] 2025/12/13 09:45:06 client updated RTT: 33.369ms (σ: 12.688ms) 2025/12/13 09:45:06 client Canceling loss detection timer. 2025/12/13 09:45:06 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:06 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:06 client Dropping Handshake keys. 2025/12/13 09:45:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7fc769215c31312195c1, StatelessResetToken: 0x35d07d26941d029880a08c72a266e7f8} 2025/12/13 09:45:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 954c51f94b85b34f3e59, StatelessResetToken: 0x052f10dd176ae52b16e44b38a32303d6} 2025/12/13 09:45:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 15bbffd4f6ff6667cf2e, StatelessResetToken: 0xcffc6723abb07668b83d15e5e8ad9ad4} 2025/12/13 09:45:06 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:06 client -> Sending packet 1 (39 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:06 client Short Header{DestConnectionID: 7fc769215c31312195c1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 230.278µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:06 client <- Reading packet 2 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.872ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:06 client newly acked packets (1): [0] 2025/12/13 09:45:06 client updated RTT: 33.323ms (σ: 9.606ms) 2025/12/13 09:45:06 client ECN capability confirmed. 2025/12/13 09:45:06 client <- Reading packet 3 (137 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:06 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9039085a42cebedb6039, StatelessResetToken: 0xc5970599e8f8a3e4cbfcb6862cd4495c} 2025/12/13 09:45:06 client <- &wire.CryptoFrame{Offset: 281, Data length: 40, Offset + Data length: 321} 2025/12/13 09:45:06 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010051d074d527ec3e3e5923b0c006e68b91e64f833c22b855dd3c15186e01712a03ef9a1876} 2025/12/13 09:45:06 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:06 client -> Sending packet 2 (39 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:06 client Short Header{DestConnectionID: 7fc769215c31312195c1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:06 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 83.716µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:06 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 20.896ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:06 client newly acked packets (1): [1] 2025/12/13 09:45:06 client Ignoring all packets below 1. 2025/12/13 09:45:06 client updated RTT: 35.608ms (σ: 11.775ms) 2025/12/13 09:45:06 client Canceling loss detection timer. 2025/12/13 09:45:07 client <- Reading packet 5 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:07 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:07 client <- &wire.PingFrame{} 2025/12/13 09:45:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 281, Offset + Data length: 281} 2025/12/13 09:45:07 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:07 client -> Sending packet 3 (1366 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:07 client Short Header{DestConnectionID: 7fc769215c31312195c1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:07 client -> &wire.PingFrame{} 2025/12/13 09:45:07 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:07 client -> Sending packet 4 (32 bytes) for connection a7f10de40e14b791eb7c387a64c2676a98eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:07 client Short Header{DestConnectionID: 7fc769215c31312195c1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:07 client Connection a7f10de40e14b791eb7c387a64c2676a98eb closed. 2025/12/13 09:45:07 Requesting https://server4:443/ecstatic-surprised-floppy. 2025/12/13 09:45:07 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:07 Increased send buffer size to 14336 kiB 2025/12/13 09:45:07 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:07 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:07 Created qlog file: /logs/qlog/1aabdd2df409c3268aa7e3988a7e0455caf7.sqlog 2025/12/13 09:45:07 client Starting new connection to server4 ([::]:49746 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1aabdd2df409c3268aa7e3988a7e0455caf7, version v1 2025/12/13 09:45:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:07 client -> Sending packet 0 (1280 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 1aabdd2df409c3268aa7e3988a7e0455caf7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:07 client -> Sending packet 1 (1280 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 1aabdd2df409c3268aa7e3988a7e0455caf7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 1230, Data length: 276, Offset + Data length: 1506} 2025/12/13 09:45:07 client <- Reading packet 12 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e80ecd4773f1394e016, Token: (empty), PacketNumber: 12, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:07 client Received first packet. Switching destination connection ID to: 2e80ecd4773f1394e016 2025/12/13 09:45:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:07 client newly acked packets (1): [0] 2025/12/13 09:45:07 client updated RTT: 33.498446ms (σ: 16.749223ms) 2025/12/13 09:45:07 client Queueing packet (776 bytes) for later decryption 2025/12/13 09:45:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:07 client -> Sending packet 2 (1280 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 1230, Data length: 276, Offset + Data length: 1506} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:07 client -> Sending packet 3 (1280 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 1230, Data length: 276, Offset + Data length: 1506} 2025/12/13 09:45:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:45:07 client -> Sending packet 4 (1280 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 1230, Data length: 276, Offset + Data length: 1506} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:07 client -> Sending packet 5 (1280 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 1230, Data length: 276, Offset + Data length: 1506} 2025/12/13 09:45:07 client Parsed a coalesced packet. Part 1: 1228 bytes. Remaining: 4 bytes. 2025/12/13 09:45:07 client <- Reading packet 15 (1228 bytes) for connection (empty), Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e80ecd4773f1394e016, Token: (empty), PacketNumber: 15, PacketNumberLen: 1, Length: 1208, Version: v1} 2025/12/13 09:45:07 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:07 client newly acked packets (1): [5] 2025/12/13 09:45:07 client updated RTT: 33.55ms (σ: 12.667ms) 2025/12/13 09:45:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:07 client Queueing packet (4 bytes) for later decryption 2025/12/13 09:45:07 client -> Sending packet 6 (1280 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:07 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 12, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}}, DelayTime: 0s} 2025/12/13 09:45:07 client <- Reading packet 0 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2e80ecd4773f1394e016, PacketNumber: 0, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1aabdd2df409c3268aa7e3988a7e0455caf7, InitialSourceConnectionID: 2e80ecd4773f1394e016, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:07 client Dropping 1RTT packet (4 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 3 2025/12/13 09:45:07 client <- Reading packet 2 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2e80ecd4773f1394e016, PacketNumber: 2, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:07 client -> Sending packet 0 (83 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 64, Version: v1} 2025/12/13 09:45:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:07 client Dropping Initial keys. 2025/12/13 09:45:07 client -> Sending packet 0 (63 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:07 client Short Header{DestConnectionID: 2e80ecd4773f1394e016, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 09:45:07 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:07 client -> Sending packet 1 (76 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:07 client -> Sending packet 2 (76 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:07 client Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1188 bytes. 2025/12/13 09:45:07 client Dropping initial packet (44 bytes) because we already dropped the keys. 2025/12/13 09:45:07 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 412 bytes. 2025/12/13 09:45:07 client <- Reading packet 3 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2e80ecd4773f1394e016, PacketNumber: 3, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:07 client Dropping 1RTT packet (412 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:07 client -> Sending packet 3 (44 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/12/13 09:45:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/12/13 09:45:07 client -> Sending packet 4 (76 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:07 client -> Sending packet 5 (76 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: 2e80ecd4773f1394e016, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:07 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1289 bytes. 2025/12/13 09:45:07 client <- Reading packet 5 (43 bytes) for connection (empty), Handshake 2025/12/13 09:45:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2e80ecd4773f1394e016, PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/12/13 09:45:07 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/12/13 09:45:07 client Peer doesn't await address validation any longer. 2025/12/13 09:45:07 client newly acked packets (1): [5] 2025/12/13 09:45:07 client updated RTT: 33.447ms (σ: 9.704ms) 2025/12/13 09:45:07 client Canceling loss detection timer. 2025/12/13 09:45:07 client <- Reading packet 0 (1289 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 253.128ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:07 client newly acked packets (1): [0] 2025/12/13 09:45:07 client updated RTT: 62.657ms (σ: 65.699ms) 2025/12/13 09:45:07 client ECN capability confirmed. 2025/12/13 09:45:07 client Dropping Handshake keys. 2025/12/13 09:45:07 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9050c258626c5b4736f, StatelessResetToken: 0xe2953e0d3b5a3dbf40f2433abf725ecb} 2025/12/13 09:45:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ccc667749fbf7ed2589a, StatelessResetToken: 0x86a6e5b58f1b2970d95c7913db242b13} 2025/12/13 09:45:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 15df0c706f200e118035, StatelessResetToken: 0xec5a492d847edaeb1541557aec294215} 2025/12/13 09:45:07 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:07 client -> Sending packet 1 (39 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:07 client Short Header{DestConnectionID: f9050c258626c5b4736f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 218.166µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:07 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:07 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:07 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:07 client -> Sending packet 2 (39 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:07 client Short Header{DestConnectionID: f9050c258626c5b4736f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 71.734µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:07 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:07 client -> Sending packet 3 (32 bytes) for connection 1aabdd2df409c3268aa7e3988a7e0455caf7, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:07 client Short Header{DestConnectionID: f9050c258626c5b4736f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:07 client Connection 1aabdd2df409c3268aa7e3988a7e0455caf7 closed. 2025/12/13 09:45:07 Requesting https://server4:443/huge-anxious-journal. 2025/12/13 09:45:07 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:07 Increased send buffer size to 14336 kiB 2025/12/13 09:45:07 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:07 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:07 Created qlog file: /logs/qlog/95be33581ced9a6ee203d8.sqlog 2025/12/13 09:45:07 client Starting new connection to server4 ([::]:38420 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 95be33581ced9a6ee203d8, version v1 2025/12/13 09:45:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:07 client -> Sending packet 0 (1280 bytes) for connection 95be33581ced9a6ee203d8, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 95be33581ced9a6ee203d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 09:45:07 client -> Sending packet 1 (1280 bytes) for connection 95be33581ced9a6ee203d8, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 95be33581ced9a6ee203d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 1237, Data length: 275, Offset + Data length: 1512} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:07 client Queueing packet (771 bytes) for later decryption 2025/12/13 09:45:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:07 client -> Sending packet 2 (1280 bytes) for connection 95be33581ced9a6ee203d8, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 95be33581ced9a6ee203d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 09:45:07 client -> Sending packet 3 (1280 bytes) for connection 95be33581ced9a6ee203d8, Initial 2025/12/13 09:45:07 client Long Header{Type: Initial, DestConnectionID: 95be33581ced9a6ee203d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:07 client -> &wire.CryptoFrame{Offset: 1237, Data length: 275, Offset + Data length: 1512} 2025/12/13 09:45:08 client Queueing packet (771 bytes) for later decryption 2025/12/13 09:45:08 client Queueing packet (771 bytes) for later decryption 2025/12/13 09:45:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:45:08 client -> Sending packet 4 (1280 bytes) for connection 95be33581ced9a6ee203d8, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 95be33581ced9a6ee203d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 09:45:08 client -> Sending packet 5 (1280 bytes) for connection 95be33581ced9a6ee203d8, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 95be33581ced9a6ee203d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 1237, Data length: 275, Offset + Data length: 1512} 2025/12/13 09:45:08 client Parsed a coalesced packet. Part 1: 1227 bytes. Remaining: 5 bytes. 2025/12/13 09:45:08 client <- Reading packet 540 (1227 bytes) for connection (empty), Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a738f8f2e01da4999be, Token: (empty), PacketNumber: 540, PacketNumberLen: 2, Length: 1207, Version: v1} 2025/12/13 09:45:08 client Received first packet. Switching destination connection ID to: 2a738f8f2e01da4999be 2025/12/13 09:45:08 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:08 client newly acked packets (1): [4] 2025/12/13 09:45:08 client updated RTT: 33.617002ms (σ: 16.808501ms) 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:08 client Queueing packet (5 bytes) for later decryption 2025/12/13 09:45:08 client -> Sending packet 6 (1280 bytes) for connection 95be33581ced9a6ee203d8, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 2a738f8f2e01da4999be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 540, LowestAcked: 540, DelayTime: 0s} 2025/12/13 09:45:08 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a738f8f2e01da4999be, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:45:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 95be33581ced9a6ee203d8, InitialSourceConnectionID: 2a738f8f2e01da4999be, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:08 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a738f8f2e01da4999be, PacketNumber: 1, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:45:08 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a738f8f2e01da4999be, PacketNumber: 2, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:45:08 client Dropping 1RTT packet (5 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 4 2025/12/13 09:45:08 client <- Reading packet 3 (771 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a738f8f2e01da4999be, PacketNumber: 3, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:45:08 client -> Sending packet 0 (139 bytes) for connection 95be33581ced9a6ee203d8, Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: 2a738f8f2e01da4999be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:08 client Short Header{DestConnectionID: 2a738f8f2e01da4999be, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 09:45:08 client Dropping Initial keys. 2025/12/13 09:45:08 client Parsed a coalesced packet. Part 1: 1227 bytes. Remaining: 5 bytes. 2025/12/13 09:45:08 client Dropping initial packet (1227 bytes) because we already dropped the keys. 2025/12/13 09:45:08 client Dropping 1RTT packet (5 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 4 2025/12/13 09:45:08 client <- Reading packet 4 (771 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a738f8f2e01da4999be, PacketNumber: 4, PacketNumberLen: 1, Length: 752, Version: v1} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 09:45:08 client -> Sending packet 1 (42 bytes) for connection 95be33581ced9a6ee203d8, Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: 2a738f8f2e01da4999be, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:08 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:08 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:08 client <- Reading packet 5 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a738f8f2e01da4999be, PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:08 client Peer doesn't await address validation any longer. 