2025/04/30 09:40:00 Requesting https://server4:443/alukyafgxb. 2025/04/30 09:40:00 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:00 Increased send buffer size to 14336 kiB 2025/04/30 09:40:00 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:00 Created qlog file: /logs/qlog/19cef5b5b5ba5321ae.sqlog 2025/04/30 09:40:00 client Starting new connection to server4 ([::]:41680 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 19cef5b5b5ba5321ae, version v1 2025/04/30 09:40:00 Adding connection ID (empty). 2025/04/30 09:40:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:00 client -> Sending packet 0 (1280 bytes) for connection 19cef5b5b5ba5321ae, Initial 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: 19cef5b5b5ba5321ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:00 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:00 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3f71cb63f88dbd78d2d2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:00 client Received first packet. Switching destination connection ID to: 3f71cb63f88dbd78d2d2 2025/04/30 09:40:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:00 client newly acked packets (1): [0] 2025/04/30 09:40:00 client updated RTT: 40.615171ms (σ: 20.307585ms) 2025/04/30 09:40:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:00 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 331 bytes. 2025/04/30 09:40:00 client <- Reading packet 0 (765 bytes) for connection (empty), Handshake 2025/04/30 09:40:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3f71cb63f88dbd78d2d2, PacketNumber: 0, PacketNumberLen: 1, Length: 746, Version: v1} 2025/04/30 09:40:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 09:40:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 19cef5b5b5ba5321ae, InitialSourceConnectionID: 3f71cb63f88dbd78d2d2, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:00 client Dropping %!s(logging.PacketType=5) packet (331 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 19cef5b5b5ba5321ae 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: 3f71cb63f88dbd78d2d2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client Long Header{Type: Handshake, DestConnectionID: 3f71cb63f88dbd78d2d2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:00 client Dropping Initial keys. 2025/04/30 09:40:00 client -> Sending packet 1 (45 bytes) for connection 19cef5b5b5ba5321ae, Handshake 2025/04/30 09:40:00 client Long Header{Type: Handshake, DestConnectionID: 3f71cb63f88dbd78d2d2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client -> Sending packet 0 (48 bytes) for connection 19cef5b5b5ba5321ae, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 3f71cb63f88dbd78d2d2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:00 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.PingFrame{} 2025/04/30 09:40:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:00 client -> Sending packet 1 (37 bytes) for connection 19cef5b5b5ba5321ae, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 3f71cb63f88dbd78d2d2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 80.962µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client <- Reading packet 3 (191 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.CryptoFrame{Offset: 182, Data length: 123, Offset + Data length: 305} 2025/04/30 09:40:00 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010083d17cbfa4399dae5c7a7bff385d9cea8283db82a783802afa15a17cde0f39a799c0240f} 2025/04/30 09:40:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:00 client -> Sending packet 2 (39 bytes) for connection 19cef5b5b5ba5321ae, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 3f71cb63f88dbd78d2d2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 81.263µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client <- Reading packet 5 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.PingFrame{} 2025/04/30 09:40:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:00 client -> Sending packet 3 (41 bytes) for connection 19cef5b5b5ba5321ae, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 3f71cb63f88dbd78d2d2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 74.179µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client <- Reading packet 6 (109 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:00 client Dropping Handshake keys. 2025/04/30 09:40:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3bab8ee808179cd04915, StatelessResetToken: 0x708c0af44ae03bbd2746b9b5b1d44994} 2025/04/30 09:40:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aa3554d797a2fb7c4eea, StatelessResetToken: 0x26319d9060375efe67f47e23180c441a} 2025/04/30 09:40:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 52322e4652ed7b1f139f, StatelessResetToken: 0x35bf3a31bf5f2deab7caefa16fdc6607} 2025/04/30 09:40:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:00 client -> Sending packet 4 (43 bytes) for connection 19cef5b5b5ba5321ae, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 52322e4652ed7b1f139f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 138.713µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:00 client <- Reading packet 7 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:00 client -> Sending packet 5 (32 bytes) for connection 19cef5b5b5ba5321ae, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 52322e4652ed7b1f139f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:00 client Connection 19cef5b5b5ba5321ae closed. 2025/04/30 09:40:00 Requesting https://server4:443/edszunwgbo. 2025/04/30 09:40:00 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:00 Increased send buffer size to 14336 kiB 2025/04/30 09:40:00 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:00 Created qlog file: /logs/qlog/c91a7d9eaf0557b43610863d6ce5.sqlog 2025/04/30 09:40:00 client Starting new connection to server4 ([::]:44249 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c91a7d9eaf0557b43610863d6ce5, version v1 2025/04/30 09:40:00 Adding connection ID (empty). 2025/04/30 09:40:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:00 client -> Sending packet 0 (1280 bytes) for connection c91a7d9eaf0557b43610863d6ce5, Initial 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: c91a7d9eaf0557b43610863d6ce5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:40:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:00 client -> Sending packet 1 (1280 bytes) for connection c91a7d9eaf0557b43610863d6ce5, Initial 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: c91a7d9eaf0557b43610863d6ce5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:40:00 client -> Sending packet 2 (1280 bytes) for connection c91a7d9eaf0557b43610863d6ce5, Initial 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: c91a7d9eaf0557b43610863d6ce5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:40:00 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:00 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 319b866d1eba265c76eb, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:00 client Received first packet. Switching destination connection ID to: 319b866d1eba265c76eb 2025/04/30 09:40:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:00 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 327 bytes. 2025/04/30 09:40:00 client <- Reading packet 0 (769 bytes) for connection (empty), Handshake 2025/04/30 09:40:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 319b866d1eba265c76eb, PacketNumber: 0, PacketNumberLen: 1, Length: 750, Version: v1} 2025/04/30 09:40:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 09:40:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c91a7d9eaf0557b43610863d6ce5, InitialSourceConnectionID: 319b866d1eba265c76eb, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:00 client Dropping %!s(logging.PacketType=5) packet (327 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c91a7d9eaf0557b43610863d6ce5 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: 319b866d1eba265c76eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client Long Header{Type: Handshake, DestConnectionID: 319b866d1eba265c76eb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:00 client Dropping Initial keys. 2025/04/30 09:40:00 client -> Sending packet 1 (93 bytes) for connection c91a7d9eaf0557b43610863d6ce5, Handshake 2025/04/30 09:40:00 client Long Header{Type: Handshake, DestConnectionID: 319b866d1eba265c76eb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client Short Header{DestConnectionID: 319b866d1eba265c76eb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:00 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.PingFrame{} 2025/04/30 09:40:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:00 client -> Sending packet 1 (37 bytes) for connection c91a7d9eaf0557b43610863d6ce5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 319b866d1eba265c76eb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 86.683µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client <- Reading packet 5 (479 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:00 client Dropping Handshake keys. 2025/04/30 09:40:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 35c08513ad8e48ebcb25, StatelessResetToken: 0x1f2a6e6b1c555b883d99bf7b35a1f0c8} 2025/04/30 09:40:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9efe0fc62a5fc5d26a72, StatelessResetToken: 0x2acc7918596886feb1c88a59a9b29b62} 2025/04/30 09:40:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 03a5c115ed93f265ea2a, StatelessResetToken: 0x15d9184a2c6a5da8f13cad17f600d703} 2025/04/30 09:40:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:00 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601001b771dbddc1ab1753eeaaef44378ac9711c06b55603ab3c00f75c4412284785cf99e8865} 2025/04/30 09:40:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:00 client -> Sending packet 2 (1366 bytes) for connection c91a7d9eaf0557b43610863d6ce5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 35c08513ad8e48ebcb25, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.PingFrame{} 2025/04/30 09:40:00 client -> Sending packet 3 (41 bytes) for connection c91a7d9eaf0557b43610863d6ce5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 35c08513ad8e48ebcb25, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 191.23µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:00 client -> Sending packet 5 (48 bytes) for connection c91a7d9eaf0557b43610863d6ce5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 35c08513ad8e48ebcb25, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:00 client Skipping packet number 4 2025/04/30 09:40:00 client -> Sending packet 6 (31 bytes) for connection c91a7d9eaf0557b43610863d6ce5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 35c08513ad8e48ebcb25, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:00 client <- Reading packet 7 (28 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:00 client newly acked packets (1): [5] 2025/04/30 09:40:00 client updated RTT: 30.922214ms (σ: 15.461107ms) 2025/04/30 09:40:00 client ECN capability confirmed. 2025/04/30 09:40:00 client lost packet 2 (time threshold) 2025/04/30 09:40:00 client -> Sending packet 7 (1323 bytes) for connection c91a7d9eaf0557b43610863d6ce5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 35c08513ad8e48ebcb25, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.PingFrame{} 2025/04/30 09:40:00 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:00 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:00 client -> Sending packet 8 (32 bytes) for connection c91a7d9eaf0557b43610863d6ce5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:00 client Short Header{DestConnectionID: 35c08513ad8e48ebcb25, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:00 client Connection c91a7d9eaf0557b43610863d6ce5 closed. 2025/04/30 09:40:00 Requesting https://server4:443/ngsmctzjdh. 2025/04/30 09:40:00 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:00 Increased send buffer size to 14336 kiB 2025/04/30 09:40:00 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:00 Created qlog file: /logs/qlog/42283bc3b1fe94bafa987bb3c91f9b3d.sqlog 2025/04/30 09:40:00 client Starting new connection to server4 ([::]:47470 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 42283bc3b1fe94bafa987bb3c91f9b3d, version v1 2025/04/30 09:40:00 Adding connection ID (empty). 2025/04/30 09:40:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:00 client -> Sending packet 0 (1280 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, Initial 2025/04/30 09:40:00 client Long Header{Type: Initial, DestConnectionID: 42283bc3b1fe94bafa987bb3c91f9b3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:40:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:01 client -> Sending packet 1 (1280 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, Initial 2025/04/30 09:40:01 client Long Header{Type: Initial, DestConnectionID: 42283bc3b1fe94bafa987bb3c91f9b3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:40:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:01 client -> Sending packet 2 (1280 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, Initial 2025/04/30 09:40:01 client Long Header{Type: Initial, DestConnectionID: 42283bc3b1fe94bafa987bb3c91f9b3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:40:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:01 client Parsed a coalesced packet. Part 1: 139 bytes. Remaining: 1093 bytes. 2025/04/30 09:40:01 client <- Reading packet 1 (139 bytes) for connection (empty), Initial 2025/04/30 09:40:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fcee52639cb1dde7f3f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 09:40:01 client Received first packet. Switching destination connection ID to: 6fcee52639cb1dde7f3f 2025/04/30 09:40:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 300.304ms} 2025/04/30 09:40:01 client newly acked packets (1): [2] 2025/04/30 09:40:01 client updated RTT: 334.351104ms (σ: 167.175552ms) 2025/04/30 09:40:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:01 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 320 bytes. 2025/04/30 09:40:01 client <- Reading packet 1 (773 bytes) for connection (empty), Handshake 2025/04/30 09:40:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fcee52639cb1dde7f3f, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/04/30 09:40:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 09:40:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 42283bc3b1fe94bafa987bb3c91f9b3d, InitialSourceConnectionID: 6fcee52639cb1dde7f3f, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:01 client Dropping %!s(logging.PacketType=5) packet (320 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d 2025/04/30 09:40:01 client Long Header{Type: Initial, DestConnectionID: 6fcee52639cb1dde7f3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client Long Header{Type: Handshake, DestConnectionID: 6fcee52639cb1dde7f3f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:01 client Dropping Initial keys. 2025/04/30 09:40:01 client -> Sending packet 1 (45 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, Handshake 2025/04/30 09:40:01 client Long Header{Type: Handshake, DestConnectionID: 6fcee52639cb1dde7f3f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client -> Sending packet 0 (48 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: 6fcee52639cb1dde7f3f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:01 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:01 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100e626b4a4feab12ad680100fd8f5a7c5c765ba47c645517eb5f96671d9e90a32ed56e2562} 2025/04/30 09:40:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:01 client -> Sending packet 1 (37 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: 6fcee52639cb1dde7f3f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 82.255µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client <- Reading packet 3 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.PingFrame{} 2025/04/30 09:40:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:01 client Dropping Handshake keys. 2025/04/30 09:40:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7df1f2d7b7de2fbd30dd, StatelessResetToken: 0x27ef9cd82cd91358f9f21e808ddcc2de} 2025/04/30 09:40:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9f0804dd19e32de4a123, StatelessResetToken: 0x0a71756ebc85ef722359ffe59f25ce57} 2025/04/30 09:40:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ab4e5136f46f01ad894b, StatelessResetToken: 0xcf4cb103b539a562899fb3c6ad930dda} 2025/04/30 09:40:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:01 client -> Sending packet 2 (39 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: ab4e5136f46f01ad894b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 115.567µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:01 client <- Reading packet 4 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.PingFrame{} 2025/04/30 09:40:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 24f3e3019fb2cfa8c50d, StatelessResetToken: 0xa684b004bcb6e1da346064ac628c366e} 2025/04/30 09:40:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:01 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 20.44ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client newly acked packets (1): [2] 2025/04/30 09:40:01 client updated RTT: 298.951ms (σ: 196.18ms) 2025/04/30 09:40:01 client ECN capability confirmed. 2025/04/30 09:40:01 client setting loss timer for packet 0 (1-RTT) to 336.319875ms (in 2025-04-30 09:40:01.857946196 +0000 UTC m=+1.655623168) 2025/04/30 09:40:01 client Ignoring all packets below 4. 2025/04/30 09:40:01 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:01 client -> Sending packet 3 (38 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: ab4e5136f46f01ad894b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 6.16197ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client <- Reading packet 6 (1422 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.PingFrame{} 2025/04/30 09:40:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:01 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:01 client -> Sending packet 4 (38 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: ab4e5136f46f01ad894b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 25.238596ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.PingFrame{} 2025/04/30 09:40:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:01 client -> Sending packet 5 (39 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: ab4e5136f46f01ad894b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 102.173µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.PingFrame{} 2025/04/30 09:40:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:01 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:01 client -> Sending packet 6 (40 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: ab4e5136f46f01ad894b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 25.241222ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:40:01.857946196 +0000 UTC m=+1.655623168 2025/04/30 09:40:01 client lost packet 0 (time threshold) 2025/04/30 09:40:01 client Canceling loss detection timer. 2025/04/30 09:40:01 client -> Sending packet 7 (48 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: ab4e5136f46f01ad894b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:01 client <- Reading packet 12 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:01 client -> Sending packet 8 (41 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: ab4e5136f46f01ad894b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 72.286µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:01 client <- Reading packet 13 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:01 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:01 client <- &wire.PingFrame{} 2025/04/30 09:40:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:01 client -> Sending packet 9 (32 bytes) for connection 42283bc3b1fe94bafa987bb3c91f9b3d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:01 client Short Header{DestConnectionID: ab4e5136f46f01ad894b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:01 client Connection 42283bc3b1fe94bafa987bb3c91f9b3d closed. 2025/04/30 09:40:01 Requesting https://server4:443/lvphodwhly. 2025/04/30 09:40:01 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:01 Increased send buffer size to 14336 kiB 2025/04/30 09:40:01 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:01 Created qlog file: /logs/qlog/612f8c22a3431d54a7ff57815031589bfc9fe0.sqlog 2025/04/30 09:40:01 client Starting new connection to server4 ([::]:49858 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 612f8c22a3431d54a7ff57815031589bfc9fe0, version v1 2025/04/30 09:40:01 Adding connection ID (empty). 2025/04/30 09:40:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:01 client -> Sending packet 0 (1280 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, Initial 2025/04/30 09:40:01 client Long Header{Type: Initial, DestConnectionID: 612f8c22a3431d54a7ff57815031589bfc9fe0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:40:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:02 client -> Sending packet 1 (1280 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, Initial 2025/04/30 09:40:02 client Long Header{Type: Initial, DestConnectionID: 612f8c22a3431d54a7ff57815031589bfc9fe0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:40:02 client -> Sending packet 2 (1280 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, Initial 2025/04/30 09:40:02 client Long Header{Type: Initial, DestConnectionID: 612f8c22a3431d54a7ff57815031589bfc9fe0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:40:02 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1094 bytes. 2025/04/30 09:40:02 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/04/30 09:40:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8d7cf451fb306601602, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 09:40:02 client Received first packet. Switching destination connection ID to: f8d7cf451fb306601602 2025/04/30 09:40:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 09:40:02 client newly acked packets (1): [2] 2025/04/30 09:40:02 client updated RTT: 33.859338ms (σ: 16.929669ms) 2025/04/30 09:40:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:02 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 318 bytes. 2025/04/30 09:40:02 client <- Reading packet 1 (776 bytes) for connection (empty), Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8d7cf451fb306601602, PacketNumber: 1, PacketNumberLen: 1, Length: 757, Version: v1} 2025/04/30 09:40:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 09:40:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 612f8c22a3431d54a7ff57815031589bfc9fe0, InitialSourceConnectionID: f8d7cf451fb306601602, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:02 client Dropping %!s(logging.PacketType=5) packet (318 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0 2025/04/30 09:40:02 client Long Header{Type: Initial, DestConnectionID: f8d7cf451fb306601602, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: f8d7cf451fb306601602, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:02 client Dropping Initial keys. 2025/04/30 09:40:02 client -> Sending packet 1 (45 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: f8d7cf451fb306601602, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client -> Sending packet 0 (48 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: f8d7cf451fb306601602, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:02 client -> Sending packet 2 (76 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: f8d7cf451fb306601602, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:02 client -> Sending packet 3 (76 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: f8d7cf451fb306601602, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:40:02 client -> Sending packet 4 (76 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: f8d7cf451fb306601602, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:02 client -> Sending packet 5 (76 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: f8d7cf451fb306601602, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:02 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1289 bytes. 2025/04/30 09:40:02 client <- Reading packet 2 (43 bytes) for connection (empty), Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8d7cf451fb306601602, PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 09:40:02 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 09:40:02 client Peer doesn't await address validation any longer. 2025/04/30 09:40:02 client <- Reading packet 0 (1289 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 305.016ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client newly acked packets (1): [0] 2025/04/30 09:40:02 client updated RTT: 69.41ms (σ: 83.798ms) 2025/04/30 09:40:02 client ECN capability confirmed. 2025/04/30 09:40:02 client Canceling loss detection timer. 2025/04/30 09:40:02 client Dropping Handshake keys. 2025/04/30 09:40:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d8ab00db9fc0fd2e014, StatelessResetToken: 0xc425af8f03d470e60bebf2cbef111925} 2025/04/30 09:40:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d987aae23ca1c505908e, StatelessResetToken: 0x82b4a20c0acbeffd2bd37802d895590d} 2025/04/30 09:40:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7811ce84ba237374db9d, StatelessResetToken: 0x48245777466b001b9a85745477a94863} 2025/04/30 09:40:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:02 client -> Sending packet 1 (39 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: 4d8ab00db9fc0fd2e014, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 245.101µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:02 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.PingFrame{} 2025/04/30 09:40:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:02 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:02 client -> Sending packet 2 (37 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: 4d8ab00db9fc0fd2e014, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 76.374µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:02 client -> Sending packet 3 (32 bytes) for connection 612f8c22a3431d54a7ff57815031589bfc9fe0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: 4d8ab00db9fc0fd2e014, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:02 client Connection 612f8c22a3431d54a7ff57815031589bfc9fe0 closed. 2025/04/30 09:40:02 Requesting https://server4:443/ajlvclloyq. 2025/04/30 09:40:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:02 Increased send buffer size to 14336 kiB 2025/04/30 09:40:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:02 Created qlog file: /logs/qlog/47cb53d6e5a945a399cd0bf4f861.sqlog 2025/04/30 09:40:02 client Starting new connection to server4 ([::]:55119 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 47cb53d6e5a945a399cd0bf4f861, version v1 2025/04/30 09:40:02 Adding connection ID (empty). 2025/04/30 09:40:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:02 client -> Sending packet 0 (1280 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, Initial 2025/04/30 09:40:02 client Long Header{Type: Initial, DestConnectionID: 47cb53d6e5a945a399cd0bf4f861, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:02 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:02 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23a5166a866a20db3440, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:02 client Received first packet. Switching destination connection ID to: 23a5166a866a20db3440 2025/04/30 09:40:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:02 client newly acked packets (1): [0] 2025/04/30 09:40:02 client updated RTT: 34.743333ms (σ: 17.371666ms) 2025/04/30 09:40:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:02 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 09:40:02 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23a5166a866a20db3440, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 09:40:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 09:40:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 47cb53d6e5a945a399cd0bf4f861, InitialSourceConnectionID: 23a5166a866a20db3440, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:02 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 47cb53d6e5a945a399cd0bf4f861 2025/04/30 09:40:02 client Long Header{Type: Initial, DestConnectionID: 23a5166a866a20db3440, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: 23a5166a866a20db3440, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:02 client Dropping Initial keys. 2025/04/30 09:40:02 client -> Sending packet 1 (45 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, Handshake 2025/04/30 09:40:02 client Long Header{Type: Handshake, DestConnectionID: 23a5166a866a20db3440, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client -> Sending packet 0 (48 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: 23a5166a866a20db3440, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:02 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.PingFrame{} 2025/04/30 09:40:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:02 client -> Sending packet 1 (37 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: 23a5166a866a20db3440, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 65.503µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/04/30 09:40:02 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010072876e9fb4eb3347de7bcbdf0dc46e2e64a8ae65a6c01f5242e0552de0b2a31404c83554} 2025/04/30 09:40:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:02 client -> Sending packet 2 (39 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: 23a5166a866a20db3440, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 82.936µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.28ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client Peer doesn't await address validation any longer. 2025/04/30 09:40:02 client newly acked packets (1): [0] 2025/04/30 09:40:02 client updated RTT: 37.099ms (σ: 17.741ms) 2025/04/30 09:40:02 client ECN capability confirmed. 2025/04/30 09:40:02 client Canceling loss detection timer. 2025/04/30 09:40:02 client Dropping Handshake keys. 2025/04/30 09:40:02 client <- Reading packet 5 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.PingFrame{} 2025/04/30 09:40:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:02 client <- Reading packet 6 (109 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 70c592a53b7073233fb4, StatelessResetToken: 0x244265faf7f893c57f7deaadbce7eb66} 2025/04/30 09:40:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6e8643ee09741ce54660, StatelessResetToken: 0xd725e5df6105e5fde5edbeac9fbeed96} 2025/04/30 09:40:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fa6bda56d25aac0327c7, StatelessResetToken: 0x838ab3604d0d37ab3511f8940e1a6438} 2025/04/30 09:40:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:02 client -> Sending packet 3 (41 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: fa6bda56d25aac0327c7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 105.399µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:02 client -> Sending packet 5 (31 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: fa6bda56d25aac0327c7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:02 client -> Sending packet 6 (31 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: fa6bda56d25aac0327c7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:02 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.PingFrame{} 2025/04/30 09:40:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:02 client -> Sending packet 7 (41 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: fa6bda56d25aac0327c7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 73.088µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client <- Reading packet 11 (28 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:02 client <- Reading packet 12 (1422 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:02 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:02 client <- &wire.PingFrame{} 2025/04/30 09:40:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d9eb2a13a0d1909c6cd0, StatelessResetToken: 0x09560dbdd8b9b78d833be20538737424} 2025/04/30 09:40:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:02 client -> Sending packet 8 (32 bytes) for connection 47cb53d6e5a945a399cd0bf4f861, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:02 client Short Header{DestConnectionID: fa6bda56d25aac0327c7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:02 client Connection 47cb53d6e5a945a399cd0bf4f861 closed. 