2025/12/13 09:45:08 client newly acked packets (1): [0] 2025/12/13 09:45:08 client updated RTT: 33.621ms (σ: 12.614ms) 2025/12/13 09:45:08 client Canceling loss detection timer. 2025/12/13 09:45:08 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:08 client Dropping Handshake keys. 2025/12/13 09:45:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a6a296b49cef6c60502, StatelessResetToken: 0x9c3d22195976239e9ace3e46bf162512} 2025/12/13 09:45:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 867de7c68b05653f17c4, StatelessResetToken: 0x8341134e4407e6cb8813e7a8d1295429} 2025/12/13 09:45:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 26458766ea6c32555ff9, StatelessResetToken: 0x7614edc8ac56fd047e33086018a71f40} 2025/12/13 09:45:08 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:08 client -> Sending packet 1 (39 bytes) for connection 95be33581ced9a6ee203d8, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 0a6a296b49cef6c60502, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 178.642µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:08 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.PingFrame{} 2025/12/13 09:45:08 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:08 client <- Reading packet 3 (191 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 182, Data length: 123, Offset + Data length: 305} 2025/12/13 09:45:08 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601000bf497e75afebc849683fe2cae77a391b2882c247494b890ef135223a851209132ac57d9} 2025/12/13 09:45:08 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:08 client -> Sending packet 2 (39 bytes) for connection 95be33581ced9a6ee203d8, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 0a6a296b49cef6c60502, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 62.686µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:08 client <- Reading packet 4 (24 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.176ms} 2025/12/13 09:45:08 client newly acked packets (1): [0] 2025/12/13 09:45:08 client updated RTT: 33.641ms (σ: 9.5ms) 2025/12/13 09:45:08 client <- Reading packet 6 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.PingFrame{} 2025/12/13 09:45:08 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:08 client -> Sending packet 3 (41 bytes) for connection 95be33581ced9a6ee203d8, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 0a6a296b49cef6c60502, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 57.336µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:08 client <- Reading packet 7 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:08 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:08 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:08 client -> Sending packet 4 (32 bytes) for connection 95be33581ced9a6ee203d8, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 0a6a296b49cef6c60502, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:08 client Connection 95be33581ced9a6ee203d8 closed. 2025/12/13 09:45:08 Requesting https://server4:443/frightened-merciless-computer. 2025/12/13 09:45:08 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:08 Increased send buffer size to 14336 kiB 2025/12/13 09:45:08 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:08 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:08 Created qlog file: /logs/qlog/12b0b53ff1589bc75ff8b54f7e5892442169c6.sqlog 2025/12/13 09:45:08 client Starting new connection to server4 ([::]:46102 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 12b0b53ff1589bc75ff8b54f7e5892442169c6, version v1 2025/12/13 09:45:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:08 client -> Sending packet 0 (1280 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 12b0b53ff1589bc75ff8b54f7e5892442169c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 09:45:08 client -> Sending packet 1 (1280 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 12b0b53ff1589bc75ff8b54f7e5892442169c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 284, Offset + Data length: 1513} 2025/12/13 09:45:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:08 client -> Sending packet 2 (1280 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 12b0b53ff1589bc75ff8b54f7e5892442169c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 09:45:08 client -> Sending packet 3 (1280 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 12b0b53ff1589bc75ff8b54f7e5892442169c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 284, Offset + Data length: 1513} 2025/12/13 09:45:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:08 client Queueing packet (777 bytes) for later decryption 2025/12/13 09:45:08 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:08 client <- Reading packet 6 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c24b36ea55e9b216476a, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:08 client Received first packet. Switching destination connection ID to: c24b36ea55e9b216476a 2025/12/13 09:45:08 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:08 client newly acked packets (2): [2 3] 2025/12/13 09:45:08 client updated RTT: 36.596427ms (σ: 18.298213ms) 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:08 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:08 client -> Sending packet 4 (1280 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: c24b36ea55e9b216476a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s} 2025/12/13 09:45:08 client <- Reading packet 0 (777 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c24b36ea55e9b216476a, PacketNumber: 0, PacketNumberLen: 1, Length: 758, Version: v1} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/12/13 09:45:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 12b0b53ff1589bc75ff8b54f7e5892442169c6, InitialSourceConnectionID: c24b36ea55e9b216476a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:08 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:08 client <- Reading packet 1 (777 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c24b36ea55e9b216476a, PacketNumber: 1, PacketNumberLen: 1, Length: 758, Version: v1} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/12/13 09:45:08 client -> Sending packet 0 (81 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: c24b36ea55e9b216476a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:08 client Dropping Initial keys. 2025/12/13 09:45:08 client -> Sending packet 0 (67 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: c24b36ea55e9b216476a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:08 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:08 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:08 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c24b36ea55e9b216476a, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:08 client Peer doesn't await address validation any longer. 2025/12/13 09:45:08 client newly acked packets (1): [0] 2025/12/13 09:45:08 client updated RTT: 36.169ms (σ: 14.576ms) 2025/12/13 09:45:08 client Canceling loss detection timer. 2025/12/13 09:45:08 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:08 client Dropping Handshake keys. 2025/12/13 09:45:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 46a9ff9c41e8e0eade30, StatelessResetToken: 0xc859bb599fd165df08cebc5edac8f039} 2025/12/13 09:45:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b30d8ff05fd73ed46811, StatelessResetToken: 0x8b89deee350d22f8da31784bc8d71fc4} 2025/12/13 09:45:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0df33287535984717021, StatelessResetToken: 0x84c6d9233ea1ec18bc62c968929bc3ee} 2025/12/13 09:45:08 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:08 client -> Sending packet 1 (39 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 46a9ff9c41e8e0eade30, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 141.303µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:08 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:08 client newly acked packets (1): [0] 2025/12/13 09:45:08 client updated RTT: 35.838ms (σ: 11.593ms) 2025/12/13 09:45:08 client ECN capability confirmed. 2025/12/13 09:45:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:08 client -> Sending packet 3 (31 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 46a9ff9c41e8e0eade30, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:08 client -> Sending packet 4 (31 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 46a9ff9c41e8e0eade30, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:08 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.PingFrame{} 2025/12/13 09:45:08 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:08 client -> Sending packet 5 (41 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 46a9ff9c41e8e0eade30, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 106.288µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:08 client <- Reading packet 9 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.PingFrame{} 2025/12/13 09:45:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9a4a41e7edb9b8c28fe5, StatelessResetToken: 0xcc67acc002593efe41a7ae8556aa3383} 2025/12/13 09:45:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 251, Offset + Data length: 251} 2025/12/13 09:45:08 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:08 client <- Reading packet 10 (138 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:08 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:08 client <- &wire.CryptoFrame{Offset: 251, Data length: 70, Offset + Data length: 321} 2025/12/13 09:45:08 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010000aa279e1fe2a9c707ddaae116071d52a70aec72feacefb11a4311123d8bfa768966c1f7} 2025/12/13 09:45:08 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:08 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:08 client -> Sending packet 6 (32 bytes) for connection 12b0b53ff1589bc75ff8b54f7e5892442169c6, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:08 client Short Header{DestConnectionID: 46a9ff9c41e8e0eade30, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:08 client Connection 12b0b53ff1589bc75ff8b54f7e5892442169c6 closed. 2025/12/13 09:45:08 Requesting https://server4:443/light-tremendous-uxie. 2025/12/13 09:45:08 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:08 Increased send buffer size to 14336 kiB 2025/12/13 09:45:08 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:08 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:08 Created qlog file: /logs/qlog/2b63e92037ce29cc576b47658a94d9.sqlog 2025/12/13 09:45:08 client Starting new connection to server4 ([::]:53285 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2b63e92037ce29cc576b47658a94d9, version v1 2025/12/13 09:45:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:08 client -> Sending packet 0 (1280 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 2b63e92037ce29cc576b47658a94d9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:08 client -> Sending packet 1 (1280 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 2b63e92037ce29cc576b47658a94d9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 1233, Data length: 279, Offset + Data length: 1512} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:08 client <- Reading packet 19 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60aa3d53bc98340bb3ed, Token: (empty), PacketNumber: 19, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:08 client Received first packet. Switching destination connection ID to: 60aa3d53bc98340bb3ed 2025/12/13 09:45:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:08 client newly acked packets (1): [1] 2025/12/13 09:45:08 client updated RTT: 34.150628ms (σ: 17.075314ms) 2025/12/13 09:45:08 client setting loss timer for packet 0 (Initial) to 38.419456ms (in %!s(monotime.Time=3620329968476)) 2025/12/13 09:45:08 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3620329968476) 2025/12/13 09:45:08 client lost packet 0 (time threshold) 2025/12/13 09:45:08 client -> Sending packet 2 (1280 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Initial 2025/12/13 09:45:08 client Long Header{Type: Initial, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 09:45:09 client Queueing packet (775 bytes) for later decryption 2025/12/13 09:45:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:09 client -> Sending packet 3 (1280 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:09 client -> Sending packet 4 (1280 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:09 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:09 client <- Reading packet 21 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60aa3d53bc98340bb3ed, Token: (empty), PacketNumber: 21, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:45:09 client newly acked packets (1): [4] 2025/12/13 09:45:09 client updated RTT: 34.116ms (σ: 12.872ms) 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:09 client -> Sending packet 5 (1280 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 19, AckRanges: {{Largest: 21, Smallest: 21}, {Largest: 19, Smallest: 19}}, DelayTime: 0s} 2025/12/13 09:45:09 client <- Reading packet 0 (775 bytes) for connection (empty), Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 60aa3d53bc98340bb3ed, PacketNumber: 0, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2b63e92037ce29cc576b47658a94d9, InitialSourceConnectionID: 60aa3d53bc98340bb3ed, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:09 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:09 client <- Reading packet 1 (775 bytes) for connection (empty), Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 60aa3d53bc98340bb3ed, PacketNumber: 1, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:09 client -> Sending packet 0 (81 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:09 client Dropping Initial keys. 2025/12/13 09:45:09 client -> Sending packet 0 (59 bytes) for connection 2b63e92037ce29cc576b47658a94d9, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: 60aa3d53bc98340bb3ed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:45:09 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:09 client -> Sending packet 1 (76 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:09 client -> Sending packet 2 (76 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:09 client Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1188 bytes. 2025/12/13 09:45:09 client Dropping initial packet (44 bytes) because we already dropped the keys. 2025/12/13 09:45:09 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 413 bytes. 2025/12/13 09:45:09 client <- Reading packet 2 (775 bytes) for connection (empty), Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 60aa3d53bc98340bb3ed, PacketNumber: 2, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:09 client Dropping 1RTT packet (413 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:09 client -> Sending packet 3 (42 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/12/13 09:45:09 client -> Sending packet 4 (76 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:09 client -> Sending packet 5 (76 bytes) for connection 2b63e92037ce29cc576b47658a94d9, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 60aa3d53bc98340bb3ed, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:09 client Parsed a coalesced packet. Part 1: 780 bytes. Remaining: 552 bytes. 2025/12/13 09:45:09 client <- Reading packet 3 (780 bytes) for connection (empty), Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 60aa3d53bc98340bb3ed, PacketNumber: 3, PacketNumberLen: 1, Length: 761, Version: v1} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/12/13 09:45:09 client Peer doesn't await address validation any longer. 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:09 client <- Reading packet 0 (552 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256.792ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client newly acked packets (1): [0] 2025/12/13 09:45:09 client updated RTT: 63.621ms (σ: 68.665ms) 2025/12/13 09:45:09 client ECN capability confirmed. 2025/12/13 09:45:09 client Canceling loss detection timer. 2025/12/13 09:45:09 client Dropping Handshake keys. 2025/12/13 09:45:09 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ad9b7ec05d7aece9c75, StatelessResetToken: 0x420fade72522ae52423197b2203108d6} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77a223179b73a60f9785, StatelessResetToken: 0x90dde11e2f646b3c6aa965818b21cbc6} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c5e8e3812cb739994999, StatelessResetToken: 0x109f50c620293184efd913f3abcfe80e} 2025/12/13 09:45:09 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:09 client -> Sending packet 1 (39 bytes) for connection 2b63e92037ce29cc576b47658a94d9, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: 5ad9b7ec05d7aece9c75, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 202.947µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:09 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.PingFrame{} 2025/12/13 09:45:09 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:09 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:09 client -> Sending packet 2 (37 bytes) for connection 2b63e92037ce29cc576b47658a94d9, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: 5ad9b7ec05d7aece9c75, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 80.009µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:09 client -> Sending packet 3 (32 bytes) for connection 2b63e92037ce29cc576b47658a94d9, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: 5ad9b7ec05d7aece9c75, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:09 client Connection 2b63e92037ce29cc576b47658a94d9 closed. 2025/12/13 09:45:09 Requesting https://server4:443/spicy-content-pharaoh. 2025/12/13 09:45:09 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:09 Increased send buffer size to 14336 kiB 2025/12/13 09:45:09 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:09 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:09 Created qlog file: /logs/qlog/28118cc82762fd0faa1f76079cabc2930721af1e.sqlog 2025/12/13 09:45:09 client Starting new connection to server4 ([::]:39024 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 28118cc82762fd0faa1f76079cabc2930721af1e, version v1 2025/12/13 09:45:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:09 client -> Sending packet 0 (1280 bytes) for connection 28118cc82762fd0faa1f76079cabc2930721af1e, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 28118cc82762fd0faa1f76079cabc2930721af1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:09 client -> Sending packet 1 (1280 bytes) for connection 28118cc82762fd0faa1f76079cabc2930721af1e, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 28118cc82762fd0faa1f76079cabc2930721af1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 1228, Data length: 283, Offset + Data length: 1511} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:09 client <- Reading packet 26 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 85391e8ed0d86c0d894f, Token: (empty), PacketNumber: 26, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:09 client Received first packet. Switching destination connection ID to: 85391e8ed0d86c0d894f 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client newly acked packets (1): [0] 2025/12/13 09:45:09 client updated RTT: 33.443941ms (σ: 16.72197ms) 2025/12/13 09:45:09 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:09 client <- Reading packet 27 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 85391e8ed0d86c0d894f, Token: (empty), PacketNumber: 27, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client newly acked packets (1): [1] 2025/12/13 09:45:09 client updated RTT: 33.771ms (σ: 13.197ms) 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:09 client -> Sending packet 2 (1280 bytes) for connection 28118cc82762fd0faa1f76079cabc2930721af1e, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 85391e8ed0d86c0d894f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 27, LowestAcked: 26, DelayTime: 0s} 2025/12/13 09:45:09 client <- Reading packet 0 (779 bytes) for connection (empty), Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 85391e8ed0d86c0d894f, PacketNumber: 0, PacketNumberLen: 1, Length: 760, Version: v1} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/12/13 09:45:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 28118cc82762fd0faa1f76079cabc2930721af1e, InitialSourceConnectionID: 85391e8ed0d86c0d894f, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:09 client -> Sending packet 0 (81 bytes) for connection 28118cc82762fd0faa1f76079cabc2930721af1e, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 85391e8ed0d86c0d894f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:09 client Dropping Initial keys. 2025/12/13 09:45:09 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:09 client -> Sending packet 0 (59 bytes) for connection 28118cc82762fd0faa1f76079cabc2930721af1e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: 85391e8ed0d86c0d894f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:45:09 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.PingFrame{} 2025/12/13 09:45:09 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:09 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:09 client -> Sending packet 1 (37 bytes) for connection 28118cc82762fd0faa1f76079cabc2930721af1e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: 85391e8ed0d86c0d894f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 84.968µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:09 client -> Sending packet 1 (73 bytes) for connection 28118cc82762fd0faa1f76079cabc2930721af1e, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 85391e8ed0d86c0d894f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/12/13 09:45:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:09 client Short Header{DestConnectionID: 85391e8ed0d86c0d894f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:09 client Connection 28118cc82762fd0faa1f76079cabc2930721af1e closed. 2025/12/13 09:45:09 Requesting https://server4:443/unrelenting-excited-mewtwo. 2025/12/13 09:45:09 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:09 Increased send buffer size to 14336 kiB 2025/12/13 09:45:09 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:09 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:09 Created qlog file: /logs/qlog/09a13fa4ceb8215e.sqlog 2025/12/13 09:45:09 client Starting new connection to server4 ([::]:44734 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 09a13fa4ceb8215e, version v1 2025/12/13 09:45:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:09 client -> Sending packet 0 (1280 bytes) for connection 09a13fa4ceb8215e, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 09a13fa4ceb8215e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:09 client -> Sending packet 1 (1280 bytes) for connection 09a13fa4ceb8215e, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 09a13fa4ceb8215e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 1240, Data length: 267, Offset + Data length: 1507} 2025/12/13 09:45:09 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 235eccdba1c2748f7cf6, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:09 client Received first packet. Switching destination connection ID to: 235eccdba1c2748f7cf6 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client newly acked packets (1): [0] 2025/12/13 09:45:09 client updated RTT: 33.019592ms (σ: 16.509796ms) 2025/12/13 09:45:09 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:09 client <- Reading packet 4 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 235eccdba1c2748f7cf6, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client newly acked packets (1): [1] 2025/12/13 09:45:09 client updated RTT: 33.389ms (σ: 13.123ms) 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:09 client -> Sending packet 2 (1280 bytes) for connection 09a13fa4ceb8215e, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 235eccdba1c2748f7cf6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/12/13 09:45:09 client <- Reading packet 0 (766 bytes) for connection (empty), Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 235eccdba1c2748f7cf6, PacketNumber: 0, PacketNumberLen: 1, Length: 747, Version: v1} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/12/13 09:45:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 09a13fa4ceb8215e, InitialSourceConnectionID: 235eccdba1c2748f7cf6, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:09 client -> Sending packet 0 (81 bytes) for connection 09a13fa4ceb8215e, Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: 235eccdba1c2748f7cf6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:09 client Dropping Initial keys. 2025/12/13 09:45:09 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:09 client -> Sending packet 0 (64 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: 235eccdba1c2748f7cf6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 09:45:09 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:09 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 235eccdba1c2748f7cf6, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:09 client Peer doesn't await address validation any longer. 2025/12/13 09:45:09 client newly acked packets (1): [0] 2025/12/13 09:45:09 client updated RTT: 33.334ms (σ: 9.951ms) 2025/12/13 09:45:09 client Canceling loss detection timer. 2025/12/13 09:45:09 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:09 client Dropping Handshake keys. 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d62d88b79bfa6c9fa118, StatelessResetToken: 0x0cc43ce6829824c7d544e34d27ef5c55} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3e907846b75fdc8b1917, StatelessResetToken: 0xe866f172e2a4d3fca0193021b874b58d} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f844bdbe0405595835d2, StatelessResetToken: 0xb1fb7c542fbb958819c288656be7844c} 2025/12/13 09:45:09 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:09 client -> Sending packet 1 (39 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 179.023µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:09 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.PingFrame{} 2025/12/13 09:45:09 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:09 client <- Reading packet 3 (191 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 182, Data length: 123, Offset + Data length: 305} 2025/12/13 09:45:09 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601006eb9ef9b13eaffe12b4ca3b4e4bb6d3322e7d300c75532ce8bd68c26093d8acd91a1ec46} 2025/12/13 09:45:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:09 client -> Sending packet 2 (39 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 59.571µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.896ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client newly acked packets (1): [0] 2025/12/13 09:45:09 client updated RTT: 33.31ms (σ: 7.51ms) 2025/12/13 09:45:09 client ECN capability confirmed. 2025/12/13 09:45:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:09 client -> Sending packet 4 (31 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:09 client -> Sending packet 5 (31 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:09 client <- Reading packet 5 (58 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5dfee903ef91eb8f8a1a, StatelessResetToken: 0x968e3c5816a734eeb802f366a55f5418} 2025/12/13 09:45:09 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:09 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 21.112ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client newly acked packets (1): [5] 2025/12/13 09:45:09 client updated RTT: 35.685ms (σ: 10.382ms) 2025/12/13 09:45:09 client Canceling loss detection timer. 2025/12/13 09:45:09 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:09 client -> Sending packet 6 (40 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 4.219466ms, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:45:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:09 client <- Reading packet 7 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f844bdbe0405595835d2, StatelessResetToken: 0xb1fb7c542fbb958819c288656be7844c} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3e907846b75fdc8b1917, StatelessResetToken: 0xe866f172e2a4d3fca0193021b874b58d} 2025/12/13 09:45:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d62d88b79bfa6c9fa118, StatelessResetToken: 0x0cc43ce6829824c7d544e34d27ef5c55} 2025/12/13 09:45:09 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:09 client -> Sending packet 7 (1366 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.PingFrame{} 2025/12/13 09:45:09 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:09 client -> Sending packet 8 (40 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.400005ms, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client <- Reading packet 9 (30 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client newly acked packets (1): [7] 2025/12/13 09:45:09 client updated RTT: 35.201ms (σ: 8.753ms) 2025/12/13 09:45:09 client <- Reading packet 10 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:09 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:09 client <- &wire.PingFrame{} 2025/12/13 09:45:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:09 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:09 client -> Sending packet 9 (41 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 82.694µs, ECT0: 9, ECT1: 0, CE: 0} 2025/12/13 09:45:09 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:09 client -> Sending packet 10 (32 bytes) for connection 09a13fa4ceb8215e, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:09 client Short Header{DestConnectionID: d62d88b79bfa6c9fa118, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:09 client Connection 09a13fa4ceb8215e closed. 2025/12/13 09:45:09 Requesting https://server4:443/brown-calm-subway. 2025/12/13 09:45:09 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:09 Increased send buffer size to 14336 kiB 2025/12/13 09:45:09 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:09 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:09 Created qlog file: /logs/qlog/37a214ececa8938371d0d72d292b30f1c91a.sqlog 2025/12/13 09:45:09 client Starting new connection to server4 ([::]:37083 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 37a214ececa8938371d0d72d292b30f1c91a, version v1 2025/12/13 09:45:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:09 client -> Sending packet 0 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 37a214ececa8938371d0d72d292b30f1c91a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:09 client -> Sending packet 1 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:09 client Long Header{Type: Initial, DestConnectionID: 37a214ececa8938371d0d72d292b30f1c91a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 1230, Data length: 286, Offset + Data length: 1516} 2025/12/13 09:45:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:10 client -> Sending packet 2 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: 37a214ececa8938371d0d72d292b30f1c91a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:10 client -> Sending packet 3 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: 37a214ececa8938371d0d72d292b30f1c91a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 1230, Data length: 286, Offset + Data length: 1516} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:10 client <- Reading packet 19 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, Token: (empty), PacketNumber: 19, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:10 client Received first packet. Switching destination connection ID to: ffe07a15f72d1f48cb1e 2025/12/13 09:45:10 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/12/13 09:45:10 client newly acked packets (1): [3] 2025/12/13 09:45:10 client updated RTT: 34.149085ms (σ: 17.074542ms) 2025/12/13 09:45:10 client setting loss timer for packet 2 (Initial) to 38.41772ms (in %!s(monotime.Time=3621433033556)) 2025/12/13 09:45:10 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3621433033556) 2025/12/13 09:45:10 client lost packet 2 (time threshold) 2025/12/13 09:45:10 client -> Sending packet 4 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:45:10 client -> Sending packet 5 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:10 client -> Sending packet 6 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:10 client Parsed a coalesced packet. Part 1: 46 bytes. Remaining: 1186 bytes. 2025/12/13 09:45:10 client <- Reading packet 20 (46 bytes) for connection (empty), Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, Token: (empty), PacketNumber: 20, PacketNumberLen: 1, Length: 26, Version: v1} 2025/12/13 09:45:10 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 300.776ms} 2025/12/13 09:45:10 client <- &wire.PingFrame{} 2025/12/13 09:45:10 client Queueing packet (1186 bytes) for later decryption 2025/12/13 09:45:10 client -> Sending packet 7 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:10 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 19, DelayTime: 0s} 2025/12/13 09:45:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:10 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1192 bytes. 2025/12/13 09:45:10 client <- Reading packet 22 (40 bytes) for connection (empty), Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, Token: (empty), PacketNumber: 22, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:45:10 client <- &wire.PingFrame{} 2025/12/13 09:45:10 client Queueing packet (1192 bytes) for later decryption 2025/12/13 09:45:10 client -> Sending packet 8 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:10 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 19, AckRanges: {{Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 19}}, DelayTime: 0s} 2025/12/13 09:45:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/12/13 09:45:10 client -> Sending packet 9 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:10 client -> Sending packet 10 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:10 client Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1192 bytes. 