2025/04/30 09:40:02 Requesting https://server4:443/yhxgchutqc. 2025/04/30 09:40:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:02 Increased send buffer size to 14336 kiB 2025/04/30 09:40:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:02 Created qlog file: /logs/qlog/7125f43153a15d113fb85b.sqlog 2025/04/30 09:40:02 client Starting new connection to server4 ([::]:53896 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7125f43153a15d113fb85b, version v1 2025/04/30 09:40:02 Adding connection ID (empty). 2025/04/30 09:40:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:02 client -> Sending packet 0 (1280 bytes) for connection 7125f43153a15d113fb85b, Initial 2025/04/30 09:40:02 client Long Header{Type: Initial, DestConnectionID: 7125f43153a15d113fb85b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:40:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:03 client -> Sending packet 1 (1280 bytes) for connection 7125f43153a15d113fb85b, Initial 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: 7125f43153a15d113fb85b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:40:03 client -> Sending packet 2 (1280 bytes) for connection 7125f43153a15d113fb85b, Initial 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: 7125f43153a15d113fb85b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:40:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:40:03 client -> Sending packet 3 (1280 bytes) for connection 7125f43153a15d113fb85b, Initial 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: 7125f43153a15d113fb85b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:40:03 client -> Sending packet 4 (1280 bytes) for connection 7125f43153a15d113fb85b, Initial 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: 7125f43153a15d113fb85b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:40:03 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:03 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ace77aa8e99ab34091e0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:03 client Received first packet. Switching destination connection ID to: ace77aa8e99ab34091e0 2025/04/30 09:40:03 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 09:40:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:03 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:03 client <- Reading packet 0 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ace77aa8e99ab34091e0, PacketNumber: 0, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7125f43153a15d113fb85b, InitialSourceConnectionID: ace77aa8e99ab34091e0, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:03 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7125f43153a15d113fb85b 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: ace77aa8e99ab34091e0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: ace77aa8e99ab34091e0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:03 client Dropping Initial keys. 2025/04/30 09:40:03 client -> Sending packet 1 (45 bytes) for connection 7125f43153a15d113fb85b, Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: ace77aa8e99ab34091e0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client -> Sending packet 0 (48 bytes) for connection 7125f43153a15d113fb85b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:03 client Short Header{DestConnectionID: ace77aa8e99ab34091e0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:03 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:03 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 09:40:03 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:03 client <- Reading packet 1 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ace77aa8e99ab34091e0, PacketNumber: 1, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:03 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:03 client -> Sending packet 2 (45 bytes) for connection 7125f43153a15d113fb85b, Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: ace77aa8e99ab34091e0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client <- Reading packet 2 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ace77aa8e99ab34091e0, PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:03 client <- &wire.PingFrame{} 2025/04/30 09:40:03 client -> Sending packet 3 (45 bytes) for connection 7125f43153a15d113fb85b, Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: ace77aa8e99ab34091e0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:03 client -> Sending packet 4 (76 bytes) for connection 7125f43153a15d113fb85b, Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: ace77aa8e99ab34091e0, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:03 client -> Sending packet 5 (76 bytes) for connection 7125f43153a15d113fb85b, Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: ace77aa8e99ab34091e0, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:03 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1289 bytes. 2025/04/30 09:40:03 client <- Reading packet 3 (43 bytes) for connection (empty), Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ace77aa8e99ab34091e0, PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 09:40:03 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 09:40:03 client Peer doesn't await address validation any longer. 2025/04/30 09:40:03 client <- Reading packet 0 (1289 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 199.896ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client newly acked packets (1): [0] 2025/04/30 09:40:03 client updated RTT: 233.162516ms (σ: 116.581258ms) 2025/04/30 09:40:03 client ECN capability confirmed. 2025/04/30 09:40:03 client Canceling loss detection timer. 2025/04/30 09:40:03 client Dropping Handshake keys. 2025/04/30 09:40:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 48d5c9149264a970f3ca, StatelessResetToken: 0xd7269f4749b15378b0c378b5c7c1402f} 2025/04/30 09:40:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8bea3dfd551ad8dfc14a, StatelessResetToken: 0x87b8947327135db82011269a8366a469} 2025/04/30 09:40:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 838fcad2fab7a406508a, StatelessResetToken: 0x1dc58e7cf15949e3e37d1c79c3b96178} 2025/04/30 09:40:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:03 client -> Sending packet 1 (39 bytes) for connection 7125f43153a15d113fb85b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:03 client Short Header{DestConnectionID: 48d5c9149264a970f3ca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 198.704µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:03 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:03 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:03 client <- &wire.PingFrame{} 2025/04/30 09:40:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:03 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:03 client -> Sending packet 2 (38 bytes) for connection 7125f43153a15d113fb85b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:03 client Short Header{DestConnectionID: 48d5c9149264a970f3ca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.237434ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client <- Reading packet 4 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:03 client <- &wire.PingFrame{} 2025/04/30 09:40:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:03 client -> Sending packet 3 (39 bytes) for connection 7125f43153a15d113fb85b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:03 client Short Header{DestConnectionID: 48d5c9149264a970f3ca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 79.45µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client <- Reading packet 5 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 282, Offset + Data length: 282} 2025/04/30 09:40:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:03 client <- Reading packet 6 (90 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:03 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:03 client <- &wire.CryptoFrame{Offset: 282, Data length: 23, Offset + Data length: 305} 2025/04/30 09:40:03 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601000db45e2742426cc2b55b8a303e9ff7927a99324fe8df24d15852b57282d54db2bbded6ca} 2025/04/30 09:40:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:03 client -> Sending packet 4 (39 bytes) for connection 7125f43153a15d113fb85b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:03 client Short Header{DestConnectionID: 48d5c9149264a970f3ca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 112.913µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:03 client -> Sending packet 5 (32 bytes) for connection 7125f43153a15d113fb85b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:03 client Short Header{DestConnectionID: 48d5c9149264a970f3ca, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:03 client Connection 7125f43153a15d113fb85b closed. 2025/04/30 09:40:03 Requesting https://server4:443/avwcwaxmsj. 2025/04/30 09:40:03 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:03 Increased send buffer size to 14336 kiB 2025/04/30 09:40:03 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:03 Created qlog file: /logs/qlog/b4bdf68ed63e7c3c1c4f0c96eff945c8.sqlog 2025/04/30 09:40:03 client Starting new connection to server4 ([::]:34258 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b4bdf68ed63e7c3c1c4f0c96eff945c8, version v1 2025/04/30 09:40:03 Adding connection ID (empty). 2025/04/30 09:40:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:03 client -> Sending packet 0 (1280 bytes) for connection b4bdf68ed63e7c3c1c4f0c96eff945c8, Initial 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: b4bdf68ed63e7c3c1c4f0c96eff945c8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:03 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:03 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 41b2de5fe44430938cf6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:03 client Received first packet. Switching destination connection ID to: 41b2de5fe44430938cf6 2025/04/30 09:40:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:03 client newly acked packets (1): [0] 2025/04/30 09:40:03 client updated RTT: 35.012076ms (σ: 17.506038ms) 2025/04/30 09:40:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:03 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 324 bytes. 2025/04/30 09:40:03 client <- Reading packet 0 (772 bytes) for connection (empty), Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 41b2de5fe44430938cf6, PacketNumber: 0, PacketNumberLen: 1, Length: 753, Version: v1} 2025/04/30 09:40:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 09:40:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b4bdf68ed63e7c3c1c4f0c96eff945c8, InitialSourceConnectionID: 41b2de5fe44430938cf6, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:03 client Dropping %!s(logging.PacketType=5) packet (324 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b4bdf68ed63e7c3c1c4f0c96eff945c8 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: 41b2de5fe44430938cf6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: 41b2de5fe44430938cf6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:03 client Dropping Initial keys. 2025/04/30 09:40:03 client -> Sending packet 1 (45 bytes) for connection b4bdf68ed63e7c3c1c4f0c96eff945c8, Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: 41b2de5fe44430938cf6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client -> Sending packet 0 (48 bytes) for connection b4bdf68ed63e7c3c1c4f0c96eff945c8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:03 client Short Header{DestConnectionID: 41b2de5fe44430938cf6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:03 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:03 client -> Sending packet 1 (37 bytes) for connection b4bdf68ed63e7c3c1c4f0c96eff945c8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:03 client Short Header{DestConnectionID: 41b2de5fe44430938cf6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 87.445µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:03 client -> Sending packet 2 (73 bytes) for connection b4bdf68ed63e7c3c1c4f0c96eff945c8, Handshake 2025/04/30 09:40:03 client Long Header{Type: Handshake, DestConnectionID: 41b2de5fe44430938cf6, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:03 client Short Header{DestConnectionID: 41b2de5fe44430938cf6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:03 client Connection b4bdf68ed63e7c3c1c4f0c96eff945c8 closed. 2025/04/30 09:40:03 Requesting https://server4:443/jngbzxflrl. 2025/04/30 09:40:03 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:03 Increased send buffer size to 14336 kiB 2025/04/30 09:40:03 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:03 Created qlog file: /logs/qlog/5b23c1782e5edfcea08b.sqlog 2025/04/30 09:40:03 client Starting new connection to server4 ([::]:44325 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5b23c1782e5edfcea08b, version v1 2025/04/30 09:40:03 Adding connection ID (empty). 2025/04/30 09:40:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:03 client -> Sending packet 0 (1280 bytes) for connection 5b23c1782e5edfcea08b, Initial 2025/04/30 09:40:03 client Long Header{Type: Initial, DestConnectionID: 5b23c1782e5edfcea08b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:40:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:04 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8247975ffb551353c495, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:04 client Received first packet. Switching destination connection ID to: 8247975ffb551353c495 2025/04/30 09:40:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:04 client newly acked packets (1): [0] 2025/04/30 09:40:04 client updated RTT: 35.037203ms (σ: 17.518601ms) 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 330 bytes. 2025/04/30 09:40:04 client <- Reading packet 0 (766 bytes) for connection (empty), Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8247975ffb551353c495, PacketNumber: 0, PacketNumberLen: 1, Length: 747, Version: v1} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:40:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5b23c1782e5edfcea08b, InitialSourceConnectionID: 8247975ffb551353c495, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:04 client Dropping %!s(logging.PacketType=5) packet (330 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5b23c1782e5edfcea08b 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: 8247975ffb551353c495, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: 8247975ffb551353c495, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:04 client Dropping Initial keys. 2025/04/30 09:40:04 client -> Sending packet 1 (93 bytes) for connection 5b23c1782e5edfcea08b, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: 8247975ffb551353c495, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Short Header{DestConnectionID: 8247975ffb551353c495, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:04 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8247975ffb551353c495, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:04 client Peer doesn't await address validation any longer. 2025/04/30 09:40:04 client newly acked packets (1): [0] 2025/04/30 09:40:04 client updated RTT: 34.834ms (σ: 13.543ms) 2025/04/30 09:40:04 client Canceling loss detection timer. 2025/04/30 09:40:04 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:04 client Dropping Handshake keys. 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9b54c222e033175af9a, StatelessResetToken: 0x3c2e967688e695e46def22a00895f081} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6f46d2e70298548831e7, StatelessResetToken: 0x5f95893033b3d750fb8bd190d42cb8f9} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 45bc4a1f662e07af2b7d, StatelessResetToken: 0x68ed6509e0c9823f4ceb34436b0e64ab} 2025/04/30 09:40:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:04 client -> Sending packet 1 (39 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 153.89µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.PingFrame{} 2025/04/30 09:40:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:04 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:04 client -> Sending packet 2 (38 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.2333ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:04 client -> Sending packet 4 (48 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:04 client Skipping packet number 3 2025/04/30 09:40:04 client -> Sending packet 5 (31 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:04 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.PingFrame{} 2025/04/30 09:40:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:04 client -> Sending packet 6 (39 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 91.993µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client <- Reading packet 5 (26 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client newly acked packets (1): [4] 2025/04/30 09:40:04 client updated RTT: 34.332ms (σ: 11.159ms) 2025/04/30 09:40:04 client ECN capability confirmed. 2025/04/30 09:40:04 client <- Reading packet 9 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.PingFrame{} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/04/30 09:40:04 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100966e7c364f920a42a906a48686e0e9c3b5d59c0ab99c18442ddbdeab4ed563e885b173b8} 2025/04/30 09:40:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:04 client -> Sending packet 7 (41 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 102.603µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client <- Reading packet 10 (109 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9b54c222e033175af9a, StatelessResetToken: 0x3c2e967688e695e46def22a00895f081} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6f46d2e70298548831e7, StatelessResetToken: 0x5f95893033b3d750fb8bd190d42cb8f9} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 45bc4a1f662e07af2b7d, StatelessResetToken: 0x68ed6509e0c9823f4ceb34436b0e64ab} 2025/04/30 09:40:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:04 client -> Sending packet 8 (1366 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.PingFrame{} 2025/04/30 09:40:04 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:04 client -> Sending packet 9 (42 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 25.312063ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client <- Reading packet 12 (26 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client newly acked packets (2): [5 8] 2025/04/30 09:40:04 client updated RTT: 34.003ms (σ: 9.025ms) 2025/04/30 09:40:04 client Canceling loss detection timer. 2025/04/30 09:40:04 client <- Reading packet 13 (1167 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f18816fadf82b71398ad, StatelessResetToken: 0x044bc22b56fb95fc50fe29c7a5ce8ab9} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 45bc4a1f662e07af2b7d, StatelessResetToken: 0x68ed6509e0c9823f4ceb34436b0e64ab} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6f46d2e70298548831e7, StatelessResetToken: 0x5f95893033b3d750fb8bd190d42cb8f9} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9b54c222e033175af9a, StatelessResetToken: 0x3c2e967688e695e46def22a00895f081} 2025/04/30 09:40:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:04 client <- Reading packet 14 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.PingFrame{} 2025/04/30 09:40:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:04 client -> Sending packet 10 (43 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 131.162µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:04 client -> Sending packet 11 (32 bytes) for connection 5b23c1782e5edfcea08b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: c9b54c222e033175af9a, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:04 client Connection 5b23c1782e5edfcea08b closed. 2025/04/30 09:40:04 Requesting https://server4:443/uwhyobzntv. 2025/04/30 09:40:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:04 Increased send buffer size to 14336 kiB 2025/04/30 09:40:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:04 Created qlog file: /logs/qlog/10f999648b30744ff5a5fa502a6822a0b0d4.sqlog 2025/04/30 09:40:04 client Starting new connection to server4 ([::]:52491 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 10f999648b30744ff5a5fa502a6822a0b0d4, version v1 2025/04/30 09:40:04 Adding connection ID (empty). 2025/04/30 09:40:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:04 client -> Sending packet 0 (1280 bytes) for connection 10f999648b30744ff5a5fa502a6822a0b0d4, Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: 10f999648b30744ff5a5fa502a6822a0b0d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:04 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dd011b635f0a323f3e5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:04 client Received first packet. Switching destination connection ID to: 9dd011b635f0a323f3e5 2025/04/30 09:40:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:04 client newly acked packets (1): [0] 2025/04/30 09:40:04 client updated RTT: 34.973882ms (σ: 17.486941ms) 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 322 bytes. 2025/04/30 09:40:04 client <- Reading packet 0 (774 bytes) for connection (empty), Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dd011b635f0a323f3e5, PacketNumber: 0, PacketNumberLen: 1, Length: 755, Version: v1} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 09:40:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 10f999648b30744ff5a5fa502a6822a0b0d4, InitialSourceConnectionID: 9dd011b635f0a323f3e5, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:04 client Dropping %!s(logging.PacketType=5) packet (322 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 10f999648b30744ff5a5fa502a6822a0b0d4 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: 9dd011b635f0a323f3e5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: 9dd011b635f0a323f3e5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:04 client Dropping Initial keys. 2025/04/30 09:40:04 client -> Sending packet 1 (45 bytes) for connection 10f999648b30744ff5a5fa502a6822a0b0d4, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: 9dd011b635f0a323f3e5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client -> Sending packet 0 (48 bytes) for connection 10f999648b30744ff5a5fa502a6822a0b0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: 9dd011b635f0a323f3e5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:04 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dd011b635f0a323f3e5, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:04 client Peer doesn't await address validation any longer. 2025/04/30 09:40:04 client newly acked packets (1): [0] 2025/04/30 09:40:04 client updated RTT: 34.801ms (σ: 13.458ms) 2025/04/30 09:40:04 client Canceling loss detection timer. 2025/04/30 09:40:04 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:04 client Dropping Handshake keys. 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3a07fdae80ef038b4e87, StatelessResetToken: 0x197707023871e64ed28cb9d7c205fdaf} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8d6835957fd7ac92310f, StatelessResetToken: 0xea3c1d76ade85e70da507af3fe0a04b9} 2025/04/30 09:40:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e2266581c526b0f758f6, StatelessResetToken: 0x860c22cfc1891edaa5479db47afe2c9f} 2025/04/30 09:40:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:04 client -> Sending packet 1 (39 bytes) for connection 10f999648b30744ff5a5fa502a6822a0b0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: 3a07fdae80ef038b4e87, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 175.29µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.PingFrame{} 2025/04/30 09:40:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:04 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:04 client -> Sending packet 2 (37 bytes) for connection 10f999648b30744ff5a5fa502a6822a0b0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: 3a07fdae80ef038b4e87, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 68.428µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:04 client -> Sending packet 3 (32 bytes) for connection 10f999648b30744ff5a5fa502a6822a0b0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: 3a07fdae80ef038b4e87, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:04 client Connection 10f999648b30744ff5a5fa502a6822a0b0d4 closed. 2025/04/30 09:40:04 Requesting https://server4:443/iplevvkurh. 2025/04/30 09:40:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:04 Increased send buffer size to 14336 kiB 2025/04/30 09:40:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:04 Created qlog file: /logs/qlog/de3957e2242d33f5cb45c80fdd51478dde43ce.sqlog 2025/04/30 09:40:04 client Starting new connection to server4 ([::]:43799 -> 193.167.100.100:443), source connection ID (empty), destination connection ID de3957e2242d33f5cb45c80fdd51478dde43ce, version v1 2025/04/30 09:40:04 Adding connection ID (empty). 2025/04/30 09:40:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:04 client -> Sending packet 0 (1280 bytes) for connection de3957e2242d33f5cb45c80fdd51478dde43ce, Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: de3957e2242d33f5cb45c80fdd51478dde43ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:04 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c8f839e90f7b33405a1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:04 client Received first packet. Switching destination connection ID to: 2c8f839e90f7b33405a1 2025/04/30 09:40:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:04 client newly acked packets (1): [0] 2025/04/30 09:40:04 client updated RTT: 34.689757ms (σ: 17.344878ms) 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 321 bytes. 2025/04/30 09:40:04 client <- Reading packet 0 (775 bytes) for connection (empty), Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c8f839e90f7b33405a1, PacketNumber: 0, PacketNumberLen: 1, Length: 756, Version: v1} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 09:40:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: de3957e2242d33f5cb45c80fdd51478dde43ce, InitialSourceConnectionID: 2c8f839e90f7b33405a1, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:04 client Dropping %!s(logging.PacketType=5) packet (321 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection de3957e2242d33f5cb45c80fdd51478dde43ce 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: 2c8f839e90f7b33405a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: 2c8f839e90f7b33405a1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:04 client Dropping Initial keys. 2025/04/30 09:40:04 client -> Sending packet 1 (45 bytes) for connection de3957e2242d33f5cb45c80fdd51478dde43ce, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: 2c8f839e90f7b33405a1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client -> Sending packet 0 (48 bytes) for connection de3957e2242d33f5cb45c80fdd51478dde43ce, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: 2c8f839e90f7b33405a1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.PingFrame{} 2025/04/30 09:40:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:04 client -> Sending packet 1 (37 bytes) for connection de3957e2242d33f5cb45c80fdd51478dde43ce, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: 2c8f839e90f7b33405a1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 66.696µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:04 client -> Sending packet 2 (73 bytes) for connection de3957e2242d33f5cb45c80fdd51478dde43ce, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: 2c8f839e90f7b33405a1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:04 client Short Header{DestConnectionID: 2c8f839e90f7b33405a1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:04 Received 1 packets after sending CONNECTION_CLOSE. Retransmitting. 2025/04/30 09:40:04 client Connection de3957e2242d33f5cb45c80fdd51478dde43ce closed. 2025/04/30 09:40:04 Requesting https://server4:443/fhtaupmzqr. 2025/04/30 09:40:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:04 Increased send buffer size to 14336 kiB 2025/04/30 09:40:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:04 Created qlog file: /logs/qlog/918099bcf7750ac29e51ffe61f1c85.sqlog 2025/04/30 09:40:04 client Starting new connection to server4 ([::]:43441 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 918099bcf7750ac29e51ffe61f1c85, version v1 2025/04/30 09:40:04 Adding connection ID (empty). 2025/04/30 09:40:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:04 client -> Sending packet 0 (1280 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: 918099bcf7750ac29e51ffe61f1c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:04 client -> Sending packet 1 (1280 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: 918099bcf7750ac29e51ffe61f1c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:04 client -> Sending packet 2 (1280 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: 918099bcf7750ac29e51ffe61f1c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:04 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: da591a6342b5c2bb9734, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:04 client Received first packet. Switching destination connection ID to: da591a6342b5c2bb9734 2025/04/30 09:40:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 09:40:04 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da591a6342b5c2bb9734, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 09:40:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 918099bcf7750ac29e51ffe61f1c85, InitialSourceConnectionID: da591a6342b5c2bb9734, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:04 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 918099bcf7750ac29e51ffe61f1c85 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: da591a6342b5c2bb9734, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: da591a6342b5c2bb9734, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:04 client Dropping Initial keys. 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:04 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 09:40:04 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 09:40:04 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da591a6342b5c2bb9734, PacketNumber: 1, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 09:40:04 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:04 client -> Sending packet 1 (93 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: da591a6342b5c2bb9734, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Short Header{DestConnectionID: da591a6342b5c2bb9734, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:04 client <- Reading packet 2 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da591a6342b5c2bb9734, PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:04 client <- &wire.PingFrame{} 2025/04/30 09:40:04 client -> Sending packet 2 (45 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: da591a6342b5c2bb9734, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:04 client -> Sending packet 3 (76 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: da591a6342b5c2bb9734, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:04 client -> Sending packet 4 (76 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: da591a6342b5c2bb9734, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:04 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.PingFrame{} 2025/04/30 09:40:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:04 client -> Sending packet 1 (37 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:04 client Short Header{DestConnectionID: da591a6342b5c2bb9734, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 81.453µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:04 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:04 client -> Sending packet 5 (73 bytes) for connection 918099bcf7750ac29e51ffe61f1c85, Handshake 2025/04/30 09:40:04 client Long Header{Type: Handshake, DestConnectionID: da591a6342b5c2bb9734, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:04 client Short Header{DestConnectionID: da591a6342b5c2bb9734, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:04 client Connection 918099bcf7750ac29e51ffe61f1c85 closed. 2025/04/30 09:40:04 Requesting https://server4:443/fgarnymijp. 