2025/12/13 09:45:10 client <- Reading packet 23 (40 bytes) for connection (empty), Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, Token: (empty), PacketNumber: 23, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:45:10 client <- &wire.PingFrame{} 2025/12/13 09:45:10 client Queueing packet (1192 bytes) for later decryption 2025/12/13 09:45:10 client -> Sending packet 11 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:10 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:10 client -> &wire.AckFrame{LargestAcked: 23, LowestAcked: 19, AckRanges: {{Largest: 23, Smallest: 22}, {Largest: 20, Smallest: 19}}, DelayTime: 0s} 2025/12/13 09:45:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/12/13 09:45:11 client -> Sending packet 12 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:11 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:11 client -> Sending packet 13 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:11 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 5 2025/12/13 09:45:13 client -> Sending packet 14 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:13 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 14, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:13 client -> Sending packet 15 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:13 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 15, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:13 client Queueing packet (778 bytes) for later decryption 2025/12/13 09:45:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 6 2025/12/13 09:45:16 client -> Sending packet 16 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:16 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 16, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:16 client -> Sending packet 17 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:16 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 17, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:16 client Parsed a coalesced packet. Part 1: 1228 bytes. Remaining: 4 bytes. 2025/12/13 09:45:16 client <- Reading packet 25 (1228 bytes) for connection (empty), Initial 2025/12/13 09:45:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, Token: (empty), PacketNumber: 25, PacketNumberLen: 1, Length: 1208, Version: v1} 2025/12/13 09:45:16 client <- &wire.AckFrame{LargestAcked: 16, LowestAcked: 7, AckRanges: {{Largest: 16, Smallest: 15}, {Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}}, DelayTime: 0s} 2025/12/13 09:45:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:16 client Queueing packet (4 bytes) for later decryption 2025/12/13 09:45:16 client -> Sending packet 18 (1280 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Initial 2025/12/13 09:45:16 client Long Header{Type: Initial, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 18, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 19, AckRanges: {{Largest: 25, Smallest: 25}, {Largest: 23, Smallest: 22}, {Largest: 20, Smallest: 19}}, DelayTime: 0s} 2025/12/13 09:45:16 client Queueing packet (1186 bytes) for later decryption 2025/12/13 09:45:16 client Queueing packet (1192 bytes) for later decryption 2025/12/13 09:45:16 client Queueing packet (1192 bytes) for later decryption 2025/12/13 09:45:16 client <- Reading packet 0 (778 bytes) for connection (empty), Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, PacketNumber: 0, PacketNumberLen: 1, Length: 759, Version: v1} 2025/12/13 09:45:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/12/13 09:45:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 37a214ececa8938371d0d72d292b30f1c91a, InitialSourceConnectionID: ffe07a15f72d1f48cb1e, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:16 client Dropping 1RTT packet (4 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 3 2025/12/13 09:45:16 client Dropping 1RTT packet (1186 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:16 client Dropping 1RTT packet (1192 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:16 client Dropping 1RTT packet (1192 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:16 client <- Reading packet 1 (778 bytes) for connection (empty), Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, PacketNumber: 1, PacketNumberLen: 1, Length: 759, Version: v1} 2025/12/13 09:45:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/12/13 09:45:16 client -> Sending packet 0 (81 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:16 client Dropping Initial keys. 2025/12/13 09:45:16 client -> Sending packet 0 (55 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:16 client Short Header{DestConnectionID: ffe07a15f72d1f48cb1e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 09:45:16 client Parsed a coalesced packet. Part 1: 1228 bytes. Remaining: 4 bytes. 2025/12/13 09:45:16 client Dropping initial packet (1228 bytes) because we already dropped the keys. 2025/12/13 09:45:16 client Dropping 1RTT packet (4 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 3 2025/12/13 09:45:16 client <- Reading packet 2 (778 bytes) for connection (empty), Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, PacketNumber: 2, PacketNumberLen: 1, Length: 759, Version: v1} 2025/12/13 09:45:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/12/13 09:45:16 client -> Sending packet 1 (42 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:16 client <- Reading packet 3 (39 bytes) for connection (empty), Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, PacketNumber: 3, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:45:16 client <- &wire.PingFrame{} 2025/12/13 09:45:16 client -> Sending packet 2 (42 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:16 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:16 client -> Sending packet 3 (76 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:16 client -> Sending packet 4 (76 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:16 client <- Reading packet 4 (39 bytes) for connection (empty), Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ffe07a15f72d1f48cb1e, PacketNumber: 4, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:45:16 client <- &wire.PingFrame{} 2025/12/13 09:45:16 client -> Sending packet 5 (42 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, Handshake 2025/12/13 09:45:16 client Long Header{Type: Handshake, DestConnectionID: ffe07a15f72d1f48cb1e, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:16 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:16 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:16 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/12/13 09:45:16 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100fc18751173074968961336d48d7f5593d34383061f076fb4b080dbeee9474f1d6f58552b} 2025/12/13 09:45:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:16 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:16 client -> Sending packet 1 (38 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:16 client Short Header{DestConnectionID: ffe07a15f72d1f48cb1e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 25.282155ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:16 client <- Reading packet 4 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:16 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:16 client Dropping Handshake keys. 2025/12/13 09:45:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bbfb1907752a015e3392, StatelessResetToken: 0xb25cb7ffaf39cb4268094059e2620c5a} 2025/12/13 09:45:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a79382a3b8adb20f5a3d, StatelessResetToken: 0xc595c18e1b45eac17e5ca2f3268dabe7} 2025/12/13 09:45:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7c865dd24d929fb5565, StatelessResetToken: 0x947bcdf4e175a211bbdc7cde7e721244} 2025/12/13 09:45:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:16 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:16 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:16 client <- &wire.PingFrame{} 2025/12/13 09:45:16 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:16 client -> Sending packet 3 (65 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:16 client Short Header{DestConnectionID: e7c865dd24d929fb5565, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 107.329µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 09:45:16 client -> Sending packet 4 (57 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:16 client Short Header{DestConnectionID: e7c865dd24d929fb5565, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 09:45:16 client <- Reading packet 6 (58 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:16 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:16 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:16 client newly acked packets (1): [4] 2025/12/13 09:45:16 client updated RTT: 33.747ms (σ: 13.608ms) 2025/12/13 09:45:16 client ECN capability confirmed. 2025/12/13 09:45:16 client Canceling loss detection timer. 2025/12/13 09:45:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e585e641309c7702e0ac, StatelessResetToken: 0x4931753701a9b793d6be548669f3a096} 2025/12/13 09:45:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:16 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:16 client -> Sending packet 5 (38 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:16 client Short Header{DestConnectionID: e7c865dd24d929fb5565, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 25.320125ms, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:45:16 client <- Reading packet 8 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:16 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:16 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7c865dd24d929fb5565, StatelessResetToken: 0x947bcdf4e175a211bbdc7cde7e721244} 2025/12/13 09:45:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a79382a3b8adb20f5a3d, StatelessResetToken: 0xc595c18e1b45eac17e5ca2f3268dabe7} 2025/12/13 09:45:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bbfb1907752a015e3392, StatelessResetToken: 0xb25cb7ffaf39cb4268094059e2620c5a} 2025/12/13 09:45:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 91, Offset + Data length: 91} 2025/12/13 09:45:16 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:16 client -> Sending packet 6 (1366 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:16 client Short Header{DestConnectionID: e7c865dd24d929fb5565, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:16 client -> &wire.PingFrame{} 2025/12/13 09:45:16 client -> Sending packet 7 (39 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:16 client Short Header{DestConnectionID: e7c865dd24d929fb5565, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:16 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 3}}, DelayTime: 224.137µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:16 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:16 client -> Sending packet 8 (32 bytes) for connection 37a214ececa8938371d0d72d292b30f1c91a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:16 client Short Header{DestConnectionID: e7c865dd24d929fb5565, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:16 client Connection 37a214ececa8938371d0d72d292b30f1c91a closed. 2025/12/13 09:45:16 Requesting https://server4:443/glad-silver-smartphone. 2025/12/13 09:45:16 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:16 Increased send buffer size to 14336 kiB 2025/12/13 09:45:16 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:16 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:16 Created qlog file: /logs/qlog/0ee540419e11c6dfac512f4fec56.sqlog 2025/12/13 09:45:16 client Starting new connection to server4 ([::]:48431 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0ee540419e11c6dfac512f4fec56, version v1 2025/12/13 09:45:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:16 client -> Sending packet 0 (1280 bytes) for connection 0ee540419e11c6dfac512f4fec56, Initial 2025/12/13 09:45:16 client Long Header{Type: Initial, DestConnectionID: 0ee540419e11c6dfac512f4fec56, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:16 client -> Sending packet 1 (1280 bytes) for connection 0ee540419e11c6dfac512f4fec56, Initial 2025/12/13 09:45:16 client Long Header{Type: Initial, DestConnectionID: 0ee540419e11c6dfac512f4fec56, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/12/13 09:45:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:16 client <- Reading packet 2 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98cf4735ba05e12f5474, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:16 client Received first packet. Switching destination connection ID to: 98cf4735ba05e12f5474 2025/12/13 09:45:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:16 client newly acked packets (1): [0] 2025/12/13 09:45:16 client updated RTT: 33.954903ms (σ: 16.977451ms) 2025/12/13 09:45:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:17 client -> Sending packet 2 (1280 bytes) for connection 0ee540419e11c6dfac512f4fec56, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client -> Sending packet 3 (1280 bytes) for connection 0ee540419e11c6dfac512f4fec56, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:17 client <- Reading packet 3 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98cf4735ba05e12f5474, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:17 client -> Sending packet 4 (1280 bytes) for connection 0ee540419e11c6dfac512f4fec56, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:45:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:45:17 client -> Sending packet 5 (1280 bytes) for connection 0ee540419e11c6dfac512f4fec56, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/12/13 09:45:17 client -> Sending packet 6 (1280 bytes) for connection 0ee540419e11c6dfac512f4fec56, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 773 bytes. 2025/12/13 09:45:17 client <- Reading packet 5 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98cf4735ba05e12f5474, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 0 bytes. 2025/12/13 09:45:17 client <- Reading packet 2 (773 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98cf4735ba05e12f5474, PacketNumber: 2, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:45:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0ee540419e11c6dfac512f4fec56, InitialSourceConnectionID: 98cf4735ba05e12f5474, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:17 client -> Sending packet 0 (81 bytes) for connection 0ee540419e11c6dfac512f4fec56, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client Dropping Initial keys. 2025/12/13 09:45:17 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:17 client -> Sending packet 0 (60 bytes) for connection 0ee540419e11c6dfac512f4fec56, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 98cf4735ba05e12f5474, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 773 bytes. 2025/12/13 09:45:17 client Dropping initial packet (42 bytes) because we already dropped the keys. 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 0 bytes. 2025/12/13 09:45:17 client <- Reading packet 3 (773 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98cf4735ba05e12f5474, PacketNumber: 3, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:45:17 client -> Sending packet 1 (42 bytes) for connection 0ee540419e11c6dfac512f4fec56, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:45:17 client <- Reading packet 4 (39 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98cf4735ba05e12f5474, PacketNumber: 4, PacketNumberLen: 1, Length: 20, Version: v1} 2025/12/13 09:45:17 client <- &wire.PingFrame{} 2025/12/13 09:45:17 client -> Sending packet 2 (42 bytes) for connection 0ee540419e11c6dfac512f4fec56, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:45:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:17 client -> Sending packet 3 (76 bytes) for connection 0ee540419e11c6dfac512f4fec56, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client -> Sending packet 4 (76 bytes) for connection 0ee540419e11c6dfac512f4fec56, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.PingFrame{} 2025/12/13 09:45:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:17 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:17 client -> Sending packet 1 (37 bytes) for connection 0ee540419e11c6dfac512f4fec56, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 98cf4735ba05e12f5474, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 70.201µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:17 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:17 client -> Sending packet 5 (73 bytes) for connection 0ee540419e11c6dfac512f4fec56, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 98cf4735ba05e12f5474, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 22, Version: v1} 2025/12/13 09:45:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:17 client Short Header{DestConnectionID: 98cf4735ba05e12f5474, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:17 client Connection 0ee540419e11c6dfac512f4fec56 closed. 2025/12/13 09:45:17 Requesting https://server4:443/few-merry-sultan. 2025/12/13 09:45:17 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:17 Increased send buffer size to 14336 kiB 2025/12/13 09:45:17 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:17 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:17 Created qlog file: /logs/qlog/16a27dacf9bfddaed508ce6d09009bdff3.sqlog 2025/12/13 09:45:17 client Starting new connection to server4 ([::]:58096 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 16a27dacf9bfddaed508ce6d09009bdff3, version v1 2025/12/13 09:45:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:17 client -> Sending packet 0 (1280 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 16a27dacf9bfddaed508ce6d09009bdff3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:17 client -> Sending packet 1 (1280 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 16a27dacf9bfddaed508ce6d09009bdff3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1231, Data length: 285, Offset + Data length: 1516} 2025/12/13 09:45:17 client <- Reading packet 4 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 93c092d5b89b87ac2cd1, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:17 client Received first packet. Switching destination connection ID to: 93c092d5b89b87ac2cd1 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client newly acked packets (1): [0] 2025/12/13 09:45:17 client updated RTT: 33.224376ms (σ: 16.612188ms) 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:17 client <- Reading packet 5 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 93c092d5b89b87ac2cd1, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client newly acked packets (1): [1] 2025/12/13 09:45:17 client updated RTT: 33.554ms (σ: 13.119ms) 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:17 client -> Sending packet 2 (1280 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 93c092d5b89b87ac2cd1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/12/13 09:45:17 client <- Reading packet 0 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 93c092d5b89b87ac2cd1, PacketNumber: 0, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 16a27dacf9bfddaed508ce6d09009bdff3, InitialSourceConnectionID: 93c092d5b89b87ac2cd1, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:17 client -> Sending packet 0 (81 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 93c092d5b89b87ac2cd1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client Dropping Initial keys. 2025/12/13 09:45:17 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:17 client -> Sending packet 0 (54 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 93c092d5b89b87ac2cd1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 23, Offset + Data length: 23} 2025/12/13 09:45:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:17 client -> Sending packet 1 (76 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 93c092d5b89b87ac2cd1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client -> Sending packet 2 (76 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 93c092d5b89b87ac2cd1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:17 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 93c092d5b89b87ac2cd1, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:17 client Peer doesn't await address validation any longer. 2025/12/13 09:45:17 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 86.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:17 client newly acked packets (1): [0] 2025/12/13 09:45:17 client updated RTT: 41.792ms (σ: 26.316ms) 2025/12/13 09:45:17 client ECN capability confirmed. 2025/12/13 09:45:17 client Canceling loss detection timer. 2025/12/13 09:45:17 client Dropping Handshake keys. 2025/12/13 09:45:17 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 91a8de7ab21e5ecc9558, StatelessResetToken: 0x9bba6ac2a5669b390a6b8890d7c638ca} 2025/12/13 09:45:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2ded0e08e688b59176c3, StatelessResetToken: 0x838d4889613aa2772436e08a628ed5e5} 2025/12/13 09:45:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ab97c0ac3478e21e2dc9, StatelessResetToken: 0x67cbff7313d68fb5d1f4d964e7bfe1b1} 2025/12/13 09:45:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:17 client -> Sending packet 1 (39 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 91a8de7ab21e5ecc9558, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 231.09µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:17 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.PingFrame{} 2025/12/13 09:45:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:17 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:17 client -> Sending packet 2 (37 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 91a8de7ab21e5ecc9558, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 93.314µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:17 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:17 client -> Sending packet 3 (32 bytes) for connection 16a27dacf9bfddaed508ce6d09009bdff3, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 91a8de7ab21e5ecc9558, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:17 client Connection 16a27dacf9bfddaed508ce6d09009bdff3 closed. 2025/12/13 09:45:17 Requesting https://server4:443/massive-empty-belt. 2025/12/13 09:45:17 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:17 Increased send buffer size to 14336 kiB 2025/12/13 09:45:17 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:17 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:17 Created qlog file: /logs/qlog/3519aa27b82d746805e7f3a879fb.sqlog 2025/12/13 09:45:17 client Starting new connection to server4 ([::]:41201 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3519aa27b82d746805e7f3a879fb, version v1 2025/12/13 09:45:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:17 client -> Sending packet 0 (1280 bytes) for connection 3519aa27b82d746805e7f3a879fb, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 3519aa27b82d746805e7f3a879fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:17 client -> Sending packet 1 (1280 bytes) for connection 3519aa27b82d746805e7f3a879fb, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 3519aa27b82d746805e7f3a879fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1234, Data length: 284, Offset + Data length: 1518} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client <- Reading packet 30 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bd89dc047bbac431574a, Token: (empty), PacketNumber: 30, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:17 client Received first packet. Switching destination connection ID to: bd89dc047bbac431574a 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client newly acked packets (1): [0] 2025/12/13 09:45:17 client updated RTT: 32.95249ms (σ: 16.476245ms) 2025/12/13 09:45:17 client Queueing packet (773 bytes) for later decryption 2025/12/13 09:45:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:17 client -> Sending packet 2 (1280 bytes) for connection 3519aa27b82d746805e7f3a879fb, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: bd89dc047bbac431574a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1234, Data length: 284, Offset + Data length: 1518} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client -> Sending packet 3 (1280 bytes) for connection 3519aa27b82d746805e7f3a879fb, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: bd89dc047bbac431574a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1234, Data length: 284, Offset + Data length: 1518} 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:17 client <- Reading packet 32 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bd89dc047bbac431574a, Token: (empty), PacketNumber: 32, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:17 client -> Sending packet 4 (1280 bytes) for connection 3519aa27b82d746805e7f3a879fb, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: bd89dc047bbac431574a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 32, LowestAcked: 30, AckRanges: {{Largest: 32, Smallest: 32}, {Largest: 30, Smallest: 30}}, DelayTime: 0s} 2025/12/13 09:45:17 client <- Reading packet 0 (773 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bd89dc047bbac431574a, PacketNumber: 0, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:45:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3519aa27b82d746805e7f3a879fb, InitialSourceConnectionID: bd89dc047bbac431574a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:17 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:17 client <- Reading packet 1 (773 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bd89dc047bbac431574a, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/12/13 09:45:17 client -> Sending packet 0 (81 bytes) for connection 3519aa27b82d746805e7f3a879fb, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: bd89dc047bbac431574a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client Dropping Initial keys. 2025/12/13 09:45:17 client -> Sending packet 0 (56 bytes) for connection 3519aa27b82d746805e7f3a879fb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: bd89dc047bbac431574a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 09:45:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:17 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bd89dc047bbac431574a, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client Peer doesn't await address validation any longer. 2025/12/13 09:45:17 client newly acked packets (1): [0] 2025/12/13 09:45:17 client updated RTT: 32.929ms (σ: 12.402ms) 2025/12/13 09:45:17 client Canceling loss detection timer. 2025/12/13 09:45:17 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:17 client Dropping Handshake keys. 2025/12/13 09:45:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6d619bafade8cba86ed3, StatelessResetToken: 0x9d5123d4d9470327f34b85d93f905b55} 2025/12/13 09:45:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c4410cc07f5ff70381c, StatelessResetToken: 0x157beaa62d70f0857ae5ce11d71aedec} 2025/12/13 09:45:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 447f1b4633d63f5404d8, StatelessResetToken: 0x750885e2f34a950facb029c3bd71a837} 2025/12/13 09:45:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:17 client -> Sending packet 1 (39 bytes) for connection 3519aa27b82d746805e7f3a879fb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 6d619bafade8cba86ed3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144.91µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:17 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.PingFrame{} 2025/12/13 09:45:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:17 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:17 client -> Sending packet 2 (37 bytes) for connection 3519aa27b82d746805e7f3a879fb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 6d619bafade8cba86ed3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 83.255µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:17 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:17 client -> Sending packet 3 (32 bytes) for connection 3519aa27b82d746805e7f3a879fb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 6d619bafade8cba86ed3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:17 client Connection 3519aa27b82d746805e7f3a879fb closed. 2025/12/13 09:45:17 Requesting https://server4:443/tropical-unlimited-pikachu. 2025/12/13 09:45:17 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:17 Increased send buffer size to 14336 kiB 2025/12/13 09:45:17 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:17 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:17 Created qlog file: /logs/qlog/6ebc46dd6d0eaea526.sqlog 2025/12/13 09:45:17 client Starting new connection to server4 ([::]:54507 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6ebc46dd6d0eaea526, version v1 2025/12/13 09:45:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:17 client -> Sending packet 0 (1280 bytes) for connection 6ebc46dd6d0eaea526, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 6ebc46dd6d0eaea526, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:17 client -> Sending packet 1 (1280 bytes) for connection 6ebc46dd6d0eaea526, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 6ebc46dd6d0eaea526, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client <- Reading packet 749 (43 bytes) for connection (empty), Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 04e0852a9095b890407a, Token: (empty), PacketNumber: 749, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:17 client Received first packet. Switching destination connection ID to: 04e0852a9095b890407a 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client newly acked packets (1): [0] 2025/12/13 09:45:17 client updated RTT: 32.908423ms (σ: 16.454211ms) 2025/12/13 09:45:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:17 client -> Sending packet 2 (1280 bytes) for connection 6ebc46dd6d0eaea526, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 04e0852a9095b890407a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client -> Sending packet 3 (1280 bytes) for connection 6ebc46dd6d0eaea526, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 04e0852a9095b890407a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:17 client Parsed a coalesced packet. Part 1: 1227 bytes. Remaining: 5 bytes. 2025/12/13 09:45:17 client <- Reading packet 750 (1227 bytes) for connection (empty), Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 04e0852a9095b890407a, Token: (empty), PacketNumber: 750, PacketNumberLen: 2, Length: 1207, Version: v1} 2025/12/13 09:45:17 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:17 client newly acked packets (1): [3] 2025/12/13 09:45:17 client updated RTT: 33.262ms (σ: 13.049ms) 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Queueing packet (5 bytes) for later decryption 2025/12/13 09:45:17 client -> Sending packet 4 (1280 bytes) for connection 6ebc46dd6d0eaea526, Initial 2025/12/13 09:45:17 client Long Header{Type: Initial, DestConnectionID: 04e0852a9095b890407a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 750, LowestAcked: 749, DelayTime: 0s} 2025/12/13 09:45:17 client <- Reading packet 0 (768 bytes) for connection (empty), Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 04e0852a9095b890407a, PacketNumber: 0, PacketNumberLen: 1, Length: 749, Version: v1} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/12/13 09:45:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6ebc46dd6d0eaea526, InitialSourceConnectionID: 04e0852a9095b890407a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:17 client -> Sending packet 0 (81 bytes) for connection 6ebc46dd6d0eaea526, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 04e0852a9095b890407a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client Dropping Initial keys. 2025/12/13 09:45:17 client Dropping 1RTT packet (5 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 4 2025/12/13 09:45:17 client -> Sending packet 0 (64 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 04e0852a9095b890407a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 09:45:17 client <- Reading packet 2 (372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/12/13 09:45:17 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100881508772df0685cf9ba62349b4baa18fc1ab88ca964b6a3b227ef0e4616ab8f860fb93e} 2025/12/13 09:45:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:17 client Sending ACK because the ACK timer expired. 2025/12/13 09:45:17 client -> Sending packet 1 (38 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:17 client Short Header{DestConnectionID: 04e0852a9095b890407a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 25.242776ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:17 client -> Sending packet 1 (76 bytes) for connection 6ebc46dd6d0eaea526, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 04e0852a9095b890407a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 client -> Sending packet 2 (76 bytes) for connection 6ebc46dd6d0eaea526, Handshake 2025/12/13 09:45:17 client Long Header{Type: Handshake, DestConnectionID: 04e0852a9095b890407a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:18 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.PingFrame{} 2025/12/13 09:45:18 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:18 client -> Sending packet 2 (39 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 04e0852a9095b890407a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 88.695µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client <- Reading packet 5 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.PingFrame{} 2025/12/13 09:45:18 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:18 client Dropping Handshake keys. 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5ed18d220e6b2d858edd, StatelessResetToken: 0xbb98f70cf6412b3005c357c45e15aeaa} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4c85443ecc7fe0e7fdf4, StatelessResetToken: 0x758921bcc75d6ce5fee719583a8c2510} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1033a808c958e906b4d6, StatelessResetToken: 0x88c19665fccc3331c1602ec855f40895} 2025/12/13 09:45:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:18 client -> Sending packet 4 (76 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 1033a808c958e906b4d6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 138.638µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 09:45:18 client -> Sending packet 5 (66 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 1033a808c958e906b4d6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 09:45:18 client <- Reading packet 6 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1033a808c958e906b4d6, StatelessResetToken: 0x88c19665fccc3331c1602ec855f40895} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4c85443ecc7fe0e7fdf4, StatelessResetToken: 0x758921bcc75d6ce5fee719583a8c2510} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5ed18d220e6b2d858edd, StatelessResetToken: 0xbb98f70cf6412b3005c357c45e15aeaa} 2025/12/13 09:45:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:18 client <- Reading packet 7 (58 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client newly acked packets (1): [5] 2025/12/13 09:45:18 client updated RTT: 32.981ms (σ: 10.347ms) 2025/12/13 09:45:18 client ECN capability confirmed. 