2025/04/30 09:40:04 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:04 Increased send buffer size to 14336 kiB 2025/04/30 09:40:04 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:04 Created qlog file: /logs/qlog/47858097579be9824c.sqlog 2025/04/30 09:40:04 client Starting new connection to server4 ([::]:44850 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 47858097579be9824c, version v1 2025/04/30 09:40:04 Adding connection ID (empty). 2025/04/30 09:40:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:04 client -> Sending packet 0 (1280 bytes) for connection 47858097579be9824c, Initial 2025/04/30 09:40:04 client Long Header{Type: Initial, DestConnectionID: 47858097579be9824c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:05 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2cd45b2c9856281f472, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:05 client Received first packet. Switching destination connection ID to: b2cd45b2c9856281f472 2025/04/30 09:40:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:05 client newly acked packets (1): [0] 2025/04/30 09:40:05 client updated RTT: 35.018635ms (σ: 17.509317ms) 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 330 bytes. 2025/04/30 09:40:05 client <- Reading packet 0 (766 bytes) for connection (empty), Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2cd45b2c9856281f472, PacketNumber: 0, PacketNumberLen: 1, Length: 747, Version: v1} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:40:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 47858097579be9824c, InitialSourceConnectionID: b2cd45b2c9856281f472, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:05 client Dropping %!s(logging.PacketType=5) packet (330 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 47858097579be9824c 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: b2cd45b2c9856281f472, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: b2cd45b2c9856281f472, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:05 client Dropping Initial keys. 2025/04/30 09:40:05 client -> Sending packet 1 (45 bytes) for connection 47858097579be9824c, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: b2cd45b2c9856281f472, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client -> Sending packet 0 (48 bytes) for connection 47858097579be9824c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: b2cd45b2c9856281f472, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:05 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.PingFrame{} 2025/04/30 09:40:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:05 client -> Sending packet 1 (37 bytes) for connection 47858097579be9824c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: b2cd45b2c9856281f472, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 62.338µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:05 client -> Sending packet 2 (73 bytes) for connection 47858097579be9824c, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: b2cd45b2c9856281f472, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:05 client Short Header{DestConnectionID: b2cd45b2c9856281f472, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:05 client Connection 47858097579be9824c closed. 2025/04/30 09:40:05 Requesting https://server4:443/fflmiicjyo. 2025/04/30 09:40:05 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:05 Increased send buffer size to 14336 kiB 2025/04/30 09:40:05 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:05 Created qlog file: /logs/qlog/aa9a52d6a03d88d40f2b7d39ba.sqlog 2025/04/30 09:40:05 client Starting new connection to server4 ([::]:34677 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aa9a52d6a03d88d40f2b7d39ba, version v1 2025/04/30 09:40:05 Adding connection ID (empty). 2025/04/30 09:40:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:05 client -> Sending packet 0 (1280 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: aa9a52d6a03d88d40f2b7d39ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:05 client -> Sending packet 1 (1280 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: aa9a52d6a03d88d40f2b7d39ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:05 client -> Sending packet 2 (1280 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: aa9a52d6a03d88d40f2b7d39ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:05 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 342da193534e133bb97f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:05 client Received first packet. Switching destination connection ID to: 342da193534e133bb97f 2025/04/30 09:40:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 327 bytes. 2025/04/30 09:40:05 client <- Reading packet 0 (769 bytes) for connection (empty), Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 342da193534e133bb97f, PacketNumber: 0, PacketNumberLen: 1, Length: 750, Version: v1} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 09:40:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aa9a52d6a03d88d40f2b7d39ba, InitialSourceConnectionID: 342da193534e133bb97f, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:05 client Dropping %!s(logging.PacketType=5) packet (327 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection aa9a52d6a03d88d40f2b7d39ba 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: 342da193534e133bb97f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 342da193534e133bb97f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:05 client Dropping Initial keys. 2025/04/30 09:40:05 client -> Sending packet 1 (45 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 342da193534e133bb97f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client -> Sending packet 0 (48 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 342da193534e133bb97f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:05 client <- Reading packet 1 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 342da193534e133bb97f, PacketNumber: 1, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:05 client <- &wire.PingFrame{} 2025/04/30 09:40:05 client -> Sending packet 2 (45 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 342da193534e133bb97f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client <- Reading packet 2 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 342da193534e133bb97f, PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:05 client <- &wire.PingFrame{} 2025/04/30 09:40:05 client -> Sending packet 3 (45 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 342da193534e133bb97f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:05 client -> Sending packet 4 (76 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 342da193534e133bb97f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:05 client -> Sending packet 5 (76 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 342da193534e133bb97f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:05 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.PingFrame{} 2025/04/30 09:40:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:05 client -> Sending packet 1 (37 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 342da193534e133bb97f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 73.037µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:05 client -> Sending packet 6 (73 bytes) for connection aa9a52d6a03d88d40f2b7d39ba, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 342da193534e133bb97f, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:05 client Short Header{DestConnectionID: 342da193534e133bb97f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:05 client Connection aa9a52d6a03d88d40f2b7d39ba closed. 2025/04/30 09:40:05 Requesting https://server4:443/qyepbtwnxp. 2025/04/30 09:40:05 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:05 Increased send buffer size to 14336 kiB 2025/04/30 09:40:05 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:05 Created qlog file: /logs/qlog/af890d27436812c4927c4e5c36f038.sqlog 2025/04/30 09:40:05 client Starting new connection to server4 ([::]:54902 -> 193.167.100.100:443), source connection ID (empty), destination connection ID af890d27436812c4927c4e5c36f038, version v1 2025/04/30 09:40:05 Adding connection ID (empty). 2025/04/30 09:40:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:05 client -> Sending packet 0 (1280 bytes) for connection af890d27436812c4927c4e5c36f038, Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: af890d27436812c4927c4e5c36f038, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:05 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 77f9a79867236f031782, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:05 client Received first packet. Switching destination connection ID to: 77f9a79867236f031782 2025/04/30 09:40:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:05 client newly acked packets (1): [0] 2025/04/30 09:40:05 client updated RTT: 34.822232ms (σ: 17.411116ms) 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 09:40:05 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 77f9a79867236f031782, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 09:40:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: af890d27436812c4927c4e5c36f038, InitialSourceConnectionID: 77f9a79867236f031782, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:05 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection af890d27436812c4927c4e5c36f038 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: 77f9a79867236f031782, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 77f9a79867236f031782, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:05 client Dropping Initial keys. 2025/04/30 09:40:05 client -> Sending packet 1 (45 bytes) for connection af890d27436812c4927c4e5c36f038, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 77f9a79867236f031782, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client -> Sending packet 0 (48 bytes) for connection af890d27436812c4927c4e5c36f038, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 77f9a79867236f031782, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:05 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:05 client -> Sending packet 1 (37 bytes) for connection af890d27436812c4927c4e5c36f038, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 77f9a79867236f031782, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 77.696µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:05 client -> Sending packet 2 (73 bytes) for connection af890d27436812c4927c4e5c36f038, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 77f9a79867236f031782, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:05 client Short Header{DestConnectionID: 77f9a79867236f031782, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:05 client Connection af890d27436812c4927c4e5c36f038 closed. 2025/04/30 09:40:05 Requesting https://server4:443/qtsezdzjor. 2025/04/30 09:40:05 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:05 Increased send buffer size to 14336 kiB 2025/04/30 09:40:05 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:05 Created qlog file: /logs/qlog/3504865b5ffcc7c08696a40dc74d8e595b0f2f40.sqlog 2025/04/30 09:40:05 client Starting new connection to server4 ([::]:54292 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, version v1 2025/04/30 09:40:05 Adding connection ID (empty). 2025/04/30 09:40:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:05 client -> Sending packet 0 (1280 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:05 client -> Sending packet 1 (1280 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:05 client -> Sending packet 2 (1280 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1094 bytes. 2025/04/30 09:40:05 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 42698a98488186abda2e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 09:40:05 client Received first packet. Switching destination connection ID to: 42698a98488186abda2e 2025/04/30 09:40:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 09:40:05 client newly acked packets (1): [2] 2025/04/30 09:40:05 client updated RTT: 33.942474ms (σ: 16.971237ms) 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 318 bytes. 2025/04/30 09:40:05 client <- Reading packet 1 (776 bytes) for connection (empty), Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 42698a98488186abda2e, PacketNumber: 1, PacketNumberLen: 1, Length: 757, Version: v1} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 09:40:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, InitialSourceConnectionID: 42698a98488186abda2e, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:05 client Dropping %!s(logging.PacketType=5) packet (318 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40 2025/04/30 09:40:05 client Long Header{Type: Initial, DestConnectionID: 42698a98488186abda2e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 42698a98488186abda2e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:05 client Dropping Initial keys. 2025/04/30 09:40:05 client -> Sending packet 1 (45 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: 42698a98488186abda2e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client -> Sending packet 0 (48 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 42698a98488186abda2e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:05 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:05 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 42698a98488186abda2e, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:05 client Peer doesn't await address validation any longer. 2025/04/30 09:40:05 client newly acked packets (1): [0] 2025/04/30 09:40:05 client updated RTT: 33.857ms (σ: 12.896ms) 2025/04/30 09:40:05 client Canceling loss detection timer. 2025/04/30 09:40:05 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:05 client Dropping Handshake keys. 2025/04/30 09:40:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 929dd4355c2c2d961f2a, StatelessResetToken: 0x3a74507725d66106ee0c8bd80155def6} 2025/04/30 09:40:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a62d3ce9e11a21871685, StatelessResetToken: 0x9e4e866de9a259f045baac98dba6ea74} 2025/04/30 09:40:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 60229c8848414118fbea, StatelessResetToken: 0x1da98fc5e84649ae63cdd2d56f0a3db7} 2025/04/30 09:40:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:05 client -> Sending packet 1 (39 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 929dd4355c2c2d961f2a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 150.463µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:05 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.PingFrame{} 2025/04/30 09:40:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:05 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/04/30 09:40:05 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601007a2c797a46fe0d7102337876190375c9299b86cd159d1e97be0256863056cedf5261b1fa} 2025/04/30 09:40:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:05 client -> Sending packet 2 (39 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 929dd4355c2c2d961f2a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 79.57µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client <- Reading packet 6 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.PingFrame{} 2025/04/30 09:40:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:05 client -> Sending packet 3 (41 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 929dd4355c2c2d961f2a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 65.022µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client <- Reading packet 8 (27 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 17.952ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:05 client newly acked packets (2): [0 1] 2025/04/30 09:40:05 client ECN capability confirmed. 2025/04/30 09:40:05 client Canceling loss detection timer. 2025/04/30 09:40:05 client Ignoring all packets below 1. 2025/04/30 09:40:05 client <- Reading packet 9 (1422 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.PingFrame{} 2025/04/30 09:40:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:05 client <- Reading packet 10 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:05 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 09d481432433798f5bca, StatelessResetToken: 0xe2271a18e93413ed7862d001148799d7} 2025/04/30 09:40:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:05 client -> Sending packet 4 (43 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:05 client Short Header{DestConnectionID: 929dd4355c2c2d961f2a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:05 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 64.761µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:40:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:06 client <- Reading packet 11 (1262 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 09d481432433798f5bca, StatelessResetToken: 0xe2271a18e93413ed7862d001148799d7} 2025/04/30 09:40:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:06 client -> Sending packet 5 (32 bytes) for connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 929dd4355c2c2d961f2a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:06 client Connection 3504865b5ffcc7c08696a40dc74d8e595b0f2f40 closed. 2025/04/30 09:40:06 Requesting https://server4:443/fshmzowjnl. 2025/04/30 09:40:06 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:06 Increased send buffer size to 14336 kiB 2025/04/30 09:40:06 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:06 Created qlog file: /logs/qlog/1f3acae21b18eae883.sqlog 2025/04/30 09:40:06 client Starting new connection to server4 ([::]:39558 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1f3acae21b18eae883, version v1 2025/04/30 09:40:06 Adding connection ID (empty). 2025/04/30 09:40:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:06 client -> Sending packet 0 (1280 bytes) for connection 1f3acae21b18eae883, Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 1f3acae21b18eae883, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:06 client -> Sending packet 1 (1280 bytes) for connection 1f3acae21b18eae883, Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 1f3acae21b18eae883, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:06 client -> Sending packet 2 (1280 bytes) for connection 1f3acae21b18eae883, Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 1f3acae21b18eae883, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1094 bytes. 2025/04/30 09:40:06 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4c3270694cee659f3e8b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 09:40:06 client Received first packet. Switching destination connection ID to: 4c3270694cee659f3e8b 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 09:40:06 client newly acked packets (1): [2] 2025/04/30 09:40:06 client updated RTT: 33.879618ms (σ: 16.939809ms) 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 329 bytes. 2025/04/30 09:40:06 client <- Reading packet 1 (765 bytes) for connection (empty), Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4c3270694cee659f3e8b, PacketNumber: 1, PacketNumberLen: 1, Length: 746, Version: v1} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 09:40:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1f3acae21b18eae883, InitialSourceConnectionID: 4c3270694cee659f3e8b, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:06 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1f3acae21b18eae883 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 4c3270694cee659f3e8b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 4c3270694cee659f3e8b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:06 client Dropping Initial keys. 2025/04/30 09:40:06 client -> Sending packet 1 (45 bytes) for connection 1f3acae21b18eae883, Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 4c3270694cee659f3e8b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client -> Sending packet 0 (48 bytes) for connection 1f3acae21b18eae883, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 4c3270694cee659f3e8b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:06 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4c3270694cee659f3e8b, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:06 client Peer doesn't await address validation any longer. 2025/04/30 09:40:06 client newly acked packets (1): [0] 2025/04/30 09:40:06 client updated RTT: 33.786ms (σ: 12.889ms) 2025/04/30 09:40:06 client Canceling loss detection timer. 2025/04/30 09:40:06 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:06 client Dropping Handshake keys. 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7be765246a39543dea2b, StatelessResetToken: 0xf236fbf1d3d227c1688dbda21488a0fb} 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a44ce8b3d854d7b3f7f, StatelessResetToken: 0x68af2d3a11aa38b7d54e67583ff3a4a6} 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e0078554deb9ffb2d9f7, StatelessResetToken: 0x44300f338c1b56152a41201dd2e153e2} 2025/04/30 09:40:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:06 client -> Sending packet 1 (39 bytes) for connection 1f3acae21b18eae883, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 7be765246a39543dea2b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 139.742µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:06 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.PingFrame{} 2025/04/30 09:40:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:06 client <- Reading packet 3 (191 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 182, Data length: 123, Offset + Data length: 305} 2025/04/30 09:40:06 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100aa801db83a9daf57792ee73dde1f024bbb10b12718948b250cc0bbb0cd9ddf49219d0a3b} 2025/04/30 09:40:06 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:06 client -> Sending packet 2 (39 bytes) for connection 1f3acae21b18eae883, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 7be765246a39543dea2b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 61.586µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.032ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client newly acked packets (1): [0] 2025/04/30 09:40:06 client updated RTT: 33.745ms (σ: 9.747ms) 2025/04/30 09:40:06 client ECN capability confirmed. 2025/04/30 09:40:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:06 client -> Sending packet 4 (31 bytes) for connection 1f3acae21b18eae883, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 7be765246a39543dea2b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:06 client -> Sending packet 5 (31 bytes) for connection 1f3acae21b18eae883, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 7be765246a39543dea2b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:06 client <- Reading packet 5 (58 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 077af5d875570377e350, StatelessResetToken: 0x90fd5b71ebf23fdc9740039939a880f6} 2025/04/30 09:40:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:06 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:06 client -> Sending packet 6 (40 bytes) for connection 1f3acae21b18eae883, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 7be765246a39543dea2b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.346398ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client <- Reading packet 6 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.PingFrame{} 2025/04/30 09:40:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:06 client -> Sending packet 7 (1366 bytes) for connection 1f3acae21b18eae883, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 7be765246a39543dea2b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.PingFrame{} 2025/04/30 09:40:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:06 client -> Sending packet 8 (32 bytes) for connection 1f3acae21b18eae883, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 7be765246a39543dea2b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:06 client Connection 1f3acae21b18eae883 closed. 2025/04/30 09:40:06 Requesting https://server4:443/rcdpdwlted. 2025/04/30 09:40:06 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:06 Increased send buffer size to 14336 kiB 2025/04/30 09:40:06 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:06 Created qlog file: /logs/qlog/6f872df4aec0d758f78b62c6e6353a56.sqlog 2025/04/30 09:40:06 client Starting new connection to server4 ([::]:35031 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6f872df4aec0d758f78b62c6e6353a56, version v1 2025/04/30 09:40:06 Adding connection ID (empty). 2025/04/30 09:40:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:06 client -> Sending packet 0 (1280 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 6f872df4aec0d758f78b62c6e6353a56, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:06 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9e9f2e1973ce746dc22d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:06 client Received first packet. Switching destination connection ID to: 9e9f2e1973ce746dc22d 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:06 client newly acked packets (1): [0] 2025/04/30 09:40:06 client updated RTT: 35.146338ms (σ: 17.573169ms) 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 09:40:06 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9e9f2e1973ce746dc22d, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 09:40:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6f872df4aec0d758f78b62c6e6353a56, InitialSourceConnectionID: 9e9f2e1973ce746dc22d, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:06 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 9e9f2e1973ce746dc22d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 9e9f2e1973ce746dc22d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:06 client Dropping Initial keys. 2025/04/30 09:40:06 client -> Sending packet 1 (93 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 9e9f2e1973ce746dc22d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client Short Header{DestConnectionID: 9e9f2e1973ce746dc22d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:06 client -> Sending packet 2 (76 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 9e9f2e1973ce746dc22d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:06 client -> Sending packet 3 (76 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 9e9f2e1973ce746dc22d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:06 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9e9f2e1973ce746dc22d, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 09:40:06 client Peer doesn't await address validation any longer. 2025/04/30 09:40:06 client newly acked packets (1): [3] 2025/04/30 09:40:06 client updated RTT: 34.778ms (σ: 13.914ms) 2025/04/30 09:40:06 client Canceling loss detection timer. 2025/04/30 09:40:06 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:06 client Dropping Handshake keys. 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 206817754e81af68aff8, StatelessResetToken: 0x5819afae0d611be7822600c009f10379} 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 93fa6753f78f3ab4d391, StatelessResetToken: 0x8e3fb9c14f25a6decb751c11e7e21e13} 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5d6447323ba605d70126, StatelessResetToken: 0x64246f1c87e520ab4a80b7f043e8b94f} 2025/04/30 09:40:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:06 client -> Sending packet 2 (58 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 206817754e81af68aff8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 165.972µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:06 client -> Sending packet 3 (50 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 206817754e81af68aff8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:06 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:06 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601007511f233f4207f3883894afa3433478e080d807ac773e1f9f9f2df82d887ff591d484d82} 2025/04/30 09:40:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:06 client -> Sending packet 4 (39 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 206817754e81af68aff8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 94.016µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dd0a391a3811fb691678, StatelessResetToken: 0xdd26ce781741fb6f0d80056f6edce3e3} 2025/04/30 09:40:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:06 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:06 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:06 client -> Sending packet 5 (39 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 206817754e81af68aff8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 70.432µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:06 client -> Sending packet 6 (32 bytes) for connection 6f872df4aec0d758f78b62c6e6353a56, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 206817754e81af68aff8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:06 client Connection 6f872df4aec0d758f78b62c6e6353a56 closed. 2025/04/30 09:40:06 Requesting https://server4:443/aztveateko. 2025/04/30 09:40:06 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:06 Increased send buffer size to 14336 kiB 2025/04/30 09:40:06 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:06 Created qlog file: /logs/qlog/34b9a6b0880302bbbe4ba96c0e85a2.sqlog 2025/04/30 09:40:06 client Starting new connection to server4 ([::]:56250 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 34b9a6b0880302bbbe4ba96c0e85a2, version v1 2025/04/30 09:40:06 Adding connection ID (empty). 2025/04/30 09:40:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:06 client -> Sending packet 0 (1280 bytes) for connection 34b9a6b0880302bbbe4ba96c0e85a2, Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 34b9a6b0880302bbbe4ba96c0e85a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:06 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 121fdcb4eeee3c9aa597, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:06 client Received first packet. Switching destination connection ID to: 121fdcb4eeee3c9aa597 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:06 client newly acked packets (1): [0] 2025/04/30 09:40:06 client updated RTT: 34.632877ms (σ: 17.316438ms) 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 09:40:06 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 121fdcb4eeee3c9aa597, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 09:40:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 34b9a6b0880302bbbe4ba96c0e85a2, InitialSourceConnectionID: 121fdcb4eeee3c9aa597, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:06 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 34b9a6b0880302bbbe4ba96c0e85a2 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 121fdcb4eeee3c9aa597, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 121fdcb4eeee3c9aa597, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:06 client Dropping Initial keys. 2025/04/30 09:40:06 client -> Sending packet 1 (93 bytes) for connection 34b9a6b0880302bbbe4ba96c0e85a2, Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 121fdcb4eeee3c9aa597, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client Short Header{DestConnectionID: 121fdcb4eeee3c9aa597, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:06 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.PingFrame{} 2025/04/30 09:40:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:06 client -> Sending packet 1 (37 bytes) for connection 34b9a6b0880302bbbe4ba96c0e85a2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 121fdcb4eeee3c9aa597, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 71.285µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:06 client -> Sending packet 2 (73 bytes) for connection 34b9a6b0880302bbbe4ba96c0e85a2, Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 121fdcb4eeee3c9aa597, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:06 client Short Header{DestConnectionID: 121fdcb4eeee3c9aa597, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:06 client Connection 34b9a6b0880302bbbe4ba96c0e85a2 closed. 2025/04/30 09:40:06 Requesting https://server4:443/pbvpgjgxvf. 2025/04/30 09:40:06 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:06 Increased send buffer size to 14336 kiB 2025/04/30 09:40:06 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:06 Created qlog file: /logs/qlog/a2d1156e4ad3b3a2543ef1189d.sqlog 2025/04/30 09:40:06 client Starting new connection to server4 ([::]:42263 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a2d1156e4ad3b3a2543ef1189d, version v1 2025/04/30 09:40:06 Adding connection ID (empty). 