2025/12/13 09:45:18 client Canceling loss detection timer. 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 14e77ea332e9d2b82475, StatelessResetToken: 0xe628c110295cc85d25f1289de5285464} 2025/12/13 09:45:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:18 client -> Sending packet 6 (39 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 1033a808c958e906b4d6, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 115.796µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client <- Reading packet 9 (1372 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.PingFrame{} 2025/12/13 09:45:18 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:18 client -> Sending packet 7 (41 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 1033a808c958e906b4d6, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 80.51µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.PingFrame{} 2025/12/13 09:45:18 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:18 client -> Sending packet 8 (43 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 1033a808c958e906b4d6, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 52.077µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client <- Reading packet 12 (1046 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:18 client -> Sending packet 9 (1366 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 1033a808c958e906b4d6, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.PingFrame{} 2025/12/13 09:45:18 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:18 client -> Sending packet 10 (32 bytes) for connection 6ebc46dd6d0eaea526, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 1033a808c958e906b4d6, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:18 client Connection 6ebc46dd6d0eaea526 closed. 2025/12/13 09:45:18 Requesting https://server4:443/cyan-lonely-porcupine. 2025/12/13 09:45:18 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:18 Increased send buffer size to 14336 kiB 2025/12/13 09:45:18 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:18 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:18 Created qlog file: /logs/qlog/0d4b2446715caa95e04c1b90d87f622a.sqlog 2025/12/13 09:45:18 client Starting new connection to server4 ([::]:56417 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0d4b2446715caa95e04c1b90d87f622a, version v1 2025/12/13 09:45:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:18 client -> Sending packet 0 (1280 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: 0d4b2446715caa95e04c1b90d87f622a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 09:45:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 09:45:18 client -> Sending packet 1 (1280 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: 0d4b2446715caa95e04c1b90d87f622a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 09:45:18 client -> &wire.CryptoFrame{Offset: 1232, Data length: 276, Offset + Data length: 1508} 2025/12/13 09:45:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:18 client <- Reading packet 28 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a9e3e5f7a03caebafeb, Token: (empty), PacketNumber: 28, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:18 client Received first packet. Switching destination connection ID to: 2a9e3e5f7a03caebafeb 2025/12/13 09:45:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:18 client newly acked packets (1): [1] 2025/12/13 09:45:18 client updated RTT: 34.233695ms (σ: 17.116847ms) 2025/12/13 09:45:18 client setting loss timer for packet 0 (Initial) to 38.512906ms (in %!s(monotime.Time=3629773911291)) 2025/12/13 09:45:18 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3629773911291) 2025/12/13 09:45:18 client lost packet 0 (time threshold) 2025/12/13 09:45:18 client -> Sending packet 2 (1280 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: 2a9e3e5f7a03caebafeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 09:45:18 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:18 client <- Reading packet 29 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a9e3e5f7a03caebafeb, Token: (empty), PacketNumber: 29, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:18 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:18 client newly acked packets (1): [2] 2025/12/13 09:45:18 client updated RTT: 34.287ms (σ: 12.946ms) 2025/12/13 09:45:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:18 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:18 client -> Sending packet 3 (1280 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: 2a9e3e5f7a03caebafeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 29, LowestAcked: 28, DelayTime: 0s} 2025/12/13 09:45:18 client -> Sending packet 4 (1280 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: 2a9e3e5f7a03caebafeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:18 client -> &wire.PingFrame{} 2025/12/13 09:45:18 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:18 client <- Reading packet 30 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a9e3e5f7a03caebafeb, Token: (empty), PacketNumber: 30, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:18 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/12/13 09:45:18 client newly acked packets (1): [4] 2025/12/13 09:45:18 client updated RTT: 34.113ms (σ: 10.057ms) 2025/12/13 09:45:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:18 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:18 client -> Sending packet 5 (1280 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, Initial 2025/12/13 09:45:18 client Long Header{Type: Initial, DestConnectionID: 2a9e3e5f7a03caebafeb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 30, LowestAcked: 28, DelayTime: 0s} 2025/12/13 09:45:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:18 client <- Reading packet 1 (775 bytes) for connection (empty), Handshake 2025/12/13 09:45:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a9e3e5f7a03caebafeb, PacketNumber: 1, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:45:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0d4b2446715caa95e04c1b90d87f622a, InitialSourceConnectionID: 2a9e3e5f7a03caebafeb, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:18 client -> Sending packet 0 (81 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, Handshake 2025/12/13 09:45:18 client Long Header{Type: Handshake, DestConnectionID: 2a9e3e5f7a03caebafeb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:18 client Dropping Initial keys. 2025/12/13 09:45:18 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:18 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:18 client -> Sending packet 0 (59 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 2a9e3e5f7a03caebafeb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 09:45:18 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:18 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a9e3e5f7a03caebafeb, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:18 client Peer doesn't await address validation any longer. 2025/12/13 09:45:18 client newly acked packets (1): [0] 2025/12/13 09:45:18 client updated RTT: 33.901ms (σ: 7.965ms) 2025/12/13 09:45:18 client Canceling loss detection timer. 2025/12/13 09:45:18 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:18 client Dropping Handshake keys. 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0fb554017e8659ad6af0, StatelessResetToken: 0xcdc350c37015c87be07f3e36f1af8e49} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5e4310ea5e5a083dae6a, StatelessResetToken: 0xc830773ca15e46e3c411235f0716f899} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2c6f2fbb28ff8a088fc1, StatelessResetToken: 0x9d286f793e915f5bf2777ca192dc700f} 2025/12/13 09:45:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:18 client -> Sending packet 1 (39 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 0fb554017e8659ad6af0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 199.481µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:18 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.PingFrame{} 2025/12/13 09:45:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:18 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/12/13 09:45:18 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010011887d0a17f1fb732f78b2c84ccc0b460f1eca8b5a32cf7f24e0bf26a099d0e2fc251232} 2025/12/13 09:45:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:18 client -> Sending packet 2 (39 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 0fb554017e8659ad6af0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 65.602µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.864ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client newly acked packets (1): [0] 2025/12/13 09:45:18 client updated RTT: 33.846ms (σ: 6.082ms) 2025/12/13 09:45:18 client ECN capability confirmed. 2025/12/13 09:45:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 09:45:18 client -> Sending packet 4 (31 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 0fb554017e8659ad6af0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:18 client -> Sending packet 5 (31 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 0fb554017e8659ad6af0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:18 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 21.44ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client newly acked packets (1): [5] 2025/12/13 09:45:18 client updated RTT: 33.758ms (σ: 4.736ms) 2025/12/13 09:45:18 client Canceling loss detection timer. 2025/12/13 09:45:18 client <- Reading packet 7 (109 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2c6f2fbb28ff8a088fc1, StatelessResetToken: 0x9d286f793e915f5bf2777ca192dc700f} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5e4310ea5e5a083dae6a, StatelessResetToken: 0xc830773ca15e46e3c411235f0716f899} 2025/12/13 09:45:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0fb554017e8659ad6af0, StatelessResetToken: 0xcdc350c37015c87be07f3e36f1af8e49} 2025/12/13 09:45:18 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:18 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.PingFrame{} 2025/12/13 09:45:18 client -> Sending packet 6 (1366 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 0fb554017e8659ad6af0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.PingFrame{} 2025/12/13 09:45:18 client -> Sending packet 7 (41 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:18 client Short Header{DestConnectionID: 0fb554017e8659ad6af0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:18 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 105.864µs, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client <- Reading packet 9 (28 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:18 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:18 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 09:45:18 client newly acked packets (1): [6] 2025/12/13 09:45:18 client updated RTT: 33.527ms (σ: 4.012ms) 2025/12/13 09:45:19 client <- Reading packet 10 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0fb554017e8659ad6af0, StatelessResetToken: 0xcdc350c37015c87be07f3e36f1af8e49} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5e4310ea5e5a083dae6a, StatelessResetToken: 0xc830773ca15e46e3c411235f0716f899} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2c6f2fbb28ff8a088fc1, StatelessResetToken: 0x9d286f793e915f5bf2777ca192dc700f} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 32f7993f32317f7a48ec, StatelessResetToken: 0x446815915bc1009f68dd14555c41cf16} 2025/12/13 09:45:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 62, Offset + Data length: 62} 2025/12/13 09:45:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:19 client -> Sending packet 8 (1409 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 0fb554017e8659ad6af0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.PingFrame{} 2025/12/13 09:45:19 client <- Reading packet 11 (326 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 62, Data length: 259, Offset + Data length: 321} 2025/12/13 09:45:19 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010011887d0a17f1fb732f78b2c84ccc0b460f1eca8b5a32cf7f24e0bf26a099d0e2fc251232} 2025/12/13 09:45:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:19 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:19 client -> Sending packet 9 (32 bytes) for connection 0d4b2446715caa95e04c1b90d87f622a, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 0fb554017e8659ad6af0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:19 client Connection 0d4b2446715caa95e04c1b90d87f622a closed. 2025/12/13 09:45:19 Requesting https://server4:443/thick-shy-wallet. 2025/12/13 09:45:19 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:19 Increased send buffer size to 14336 kiB 2025/12/13 09:45:19 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:19 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:19 Created qlog file: /logs/qlog/83ff2100159897630e6a395d6f58e840.sqlog 2025/12/13 09:45:19 client Starting new connection to server4 ([::]:45958 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 83ff2100159897630e6a395d6f58e840, version v1 2025/12/13 09:45:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:19 client -> Sending packet 0 (1280 bytes) for connection 83ff2100159897630e6a395d6f58e840, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 83ff2100159897630e6a395d6f58e840, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 09:45:19 client -> Sending packet 1 (1280 bytes) for connection 83ff2100159897630e6a395d6f58e840, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 83ff2100159897630e6a395d6f58e840, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:19 client <- Reading packet 19 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d875e968c603965c99d, Token: (empty), PacketNumber: 19, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:19 client Received first packet. Switching destination connection ID to: 8d875e968c603965c99d 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client newly acked packets (2): [0 1] 2025/12/13 09:45:19 client updated RTT: 36.525382ms (σ: 18.262691ms) 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:19 client -> Sending packet 2 (1280 bytes) for connection 83ff2100159897630e6a395d6f58e840, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 8d875e968c603965c99d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 19, DelayTime: 0s} 2025/12/13 09:45:19 client <- Reading packet 20 (43 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d875e968c603965c99d, Token: (empty), PacketNumber: 20, PacketNumberLen: 1, Length: 23, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 3.424ms} 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1188 bytes. 2025/12/13 09:45:19 client <- Reading packet 21 (44 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d875e968c603965c99d, Token: (empty), PacketNumber: 21, PacketNumberLen: 1, Length: 24, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 71.016ms} 2025/12/13 09:45:19 client <- &wire.PingFrame{} 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 413 bytes. 2025/12/13 09:45:19 client <- Reading packet 1 (775 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d875e968c603965c99d, PacketNumber: 1, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 83ff2100159897630e6a395d6f58e840, InitialSourceConnectionID: 8d875e968c603965c99d, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:19 client Dropping 1RTT packet (413 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/12/13 09:45:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 83ff2100159897630e6a395d6f58e840 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 8d875e968c603965c99d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1179, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 19, DelayTime: 0s} 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 8d875e968c603965c99d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client Dropping Initial keys. 2025/12/13 09:45:19 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:19 client -> Sending packet 0 (54 bytes) for connection 83ff2100159897630e6a395d6f58e840, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 8d875e968c603965c99d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 23, Offset + Data length: 23} 2025/12/13 09:45:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:19 client -> Sending packet 1 (76 bytes) for connection 83ff2100159897630e6a395d6f58e840, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 8d875e968c603965c99d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client -> Sending packet 2 (76 bytes) for connection 83ff2100159897630e6a395d6f58e840, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 8d875e968c603965c99d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 780 bytes. Remaining: 552 bytes. 2025/12/13 09:45:19 client <- Reading packet 2 (780 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d875e968c603965c99d, PacketNumber: 2, PacketNumberLen: 1, Length: 761, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:19 client Peer doesn't await address validation any longer. 