2025/04/30 09:40:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:06 client -> Sending packet 0 (1280 bytes) for connection a2d1156e4ad3b3a2543ef1189d, Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: a2d1156e4ad3b3a2543ef1189d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:40:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:06 client -> Sending packet 1 (1280 bytes) for connection a2d1156e4ad3b3a2543ef1189d, Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: a2d1156e4ad3b3a2543ef1189d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:40:06 client -> Sending packet 2 (1280 bytes) for connection a2d1156e4ad3b3a2543ef1189d, Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: a2d1156e4ad3b3a2543ef1189d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:40:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:06 client <- Reading packet 2 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7b20dba5692768998b44, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:06 client Received first packet. Switching destination connection ID to: 7b20dba5692768998b44 2025/04/30 09:40:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:06 client newly acked packets (1): [2] 2025/04/30 09:40:06 client updated RTT: 33.93089ms (σ: 16.965445ms) 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 328 bytes. 2025/04/30 09:40:06 client <- Reading packet 2 (768 bytes) for connection (empty), Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b20dba5692768998b44, PacketNumber: 2, PacketNumberLen: 1, Length: 749, Version: v1} 2025/04/30 09:40:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 09:40:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a2d1156e4ad3b3a2543ef1189d, InitialSourceConnectionID: 7b20dba5692768998b44, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:06 client Dropping %!s(logging.PacketType=5) packet (328 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a2d1156e4ad3b3a2543ef1189d 2025/04/30 09:40:06 client Long Header{Type: Initial, DestConnectionID: 7b20dba5692768998b44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 7b20dba5692768998b44, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:06 client Dropping Initial keys. 2025/04/30 09:40:06 client -> Sending packet 1 (45 bytes) for connection a2d1156e4ad3b3a2543ef1189d, Handshake 2025/04/30 09:40:06 client Long Header{Type: Handshake, DestConnectionID: 7b20dba5692768998b44, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:06 client -> Sending packet 0 (48 bytes) for connection a2d1156e4ad3b3a2543ef1189d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:06 client Short Header{DestConnectionID: 7b20dba5692768998b44, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:07 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:07 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b20dba5692768998b44, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:07 client Peer doesn't await address validation any longer. 2025/04/30 09:40:07 client newly acked packets (1): [0] 2025/04/30 09:40:07 client updated RTT: 33.833ms (σ: 12.917ms) 2025/04/30 09:40:07 client Canceling loss detection timer. 2025/04/30 09:40:07 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:07 client Dropping Handshake keys. 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8f32d621927b4ae5aa7, StatelessResetToken: 0xd508f92c7a58ff6f97dd0d065456858b} 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c98d45c7ea0797043936, StatelessResetToken: 0x2b8c11b1ddffeef73be3202aec335b53} 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 64289ee15e5c64f7aaaf, StatelessResetToken: 0x056ce1e5bac376af004513cc9dd54171} 2025/04/30 09:40:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:07 client -> Sending packet 1 (39 bytes) for connection a2d1156e4ad3b3a2543ef1189d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: a8f32d621927b4ae5aa7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 142.849µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:07 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.PingFrame{} 2025/04/30 09:40:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:07 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:07 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:07 client -> Sending packet 2 (37 bytes) for connection a2d1156e4ad3b3a2543ef1189d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: a8f32d621927b4ae5aa7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 63.189µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:07 client -> Sending packet 3 (32 bytes) for connection a2d1156e4ad3b3a2543ef1189d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: a8f32d621927b4ae5aa7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:07 client Connection a2d1156e4ad3b3a2543ef1189d closed. 2025/04/30 09:40:07 Requesting https://server4:443/nxixqpllse. 2025/04/30 09:40:07 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:07 Increased send buffer size to 14336 kiB 2025/04/30 09:40:07 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:07 Created qlog file: /logs/qlog/2790035676d8a487183d1dea63f7.sqlog 2025/04/30 09:40:07 client Starting new connection to server4 ([::]:41081 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2790035676d8a487183d1dea63f7, version v1 2025/04/30 09:40:07 Adding connection ID (empty). 2025/04/30 09:40:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:07 client -> Sending packet 0 (1280 bytes) for connection 2790035676d8a487183d1dea63f7, Initial 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: 2790035676d8a487183d1dea63f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:40:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:07 client -> Sending packet 1 (1280 bytes) for connection 2790035676d8a487183d1dea63f7, Initial 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: 2790035676d8a487183d1dea63f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:40:07 client -> Sending packet 2 (1280 bytes) for connection 2790035676d8a487183d1dea63f7, Initial 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: 2790035676d8a487183d1dea63f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:40:07 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1094 bytes. 2025/04/30 09:40:07 client <- Reading packet 1 (138 bytes) for connection (empty), Initial 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c84888f1c2a821462ddb, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 09:40:07 client Received first packet. Switching destination connection ID to: c84888f1c2a821462ddb 2025/04/30 09:40:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 09:40:07 client newly acked packets (1): [2] 2025/04/30 09:40:07 client updated RTT: 33.815135ms (σ: 16.907567ms) 2025/04/30 09:40:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:07 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 324 bytes. 2025/04/30 09:40:07 client <- Reading packet 1 (770 bytes) for connection (empty), Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c84888f1c2a821462ddb, PacketNumber: 1, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 09:40:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 09:40:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2790035676d8a487183d1dea63f7, InitialSourceConnectionID: c84888f1c2a821462ddb, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:07 client Dropping %!s(logging.PacketType=5) packet (324 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2790035676d8a487183d1dea63f7 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: c84888f1c2a821462ddb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: c84888f1c2a821462ddb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:07 client Dropping Initial keys. 2025/04/30 09:40:07 client -> Sending packet 1 (93 bytes) for connection 2790035676d8a487183d1dea63f7, Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: c84888f1c2a821462ddb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client Short Header{DestConnectionID: c84888f1c2a821462ddb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:07 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:07 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c84888f1c2a821462ddb, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:07 client Peer doesn't await address validation any longer. 2025/04/30 09:40:07 client newly acked packets (1): [0] 2025/04/30 09:40:07 client updated RTT: 33.743ms (σ: 12.823ms) 2025/04/30 09:40:07 client Canceling loss detection timer. 2025/04/30 09:40:07 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:07 client Dropping Handshake keys. 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d93a8d1951faa499cc8d, StatelessResetToken: 0x775702d6fbbad38d81192d4d1f698147} 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 81d42877567367d8864e, StatelessResetToken: 0x99afe7ed98a8efa01866481cfabb60c2} 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c2914dfd3f57ff77277a, StatelessResetToken: 0x12427c2c102bd20860d94b30faa32d12} 2025/04/30 09:40:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:07 client -> Sending packet 1 (39 bytes) for connection 2790035676d8a487183d1dea63f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: d93a8d1951faa499cc8d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 172.485µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:07 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client newly acked packets (1): [1] 2025/04/30 09:40:07 client updated RTT: 33.379ms (σ: 10.343ms) 2025/04/30 09:40:07 client ECN capability confirmed. 2025/04/30 09:40:07 client lost packet 0 (time threshold) 2025/04/30 09:40:07 client Canceling loss detection timer. 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 51db8441c28e962d1bf1, StatelessResetToken: 0xda54c970b74a28828e782715d45de603} 2025/04/30 09:40:07 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:07 client Ignoring all packets below 1. 2025/04/30 09:40:07 client -> Sending packet 2 (56 bytes) for connection 2790035676d8a487183d1dea63f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: d93a8d1951faa499cc8d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 144.452µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:07 client -> Sending packet 4 (48 bytes) for connection 2790035676d8a487183d1dea63f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: d93a8d1951faa499cc8d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:07 client -> Sending packet 5 (48 bytes) for connection 2790035676d8a487183d1dea63f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: d93a8d1951faa499cc8d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:07 client <- Reading packet 4 (418 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 51db8441c28e962d1bf1, StatelessResetToken: 0xda54c970b74a28828e782715d45de603} 2025/04/30 09:40:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:07 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601004564ec23e39ec1e28f987fb61bb712c7871c6b2cb02d120e40c91cff88f2a76cdd47a21e} 2025/04/30 09:40:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:07 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.PingFrame{} 2025/04/30 09:40:07 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:07 client -> Sending packet 6 (37 bytes) for connection 2790035676d8a487183d1dea63f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: d93a8d1951faa499cc8d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 98.676µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:07 client -> Sending packet 7 (32 bytes) for connection 2790035676d8a487183d1dea63f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: d93a8d1951faa499cc8d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:07 client Connection 2790035676d8a487183d1dea63f7 closed. 2025/04/30 09:40:07 Requesting https://server4:443/vkodavwume. 2025/04/30 09:40:07 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:07 Increased send buffer size to 14336 kiB 2025/04/30 09:40:07 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:07 Created qlog file: /logs/qlog/5a661844a20e14bddf5784.sqlog 2025/04/30 09:40:07 client Starting new connection to server4 ([::]:42223 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5a661844a20e14bddf5784, version v1 2025/04/30 09:40:07 Adding connection ID (empty). 2025/04/30 09:40:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:07 client -> Sending packet 0 (1280 bytes) for connection 5a661844a20e14bddf5784, Initial 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: 5a661844a20e14bddf5784, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:07 client -> Sending packet 1 (1280 bytes) for connection 5a661844a20e14bddf5784, Initial 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: 5a661844a20e14bddf5784, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:07 client -> Sending packet 2 (1280 bytes) for connection 5a661844a20e14bddf5784, Initial 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: 5a661844a20e14bddf5784, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:07 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:07 client <- Reading packet 2 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f940362e32c391f44edf, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:07 client Received first packet. Switching destination connection ID to: f940362e32c391f44edf 2025/04/30 09:40:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:07 client newly acked packets (1): [2] 2025/04/30 09:40:07 client updated RTT: 33.797188ms (σ: 16.898594ms) 2025/04/30 09:40:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:07 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:07 client <- Reading packet 2 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f940362e32c391f44edf, PacketNumber: 2, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5a661844a20e14bddf5784, InitialSourceConnectionID: f940362e32c391f44edf, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:07 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5a661844a20e14bddf5784 2025/04/30 09:40:07 client Long Header{Type: Initial, DestConnectionID: f940362e32c391f44edf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: f940362e32c391f44edf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:07 client Dropping Initial keys. 2025/04/30 09:40:07 client -> Sending packet 1 (45 bytes) for connection 5a661844a20e14bddf5784, Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: f940362e32c391f44edf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client -> Sending packet 0 (48 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: f940362e32c391f44edf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:07 client -> Sending packet 2 (76 bytes) for connection 5a661844a20e14bddf5784, Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: f940362e32c391f44edf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:07 client -> Sending packet 3 (76 bytes) for connection 5a661844a20e14bddf5784, Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: f940362e32c391f44edf, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:07 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:07 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f940362e32c391f44edf, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 09:40:07 client Peer doesn't await address validation any longer. 2025/04/30 09:40:07 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 101.344ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client newly acked packets (1): [0] 2025/04/30 09:40:07 client updated RTT: 43.912ms (σ: 32.903ms) 2025/04/30 09:40:07 client ECN capability confirmed. 2025/04/30 09:40:07 client Canceling loss detection timer. 2025/04/30 09:40:07 client Dropping Handshake keys. 2025/04/30 09:40:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8975dacd3bf1d0483bdd, StatelessResetToken: 0x450efb446f26cb2324fdbcca6b64b8de} 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be655831f4d362cbddf1, StatelessResetToken: 0x8ab811bbf63718f1dc24a65795dba7f2} 2025/04/30 09:40:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1e98f2ecdd2c2b4d1897, StatelessResetToken: 0xb7d2249cc16644b6ed2de6fd736da225} 2025/04/30 09:40:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:07 client -> Sending packet 1 (39 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: 8975dacd3bf1d0483bdd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.389µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:07 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.PingFrame{} 2025/04/30 09:40:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:07 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:07 client -> Sending packet 2 (38 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: 8975dacd3bf1d0483bdd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.37764ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:07 client <- Reading packet 4 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:07 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:07 client <- &wire.PingFrame{} 2025/04/30 09:40:07 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:07 client -> Sending packet 3 (39 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:07 client Short Header{DestConnectionID: 8975dacd3bf1d0483bdd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:07 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 86.956µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:08 client -> Sending packet 5 (31 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:08 client Short Header{DestConnectionID: 8975dacd3bf1d0483bdd, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:08 client -> Sending packet 6 (31 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:08 client Short Header{DestConnectionID: 8975dacd3bf1d0483bdd, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:08 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:08 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:08 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 21.232ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:08 client newly acked packets (1): [6] 2025/04/30 09:40:08 client updated RTT: 44.98ms (σ: 26.814ms) 2025/04/30 09:40:08 client Canceling loss detection timer. 2025/04/30 09:40:08 client -> Sending packet 7 (1366 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:08 client Short Header{DestConnectionID: 8975dacd3bf1d0483bdd, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:08 client -> &wire.PingFrame{} 2025/04/30 09:40:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:09 client <- Reading packet 8 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 282, Offset + Data length: 282} 2025/04/30 09:40:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:09 client -> Sending packet 8 (43 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: 8975dacd3bf1d0483bdd, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 109.014µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:09 client -> Sending packet 9 (32 bytes) for connection 5a661844a20e14bddf5784, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: 8975dacd3bf1d0483bdd, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:09 client Connection 5a661844a20e14bddf5784 closed. 2025/04/30 09:40:09 Requesting https://server4:443/lmgqhvsqla. 2025/04/30 09:40:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:09 Increased send buffer size to 14336 kiB 2025/04/30 09:40:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:09 Created qlog file: /logs/qlog/c1e4dfcd6b58928c700bb207d1.sqlog 2025/04/30 09:40:09 client Starting new connection to server4 ([::]:59433 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c1e4dfcd6b58928c700bb207d1, version v1 2025/04/30 09:40:09 Adding connection ID (empty). 2025/04/30 09:40:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:09 client -> Sending packet 0 (1280 bytes) for connection c1e4dfcd6b58928c700bb207d1, Initial 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: c1e4dfcd6b58928c700bb207d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:09 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9335829edcd8e625060, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:09 client Received first packet. Switching destination connection ID to: c9335829edcd8e625060 2025/04/30 09:40:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:09 client newly acked packets (1): [0] 2025/04/30 09:40:09 client updated RTT: 34.834783ms (σ: 17.417391ms) 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 327 bytes. 2025/04/30 09:40:09 client <- Reading packet 0 (769 bytes) for connection (empty), Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c9335829edcd8e625060, PacketNumber: 0, PacketNumberLen: 1, Length: 750, Version: v1} 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 09:40:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c1e4dfcd6b58928c700bb207d1, InitialSourceConnectionID: c9335829edcd8e625060, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:09 client Dropping %!s(logging.PacketType=5) packet (327 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c1e4dfcd6b58928c700bb207d1 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: c9335829edcd8e625060, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: c9335829edcd8e625060, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:09 client Dropping Initial keys. 2025/04/30 09:40:09 client -> Sending packet 1 (45 bytes) for connection c1e4dfcd6b58928c700bb207d1, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: c9335829edcd8e625060, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client -> Sending packet 0 (48 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: c9335829edcd8e625060, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:09 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c9335829edcd8e625060, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:09 client Peer doesn't await address validation any longer. 2025/04/30 09:40:09 client newly acked packets (1): [0] 2025/04/30 09:40:09 client updated RTT: 34.616ms (σ: 13.497ms) 2025/04/30 09:40:09 client Canceling loss detection timer. 2025/04/30 09:40:09 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:09 client Dropping Handshake keys. 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fc133dc3108b4ada5bdc, StatelessResetToken: 0x2b36b988dc5024079b8ef3923532d9a4} 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b5c564ac26a3426f24ed, StatelessResetToken: 0x763b54ec6c9d8f9a2c675c256c6b2718} 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bf3fab1afda1a2781120, StatelessResetToken: 0x78410f863a63d0b9d178d49ea371f734} 2025/04/30 09:40:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:09 client -> Sending packet 1 (39 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: fc133dc3108b4ada5bdc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 146.035µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:09 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.PingFrame{} 2025/04/30 09:40:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:09 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:09 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601007beba5197e0a702081d122b20e15696920ebc060466eba8aeeb5b24479d3f3f8f4e5ec64} 2025/04/30 09:40:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:09 client -> Sending packet 2 (37 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: fc133dc3108b4ada5bdc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 221.214µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:09 client -> Sending packet 4 (48 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: fc133dc3108b4ada5bdc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:09 client Skipping packet number 3 2025/04/30 09:40:09 client -> Sending packet 5 (31 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: fc133dc3108b4ada5bdc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:09 client <- Reading packet 5 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cbcaa9b2058d30564460, StatelessResetToken: 0x22f3ce6c35586bf8b5086546f6c7639e} 2025/04/30 09:40:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:09 client -> Sending packet 6 (39 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: fc133dc3108b4ada5bdc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 78.337µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client <- Reading packet 7 (29 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 21.584ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client newly acked packets (2): [4 5] 2025/04/30 09:40:09 client updated RTT: 36.88ms (σ: 14.651ms) 2025/04/30 09:40:09 client ECN capability confirmed. 2025/04/30 09:40:09 client Canceling loss detection timer. 2025/04/30 09:40:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:09 client <- Reading packet 9 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:09 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.PingFrame{} 2025/04/30 09:40:09 client -> Sending packet 7 (1366 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: fc133dc3108b4ada5bdc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.PingFrame{} 2025/04/30 09:40:09 client -> Sending packet 8 (43 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: fc133dc3108b4ada5bdc, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 128.482µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:09 client -> Sending packet 9 (32 bytes) for connection c1e4dfcd6b58928c700bb207d1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: fc133dc3108b4ada5bdc, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:09 client Connection c1e4dfcd6b58928c700bb207d1 closed. 2025/04/30 09:40:09 Requesting https://server4:443/vshrrfsjyb. 2025/04/30 09:40:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:09 Increased send buffer size to 14336 kiB 2025/04/30 09:40:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:09 Created qlog file: /logs/qlog/a629e8441c9eebbc8bee234a285226e9bcf5b6.sqlog 2025/04/30 09:40:09 client Starting new connection to server4 ([::]:36254 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a629e8441c9eebbc8bee234a285226e9bcf5b6, version v1 2025/04/30 09:40:09 Adding connection ID (empty). 2025/04/30 09:40:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:09 client -> Sending packet 0 (1280 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, Initial 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: a629e8441c9eebbc8bee234a285226e9bcf5b6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:09 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 48b00241b8ec30e98796, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:09 client Received first packet. Switching destination connection ID to: 48b00241b8ec30e98796 2025/04/30 09:40:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:09 client newly acked packets (1): [0] 2025/04/30 09:40:09 client updated RTT: 35.332929ms (σ: 17.666464ms) 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 322 bytes. 2025/04/30 09:40:09 client <- Reading packet 0 (774 bytes) for connection (empty), Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 48b00241b8ec30e98796, PacketNumber: 0, PacketNumberLen: 1, Length: 755, Version: v1} 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 09:40:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a629e8441c9eebbc8bee234a285226e9bcf5b6, InitialSourceConnectionID: 48b00241b8ec30e98796, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:09 client Dropping %!s(logging.PacketType=5) packet (322 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:09 client Dropping Initial keys. 2025/04/30 09:40:09 client -> Sending packet 1 (93 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Short Header{DestConnectionID: 48b00241b8ec30e98796, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:09 client <- Reading packet 1 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 48b00241b8ec30e98796, PacketNumber: 1, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:09 client <- &wire.PingFrame{} 2025/04/30 09:40:09 client -> Sending packet 2 (45 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:09 client -> Sending packet 3 (76 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:09 client -> Sending packet 4 (76 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:40:09 client -> Sending packet 5 (76 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:09 client -> Sending packet 6 (76 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:09 client <- Reading packet 3 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 48b00241b8ec30e98796, PacketNumber: 3, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:09 client <- &wire.PingFrame{} 2025/04/30 09:40:09 client -> Sending packet 7 (47 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 48b00241b8ec30e98796, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1289 bytes. 2025/04/30 09:40:09 client <- Reading packet 4 (43 bytes) for connection (empty), Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 48b00241b8ec30e98796, PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 09:40:09 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 09:40:09 client Peer doesn't await address validation any longer. 2025/04/30 09:40:09 client <- Reading packet 0 (1289 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 317.864ms} 2025/04/30 09:40:09 client newly acked packets (1): [0] 2025/04/30 09:40:09 client updated RTT: 72.298ms (σ: 87.182ms) 2025/04/30 09:40:09 client Canceling loss detection timer. 2025/04/30 09:40:09 client Dropping Handshake keys. 2025/04/30 09:40:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2d4665a8214c37886569, StatelessResetToken: 0xd10e343124a48781f0100676aac2fba3} 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2df476dd11e972c240c5, StatelessResetToken: 0x69725a12d55e9c020328a05bf2625232} 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 31a14d788af452151863, StatelessResetToken: 0x05f88fab2554cd9693b3c69da7315db3} 2025/04/30 09:40:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:09 client -> Sending packet 1 (39 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: 2d4665a8214c37886569, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 174.588µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:09 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.PingFrame{} 2025/04/30 09:40:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:09 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:09 client -> Sending packet 2 (37 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: 2d4665a8214c37886569, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 74.741µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:09 client -> Sending packet 3 (32 bytes) for connection a629e8441c9eebbc8bee234a285226e9bcf5b6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: 2d4665a8214c37886569, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:09 Received 1 packets after sending CONNECTION_CLOSE. Retransmitting. 2025/04/30 09:40:09 client Connection a629e8441c9eebbc8bee234a285226e9bcf5b6 closed. 2025/04/30 09:40:09 Requesting https://server4:443/xcpvkdehwd. 2025/04/30 09:40:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:09 Increased send buffer size to 14336 kiB 2025/04/30 09:40:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:09 Created qlog file: /logs/qlog/a15b435efd7aaed1a5c8.sqlog 2025/04/30 09:40:09 client Starting new connection to server4 ([::]:44860 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a15b435efd7aaed1a5c8, version v1 2025/04/30 09:40:09 Adding connection ID (empty). 2025/04/30 09:40:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:09 client -> Sending packet 0 (1280 bytes) for connection a15b435efd7aaed1a5c8, Initial 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: a15b435efd7aaed1a5c8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:09 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a75e111d698ead794e3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:09 client Received first packet. Switching destination connection ID to: 7a75e111d698ead794e3 2025/04/30 09:40:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:09 client newly acked packets (1): [0] 2025/04/30 09:40:09 client updated RTT: 34.601834ms (σ: 17.300917ms) 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 330 bytes. 2025/04/30 09:40:09 client <- Reading packet 0 (766 bytes) for connection (empty), Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a75e111d698ead794e3, PacketNumber: 0, PacketNumberLen: 1, Length: 747, Version: v1} 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:40:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a15b435efd7aaed1a5c8, InitialSourceConnectionID: 7a75e111d698ead794e3, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:09 client Dropping %!s(logging.PacketType=5) packet (330 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a15b435efd7aaed1a5c8 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: 7a75e111d698ead794e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 7a75e111d698ead794e3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:09 client Dropping Initial keys. 2025/04/30 09:40:09 client -> Sending packet 1 (93 bytes) for connection a15b435efd7aaed1a5c8, Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: 7a75e111d698ead794e3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Short Header{DestConnectionID: 7a75e111d698ead794e3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:09 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:09 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a75e111d698ead794e3, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:09 client Peer doesn't await address validation any longer. 2025/04/30 09:40:09 client newly acked packets (1): [0] 2025/04/30 09:40:09 client updated RTT: 34.435ms (σ: 13.306ms) 2025/04/30 09:40:09 client Canceling loss detection timer. 2025/04/30 09:40:09 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:09 client Dropping Handshake keys. 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c767fb353dcbb7757d4f, StatelessResetToken: 0xa5265188f47c53a9fa7b045556f938bb} 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2a68c1af7de9d95b9972, StatelessResetToken: 0xb5790802782e37a657d3e4b01513bbe7} 2025/04/30 09:40:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1329e5b219c550ce2a90, StatelessResetToken: 0x4bbda374be542995e2aaa2072ab91a4e} 2025/04/30 09:40:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:09 client -> Sending packet 1 (39 bytes) for connection a15b435efd7aaed1a5c8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: c767fb353dcbb7757d4f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 149.792µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:09 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.PingFrame{} 2025/04/30 09:40:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:09 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:09 client -> Sending packet 2 (37 bytes) for connection a15b435efd7aaed1a5c8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: c767fb353dcbb7757d4f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 78.387µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:09 client -> Sending packet 3 (32 bytes) for connection a15b435efd7aaed1a5c8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:09 client Short Header{DestConnectionID: c767fb353dcbb7757d4f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:09 Received 1 packets after sending CONNECTION_CLOSE. Retransmitting. 2025/04/30 09:40:09 client Connection a15b435efd7aaed1a5c8 closed. 2025/04/30 09:40:09 Requesting https://server4:443/xnovpzannh. 2025/04/30 09:40:09 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:09 Increased send buffer size to 14336 kiB 2025/04/30 09:40:09 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:09 Created qlog file: /logs/qlog/668948ccaa09ae7a31184d48c039.sqlog 2025/04/30 09:40:09 client Starting new connection to server4 ([::]:59084 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 668948ccaa09ae7a31184d48c039, version v1 2025/04/30 09:40:09 Adding connection ID (empty). 2025/04/30 09:40:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:09 client -> Sending packet 0 (1280 bytes) for connection 668948ccaa09ae7a31184d48c039, Initial 2025/04/30 09:40:09 client Long Header{Type: Initial, DestConnectionID: 668948ccaa09ae7a31184d48c039, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:10 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 153b5f030335b5de2b5f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:10 client Received first packet. Switching destination connection ID to: 153b5f030335b5de2b5f 2025/04/30 09:40:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:10 client newly acked packets (1): [0] 2025/04/30 09:40:10 client updated RTT: 34.991046ms (σ: 17.495523ms) 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 327 bytes. 2025/04/30 09:40:10 client <- Reading packet 0 (769 bytes) for connection (empty), Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 153b5f030335b5de2b5f, PacketNumber: 0, PacketNumberLen: 1, Length: 750, Version: v1} 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 09:40:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 668948ccaa09ae7a31184d48c039, InitialSourceConnectionID: 153b5f030335b5de2b5f, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:10 client Dropping %!s(logging.PacketType=5) packet (327 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 668948ccaa09ae7a31184d48c039 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: 153b5f030335b5de2b5f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: 153b5f030335b5de2b5f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:10 client Dropping Initial keys. 2025/04/30 09:40:10 client -> Sending packet 1 (45 bytes) for connection 668948ccaa09ae7a31184d48c039, Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: 153b5f030335b5de2b5f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client -> Sending packet 0 (48 bytes) for connection 668948ccaa09ae7a31184d48c039, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 153b5f030335b5de2b5f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:10 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 153b5f030335b5de2b5f, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:10 client Peer doesn't await address validation any longer. 2025/04/30 09:40:10 client newly acked packets (1): [0] 2025/04/30 09:40:10 client updated RTT: 34.774ms (σ: 13.553ms) 2025/04/30 09:40:10 client Canceling loss detection timer. 2025/04/30 09:40:10 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:10 client Dropping Handshake keys. 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1b8e1508c84cc0bd273e, StatelessResetToken: 0x84844bb47e40378560f4006143e93f21} 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00032701014a1cf6bbe6, StatelessResetToken: 0x6dfe5c62c3ae910e2c74a8ec33f5a416} 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a24f73333b3eb01bc455, StatelessResetToken: 0x23f2a95eba68614cac5a3298c21ce2a3} 2025/04/30 09:40:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:10 client -> Sending packet 1 (39 bytes) for connection 668948ccaa09ae7a31184d48c039, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 1b8e1508c84cc0bd273e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 182.153µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:10 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.PingFrame{} 2025/04/30 09:40:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:10 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:10 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:10 client -> Sending packet 2 (37 bytes) for connection 668948ccaa09ae7a31184d48c039, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 1b8e1508c84cc0bd273e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 80.621µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:10 client -> Sending packet 3 (32 bytes) for connection 668948ccaa09ae7a31184d48c039, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 1b8e1508c84cc0bd273e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:10 client Connection 668948ccaa09ae7a31184d48c039 closed. 2025/04/30 09:40:10 Requesting https://server4:443/vwbyuxrojy. 2025/04/30 09:40:10 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:10 Increased send buffer size to 14336 kiB 2025/04/30 09:40:10 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:10 Created qlog file: /logs/qlog/820612a1da912c31189d6ec36d8c.sqlog 2025/04/30 09:40:10 client Starting new connection to server4 ([::]:56080 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 820612a1da912c31189d6ec36d8c, version v1 2025/04/30 09:40:10 Adding connection ID (empty). 2025/04/30 09:40:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:10 client -> Sending packet 0 (1280 bytes) for connection 820612a1da912c31189d6ec36d8c, Initial 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: 820612a1da912c31189d6ec36d8c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:10 client -> Sending packet 1 (1280 bytes) for connection 820612a1da912c31189d6ec36d8c, Initial 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: 820612a1da912c31189d6ec36d8c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:10 client -> Sending packet 2 (1280 bytes) for connection 820612a1da912c31189d6ec36d8c, Initial 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: 820612a1da912c31189d6ec36d8c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 1: 141 bytes. Remaining: 1091 bytes. 2025/04/30 09:40:10 client <- Reading packet 2 (141 bytes) for connection (empty), Initial 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00d7fedba07ad008b0dc, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 09:40:10 client Received first packet. Switching destination connection ID to: 00d7fedba07ad008b0dc 2025/04/30 09:40:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 301.272ms} 2025/04/30 09:40:10 client newly acked packets (1): [2] 2025/04/30 09:40:10 client updated RTT: 335.471244ms (σ: 167.735622ms) 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 321 bytes. 2025/04/30 09:40:10 client <- Reading packet 2 (770 bytes) for connection (empty), Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00d7fedba07ad008b0dc, PacketNumber: 2, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 09:40:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 820612a1da912c31189d6ec36d8c, InitialSourceConnectionID: 00d7fedba07ad008b0dc, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:10 client Dropping %!s(logging.PacketType=5) packet (321 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 820612a1da912c31189d6ec36d8c 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: 00d7fedba07ad008b0dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: 00d7fedba07ad008b0dc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:10 client Dropping Initial keys. 2025/04/30 09:40:10 client -> Sending packet 1 (45 bytes) for connection 820612a1da912c31189d6ec36d8c, Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: 00d7fedba07ad008b0dc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client -> Sending packet 0 (48 bytes) for connection 820612a1da912c31189d6ec36d8c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 00d7fedba07ad008b0dc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:10 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00d7fedba07ad008b0dc, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:10 client Peer doesn't await address validation any longer. 2025/04/30 09:40:10 client newly acked packets (1): [0] 2025/04/30 09:40:10 client updated RTT: 297.698ms (σ: 201.346ms) 2025/04/30 09:40:10 client Canceling loss detection timer. 2025/04/30 09:40:10 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:10 client Dropping Handshake keys. 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4361b9222d6cff23ea8, StatelessResetToken: 0x691d4dad5ce24e6f31b1793015294bfe} 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d2733c1f3c8e6c07f016, StatelessResetToken: 0xef2a58fbe44c7d09f96661d1f292d9ba} 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2cf120f2050725ca1e06, StatelessResetToken: 0x10ab7fc227a1d77d43caf08167d4e3fb} 2025/04/30 09:40:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:10 client -> Sending packet 1 (39 bytes) for connection 820612a1da912c31189d6ec36d8c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: d4361b9222d6cff23ea8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 143.77µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:10 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.PingFrame{} 2025/04/30 09:40:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:10 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:10 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:10 client -> Sending packet 2 (37 bytes) for connection 820612a1da912c31189d6ec36d8c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: d4361b9222d6cff23ea8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 94.858µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:10 client -> Sending packet 3 (32 bytes) for connection 820612a1da912c31189d6ec36d8c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: d4361b9222d6cff23ea8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:10 client Connection 820612a1da912c31189d6ec36d8c closed. 2025/04/30 09:40:10 Requesting https://server4:443/ykphyoocpm. 2025/04/30 09:40:10 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:10 Increased send buffer size to 14336 kiB 2025/04/30 09:40:10 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:10 Created qlog file: /logs/qlog/e8ed125ed1c339cf63f1bfbe17fe64ba724a2c.sqlog 2025/04/30 09:40:10 client Starting new connection to server4 ([::]:54226 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, version v1 2025/04/30 09:40:10 Adding connection ID (empty). 2025/04/30 09:40:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:10 client -> Sending packet 0 (1280 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, Initial 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:10 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e56dcd5637a9a65d1cf2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:10 client Received first packet. Switching destination connection ID to: e56dcd5637a9a65d1cf2 2025/04/30 09:40:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:10 client newly acked packets (1): [0] 2025/04/30 09:40:10 client updated RTT: 34.852366ms (σ: 17.426183ms) 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 320 bytes. 2025/04/30 09:40:10 client <- Reading packet 0 (776 bytes) for connection (empty), Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e56dcd5637a9a65d1cf2, PacketNumber: 0, PacketNumberLen: 1, Length: 757, Version: v1} 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 09:40:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, InitialSourceConnectionID: e56dcd5637a9a65d1cf2, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:10 client Dropping %!s(logging.PacketType=5) packet (320 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: e56dcd5637a9a65d1cf2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: e56dcd5637a9a65d1cf2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:10 client Dropping Initial keys. 2025/04/30 09:40:10 client -> Sending packet 1 (45 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: e56dcd5637a9a65d1cf2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client -> Sending packet 0 (48 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: e56dcd5637a9a65d1cf2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:10 client <- Reading packet 1 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e56dcd5637a9a65d1cf2, PacketNumber: 1, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:10 client <- &wire.PingFrame{} 2025/04/30 09:40:10 client -> Sending packet 2 (45 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: e56dcd5637a9a65d1cf2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:10 client -> Sending packet 3 (76 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: e56dcd5637a9a65d1cf2, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:10 client -> Sending packet 4 (76 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: e56dcd5637a9a65d1cf2, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:10 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:10 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e56dcd5637a9a65d1cf2, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:10 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:10 client Peer doesn't await address validation any longer. 2025/04/30 09:40:10 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104.424ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client newly acked packets (1): [0] 2025/04/30 09:40:10 client updated RTT: 45.205ms (σ: 33.777ms) 2025/04/30 09:40:10 client ECN capability confirmed. 2025/04/30 09:40:10 client Canceling loss detection timer. 2025/04/30 09:40:10 client Dropping Handshake keys. 2025/04/30 09:40:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 098e94123714f21a4910, StatelessResetToken: 0x39a2a67a15ebd58252104c6ffaf484b3} 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a422f0028ae6f7f99e6b, StatelessResetToken: 0xd77acc5297676daa6ebd7febf9e93163} 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8abe858fd480de7dbc92, StatelessResetToken: 0xcca898330b70b082292edc75a0cfe6a9} 2025/04/30 09:40:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:10 client -> Sending packet 1 (39 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 098e94123714f21a4910, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 224.573µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:10 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.PingFrame{} 2025/04/30 09:40:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:10 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/04/30 09:40:10 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100b11e52bb919e1e17a342fa3bdca09515055c25aee1f611b1bea8a21191962ac24c2336c7} 2025/04/30 09:40:10 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:10 client -> Sending packet 2 (39 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 098e94123714f21a4910, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 64.35µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.PingFrame{} 2025/04/30 09:40:10 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:10 client -> Sending packet 3 (41 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 098e94123714f21a4910, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 70.863µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:10 client <- Reading packet 8 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:10 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:10 client <- &wire.PingFrame{} 2025/04/30 09:40:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 88c0daac2cc7ae6e6c7f, StatelessResetToken: 0x47de793860ff1a9e5e1b648d97dedff4} 2025/04/30 09:40:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:10 client -> Sending packet 4 (32 bytes) for connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:10 client Short Header{DestConnectionID: 098e94123714f21a4910, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:10 client Connection e8ed125ed1c339cf63f1bfbe17fe64ba724a2c closed. 2025/04/30 09:40:10 Requesting https://server4:443/szunppuify. 2025/04/30 09:40:10 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:10 Increased send buffer size to 14336 kiB 2025/04/30 09:40:10 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:10 Created qlog file: /logs/qlog/d158034b72e1911d83c890.sqlog 2025/04/30 09:40:10 client Starting new connection to server4 ([::]:35469 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d158034b72e1911d83c890, version v1 2025/04/30 09:40:10 Adding connection ID (empty). 2025/04/30 09:40:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:10 client -> Sending packet 0 (1280 bytes) for connection d158034b72e1911d83c890, Initial 2025/04/30 09:40:10 client Long Header{Type: Initial, DestConnectionID: d158034b72e1911d83c890, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:40:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:11 client -> Sending packet 1 (1280 bytes) for connection d158034b72e1911d83c890, Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: d158034b72e1911d83c890, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:40:11 client -> Sending packet 2 (1280 bytes) for connection d158034b72e1911d83c890, Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: d158034b72e1911d83c890, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:40:11 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:11 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 485434171c2509c52038, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:11 client Received first packet. Switching destination connection ID to: 485434171c2509c52038 2025/04/30 09:40:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:11 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:11 client <- Reading packet 1 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 485434171c2509c52038, PacketNumber: 1, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d158034b72e1911d83c890, InitialSourceConnectionID: 485434171c2509c52038, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:11 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d158034b72e1911d83c890 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: 485434171c2509c52038, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: 485434171c2509c52038, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:11 client Dropping Initial keys. 2025/04/30 09:40:11 client -> Sending packet 1 (45 bytes) for connection d158034b72e1911d83c890, Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: 485434171c2509c52038, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client -> Sending packet 0 (48 bytes) for connection d158034b72e1911d83c890, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 485434171c2509c52038, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:11 client -> Sending packet 2 (76 bytes) for connection d158034b72e1911d83c890, Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: 485434171c2509c52038, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:11 client -> Sending packet 3 (76 bytes) for connection d158034b72e1911d83c890, Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: 485434171c2509c52038, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:11 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:11 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 485434171c2509c52038, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:11 client Peer doesn't await address validation any longer. 2025/04/30 09:40:11 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 199.48ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client newly acked packets (1): [0] 2025/04/30 09:40:11 client updated RTT: 232.919982ms (σ: 116.459991ms) 2025/04/30 09:40:11 client ECN capability confirmed. 2025/04/30 09:40:11 client Canceling loss detection timer. 2025/04/30 09:40:11 client Dropping Handshake keys. 2025/04/30 09:40:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5866e3ef44f744991b6f, StatelessResetToken: 0xb354966ce69e8461d7901d416cadc112} 2025/04/30 09:40:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea67e3444d67dd767a6d, StatelessResetToken: 0xf0fdb9a543817c417673e93d197a765a} 2025/04/30 09:40:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2e5cc840787807846836, StatelessResetToken: 0xf7d09f2d71c4614c6575ccf3d2009c80} 2025/04/30 09:40:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:11 client -> Sending packet 1 (39 bytes) for connection d158034b72e1911d83c890, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 5866e3ef44f744991b6f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 239.791µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:11 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.PingFrame{} 2025/04/30 09:40:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:11 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:11 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:11 client -> Sending packet 2 (37 bytes) for connection d158034b72e1911d83c890, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 5866e3ef44f744991b6f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 93.956µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:11 client -> Sending packet 3 (32 bytes) for connection d158034b72e1911d83c890, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 5866e3ef44f744991b6f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:11 client Connection d158034b72e1911d83c890 closed. 2025/04/30 09:40:11 Requesting https://server4:443/wxtgssbvwf. 2025/04/30 09:40:11 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:11 Increased send buffer size to 14336 kiB 2025/04/30 09:40:11 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:11 Created qlog file: /logs/qlog/8c673b35cb3878421a03aa.sqlog 2025/04/30 09:40:11 client Starting new connection to server4 ([::]:37688 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8c673b35cb3878421a03aa, version v1 2025/04/30 09:40:11 Adding connection ID (empty). 2025/04/30 09:40:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:11 client -> Sending packet 0 (1280 bytes) for connection 8c673b35cb3878421a03aa, Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: 8c673b35cb3878421a03aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:11 client -> Sending packet 1 (1280 bytes) for connection 8c673b35cb3878421a03aa, Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: 8c673b35cb3878421a03aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:11 client -> Sending packet 2 (1280 bytes) for connection 8c673b35cb3878421a03aa, Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: 8c673b35cb3878421a03aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:11 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:11 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30265ba635fac66315f0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:11 client Received first packet. Switching destination connection ID to: 30265ba635fac66315f0 2025/04/30 09:40:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:11 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 330 bytes. 2025/04/30 09:40:11 client <- Reading packet 0 (766 bytes) for connection (empty), Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 30265ba635fac66315f0, PacketNumber: 0, PacketNumberLen: 1, Length: 747, Version: v1} 2025/04/30 09:40:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:40:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8c673b35cb3878421a03aa, InitialSourceConnectionID: 30265ba635fac66315f0, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:11 client Dropping %!s(logging.PacketType=5) packet (330 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8c673b35cb3878421a03aa 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: 30265ba635fac66315f0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: 30265ba635fac66315f0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:11 client Dropping Initial keys. 2025/04/30 09:40:11 client -> Sending packet 1 (45 bytes) for connection 8c673b35cb3878421a03aa, Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: 30265ba635fac66315f0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client -> Sending packet 0 (48 bytes) for connection 8c673b35cb3878421a03aa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 30265ba635fac66315f0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:11 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:11 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 09:40:11 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 330 bytes. 2025/04/30 09:40:11 client <- Reading packet 1 (766 bytes) for connection (empty), Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 30265ba635fac66315f0, PacketNumber: 1, PacketNumberLen: 1, Length: 747, Version: v1} 2025/04/30 09:40:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:40:11 client Dropping %!s(logging.PacketType=5) packet (330 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:11 client -> Sending packet 2 (45 bytes) for connection 8c673b35cb3878421a03aa, Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: 30265ba635fac66315f0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:11 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:11 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 30265ba635fac66315f0, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:11 client Peer doesn't await address validation any longer. 2025/04/30 09:40:11 client newly acked packets (1): [0] 2025/04/30 09:40:11 client updated RTT: 33.218615ms (σ: 16.609307ms) 2025/04/30 09:40:11 client Canceling loss detection timer. 2025/04/30 09:40:11 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:11 client Dropping Handshake keys. 2025/04/30 09:40:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3b01ec410ed58415e9d4, StatelessResetToken: 0x6955446ef80ef3e4421fb9f08a61b024} 2025/04/30 09:40:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 528cae00847724f5d478, StatelessResetToken: 0xad40ce98d8ce46d9641d1ae9c032c6e8} 2025/04/30 09:40:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fae4040c1c88543d37c3, StatelessResetToken: 0x63a5bf78e362da1bee66cfce7747559f} 2025/04/30 09:40:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:11 client -> Sending packet 1 (39 bytes) for connection 8c673b35cb3878421a03aa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 3b01ec410ed58415e9d4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 177.334µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:11 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.PingFrame{} 2025/04/30 09:40:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:11 client <- Reading packet 2 (372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/04/30 09:40:11 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100b597331408053674e3f7cbf9dfe131bcf1b4a9f7333bc55c3c2cda7a1809decff8361b78} 2025/04/30 09:40:11 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:11 client -> Sending packet 2 (37 bytes) for connection 8c673b35cb3878421a03aa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 3b01ec410ed58415e9d4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 75.512µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client newly acked packets (1): [1] 2025/04/30 09:40:11 client updated RTT: 32.907ms (σ: 13.078ms) 2025/04/30 09:40:11 client ECN capability confirmed. 2025/04/30 09:40:11 client lost packet 0 (time threshold) 2025/04/30 09:40:11 client Canceling loss detection timer. 2025/04/30 09:40:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 428e8e56a0f156a919f7, StatelessResetToken: 0xc7cf523e2ba667ff74bf1862b1936b98} 2025/04/30 09:40:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:11 client Ignoring all packets below 1. 2025/04/30 09:40:11 client -> Sending packet 3 (56 bytes) for connection 8c673b35cb3878421a03aa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 3b01ec410ed58415e9d4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 117.04µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:11 client <- Reading packet 4 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client newly acked packets (1): [3] 2025/04/30 09:40:11 client updated RTT: 32.763ms (σ: 10.095ms) 2025/04/30 09:40:11 client Canceling loss detection timer. 2025/04/30 09:40:11 client <- &wire.PingFrame{} 2025/04/30 09:40:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:11 client Ignoring all packets below 4. 2025/04/30 09:40:11 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:11 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:11 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:11 client -> Sending packet 4 (37 bytes) for connection 8c673b35cb3878421a03aa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 3b01ec410ed58415e9d4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 55.575µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:40:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:11 client -> Sending packet 5 (32 bytes) for connection 8c673b35cb3878421a03aa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:11 client Short Header{DestConnectionID: 3b01ec410ed58415e9d4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:11 client Connection 8c673b35cb3878421a03aa closed. 2025/04/30 09:40:11 Requesting https://server4:443/jarutaufdv. 2025/04/30 09:40:11 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:11 Increased send buffer size to 14336 kiB 2025/04/30 09:40:11 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:11 Created qlog file: /logs/qlog/17f6f8ec3e3fad48a9c8b9cc.sqlog 2025/04/30 09:40:11 client Starting new connection to server4 ([::]:37126 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 17f6f8ec3e3fad48a9c8b9cc, version v1 2025/04/30 09:40:11 Adding connection ID (empty). 