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:19 client <- Reading packet 0 (552 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.744ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client newly acked packets (1): [0] 2025/12/13 09:45:19 client updated RTT: 47.354ms (σ: 35.355ms) 2025/12/13 09:45:19 client ECN capability confirmed. 2025/12/13 09:45:19 client Canceling loss detection timer. 2025/12/13 09:45:19 client Dropping Handshake keys. 2025/12/13 09:45:19 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40f22741f077f74e4f9b, StatelessResetToken: 0x197961d60602ac0ba7d4eae79877d0af} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5f797b4612bc06fabf, StatelessResetToken: 0x2edb53ad202073a4897d7c27677c6946} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 95b93189b0328eed5dd3, StatelessResetToken: 0x459a8c1bfb69155d7c06c5e9d523dc77} 2025/12/13 09:45:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:19 client -> Sending packet 1 (39 bytes) for connection 83ff2100159897630e6a395d6f58e840, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 40f22741f077f74e4f9b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 178.763µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:19 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.PingFrame{} 2025/12/13 09:45:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:19 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:19 client -> Sending packet 2 (37 bytes) for connection 83ff2100159897630e6a395d6f58e840, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 40f22741f077f74e4f9b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 67.877µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:19 client -> Sending packet 3 (32 bytes) for connection 83ff2100159897630e6a395d6f58e840, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 40f22741f077f74e4f9b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:19 client Connection 83ff2100159897630e6a395d6f58e840 closed. 2025/12/13 09:45:19 Requesting https://server4:443/calm-sharp-squirtle. 2025/12/13 09:45:19 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:19 Increased send buffer size to 14336 kiB 2025/12/13 09:45:19 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:19 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:19 Created qlog file: /logs/qlog/759e4f1445979dfdf97118.sqlog 2025/12/13 09:45:19 client Starting new connection to server4 ([::]:59225 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 759e4f1445979dfdf97118, version v1 2025/12/13 09:45:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:19 client -> Sending packet 0 (1280 bytes) for connection 759e4f1445979dfdf97118, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 759e4f1445979dfdf97118, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:19 client -> Sending packet 1 (1280 bytes) for connection 759e4f1445979dfdf97118, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 759e4f1445979dfdf97118, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 1237, Data length: 271, Offset + Data length: 1508} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:19 client <- Reading packet 18 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 96f6c341613fca5bb658, Token: (empty), PacketNumber: 18, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:19 client Received first packet. Switching destination connection ID to: 96f6c341613fca5bb658 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client newly acked packets (1): [0] 2025/12/13 09:45:19 client updated RTT: 33.067482ms (σ: 16.533741ms) 2025/12/13 09:45:19 client Queueing packet (770 bytes) for later decryption 2025/12/13 09:45:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:19 client -> Sending packet 2 (1280 bytes) for connection 759e4f1445979dfdf97118, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 96f6c341613fca5bb658, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 1237, Data length: 271, Offset + Data length: 1508} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:19 client -> Sending packet 3 (1280 bytes) for connection 759e4f1445979dfdf97118, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 96f6c341613fca5bb658, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 1237, Data length: 271, Offset + Data length: 1508} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 1226 bytes. Remaining: 6 bytes. 2025/12/13 09:45:19 client <- Reading packet 20 (1226 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 96f6c341613fca5bb658, Token: (empty), PacketNumber: 20, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/12/13 09:45:19 client newly acked packets (1): [3] 2025/12/13 09:45:19 client updated RTT: 33.189ms (σ: 12.644ms) 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Queueing packet (6 bytes) for later decryption 2025/12/13 09:45:19 client -> Sending packet 4 (1280 bytes) for connection 759e4f1445979dfdf97118, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 96f6c341613fca5bb658, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 18, AckRanges: {{Largest: 20, Smallest: 20}, {Largest: 18, Smallest: 18}}, DelayTime: 0s} 2025/12/13 09:45:19 client <- Reading packet 0 (770 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 96f6c341613fca5bb658, PacketNumber: 0, PacketNumberLen: 1, Length: 751, Version: v1} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/12/13 09:45:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 759e4f1445979dfdf97118, InitialSourceConnectionID: 96f6c341613fca5bb658, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:19 client Dropping 1RTT packet (6 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 5 2025/12/13 09:45:19 client -> Sending packet 0 (81 bytes) for connection 759e4f1445979dfdf97118, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 96f6c341613fca5bb658, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client Dropping Initial keys. 2025/12/13 09:45:19 client -> Sending packet 0 (57 bytes) for connection 759e4f1445979dfdf97118, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 96f6c341613fca5bb658, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:19 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 96f6c341613fca5bb658, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client Peer doesn't await address validation any longer. 2025/12/13 09:45:19 client newly acked packets (1): [0] 2025/12/13 09:45:19 client updated RTT: 33.191ms (σ: 9.487ms) 2025/12/13 09:45:19 client Canceling loss detection timer. 2025/12/13 09:45:19 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:19 client Dropping Handshake keys. 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dbfb1614d549a083f844, StatelessResetToken: 0x350b1bdba5bfd096970fe27bc79fcaf1} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 06e6c453a8faf2217c7d, StatelessResetToken: 0xf23fdc44760103a556aaaf9703c2dd91} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b949fa33c02a4111c44a, StatelessResetToken: 0x97eef71402dea36da29b7517ecd1e69b} 2025/12/13 09:45:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:19 client -> Sending packet 1 (39 bytes) for connection 759e4f1445979dfdf97118, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: dbfb1614d549a083f844, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 163.374µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:19 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.PingFrame{} 2025/12/13 09:45:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:19 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:19 client -> Sending packet 2 (37 bytes) for connection 759e4f1445979dfdf97118, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: dbfb1614d549a083f844, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 91.58µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:19 client -> Sending packet 3 (32 bytes) for connection 759e4f1445979dfdf97118, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: dbfb1614d549a083f844, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:19 client Connection 759e4f1445979dfdf97118 closed. 2025/12/13 09:45:19 Requesting https://server4:443/dry-maroon-articuno. 2025/12/13 09:45:19 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:19 Increased send buffer size to 14336 kiB 2025/12/13 09:45:19 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:19 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:19 Created qlog file: /logs/qlog/783e8053ae71b99ce558deb8f08fcdf3f69b8f.sqlog 2025/12/13 09:45:19 client Starting new connection to server4 ([::]:46904 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 783e8053ae71b99ce558deb8f08fcdf3f69b8f, version v1 2025/12/13 09:45:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:19 client -> Sending packet 0 (1280 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 783e8053ae71b99ce558deb8f08fcdf3f69b8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:19 client -> Sending packet 1 (1280 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 783e8053ae71b99ce558deb8f08fcdf3f69b8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:19 client <- Reading packet 164 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35a43385cbb362bcbf27, Token: (empty), PacketNumber: 164, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:19 client Received first packet. Switching destination connection ID to: 35a43385cbb362bcbf27 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client newly acked packets (1): [0] 2025/12/13 09:45:19 client updated RTT: 33.116919ms (σ: 16.558459ms) 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:19 client <- Reading packet 165 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35a43385cbb362bcbf27, Token: (empty), PacketNumber: 165, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client newly acked packets (1): [1] 2025/12/13 09:45:19 client updated RTT: 33.497ms (σ: 13.181ms) 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:19 client -> Sending packet 2 (1280 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 35a43385cbb362bcbf27, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 165, LowestAcked: 164, DelayTime: 0s} 2025/12/13 09:45:19 client <- Reading packet 0 (779 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35a43385cbb362bcbf27, PacketNumber: 0, PacketNumberLen: 1, Length: 760, Version: v1} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/12/13 09:45:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 783e8053ae71b99ce558deb8f08fcdf3f69b8f, InitialSourceConnectionID: 35a43385cbb362bcbf27, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:19 client -> Sending packet 0 (81 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 35a43385cbb362bcbf27, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client Dropping Initial keys. 2025/12/13 09:45:19 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:19 client -> Sending packet 0 (57 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 35a43385cbb362bcbf27, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 09:45:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:19 client -> Sending packet 1 (76 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 35a43385cbb362bcbf27, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client -> Sending packet 2 (76 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 35a43385cbb362bcbf27, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:19 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35a43385cbb362bcbf27, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 09:45:19 client Peer doesn't await address validation any longer. 2025/12/13 09:45:19 client newly acked packets (1): [2] 2025/12/13 09:45:19 client updated RTT: 33.388ms (σ: 10.101ms) 2025/12/13 09:45:19 client Canceling loss detection timer. 2025/12/13 09:45:19 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 85.936ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client newly acked packets (1): [0] 2025/12/13 09:45:19 client updated RTT: 41.57ms (σ: 23.94ms) 2025/12/13 09:45:19 client ECN capability confirmed. 2025/12/13 09:45:19 client Dropping Handshake keys. 2025/12/13 09:45:19 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0f30ef9cc0a6475b48ab, StatelessResetToken: 0x4fa6ed462bff864843ed1d734d3f0768} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 430ebfb15580492b890f, StatelessResetToken: 0xa57fc52d2ddd165abcbb72f37c451c98} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 661b2d9e3b089274830e, StatelessResetToken: 0x9263a3859bb940fd64f6aec4ec1d3e3d} 2025/12/13 09:45:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:19 client -> Sending packet 1 (39 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 0f30ef9cc0a6475b48ab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 195.504µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:19 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.PingFrame{} 2025/12/13 09:45:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:19 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:19 client -> Sending packet 2 (37 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 0f30ef9cc0a6475b48ab, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 87.964µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:19 client -> Sending packet 3 (32 bytes) for connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 0f30ef9cc0a6475b48ab, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:19 client Connection 783e8053ae71b99ce558deb8f08fcdf3f69b8f closed. 2025/12/13 09:45:19 Requesting https://server4:443/overjoyed-dull-speaker. 2025/12/13 09:45:19 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:19 Increased send buffer size to 14336 kiB 2025/12/13 09:45:19 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:19 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:19 Created qlog file: /logs/qlog/f8a1ff9589f7b0e0c37525d363071411f2.sqlog 2025/12/13 09:45:19 client Starting new connection to server4 ([::]:35150 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f8a1ff9589f7b0e0c37525d363071411f2, version v1 2025/12/13 09:45:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:19 client -> Sending packet 0 (1280 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: f8a1ff9589f7b0e0c37525d363071411f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:19 client -> Sending packet 1 (1280 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: f8a1ff9589f7b0e0c37525d363071411f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/12/13 09:45:19 client <- Reading packet 21 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3340c9421ddf714277b2, Token: (empty), PacketNumber: 21, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:19 client Received first packet. Switching destination connection ID to: 3340c9421ddf714277b2 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client newly acked packets (1): [0] 2025/12/13 09:45:19 client updated RTT: 32.879857ms (σ: 16.439928ms) 2025/12/13 09:45:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:19 client -> Sending packet 2 (1280 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 3340c9421ddf714277b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/12/13 09:45:19 client -> Sending packet 3 (1280 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 3340c9421ddf714277b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/12/13 09:45:19 client Queueing packet (776 bytes) for later decryption 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:19 client <- Reading packet 24 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3340c9421ddf714277b2, Token: (empty), PacketNumber: 24, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:19 client newly acked packets (1): [3] 2025/12/13 09:45:19 client updated RTT: 33.112ms (σ: 12.795ms) 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:19 client -> Sending packet 4 (1280 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Initial 2025/12/13 09:45:19 client Long Header{Type: Initial, DestConnectionID: 3340c9421ddf714277b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 24, LowestAcked: 21, AckRanges: {{Largest: 24, Smallest: 24}, {Largest: 21, Smallest: 21}}, DelayTime: 0s} 2025/12/13 09:45:19 client <- Reading packet 1 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3340c9421ddf714277b2, PacketNumber: 1, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f8a1ff9589f7b0e0c37525d363071411f2, InitialSourceConnectionID: 3340c9421ddf714277b2, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:19 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:19 client -> Sending packet 0 (81 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 3340c9421ddf714277b2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client Dropping Initial keys. 2025/12/13 09:45:19 client -> Sending packet 0 (60 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 3340c9421ddf714277b2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:19 client <- Reading packet 2 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3340c9421ddf714277b2, PacketNumber: 2, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:19 client -> Sending packet 1 (42 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 3340c9421ddf714277b2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:19 client -> Sending packet 2 (76 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 3340c9421ddf714277b2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 client -> Sending packet 3 (76 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: 3340c9421ddf714277b2, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:19 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:19 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3340c9421ddf714277b2, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:19 client Peer doesn't await address validation any longer. 