2025/04/30 09:40:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:11 client -> Sending packet 0 (1280 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: 17f6f8ec3e3fad48a9c8b9cc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:11 client -> Sending packet 1 (1280 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: 17f6f8ec3e3fad48a9c8b9cc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:11 client -> Sending packet 2 (1280 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, Initial 2025/04/30 09:40:11 client Long Header{Type: Initial, DestConnectionID: 17f6f8ec3e3fad48a9c8b9cc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:40:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:12 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:12 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 52005d9a1c0fa9edff32, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:12 client Received first packet. Switching destination connection ID to: 52005d9a1c0fa9edff32 2025/04/30 09:40:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:12 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:12 client <- Reading packet 0 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 52005d9a1c0fa9edff32, PacketNumber: 0, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 17f6f8ec3e3fad48a9c8b9cc, InitialSourceConnectionID: 52005d9a1c0fa9edff32, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:12 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc 2025/04/30 09:40:12 client Long Header{Type: Initial, DestConnectionID: 52005d9a1c0fa9edff32, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:12 client Long Header{Type: Handshake, DestConnectionID: 52005d9a1c0fa9edff32, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:12 client Dropping Initial keys. 2025/04/30 09:40:12 client -> Sending packet 1 (45 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, Handshake 2025/04/30 09:40:12 client Long Header{Type: Handshake, DestConnectionID: 52005d9a1c0fa9edff32, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:12 client -> Sending packet 0 (48 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:12 client Short Header{DestConnectionID: 52005d9a1c0fa9edff32, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:12 client -> Sending packet 2 (76 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, Handshake 2025/04/30 09:40:12 client Long Header{Type: Handshake, DestConnectionID: 52005d9a1c0fa9edff32, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:12 client -> Sending packet 3 (76 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, Handshake 2025/04/30 09:40:12 client Long Header{Type: Handshake, DestConnectionID: 52005d9a1c0fa9edff32, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:12 client Parsed a coalesced packet. Part 1: 43 bytes. Remaining: 1289 bytes. 2025/04/30 09:40:12 client <- Reading packet 2 (43 bytes) for connection (empty), Handshake 2025/04/30 09:40:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 52005d9a1c0fa9edff32, PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 09:40:12 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 09:40:12 client Peer doesn't await address validation any longer. 2025/04/30 09:40:12 client newly acked packets (1): [3] 2025/04/30 09:40:12 client updated RTT: 32.295183ms (σ: 16.147591ms) 2025/04/30 09:40:12 client Canceling loss detection timer. 2025/04/30 09:40:12 client <- Reading packet 0 (1289 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:12 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 199.64ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:12 client newly acked packets (1): [0] 2025/04/30 09:40:12 client updated RTT: 54.874ms (σ: 57.27ms) 2025/04/30 09:40:12 client ECN capability confirmed. 2025/04/30 09:40:12 client Dropping Handshake keys. 2025/04/30 09:40:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0adbaac83a3fd721070d, StatelessResetToken: 0xa65a476f3f209d62d7cf74153ede3d28} 2025/04/30 09:40:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: caac91e34b6a7c019239, StatelessResetToken: 0x9da510ac6c84fd9b1111aad2742a783d} 2025/04/30 09:40:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 597c47773ef67ca79563, StatelessResetToken: 0x032ca13439c0a8f2fb6abbc561c2699f} 2025/04/30 09:40:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:12 client -> Sending packet 1 (39 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:12 client Short Header{DestConnectionID: 0adbaac83a3fd721070d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 206.95µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:12 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:12 client <- &wire.PingFrame{} 2025/04/30 09:40:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:12 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:12 client -> Sending packet 2 (37 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:12 client Short Header{DestConnectionID: 0adbaac83a3fd721070d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 141.907µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:12 client -> Sending packet 3 (32 bytes) for connection 17f6f8ec3e3fad48a9c8b9cc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:12 client Short Header{DestConnectionID: 0adbaac83a3fd721070d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:12 client Connection 17f6f8ec3e3fad48a9c8b9cc closed. 2025/04/30 09:40:12 Requesting https://server4:443/rgttxupicq. 2025/04/30 09:40:12 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:12 Increased send buffer size to 14336 kiB 2025/04/30 09:40:12 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:12 Created qlog file: /logs/qlog/7147d5f52a7a0ad8543e822cb1ef.sqlog 2025/04/30 09:40:12 client Starting new connection to server4 ([::]:48341 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7147d5f52a7a0ad8543e822cb1ef, version v1 2025/04/30 09:40:12 Adding connection ID (empty). 2025/04/30 09:40:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:12 client -> Sending packet 0 (1280 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, Initial 2025/04/30 09:40:12 client Long Header{Type: Initial, DestConnectionID: 7147d5f52a7a0ad8543e822cb1ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:40:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:12 client -> Sending packet 1 (1280 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, Initial 2025/04/30 09:40:12 client Long Header{Type: Initial, DestConnectionID: 7147d5f52a7a0ad8543e822cb1ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:40:12 client -> Sending packet 2 (1280 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, Initial 2025/04/30 09:40:12 client Long Header{Type: Initial, DestConnectionID: 7147d5f52a7a0ad8543e822cb1ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:40:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:40:12 client -> Sending packet 3 (1280 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, Initial 2025/04/30 09:40:12 client Long Header{Type: Initial, DestConnectionID: 7147d5f52a7a0ad8543e822cb1ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:40:12 client -> Sending packet 4 (1280 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, Initial 2025/04/30 09:40:12 client Long Header{Type: Initial, DestConnectionID: 7147d5f52a7a0ad8543e822cb1ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 1: 139 bytes. Remaining: 1093 bytes. 2025/04/30 09:40:13 client <- Reading packet 1 (139 bytes) for connection (empty), Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8724671feff64f3affaf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 09:40:13 client Received first packet. Switching destination connection ID to: 8724671feff64f3affaf 2025/04/30 09:40:13 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 301.264ms} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 323 bytes. 2025/04/30 09:40:13 client <- Reading packet 1 (770 bytes) for connection (empty), Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8724671feff64f3affaf, PacketNumber: 1, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 09:40:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7147d5f52a7a0ad8543e822cb1ef, InitialSourceConnectionID: 8724671feff64f3affaf, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:13 client Dropping %!s(logging.PacketType=5) packet (323 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: 8724671feff64f3affaf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: 8724671feff64f3affaf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:13 client Dropping Initial keys. 2025/04/30 09:40:13 client -> Sending packet 1 (45 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: 8724671feff64f3affaf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client -> Sending packet 0 (48 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 8724671feff64f3affaf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:13 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:13 client -> Sending packet 1 (37 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 8724671feff64f3affaf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 71.775µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:13 client -> Sending packet 2 (73 bytes) for connection 7147d5f52a7a0ad8543e822cb1ef, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: 8724671feff64f3affaf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:13 client Short Header{DestConnectionID: 8724671feff64f3affaf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:13 client Connection 7147d5f52a7a0ad8543e822cb1ef closed. 2025/04/30 09:40:13 Requesting https://server4:443/nftrrbnpqt. 2025/04/30 09:40:13 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:13 Increased send buffer size to 14336 kiB 2025/04/30 09:40:13 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:13 Created qlog file: /logs/qlog/424bb2aa8e54bf171f851a94.sqlog 2025/04/30 09:40:13 client Starting new connection to server4 ([::]:45310 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 424bb2aa8e54bf171f851a94, version v1 2025/04/30 09:40:13 Adding connection ID (empty). 2025/04/30 09:40:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:13 client -> Sending packet 0 (1280 bytes) for connection 424bb2aa8e54bf171f851a94, Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: 424bb2aa8e54bf171f851a94, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:13 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bde366500eb403850054, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:13 client Received first packet. Switching destination connection ID to: bde366500eb403850054 2025/04/30 09:40:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:13 client newly acked packets (1): [0] 2025/04/30 09:40:13 client updated RTT: 34.877283ms (σ: 17.438641ms) 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 327 bytes. 2025/04/30 09:40:13 client <- Reading packet 0 (769 bytes) for connection (empty), Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bde366500eb403850054, PacketNumber: 0, PacketNumberLen: 1, Length: 750, Version: v1} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 09:40:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 424bb2aa8e54bf171f851a94, InitialSourceConnectionID: bde366500eb403850054, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:13 client Dropping %!s(logging.PacketType=5) packet (327 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 424bb2aa8e54bf171f851a94 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: bde366500eb403850054, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: bde366500eb403850054, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:13 client Dropping Initial keys. 2025/04/30 09:40:13 client -> Sending packet 1 (45 bytes) for connection 424bb2aa8e54bf171f851a94, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: bde366500eb403850054, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client -> Sending packet 0 (48 bytes) for connection 424bb2aa8e54bf171f851a94, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: bde366500eb403850054, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:13 client <- Reading packet 1 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bde366500eb403850054, PacketNumber: 1, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:13 client <- &wire.PingFrame{} 2025/04/30 09:40:13 client -> Sending packet 2 (45 bytes) for connection 424bb2aa8e54bf171f851a94, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: bde366500eb403850054, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:13 client -> Sending packet 3 (76 bytes) for connection 424bb2aa8e54bf171f851a94, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: bde366500eb403850054, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:13 client -> Sending packet 4 (76 bytes) for connection 424bb2aa8e54bf171f851a94, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: bde366500eb403850054, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:13 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bde366500eb403850054, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:13 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:13 client Peer doesn't await address validation any longer. 2025/04/30 09:40:13 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:13 client Dropping Handshake keys. 2025/04/30 09:40:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 55c40b556ee37a862a71, StatelessResetToken: 0xc4820d83040283e3579ed8bc95645f9d} 2025/04/30 09:40:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0b474e01756ce1c590b5, StatelessResetToken: 0xc087d1be5657e8fd584ec7ee85c9349b} 2025/04/30 09:40:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac5233e14ca608d9d911, StatelessResetToken: 0x2b777f5e5d80392f797440d299a8f73a} 2025/04/30 09:40:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:13 client -> Sending packet 2 (58 bytes) for connection 424bb2aa8e54bf171f851a94, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 55c40b556ee37a862a71, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 181.241µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:13 client -> Sending packet 3 (50 bytes) for connection 424bb2aa8e54bf171f851a94, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 55c40b556ee37a862a71, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:13 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.PingFrame{} 2025/04/30 09:40:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:13 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:13 client -> Sending packet 4 (38 bytes) for connection 424bb2aa8e54bf171f851a94, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 55c40b556ee37a862a71, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.240096ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2a794c7d2a8e683e82ef, StatelessResetToken: 0xa31810c9afc71f5389e87c2e749dc29e} 2025/04/30 09:40:13 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:13 client -> Sending packet 5 (39 bytes) for connection 424bb2aa8e54bf171f851a94, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 55c40b556ee37a862a71, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 75.693µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:13 client -> Sending packet 6 (32 bytes) for connection 424bb2aa8e54bf171f851a94, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 55c40b556ee37a862a71, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:13 client Connection 424bb2aa8e54bf171f851a94 closed. 2025/04/30 09:40:13 Requesting https://server4:443/kywoqzvufd. 2025/04/30 09:40:13 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:13 Increased send buffer size to 14336 kiB 2025/04/30 09:40:13 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:13 Created qlog file: /logs/qlog/55eeb87fa32be90e8aa4e3.sqlog 2025/04/30 09:40:13 client Starting new connection to server4 ([::]:51709 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 55eeb87fa32be90e8aa4e3, version v1 2025/04/30 09:40:13 Adding connection ID (empty). 2025/04/30 09:40:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:13 client -> Sending packet 0 (1280 bytes) for connection 55eeb87fa32be90e8aa4e3, Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: 55eeb87fa32be90e8aa4e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:13 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 36c1bf4ad588a229e208, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:13 client Received first packet. Switching destination connection ID to: 36c1bf4ad588a229e208 2025/04/30 09:40:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:13 client newly acked packets (1): [0] 2025/04/30 09:40:13 client updated RTT: 34.634676ms (σ: 17.317338ms) 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 330 bytes. 2025/04/30 09:40:13 client <- Reading packet 0 (766 bytes) for connection (empty), Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 36c1bf4ad588a229e208, PacketNumber: 0, PacketNumberLen: 1, Length: 747, Version: v1} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 09:40:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 55eeb87fa32be90e8aa4e3, InitialSourceConnectionID: 36c1bf4ad588a229e208, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:13 client Dropping %!s(logging.PacketType=5) packet (330 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 55eeb87fa32be90e8aa4e3 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: 36c1bf4ad588a229e208, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: 36c1bf4ad588a229e208, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:13 client Dropping Initial keys. 2025/04/30 09:40:13 client -> Sending packet 1 (45 bytes) for connection 55eeb87fa32be90e8aa4e3, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: 36c1bf4ad588a229e208, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client -> Sending packet 0 (48 bytes) for connection 55eeb87fa32be90e8aa4e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 36c1bf4ad588a229e208, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:13 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:13 client -> Sending packet 2 (76 bytes) for connection 55eeb87fa32be90e8aa4e3, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: 36c1bf4ad588a229e208, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:13 client -> Sending packet 3 (76 bytes) for connection 55eeb87fa32be90e8aa4e3, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: 36c1bf4ad588a229e208, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:13 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 36c1bf4ad588a229e208, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:13 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 09:40:13 client Peer doesn't await address validation any longer. 2025/04/30 09:40:13 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.488ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client newly acked packets (1): [0] 2025/04/30 09:40:13 client updated RTT: 44.89ms (σ: 33.5ms) 2025/04/30 09:40:13 client ECN capability confirmed. 2025/04/30 09:40:13 client Canceling loss detection timer. 2025/04/30 09:40:13 client Dropping Handshake keys. 2025/04/30 09:40:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 746418df3bd2afcefc27, StatelessResetToken: 0x3e12f8115269dc9b42a9df29552c2704} 2025/04/30 09:40:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f0c99e55fcdcbce10f5f, StatelessResetToken: 0xc85bbee6775a4b28f094c96975a820ee} 2025/04/30 09:40:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b8fffe311fb2cfbb45aa, StatelessResetToken: 0x8061cf15aa35606f9f5913f4acb35435} 2025/04/30 09:40:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:13 client -> Sending packet 1 (39 bytes) for connection 55eeb87fa32be90e8aa4e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 746418df3bd2afcefc27, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 186.641µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:13 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.PingFrame{} 2025/04/30 09:40:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:13 client <- Reading packet 3 (191 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 182, Data length: 123, Offset + Data length: 305} 2025/04/30 09:40:13 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100d2bba8e27987fdeeba09ee07d4bee5223bd5d7b0d960b8fafdbe4a27e137fafea4129634} 2025/04/30 09:40:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:13 client -> Sending packet 2 (39 bytes) for connection 55eeb87fa32be90e8aa4e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 746418df3bd2afcefc27, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 79.66µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client <- Reading packet 4 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a4e86edcb49038c1bf39, StatelessResetToken: 0x79390fbdc6618ef25f8a50cf83b13377} 2025/04/30 09:40:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:13 client <- Reading packet 5 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.PingFrame{} 2025/04/30 09:40:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:13 client -> Sending packet 3 (39 bytes) for connection 55eeb87fa32be90e8aa4e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 746418df3bd2afcefc27, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 85.35µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client <- Reading packet 7 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:13 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:13 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:13 client -> Sending packet 4 (32 bytes) for connection 55eeb87fa32be90e8aa4e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:13 client Short Header{DestConnectionID: 746418df3bd2afcefc27, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:13 client Connection 55eeb87fa32be90e8aa4e3 closed. 2025/04/30 09:40:13 Requesting https://server4:443/aojqfrrhow. 2025/04/30 09:40:13 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:13 Increased send buffer size to 14336 kiB 2025/04/30 09:40:13 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:13 Created qlog file: /logs/qlog/12684c19eb057310807d4be2b75ca27fde408106.sqlog 2025/04/30 09:40:13 client Starting new connection to server4 ([::]:57712 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 12684c19eb057310807d4be2b75ca27fde408106, version v1 2025/04/30 09:40:13 Adding connection ID (empty). 2025/04/30 09:40:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:13 client -> Sending packet 0 (1280 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: 12684c19eb057310807d4be2b75ca27fde408106, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:13 client -> Sending packet 1 (1280 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: 12684c19eb057310807d4be2b75ca27fde408106, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:13 client -> Sending packet 2 (1280 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: 12684c19eb057310807d4be2b75ca27fde408106, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:13 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bb8e4ab9aef1547dc493, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:13 client Received first packet. Switching destination connection ID to: bb8e4ab9aef1547dc493 2025/04/30 09:40:13 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 321 bytes. 2025/04/30 09:40:13 client <- Reading packet 1 (775 bytes) for connection (empty), Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bb8e4ab9aef1547dc493, PacketNumber: 1, PacketNumberLen: 1, Length: 756, Version: v1} 2025/04/30 09:40:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 09:40:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 12684c19eb057310807d4be2b75ca27fde408106, InitialSourceConnectionID: bb8e4ab9aef1547dc493, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:13 client Dropping %!s(logging.PacketType=5) packet (321 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106 2025/04/30 09:40:13 client Long Header{Type: Initial, DestConnectionID: bb8e4ab9aef1547dc493, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: bb8e4ab9aef1547dc493, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:13 client Dropping Initial keys. 2025/04/30 09:40:13 client -> Sending packet 1 (93 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, Handshake 2025/04/30 09:40:13 client Long Header{Type: Handshake, DestConnectionID: bb8e4ab9aef1547dc493, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:13 client Short Header{DestConnectionID: bb8e4ab9aef1547dc493, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:14 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:14 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bb8e4ab9aef1547dc493, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:14 client Peer doesn't await address validation any longer. 2025/04/30 09:40:14 client newly acked packets (1): [0] 2025/04/30 09:40:14 client updated RTT: 33.198818ms (σ: 16.599409ms) 2025/04/30 09:40:14 client Canceling loss detection timer. 2025/04/30 09:40:14 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:14 client Dropping Handshake keys. 2025/04/30 09:40:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d22c85e1807561082db0, StatelessResetToken: 0x40d0e87dd299f88613d3652fd6d25a9c} 2025/04/30 09:40:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ccf1ee99f7084ab0a584, StatelessResetToken: 0x665e21230047f2f2fcde14a9ad38f4c7} 2025/04/30 09:40:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 11863a9eb1b9590617e6, StatelessResetToken: 0xee31d88480ca7516a477d1f078117398} 2025/04/30 09:40:14 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:14 client -> Sending packet 1 (39 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 212.77µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:14 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.PingFrame{} 2025/04/30 09:40:14 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:14 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:14 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100bde5421b3e7079e10228157608c7961d7a349164eb84e882cc80b8fa95a6734ca99c2c21} 2025/04/30 09:40:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:14 client -> Sending packet 2 (37 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 118.403µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:14 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:14 client newly acked packets (1): [1] 2025/04/30 09:40:14 client updated RTT: 32.895ms (σ: 13.055ms) 2025/04/30 09:40:14 client ECN capability confirmed. 2025/04/30 09:40:14 client lost packet 0 (time threshold) 2025/04/30 09:40:14 client Canceling loss detection timer. 2025/04/30 09:40:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 37cd85c73e8f82f9624a, StatelessResetToken: 0x12d05c3c68af6522aeb18989403f41cf} 2025/04/30 09:40:14 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:14 client Ignoring all packets below 1. 2025/04/30 09:40:14 client -> Sending packet 3 (56 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 129.704µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:14 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:14 client -> Sending packet 5 (48 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:14 client -> Sending packet 6 (48 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:14 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.PingFrame{} 2025/04/30 09:40:14 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:14 client -> Sending packet 7 (39 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 1}}, DelayTime: 61.796µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:14 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:40:14 client -> Sending packet 9 (48 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:14 client -> Sending packet 10 (48 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:14 client -> Sending packet 11 (1366 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.PingFrame{} 2025/04/30 09:40:14 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.PingFrame{} 2025/04/30 09:40:14 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:14 client -> Sending packet 12 (41 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 1}}, DelayTime: 55.625µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:14 client <- Reading packet 12 (30 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:14 client <- Reading packet 13 (30 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 3, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:40:14 client newly acked packets (2): [10 11] 2025/04/30 09:40:14 client updated RTT: 32.769ms (σ: 10.043ms) 2025/04/30 09:40:14 client Canceling loss detection timer. 2025/04/30 09:40:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:14 client <- Reading packet 14 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:14 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:14 client <- Reading packet 15 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:14 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:14 client <- &wire.PingFrame{} 2025/04/30 09:40:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:14 client -> Sending packet 13 (1409 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.PingFrame{} 2025/04/30 09:40:14 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:14 client -> Sending packet 14 (32 bytes) for connection 12684c19eb057310807d4be2b75ca27fde408106, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:14 client Short Header{DestConnectionID: d22c85e1807561082db0, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:14 client Connection 12684c19eb057310807d4be2b75ca27fde408106 closed. 2025/04/30 09:40:14 Requesting https://server4:443/ytmsrtwkft. 2025/04/30 09:40:14 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:14 Increased send buffer size to 14336 kiB 2025/04/30 09:40:14 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:14 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:14 Created qlog file: /logs/qlog/38f9cee23631efb9a51bd8.sqlog 2025/04/30 09:40:14 client Starting new connection to server4 ([::]:49348 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 38f9cee23631efb9a51bd8, version v1 2025/04/30 09:40:14 Adding connection ID (empty). 2025/04/30 09:40:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:14 client -> Sending packet 0 (1280 bytes) for connection 38f9cee23631efb9a51bd8, Initial 2025/04/30 09:40:14 client Long Header{Type: Initial, DestConnectionID: 38f9cee23631efb9a51bd8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:40:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:14 client -> Sending packet 1 (1280 bytes) for connection 38f9cee23631efb9a51bd8, Initial 2025/04/30 09:40:14 client Long Header{Type: Initial, DestConnectionID: 38f9cee23631efb9a51bd8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:40:14 client -> Sending packet 2 (1280 bytes) for connection 38f9cee23631efb9a51bd8, Initial 2025/04/30 09:40:14 client Long Header{Type: Initial, DestConnectionID: 38f9cee23631efb9a51bd8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:40:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:40:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:15 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 95c5de272147504787bd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:15 client Received first packet. Switching destination connection ID to: 95c5de272147504787bd 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:15 client <- Reading packet 0 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 95c5de272147504787bd, PacketNumber: 0, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 38f9cee23631efb9a51bd8, InitialSourceConnectionID: 95c5de272147504787bd, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:15 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 38f9cee23631efb9a51bd8 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: 95c5de272147504787bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 95c5de272147504787bd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:15 client Dropping Initial keys. 2025/04/30 09:40:15 client -> Sending packet 1 (45 bytes) for connection 38f9cee23631efb9a51bd8, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 95c5de272147504787bd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client -> Sending packet 0 (48 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 95c5de272147504787bd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:15 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:15 client <- Reading packet 1 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 95c5de272147504787bd, PacketNumber: 1, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:15 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:15 client -> Sending packet 2 (45 bytes) for connection 38f9cee23631efb9a51bd8, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 95c5de272147504787bd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client <- Reading packet 2 (372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/04/30 09:40:15 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100760dab2e8c4e110c9d53602a4d6144fc42df07b154103a88a886e0823cc9a25f035af723} 2025/04/30 09:40:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:15 client -> Sending packet 1 (37 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 95c5de272147504787bd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 80.922µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:15 client <- Reading packet 3 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.PingFrame{} 2025/04/30 09:40:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:15 client Dropping Handshake keys. 2025/04/30 09:40:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7b5da85111b7e3452625, StatelessResetToken: 0x29d9e1543d6eefdaa142c03e83edced7} 2025/04/30 09:40:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae30ddc443210a18a22e, StatelessResetToken: 0x0e28d2f5deffbdecc7b317e27eea1eb6} 2025/04/30 09:40:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 66373800c8b8af061f79, StatelessResetToken: 0xf811be1ccd575c4ebb9a49d5f399ee92} 2025/04/30 09:40:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:15 client -> Sending packet 2 (1366 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.PingFrame{} 2025/04/30 09:40:15 client -> Sending packet 3 (39 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 218.639µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:15 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client newly acked packets (1): [2] 2025/04/30 09:40:15 client updated RTT: 31.88232ms (σ: 15.94116ms) 2025/04/30 09:40:15 client ECN capability confirmed. 2025/04/30 09:40:15 client lost packet 0 (time threshold) 2025/04/30 09:40:15 client -> Sending packet 4 (48 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 client <- Reading packet 5 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.PingFrame{} 2025/04/30 09:40:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2a201cb68f0cb16845fd, StatelessResetToken: 0x9736d522fa5d936660a58a88874a7601} 2025/04/30 09:40:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:15 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 21.52ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client newly acked packets (1): [3] 2025/04/30 09:40:15 client updated RTT: 32.154ms (σ: 12.499ms) 2025/04/30 09:40:15 client Ignoring all packets below 4. 2025/04/30 09:40:15 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:15 client -> Sending packet 5 (38 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 5.154544ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:15 client -> Sending packet 7 (48 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 client -> Sending packet 8 (48 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 client <- Reading packet 8 (28 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client -> Sending packet 9 (1409 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.PingFrame{} 2025/04/30 09:40:15 client <- Reading packet 10 (30 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client newly acked packets (1): [9] 2025/04/30 09:40:15 client updated RTT: 32.122ms (σ: 9.436ms) 2025/04/30 09:40:15 client lost packet 8 (time threshold) 2025/04/30 09:40:15 client Canceling loss detection timer. 2025/04/30 09:40:15 client -> Sending packet 10 (48 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 client <- Reading packet 11 (31 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 5, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 21.312ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client newly acked packets (1): [10] 2025/04/30 09:40:15 client updated RTT: 32.122ms (σ: 7.078ms) 2025/04/30 09:40:15 client Canceling loss detection timer. 2025/04/30 09:40:15 client <- Reading packet 12 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:15 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:15 client -> Sending packet 11 (32 bytes) for connection 38f9cee23631efb9a51bd8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 66373800c8b8af061f79, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:15 client Connection 38f9cee23631efb9a51bd8 closed. 2025/04/30 09:40:15 Requesting https://server4:443/hmiotukaco. 2025/04/30 09:40:15 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:15 Increased send buffer size to 14336 kiB 2025/04/30 09:40:15 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:15 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:15 Created qlog file: /logs/qlog/24fe1e04bc86b2d82fd3a3db84f2757a09af.sqlog 2025/04/30 09:40:15 client Starting new connection to server4 ([::]:46054 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 24fe1e04bc86b2d82fd3a3db84f2757a09af, version v1 2025/04/30 09:40:15 Adding connection ID (empty). 2025/04/30 09:40:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:15 client -> Sending packet 0 (1280 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Initial 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: 24fe1e04bc86b2d82fd3a3db84f2757a09af, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:15 client -> Sending packet 1 (1280 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Initial 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: 24fe1e04bc86b2d82fd3a3db84f2757a09af, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:15 client -> Sending packet 2 (1280 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Initial 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: 24fe1e04bc86b2d82fd3a3db84f2757a09af, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:15 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33cd27b9641718306b17, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:15 client Received first packet. Switching destination connection ID to: 33cd27b9641718306b17 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 323 bytes. 2025/04/30 09:40:15 client <- Reading packet 0 (773 bytes) for connection (empty), Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33cd27b9641718306b17, PacketNumber: 0, PacketNumberLen: 1, Length: 754, Version: v1} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 09:40:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 24fe1e04bc86b2d82fd3a3db84f2757a09af, InitialSourceConnectionID: 33cd27b9641718306b17, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:15 client Dropping %!s(logging.PacketType=5) packet (323 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: 33cd27b9641718306b17, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 33cd27b9641718306b17, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:15 client Dropping Initial keys. 2025/04/30 09:40:15 client -> Sending packet 1 (45 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 33cd27b9641718306b17, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client -> Sending packet 0 (48 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 33cd27b9641718306b17, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:15 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 2: 773 bytes. Remaining: 323 bytes. 2025/04/30 09:40:15 client <- Reading packet 1 (773 bytes) for connection (empty), Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33cd27b9641718306b17, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 09:40:15 client Dropping %!s(logging.PacketType=5) packet (323 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:15 client -> Sending packet 2 (45 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 33cd27b9641718306b17, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:15 client <- Reading packet 2 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33cd27b9641718306b17, PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:15 client <- &wire.PingFrame{} 2025/04/30 09:40:15 client -> Sending packet 3 (45 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 33cd27b9641718306b17, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client <- Reading packet 3 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33cd27b9641718306b17, PacketNumber: 3, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:15 client <- &wire.PingFrame{} 2025/04/30 09:40:15 client -> Sending packet 4 (45 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 33cd27b9641718306b17, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:15 client -> Sending packet 5 (76 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 33cd27b9641718306b17, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:15 client -> Sending packet 6 (76 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 33cd27b9641718306b17, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:15 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.PingFrame{} 2025/04/30 09:40:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:15 client -> Sending packet 1 (37 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 33cd27b9641718306b17, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 68.278µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:15 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601000db3b9b0d52993431479d9d5f8b41aa500e9dbf64fb63fb0f11f199d70c07913941c6321} 2025/04/30 09:40:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:15 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:15 client -> Sending packet 2 (38 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 33cd27b9641718306b17, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.248639ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client <- Reading packet 3 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.PingFrame{} 2025/04/30 09:40:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:15 client Dropping Handshake keys. 2025/04/30 09:40:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 966401c5f8bddc836ece, StatelessResetToken: 0x5d15c2daea295630e760dc7825175cb6} 2025/04/30 09:40:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6131e29ca76a4ebfde95, StatelessResetToken: 0xe7c129b27f076fb169d8b6cf9a6aa52c} 2025/04/30 09:40:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2b5821fe63c55be1a0ba, StatelessResetToken: 0x65b7093e91e6dd3a745bdf2dd386ff14} 2025/04/30 09:40:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:15 client -> Sending packet 4 (58 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 2b5821fe63c55be1a0ba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 97.714µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 client -> Sending packet 5 (50 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 2b5821fe63c55be1a0ba, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 client -> Sending packet 6 (1366 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 2b5821fe63c55be1a0ba, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.PingFrame{} 2025/04/30 09:40:15 client <- Reading packet 4 (1422 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client <- &wire.PingFrame{} 2025/04/30 09:40:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e5dcfd129b49bbdd75ad, StatelessResetToken: 0x5e119a87f6f3f114cced1ac4f00695c1} 2025/04/30 09:40:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:15 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:15 client -> Sending packet 7 (37 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 2b5821fe63c55be1a0ba, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 63.379µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:15 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client newly acked packets (2): [5 6] 2025/04/30 09:40:15 client updated RTT: 32.841822ms (σ: 16.420911ms) 2025/04/30 09:40:15 client ECN capability confirmed. 2025/04/30 09:40:15 client Canceling loss detection timer. 2025/04/30 09:40:15 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:15 client -> Sending packet 8 (32 bytes) for connection 24fe1e04bc86b2d82fd3a3db84f2757a09af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 2b5821fe63c55be1a0ba, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:15 client Connection 24fe1e04bc86b2d82fd3a3db84f2757a09af closed. 2025/04/30 09:40:15 Requesting https://server4:443/cwhpveolei. 2025/04/30 09:40:15 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:15 Increased send buffer size to 14336 kiB 2025/04/30 09:40:15 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:15 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:15 Created qlog file: /logs/qlog/50fc47c971d5b6d8517c705ad1e3.sqlog 2025/04/30 09:40:15 client Starting new connection to server4 ([::]:55184 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 50fc47c971d5b6d8517c705ad1e3, version v1 2025/04/30 09:40:15 Adding connection ID (empty). 2025/04/30 09:40:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:15 client -> Sending packet 0 (1280 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, Initial 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: 50fc47c971d5b6d8517c705ad1e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:15 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 80eb4b4e62cc928d7866, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:15 client Received first packet. Switching destination connection ID to: 80eb4b4e62cc928d7866 2025/04/30 09:40:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:15 client newly acked packets (1): [0] 2025/04/30 09:40:15 client updated RTT: 34.748877ms (σ: 17.374438ms) 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 326 bytes. 2025/04/30 09:40:15 client <- Reading packet 0 (770 bytes) for connection (empty), Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 80eb4b4e62cc928d7866, PacketNumber: 0, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 09:40:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 09:40:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 50fc47c971d5b6d8517c705ad1e3, InitialSourceConnectionID: 80eb4b4e62cc928d7866, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:15 client Dropping %!s(logging.PacketType=5) packet (326 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 50fc47c971d5b6d8517c705ad1e3 2025/04/30 09:40:15 client Long Header{Type: Initial, DestConnectionID: 80eb4b4e62cc928d7866, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 80eb4b4e62cc928d7866, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:15 client Dropping Initial keys. 2025/04/30 09:40:15 client -> Sending packet 1 (45 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, Handshake 2025/04/30 09:40:15 client Long Header{Type: Handshake, DestConnectionID: 80eb4b4e62cc928d7866, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:15 client -> Sending packet 0 (48 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:15 client Short Header{DestConnectionID: 80eb4b4e62cc928d7866, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:16 client <- Reading packet 1 (39 bytes) for connection (empty), Handshake 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 80eb4b4e62cc928d7866, PacketNumber: 1, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 09:40:16 client <- &wire.PingFrame{} 2025/04/30 09:40:16 client -> Sending packet 2 (45 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, Handshake 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: 80eb4b4e62cc928d7866, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:16 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:16 client -> Sending packet 3 (76 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, Handshake 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: 80eb4b4e62cc928d7866, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:16 client -> Sending packet 4 (76 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, Handshake 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: 80eb4b4e62cc928d7866, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:16 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:16 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 80eb4b4e62cc928d7866, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:16 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:16 client Peer doesn't await address validation any longer. 2025/04/30 09:40:16 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.416ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:16 client newly acked packets (1): [0] 2025/04/30 09:40:16 client updated RTT: 44.985ms (σ: 33.505ms) 2025/04/30 09:40:16 client ECN capability confirmed. 2025/04/30 09:40:16 client Canceling loss detection timer. 2025/04/30 09:40:16 client Dropping Handshake keys. 2025/04/30 09:40:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9e7b623902342e39e09a, StatelessResetToken: 0xafaa7acd0b390f27aa15f681866baa86} 2025/04/30 09:40:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea6dcd4d28c88ec290e3, StatelessResetToken: 0xbabf771db33d81c45df8a19033128740} 2025/04/30 09:40:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e46e399b5e99e671ee20, StatelessResetToken: 0x7e6de49435454e0d5270cffd2e322c96} 2025/04/30 09:40:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:16 client -> Sending packet 1 (39 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:16 client Short Header{DestConnectionID: 9e7b623902342e39e09a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208.081µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:16 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:16 client -> Sending packet 2 (39 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:16 client Short Header{DestConnectionID: 9e7b623902342e39e09a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 121.168µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:16 client -> Sending packet 3 (32 bytes) for connection 50fc47c971d5b6d8517c705ad1e3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:16 client Short Header{DestConnectionID: 9e7b623902342e39e09a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:16 client Connection 50fc47c971d5b6d8517c705ad1e3 closed. 2025/04/30 09:40:16 Requesting https://server4:443/jjseuzuouq. 2025/04/30 09:40:16 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:16 Increased send buffer size to 14336 kiB 2025/04/30 09:40:16 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:16 Created qlog file: /logs/qlog/fefa76ecda4c0da27f.sqlog 2025/04/30 09:40:16 client Starting new connection to server4 ([::]:49005 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fefa76ecda4c0da27f, version v1 2025/04/30 09:40:16 Adding connection ID (empty). 2025/04/30 09:40:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:16 client -> Sending packet 0 (1280 bytes) for connection fefa76ecda4c0da27f, Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: fefa76ecda4c0da27f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:16 client -> Sending packet 1 (1280 bytes) for connection fefa76ecda4c0da27f, Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: fefa76ecda4c0da27f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:16 client -> Sending packet 2 (1280 bytes) for connection fefa76ecda4c0da27f, Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: fefa76ecda4c0da27f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:40:16 client -> Sending packet 3 (1280 bytes) for connection fefa76ecda4c0da27f, Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: fefa76ecda4c0da27f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:16 client -> Sending packet 4 (1280 bytes) for connection fefa76ecda4c0da27f, Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: fefa76ecda4c0da27f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 09:40:16 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1094 bytes. 2025/04/30 09:40:16 client <- Reading packet 3 (138 bytes) for connection (empty), Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a575e45f7de3ba3a56fa, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 09:40:16 client Received first packet. Switching destination connection ID to: a575e45f7de3ba3a56fa 2025/04/30 09:40:16 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 09:40:16 client newly acked packets (1): [4] 2025/04/30 09:40:16 client updated RTT: 33.818529ms (σ: 16.909264ms) 2025/04/30 09:40:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:16 client Parsed a coalesced packet. Part 2: 764 bytes. Remaining: 330 bytes. 2025/04/30 09:40:16 client <- Reading packet 3 (764 bytes) for connection (empty), Handshake 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a575e45f7de3ba3a56fa, PacketNumber: 3, PacketNumberLen: 1, Length: 745, Version: v1} 2025/04/30 09:40:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:40:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fefa76ecda4c0da27f, InitialSourceConnectionID: a575e45f7de3ba3a56fa, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:16 client Dropping %!s(logging.PacketType=5) packet (330 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fefa76ecda4c0da27f 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: a575e45f7de3ba3a56fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: a575e45f7de3ba3a56fa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:16 client Dropping Initial keys. 2025/04/30 09:40:16 client -> Sending packet 1 (93 bytes) for connection fefa76ecda4c0da27f, Handshake 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: a575e45f7de3ba3a56fa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:16 client Short Header{DestConnectionID: a575e45f7de3ba3a56fa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:16 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:16 client <- &wire.PingFrame{} 2025/04/30 09:40:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:16 client -> Sending packet 1 (37 bytes) for connection fefa76ecda4c0da27f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:16 client Short Header{DestConnectionID: a575e45f7de3ba3a56fa, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 95.72µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:16 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:16 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:16 client -> Sending packet 2 (73 bytes) for connection fefa76ecda4c0da27f, Handshake 2025/04/30 09:40:16 client Long Header{Type: Handshake, DestConnectionID: a575e45f7de3ba3a56fa, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:16 client Short Header{DestConnectionID: a575e45f7de3ba3a56fa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:16 client Connection fefa76ecda4c0da27f closed. 2025/04/30 09:40:16 Requesting https://server4:443/wkuywgootw. 2025/04/30 09:40:16 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:16 Increased send buffer size to 14336 kiB 2025/04/30 09:40:16 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:16 Created qlog file: /logs/qlog/16e6a318b29c75f693a4d3f7b76876a5d44cf2.sqlog 2025/04/30 09:40:16 client Starting new connection to server4 ([::]:57206 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 16e6a318b29c75f693a4d3f7b76876a5d44cf2, version v1 2025/04/30 09:40:16 Adding connection ID (empty). 2025/04/30 09:40:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:16 client -> Sending packet 0 (1280 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: 16e6a318b29c75f693a4d3f7b76876a5d44cf2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:16 client -> Sending packet 1 (1280 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: 16e6a318b29c75f693a4d3f7b76876a5d44cf2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:16 client -> Sending packet 2 (1280 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, Initial 2025/04/30 09:40:16 client Long Header{Type: Initial, DestConnectionID: 16e6a318b29c75f693a4d3f7b76876a5d44cf2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:40:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:17 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:17 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 073a0178240abbab41f3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:17 client Received first packet. Switching destination connection ID to: 073a0178240abbab41f3 2025/04/30 09:40:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 09:40:17 client newly acked packets (1): [2] 2025/04/30 09:40:17 client updated RTT: 35.894816ms (σ: 17.947408ms) 2025/04/30 09:40:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:17 client Parsed a coalesced packet. Part 2: 775 bytes. Remaining: 321 bytes. 2025/04/30 09:40:17 client <- Reading packet 0 (775 bytes) for connection (empty), Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 073a0178240abbab41f3, PacketNumber: 0, PacketNumberLen: 1, Length: 756, Version: v1} 2025/04/30 09:40:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 09:40:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 16e6a318b29c75f693a4d3f7b76876a5d44cf2, InitialSourceConnectionID: 073a0178240abbab41f3, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:17 client Dropping %!s(logging.PacketType=5) packet (321 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2 2025/04/30 09:40:17 client Long Header{Type: Initial, DestConnectionID: 073a0178240abbab41f3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: 073a0178240abbab41f3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:17 client Dropping Initial keys. 2025/04/30 09:40:17 client -> Sending packet 1 (93 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: 073a0178240abbab41f3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client Short Header{DestConnectionID: 073a0178240abbab41f3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:17 client -> Sending packet 2 (76 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: 073a0178240abbab41f3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:17 client -> Sending packet 3 (76 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: 073a0178240abbab41f3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:17 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:17 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 073a0178240abbab41f3, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:17 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 09:40:17 client Peer doesn't await address validation any longer. 2025/04/30 09:40:17 client newly acked packets (1): [3] 2025/04/30 09:40:17 client updated RTT: 35.432ms (σ: 14.384ms) 2025/04/30 09:40:17 client Canceling loss detection timer. 2025/04/30 09:40:17 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:17 client Dropping Handshake keys. 2025/04/30 09:40:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 480cf0603a512b550418, StatelessResetToken: 0xd7a7da4a2fd616e1a41f8842a6c356e8} 2025/04/30 09:40:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bf35e3bb45a87844e26a, StatelessResetToken: 0x6bbe4e32fb73e515a92bdbd4e572c53d} 2025/04/30 09:40:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4d2a915636f69652300f, StatelessResetToken: 0x81e4f23018fdb2225b1ca80d7b10f62e} 2025/04/30 09:40:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:17 client -> Sending packet 2 (58 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 203.723µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:17 client -> Sending packet 3 (50 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:17 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.PingFrame{} 2025/04/30 09:40:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:17 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:17 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d8601007ac0d69975475801d354c94f89cdcf8130fd2d31abf186c1285f1313ce7351522dfd8f2d} 2025/04/30 09:40:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:17 client -> Sending packet 4 (37 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 93.465µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fe0ce947f261e0ef72dc, StatelessResetToken: 0x571902a058aa1ca2c85b015ec3fb5b0a} 2025/04/30 09:40:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:17 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:17 client -> Sending packet 5 (38 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 25.258996ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:40:17 client -> Sending packet 7 (50 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:17 client -> Sending packet 8 (50 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:17 client -> Sending packet 9 (1366 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.PingFrame{} 2025/04/30 09:40:17 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client newly acked packets (1): [9] 2025/04/30 09:40:17 client updated RTT: 34.994ms (σ: 11.663ms) 2025/04/30 09:40:17 client ECN capability confirmed. 2025/04/30 09:40:17 client setting loss timer for packet 8 (1-RTT) to 39.36825ms (in 2025-04-30 09:40:17.414379118 +0000 UTC m=+17.212056099) 2025/04/30 09:40:17 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:40:17.414379118 +0000 UTC m=+17.212056099 2025/04/30 09:40:17 client lost packet 8 (time threshold) 2025/04/30 09:40:17 client Canceling loss detection timer. 2025/04/30 09:40:17 client -> Sending packet 10 (50 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:17 client <- Reading packet 7 (29 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 5, Smallest: 4}}, DelayTime: 21.36ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client newly acked packets (1): [10] 2025/04/30 09:40:17 client updated RTT: 34.645ms (σ: 9.444ms) 2025/04/30 09:40:17 client Canceling loss detection timer. 2025/04/30 09:40:17 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:17 client -> Sending packet 11 (1409 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.PingFrame{} 2025/04/30 09:40:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:17 client -> Sending packet 12 (32 bytes) for connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 480cf0603a512b550418, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:17 client Connection 16e6a318b29c75f693a4d3f7b76876a5d44cf2 closed. 2025/04/30 09:40:17 Requesting https://server4:443/tjbmhogtzc. 2025/04/30 09:40:17 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:17 Increased send buffer size to 14336 kiB 2025/04/30 09:40:17 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:17 Created qlog file: /logs/qlog/17bd59ed15bd0ad118f1ceaf8ad009db.sqlog 2025/04/30 09:40:17 client Starting new connection to server4 ([::]:48307 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 17bd59ed15bd0ad118f1ceaf8ad009db, version v1 2025/04/30 09:40:17 Adding connection ID (empty). 2025/04/30 09:40:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:17 client -> Sending packet 0 (1280 bytes) for connection 17bd59ed15bd0ad118f1ceaf8ad009db, Initial 2025/04/30 09:40:17 client Long Header{Type: Initial, DestConnectionID: 17bd59ed15bd0ad118f1ceaf8ad009db, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:40:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:40:17 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:17 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b61799b540708d7622ac, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:17 client Received first packet. Switching destination connection ID to: b61799b540708d7622ac 2025/04/30 09:40:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:17 client newly acked packets (1): [0] 2025/04/30 09:40:17 client updated RTT: 35.787164ms (σ: 17.893582ms) 2025/04/30 09:40:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:17 client Parsed a coalesced packet. Part 2: 772 bytes. Remaining: 324 bytes. 