2025/12/13 09:45:19 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.376ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client newly acked packets (1): [0] 2025/12/13 09:45:19 client updated RTT: 41.186ms (σ: 25.746ms) 2025/12/13 09:45:19 client ECN capability confirmed. 2025/12/13 09:45:19 client Canceling loss detection timer. 2025/12/13 09:45:19 client Dropping Handshake keys. 2025/12/13 09:45:19 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f807083f7d159b54448, StatelessResetToken: 0x9d2b7c10a6c230954f3b41b37620e9c6} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 743e46596cbe9f7dfefc, StatelessResetToken: 0x7da666fd9ebbfc80991987dd8f268e55} 2025/12/13 09:45:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 390588743d726d34f208, StatelessResetToken: 0xf271b3f075d137b2683c1162f2c7979d} 2025/12/13 09:45:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:19 client -> Sending packet 1 (39 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:19 client Short Header{DestConnectionID: 3f807083f7d159b54448, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 180.316µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:20 client <- Reading packet 4 (48 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6f5e4c49ee0aa6e169c4, StatelessResetToken: 0x1dc4d90efbe45eee59134b9e9f3c86e0} 2025/12/13 09:45:20 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:20 client -> Sending packet 2 (39 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: 3f807083f7d159b54448, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 88.415µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 09:45:20 client <- Reading packet 6 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.PingFrame{} 2025/12/13 09:45:20 client Queuing ACK because there's a new missing packet to report. 2025/12/13 09:45:20 client -> Sending packet 3 (41 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: 3f807083f7d159b54448, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 91.089µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:20 client <- Reading packet 7 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:20 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:20 client -> Sending packet 4 (32 bytes) for connection f8a1ff9589f7b0e0c37525d363071411f2, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: 3f807083f7d159b54448, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:20 client Connection f8a1ff9589f7b0e0c37525d363071411f2 closed. 2025/12/13 09:45:20 Requesting https://server4:443/frozen-euphoric-hunter. 2025/12/13 09:45:20 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:20 Increased send buffer size to 14336 kiB 2025/12/13 09:45:20 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:20 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:20 Created qlog file: /logs/qlog/cdefa3865677944c82c434c19906cb9a91.sqlog 2025/12/13 09:45:20 client Starting new connection to server4 ([::]:55129 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cdefa3865677944c82c434c19906cb9a91, version v1 2025/12/13 09:45:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:20 client -> Sending packet 0 (1280 bytes) for connection cdefa3865677944c82c434c19906cb9a91, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: cdefa3865677944c82c434c19906cb9a91, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:20 client -> Sending packet 1 (1280 bytes) for connection cdefa3865677944c82c434c19906cb9a91, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: cdefa3865677944c82c434c19906cb9a91, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:20 client <- Reading packet 2 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ca87f92dcfdeb3acb110, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:20 client Received first packet. Switching destination connection ID to: ca87f92dcfdeb3acb110 2025/12/13 09:45:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:20 client newly acked packets (1): [0] 2025/12/13 09:45:20 client updated RTT: 32.863421ms (σ: 16.43171ms) 2025/12/13 09:45:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 09:45:20 client -> Sending packet 2 (1280 bytes) for connection cdefa3865677944c82c434c19906cb9a91, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: ca87f92dcfdeb3acb110, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:20 client -> Sending packet 3 (1280 bytes) for connection cdefa3865677944c82c434c19906cb9a91, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: ca87f92dcfdeb3acb110, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/12/13 09:45:20 client Queueing packet (776 bytes) for later decryption 2025/12/13 09:45:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 09:45:20 client -> Sending packet 4 (1280 bytes) for connection cdefa3865677944c82c434c19906cb9a91, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: ca87f92dcfdeb3acb110, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/12/13 09:45:20 client -> Sending packet 5 (1280 bytes) for connection cdefa3865677944c82c434c19906cb9a91, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: ca87f92dcfdeb3acb110, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 09:45:20 client Parsed a coalesced packet. Part 1: 1229 bytes. Remaining: 3 bytes. 2025/12/13 09:45:20 client <- Reading packet 4 (1229 bytes) for connection (empty), Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ca87f92dcfdeb3acb110, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1209, Version: v1} 2025/12/13 09:45:20 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 301.296ms} 2025/12/13 09:45:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:20 client Queueing packet (3 bytes) for later decryption 2025/12/13 09:45:20 client -> Sending packet 6 (1280 bytes) for connection cdefa3865677944c82c434c19906cb9a91, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: ca87f92dcfdeb3acb110, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/12/13 09:45:20 client <- Reading packet 0 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ca87f92dcfdeb3acb110, PacketNumber: 0, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cdefa3865677944c82c434c19906cb9a91, InitialSourceConnectionID: ca87f92dcfdeb3acb110, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:20 client Dropping 1RTT packet (3 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 2 2025/12/13 09:45:20 client <- Reading packet 1 (776 bytes) for connection (empty), Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ca87f92dcfdeb3acb110, PacketNumber: 1, PacketNumberLen: 1, Length: 757, Version: v1} 2025/12/13 09:45:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 09:45:20 client -> Sending packet 0 (81 bytes) for connection cdefa3865677944c82c434c19906cb9a91, Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: ca87f92dcfdeb3acb110, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:20 client Dropping Initial keys. 2025/12/13 09:45:20 client -> Sending packet 0 (60 bytes) for connection cdefa3865677944c82c434c19906cb9a91, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: ca87f92dcfdeb3acb110, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:20 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:20 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ca87f92dcfdeb3acb110, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:20 client Peer doesn't await address validation any longer. 2025/12/13 09:45:20 client newly acked packets (1): [0] 2025/12/13 09:45:20 client updated RTT: 32.918ms (σ: 12.435ms) 2025/12/13 09:45:20 client Canceling loss detection timer. 2025/12/13 09:45:20 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:20 client Dropping Handshake keys. 2025/12/13 09:45:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 454ebaa70a69e377f91c, StatelessResetToken: 0x5a360fb9c565bc4e866846b40a9bbdc7} 2025/12/13 09:45:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee0f2100b53b9c897353, StatelessResetToken: 0xc439dc511f9717c6a48a5fed947bdb7a} 2025/12/13 09:45:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5cf43ebe7a58d5a20492, StatelessResetToken: 0xaf0f7527249ed9d304933b48c20841d5} 2025/12/13 09:45:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:20 client -> Sending packet 1 (39 bytes) for connection cdefa3865677944c82c434c19906cb9a91, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: 454ebaa70a69e377f91c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 165.459µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:20 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.PingFrame{} 2025/12/13 09:45:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:20 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:20 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:20 client -> Sending packet 2 (37 bytes) for connection cdefa3865677944c82c434c19906cb9a91, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: 454ebaa70a69e377f91c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 81.572µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:20 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:20 client -> Sending packet 3 (32 bytes) for connection cdefa3865677944c82c434c19906cb9a91, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: 454ebaa70a69e377f91c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:20 client Connection cdefa3865677944c82c434c19906cb9a91 closed. 2025/12/13 09:45:20 Requesting https://server4:443/white-delighted-subway. 2025/12/13 09:45:20 Increased receive buffer size to 14336 kiB 2025/12/13 09:45:20 Increased send buffer size to 14336 kiB 2025/12/13 09:45:20 Setting DF for IPv4 and IPv6. 2025/12/13 09:45:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 09:45:20 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 09:45:20 Created qlog file: /logs/qlog/d34700e3981d5d5a3aff7817d352db08eb.sqlog 2025/12/13 09:45:20 client Starting new connection to server4 ([::]:49147 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d34700e3981d5d5a3aff7817d352db08eb, version v1 2025/12/13 09:45:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 09:45:20 client -> Sending packet 0 (1280 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: d34700e3981d5d5a3aff7817d352db08eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:45:20 client -> Sending packet 1 (1280 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: d34700e3981d5d5a3aff7817d352db08eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 1231, Data length: 277, Offset + Data length: 1508} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 09:45:20 client <- Reading packet 32 (42 bytes) for connection (empty), Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 26a7321d74ab2d35a569, Token: (empty), PacketNumber: 32, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:20 client Received first packet. Switching destination connection ID to: 26a7321d74ab2d35a569 2025/12/13 09:45:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:20 client newly acked packets (1): [1] 2025/12/13 09:45:20 client updated RTT: 33.891419ms (σ: 16.945709ms) 2025/12/13 09:45:20 client setting loss timer for packet 0 (Initial) to 38.127846ms (in %!s(monotime.Time=3631956599750)) 2025/12/13 09:45:20 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3631956599750) 2025/12/13 09:45:20 client lost packet 0 (time threshold) 2025/12/13 09:45:20 client -> Sending packet 2 (1280 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: 26a7321d74ab2d35a569, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 09:45:20 client Parsed a coalesced packet. Part 1: 1224 bytes. Remaining: 8 bytes. 2025/12/13 09:45:20 client <- Reading packet 33 (1224 bytes) for connection (empty), Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 26a7321d74ab2d35a569, Token: (empty), PacketNumber: 33, PacketNumberLen: 1, Length: 1204, Version: v1} 2025/12/13 09:45:20 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:20 client newly acked packets (1): [2] 2025/12/13 09:45:20 client updated RTT: 33.961ms (σ: 12.849ms) 2025/12/13 09:45:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 09:45:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:20 client Queueing packet (8 bytes) for later decryption 2025/12/13 09:45:20 client -> Sending packet 3 (1280 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, Initial 2025/12/13 09:45:20 client Long Header{Type: Initial, DestConnectionID: 26a7321d74ab2d35a569, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 33, LowestAcked: 32, DelayTime: 0s} 2025/12/13 09:45:20 client <- Reading packet 0 (775 bytes) for connection (empty), Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 26a7321d74ab2d35a569, PacketNumber: 0, PacketNumberLen: 1, Length: 756, Version: v1} 2025/12/13 09:45:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 09:45:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 09:45:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d34700e3981d5d5a3aff7817d352db08eb, InitialSourceConnectionID: 26a7321d74ab2d35a569, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 2097152, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false} 2025/12/13 09:45:20 client -> Sending packet 0 (81 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: 26a7321d74ab2d35a569, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:20 client Dropping Initial keys. 2025/12/13 09:45:20 client Dropping 1RTT packet (8 bytes) for which we couldn't unpack the header. Error: packet too small, expected at least 20 bytes after the header, got 7 2025/12/13 09:45:20 client -> Sending packet 0 (60 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: 26a7321d74ab2d35a569, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 09:45:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 09:45:20 client -> Sending packet 1 (76 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: 26a7321d74ab2d35a569, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:20 client -> Sending packet 2 (76 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: 26a7321d74ab2d35a569, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 09:45:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 09:45:20 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/12/13 09:45:20 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/12/13 09:45:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 26a7321d74ab2d35a569, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/12/13 09:45:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/12/13 09:45:20 client Peer doesn't await address validation any longer. 2025/12/13 09:45:20 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.968ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:20 client newly acked packets (1): [0] 2025/12/13 09:45:20 client updated RTT: 41.943ms (σ: 25.602ms) 2025/12/13 09:45:20 client ECN capability confirmed. 2025/12/13 09:45:20 client Canceling loss detection timer. 2025/12/13 09:45:20 client Dropping Handshake keys. 2025/12/13 09:45:20 client <- &wire.HandshakeDoneFrame{} 2025/12/13 09:45:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f167bc0f599172210c4f, StatelessResetToken: 0x575c9a3fc401446c4f3ebb818a937312} 2025/12/13 09:45:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a0e5bbb89277b43fe77e, StatelessResetToken: 0xe45d07d77d5591b80a20d345e062721b} 2025/12/13 09:45:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b18d0ff1adbd0bb7f0d4, StatelessResetToken: 0x33124a9e0371ee226c22eb38b85ce85e} 2025/12/13 09:45:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:20 client -> Sending packet 1 (39 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: f167bc0f599172210c4f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 218.707µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 09:45:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 09:45:20 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.PingFrame{} 2025/12/13 09:45:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 09:45:20 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/12/13 09:45:20 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 09:45:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 09:45:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/12/13 09:45:20 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 09:45:20 client -> Sending packet 2 (37 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: f167bc0f599172210c4f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 103.897µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 09:45:20 client Closing connection with error: Application error 0x0 (local) 2025/12/13 09:45:20 client -> Sending packet 3 (32 bytes) for connection d34700e3981d5d5a3aff7817d352db08eb, 1-RTT (ECN: ECT(0)) 2025/12/13 09:45:20 client Short Header{DestConnectionID: f167bc0f599172210c4f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 09:45:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 09:45:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 09:45:20 client Connection d34700e3981d5d5a3aff7817d352db08eb closed.