2025/04/30 09:40:17 client <- Reading packet 0 (772 bytes) for connection (empty), Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b61799b540708d7622ac, PacketNumber: 0, PacketNumberLen: 1, Length: 753, Version: v1} 2025/04/30 09:40:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 09:40:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 17bd59ed15bd0ad118f1ceaf8ad009db, InitialSourceConnectionID: b61799b540708d7622ac, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:17 client Dropping %!s(logging.PacketType=5) packet (324 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 17bd59ed15bd0ad118f1ceaf8ad009db 2025/04/30 09:40:17 client Long Header{Type: Initial, DestConnectionID: b61799b540708d7622ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: b61799b540708d7622ac, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:17 client Dropping Initial keys. 2025/04/30 09:40:17 client -> Sending packet 1 (93 bytes) for connection 17bd59ed15bd0ad118f1ceaf8ad009db, Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: b61799b540708d7622ac, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client Short Header{DestConnectionID: b61799b540708d7622ac, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:17 client -> Sending packet 2 (76 bytes) for connection 17bd59ed15bd0ad118f1ceaf8ad009db, Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: b61799b540708d7622ac, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:17 client -> Sending packet 3 (76 bytes) for connection 17bd59ed15bd0ad118f1ceaf8ad009db, Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: b61799b540708d7622ac, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:17 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:17 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b61799b540708d7622ac, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:17 client Peer doesn't await address validation any longer. 2025/04/30 09:40:17 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 107.408ms} 2025/04/30 09:40:17 client newly acked packets (1): [0] 2025/04/30 09:40:17 client updated RTT: 46.393ms (σ: 34.633ms) 2025/04/30 09:40:17 client Canceling loss detection timer. 2025/04/30 09:40:17 client Dropping Handshake keys. 2025/04/30 09:40:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3d8e0a1cb6d8c3cbf163, StatelessResetToken: 0x62673f41735e4b9709827f4f126b0efe} 2025/04/30 09:40:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 04478fbec13986ad364f, StatelessResetToken: 0xcc63d1aa4a43d93b5435a1e1dda7d45d} 2025/04/30 09:40:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0f18ed115e4fb92f47e7, StatelessResetToken: 0x2ff7358c4e02258fc5c6d7ced55c5c2a} 2025/04/30 09:40:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:17 client -> Sending packet 1 (39 bytes) for connection 17bd59ed15bd0ad118f1ceaf8ad009db, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 3d8e0a1cb6d8c3cbf163, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 206.108µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:17 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.PingFrame{} 2025/04/30 09:40:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:17 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:17 client -> Sending packet 2 (37 bytes) for connection 17bd59ed15bd0ad118f1ceaf8ad009db, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 3d8e0a1cb6d8c3cbf163, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 62.969µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:17 client -> Sending packet 3 (32 bytes) for connection 17bd59ed15bd0ad118f1ceaf8ad009db, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:17 client Short Header{DestConnectionID: 3d8e0a1cb6d8c3cbf163, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:17 client Connection 17bd59ed15bd0ad118f1ceaf8ad009db closed. 2025/04/30 09:40:17 Requesting https://server4:443/vxjmysural. 2025/04/30 09:40:17 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:17 Increased send buffer size to 14336 kiB 2025/04/30 09:40:17 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:17 Created qlog file: /logs/qlog/9af4a34f64c2c1fdb70e98d7c985.sqlog 2025/04/30 09:40:17 client Starting new connection to server4 ([::]:47738 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9af4a34f64c2c1fdb70e98d7c985, version v1 2025/04/30 09:40:17 Adding connection ID (empty). 2025/04/30 09:40:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:17 client -> Sending packet 0 (1280 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, Initial 2025/04/30 09:40:17 client Long Header{Type: Initial, DestConnectionID: 9af4a34f64c2c1fdb70e98d7c985, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:18 client -> Sending packet 1 (1280 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 9af4a34f64c2c1fdb70e98d7c985, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:18 client -> Sending packet 2 (1280 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 9af4a34f64c2c1fdb70e98d7c985, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:18 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b6070ecf644ac4c546d0, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:18 client Received first packet. Switching destination connection ID to: b6070ecf644ac4c546d0 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 326 bytes. 2025/04/30 09:40:18 client <- Reading packet 1 (770 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b6070ecf644ac4c546d0, PacketNumber: 1, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 09:40:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9af4a34f64c2c1fdb70e98d7c985, InitialSourceConnectionID: b6070ecf644ac4c546d0, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:18 client Dropping %!s(logging.PacketType=5) packet (326 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: b6070ecf644ac4c546d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: b6070ecf644ac4c546d0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:18 client Dropping Initial keys. 2025/04/30 09:40:18 client -> Sending packet 1 (45 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: b6070ecf644ac4c546d0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client -> Sending packet 0 (48 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: b6070ecf644ac4c546d0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:18 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 326 bytes. 2025/04/30 09:40:18 client <- Reading packet 2 (770 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b6070ecf644ac4c546d0, PacketNumber: 2, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 09:40:18 client Dropping %!s(logging.PacketType=5) packet (326 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:18 client -> Sending packet 2 (45 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: b6070ecf644ac4c546d0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:18 client <- Reading packet 3 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b6070ecf644ac4c546d0, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:18 client Peer doesn't await address validation any longer. 2025/04/30 09:40:18 client newly acked packets (1): [0] 2025/04/30 09:40:18 client updated RTT: 33.250153ms (σ: 16.625076ms) 2025/04/30 09:40:18 client Canceling loss detection timer. 2025/04/30 09:40:18 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:18 client Dropping Handshake keys. 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1be891b403efa7984ffe, StatelessResetToken: 0x78363836af2acdc3e4a5329f3edb0d61} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e592c427c64768cff0b, StatelessResetToken: 0x84f1c936bb5ede24498d9c6772b4eda7} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f3d45fd6b819255b033, StatelessResetToken: 0x2c5e8bf64b6b21f7cc708f40fa80e76a} 2025/04/30 09:40:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:18 client -> Sending packet 1 (39 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 1be891b403efa7984ffe, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 185.749µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:18 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:18 client -> Sending packet 2 (39 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 1be891b403efa7984ffe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 81.964µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:18 client -> Sending packet 3 (32 bytes) for connection 9af4a34f64c2c1fdb70e98d7c985, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 1be891b403efa7984ffe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:18 client Connection 9af4a34f64c2c1fdb70e98d7c985 closed. 2025/04/30 09:40:18 Requesting https://server4:443/uzlgwgwtix. 2025/04/30 09:40:18 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:18 Increased send buffer size to 14336 kiB 2025/04/30 09:40:18 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:18 Created qlog file: /logs/qlog/7855d573e919c48911c7d03a.sqlog 2025/04/30 09:40:18 client Starting new connection to server4 ([::]:56209 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7855d573e919c48911c7d03a, version v1 2025/04/30 09:40:18 Adding connection ID (empty). 2025/04/30 09:40:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:18 client -> Sending packet 0 (1280 bytes) for connection 7855d573e919c48911c7d03a, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 7855d573e919c48911c7d03a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:18 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0c6b2d4cb1b72788bf2b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:18 client Received first packet. Switching destination connection ID to: 0c6b2d4cb1b72788bf2b 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:18 client newly acked packets (1): [0] 2025/04/30 09:40:18 client updated RTT: 35.218104ms (σ: 17.609052ms) 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:18 client <- Reading packet 0 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0c6b2d4cb1b72788bf2b, PacketNumber: 0, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7855d573e919c48911c7d03a, InitialSourceConnectionID: 0c6b2d4cb1b72788bf2b, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:18 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7855d573e919c48911c7d03a 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 0c6b2d4cb1b72788bf2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: 0c6b2d4cb1b72788bf2b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:18 client Dropping Initial keys. 2025/04/30 09:40:18 client -> Sending packet 1 (45 bytes) for connection 7855d573e919c48911c7d03a, Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: 0c6b2d4cb1b72788bf2b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client -> Sending packet 0 (48 bytes) for connection 7855d573e919c48911c7d03a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 0c6b2d4cb1b72788bf2b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:18 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0c6b2d4cb1b72788bf2b, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:18 client Peer doesn't await address validation any longer. 2025/04/30 09:40:18 client newly acked packets (1): [0] 2025/04/30 09:40:18 client updated RTT: 34.965ms (σ: 13.711ms) 2025/04/30 09:40:18 client Canceling loss detection timer. 2025/04/30 09:40:18 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:18 client Dropping Handshake keys. 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f069efb45a756934a29f, StatelessResetToken: 0x5e1bc48137f3e5d08d4b97397b370418} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 221c2072b79c5efc2014, StatelessResetToken: 0xb90f99ba6b3519bbee178f21d9e35275} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c538acf7776d3071dac5, StatelessResetToken: 0x79498f478e8f6618d802587bbcafa530} 2025/04/30 09:40:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:18 client -> Sending packet 1 (39 bytes) for connection 7855d573e919c48911c7d03a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: f069efb45a756934a29f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 179.257µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:18 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.PingFrame{} 2025/04/30 09:40:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:18 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:18 client -> Sending packet 2 (38 bytes) for connection 7855d573e919c48911c7d03a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: f069efb45a756934a29f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.242861ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client <- Reading packet 3 (56 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client newly acked packets (1): [1] 2025/04/30 09:40:18 client updated RTT: 34.434ms (σ: 11.344ms) 2025/04/30 09:40:18 client ECN capability confirmed. 2025/04/30 09:40:18 client lost packet 0 (time threshold) 2025/04/30 09:40:18 client Canceling loss detection timer. 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 52d3cb3018cc3ab0b6f1, StatelessResetToken: 0x94e9c1ecb0b0ab771c2f31208fb11dcb} 2025/04/30 09:40:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:18 client Ignoring all packets below 1. 2025/04/30 09:40:18 client -> Sending packet 3 (58 bytes) for connection 7855d573e919c48911c7d03a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: f069efb45a756934a29f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 109.105µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:18 client <- Reading packet 4 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.PingFrame{} 2025/04/30 09:40:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:18 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:18 client -> Sending packet 4 (40 bytes) for connection 7855d573e919c48911c7d03a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: f069efb45a756934a29f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.325283ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:18 client -> Sending packet 6 (48 bytes) for connection 7855d573e919c48911c7d03a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: f069efb45a756934a29f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:18 client -> Sending packet 7 (48 bytes) for connection 7855d573e919c48911c7d03a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: f069efb45a756934a29f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:18 client <- Reading packet 6 (30 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:18 client -> Sending packet 8 (32 bytes) for connection 7855d573e919c48911c7d03a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: f069efb45a756934a29f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:18 client Connection 7855d573e919c48911c7d03a closed. 2025/04/30 09:40:18 Requesting https://server4:443/zcarsiouyt. 2025/04/30 09:40:18 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:18 Increased send buffer size to 14336 kiB 2025/04/30 09:40:18 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:18 Created qlog file: /logs/qlog/105793c414e8a00768.sqlog 2025/04/30 09:40:18 client Starting new connection to server4 ([::]:36982 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 105793c414e8a00768, version v1 2025/04/30 09:40:18 Adding connection ID (empty). 2025/04/30 09:40:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:18 client -> Sending packet 0 (1280 bytes) for connection 105793c414e8a00768, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 105793c414e8a00768, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:18 client -> Sending packet 1 (1280 bytes) for connection 105793c414e8a00768, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 105793c414e8a00768, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:18 client -> Sending packet 2 (1280 bytes) for connection 105793c414e8a00768, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 105793c414e8a00768, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:18 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 53e72693bed3e202c425, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:18 client Received first packet. Switching destination connection ID to: 53e72693bed3e202c425 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 2: 764 bytes. Remaining: 332 bytes. 2025/04/30 09:40:18 client <- Reading packet 0 (764 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 53e72693bed3e202c425, PacketNumber: 0, PacketNumberLen: 1, Length: 745, Version: v1} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:40:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 105793c414e8a00768, InitialSourceConnectionID: 53e72693bed3e202c425, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:18 client Dropping %!s(logging.PacketType=5) packet (332 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 105793c414e8a00768 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 53e72693bed3e202c425, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: 53e72693bed3e202c425, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:18 client Dropping Initial keys. 2025/04/30 09:40:18 client -> Sending packet 1 (45 bytes) for connection 105793c414e8a00768, Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: 53e72693bed3e202c425, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client -> Sending packet 0 (48 bytes) for connection 105793c414e8a00768, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 53e72693bed3e202c425, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:18 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 53e72693bed3e202c425, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:18 client Peer doesn't await address validation any longer. 2025/04/30 09:40:18 client newly acked packets (1): [0] 2025/04/30 09:40:18 client updated RTT: 33.331716ms (σ: 16.665858ms) 2025/04/30 09:40:18 client Canceling loss detection timer. 2025/04/30 09:40:18 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:18 client Dropping Handshake keys. 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 586c261b3ba814e43d15, StatelessResetToken: 0x3a01cce53f70ced88a9421eef86809b1} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d375f21d665a31dbafff, StatelessResetToken: 0x23720dd06d2f8abc86641d28d0f20b33} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 568f72656ea7de0a48d0, StatelessResetToken: 0xd80dca808beb981c81cb2609365ef209} 2025/04/30 09:40:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:18 client -> Sending packet 1 (39 bytes) for connection 105793c414e8a00768, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 586c261b3ba814e43d15, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 212.91µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:18 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.PingFrame{} 2025/04/30 09:40:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:18 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:18 client -> Sending packet 2 (37 bytes) for connection 105793c414e8a00768, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 586c261b3ba814e43d15, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 82.175µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:18 client -> Sending packet 3 (32 bytes) for connection 105793c414e8a00768, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 586c261b3ba814e43d15, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:18 client Connection 105793c414e8a00768 closed. 2025/04/30 09:40:18 Requesting https://server4:443/defqwnbgno. 2025/04/30 09:40:18 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:18 Increased send buffer size to 14336 kiB 2025/04/30 09:40:18 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:18 Created qlog file: /logs/qlog/5d29349bb520886eebc4d86dc2c3.sqlog 2025/04/30 09:40:18 client Starting new connection to server4 ([::]:47159 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5d29349bb520886eebc4d86dc2c3, version v1 2025/04/30 09:40:18 Adding connection ID (empty). 2025/04/30 09:40:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:18 client -> Sending packet 0 (1280 bytes) for connection 5d29349bb520886eebc4d86dc2c3, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 5d29349bb520886eebc4d86dc2c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:40:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:18 client -> Sending packet 1 (1280 bytes) for connection 5d29349bb520886eebc4d86dc2c3, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 5d29349bb520886eebc4d86dc2c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:40:18 client -> Sending packet 2 (1280 bytes) for connection 5d29349bb520886eebc4d86dc2c3, Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: 5d29349bb520886eebc4d86dc2c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:18 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6124f4941c7bb4a7dfc, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:18 client Received first packet. Switching destination connection ID to: f6124f4941c7bb4a7dfc 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 09:40:18 client newly acked packets (1): [2] 2025/04/30 09:40:18 client updated RTT: 35.815546ms (σ: 17.907773ms) 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 326 bytes. 2025/04/30 09:40:18 client <- Reading packet 0 (770 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f6124f4941c7bb4a7dfc, PacketNumber: 0, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 09:40:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5d29349bb520886eebc4d86dc2c3, InitialSourceConnectionID: f6124f4941c7bb4a7dfc, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:18 client Dropping %!s(logging.PacketType=5) packet (326 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5d29349bb520886eebc4d86dc2c3 2025/04/30 09:40:18 client Long Header{Type: Initial, DestConnectionID: f6124f4941c7bb4a7dfc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: f6124f4941c7bb4a7dfc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:18 client Dropping Initial keys. 2025/04/30 09:40:18 client -> Sending packet 1 (93 bytes) for connection 5d29349bb520886eebc4d86dc2c3, Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: f6124f4941c7bb4a7dfc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Short Header{DestConnectionID: f6124f4941c7bb4a7dfc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:18 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:18 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f6124f4941c7bb4a7dfc, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:18 client Peer doesn't await address validation any longer. 2025/04/30 09:40:18 client newly acked packets (1): [0] 2025/04/30 09:40:18 client updated RTT: 35.483ms (σ: 14.092ms) 2025/04/30 09:40:18 client Canceling loss detection timer. 2025/04/30 09:40:18 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:18 client Dropping Handshake keys. 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 081096f951e83743101f, StatelessResetToken: 0x49a8f60df2694fad3a10297056bbbd2c} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 85e393db78b12ce05c7e, StatelessResetToken: 0x6ed2f9e94a1f9f8d0bbc314271949480} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c97573562d69f21cbc09, StatelessResetToken: 0x63595418419a1f7ccbb29d5a71abf61f} 2025/04/30 09:40:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:18 client -> Sending packet 1 (39 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 150.473µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:18 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.PingFrame{} 2025/04/30 09:40:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:18 client <- Reading packet 2 (388 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 321, Offset + Data length: 321} 2025/04/30 09:40:18 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010017fce4b5ede022b0ee3894945541532e5b6c594602b94e1fe1204d36f08e9d0da6fde1cf} 2025/04/30 09:40:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:18 client -> Sending packet 2 (37 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 69.851µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client <- Reading packet 4 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.PingFrame{} 2025/04/30 09:40:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:18 client -> Sending packet 3 (39 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 67.537µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client <- Reading packet 5 (1422 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.PingFrame{} 2025/04/30 09:40:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:18 client <- Reading packet 6 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e16b06e4286bccdfb336, StatelessResetToken: 0x8ff8d0ea98b419393e79db78a59b845b} 2025/04/30 09:40:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:18 client -> Sending packet 4 (39 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 68.328µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:40:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:18 client -> Sending packet 6 (48 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:18 client Skipping packet number 5 2025/04/30 09:40:18 client -> Sending packet 7 (31 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:18 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:19 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.PingFrame{} 2025/04/30 09:40:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:19 client -> Sending packet 8 (1366 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.PingFrame{} 2025/04/30 09:40:19 client -> Sending packet 9 (41 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 127.98µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client <- Reading packet 14 (1076 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e16b06e4286bccdfb336, StatelessResetToken: 0x8ff8d0ea98b419393e79db78a59b845b} 2025/04/30 09:40:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:19 client <- Reading packet 15 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.PingFrame{} 2025/04/30 09:40:19 client -> Sending packet 10 (43 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 0, AckRanges: {{Largest: 15, Smallest: 14}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 123.743µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:19 client -> Sending packet 11 (32 bytes) for connection 5d29349bb520886eebc4d86dc2c3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 081096f951e83743101f, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:19 client Connection 5d29349bb520886eebc4d86dc2c3 closed. 2025/04/30 09:40:19 Requesting https://server4:443/otsnnzjhnp. 2025/04/30 09:40:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:19 Increased send buffer size to 14336 kiB 2025/04/30 09:40:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:19 Created qlog file: /logs/qlog/bb6ce7b382801a5c6844505fccbb2e.sqlog 2025/04/30 09:40:19 client Starting new connection to server4 ([::]:53501 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bb6ce7b382801a5c6844505fccbb2e, version v1 2025/04/30 09:40:19 Adding connection ID (empty). 2025/04/30 09:40:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:19 client -> Sending packet 0 (1280 bytes) for connection bb6ce7b382801a5c6844505fccbb2e, Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: bb6ce7b382801a5c6844505fccbb2e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:19 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8689f27fc9f1381a7b0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:19 client Received first packet. Switching destination connection ID to: b8689f27fc9f1381a7b0 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:19 client newly acked packets (1): [0] 2025/04/30 09:40:19 client updated RTT: 34.685612ms (σ: 17.342806ms) 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 326 bytes. 2025/04/30 09:40:19 client <- Reading packet 0 (770 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8689f27fc9f1381a7b0, PacketNumber: 0, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 09:40:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bb6ce7b382801a5c6844505fccbb2e, InitialSourceConnectionID: b8689f27fc9f1381a7b0, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:19 client Dropping %!s(logging.PacketType=5) packet (326 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bb6ce7b382801a5c6844505fccbb2e 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: b8689f27fc9f1381a7b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: b8689f27fc9f1381a7b0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:19 client Dropping Initial keys. 2025/04/30 09:40:19 client -> Sending packet 1 (93 bytes) for connection bb6ce7b382801a5c6844505fccbb2e, Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: b8689f27fc9f1381a7b0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Short Header{DestConnectionID: b8689f27fc9f1381a7b0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:19 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8689f27fc9f1381a7b0, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:19 client Peer doesn't await address validation any longer. 2025/04/30 09:40:19 client newly acked packets (1): [0] 2025/04/30 09:40:19 client updated RTT: 34.488ms (σ: 13.399ms) 2025/04/30 09:40:19 client Canceling loss detection timer. 2025/04/30 09:40:19 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:19 client Dropping Handshake keys. 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f5052bab209400585e4, StatelessResetToken: 0xa9d312d57d6cc5feb505f6875058e2de} 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 53fe8fbc4a71296b17cc, StatelessResetToken: 0xc6730c42251971fab06b999b318ef516} 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eb69340f0548ffa6cd9e, StatelessResetToken: 0x8fad7c110896ad5a1a5bf422f961441b} 2025/04/30 09:40:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:19 client -> Sending packet 1 (39 bytes) for connection bb6ce7b382801a5c6844505fccbb2e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 8f5052bab209400585e4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 195.138µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:19 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.PingFrame{} 2025/04/30 09:40:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:19 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:19 client -> Sending packet 2 (37 bytes) for connection bb6ce7b382801a5c6844505fccbb2e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 8f5052bab209400585e4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 64.361µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:19 client -> Sending packet 3 (32 bytes) for connection bb6ce7b382801a5c6844505fccbb2e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 8f5052bab209400585e4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:19 client Connection bb6ce7b382801a5c6844505fccbb2e closed. 2025/04/30 09:40:19 Requesting https://server4:443/vvjcvmpbcr. 2025/04/30 09:40:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:19 Increased send buffer size to 14336 kiB 2025/04/30 09:40:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:19 Created qlog file: /logs/qlog/1bfde25664e371fa030464f41991bb25.sqlog 2025/04/30 09:40:19 client Starting new connection to server4 ([::]:35766 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1bfde25664e371fa030464f41991bb25, version v1 2025/04/30 09:40:19 Adding connection ID (empty). 2025/04/30 09:40:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:19 client -> Sending packet 0 (1280 bytes) for connection 1bfde25664e371fa030464f41991bb25, Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: 1bfde25664e371fa030464f41991bb25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:19 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ee868a6cb3bd60c386ff, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:19 client Received first packet. Switching destination connection ID to: ee868a6cb3bd60c386ff 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:19 client newly acked packets (1): [0] 2025/04/30 09:40:19 client updated RTT: 34.885939ms (σ: 17.442969ms) 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 09:40:19 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ee868a6cb3bd60c386ff, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 09:40:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1bfde25664e371fa030464f41991bb25, InitialSourceConnectionID: ee868a6cb3bd60c386ff, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:19 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1bfde25664e371fa030464f41991bb25 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: ee868a6cb3bd60c386ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: ee868a6cb3bd60c386ff, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:19 client Dropping Initial keys. 2025/04/30 09:40:19 client -> Sending packet 1 (45 bytes) for connection 1bfde25664e371fa030464f41991bb25, Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: ee868a6cb3bd60c386ff, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client -> Sending packet 0 (48 bytes) for connection 1bfde25664e371fa030464f41991bb25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: ee868a6cb3bd60c386ff, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:19 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:19 client -> Sending packet 1 (37 bytes) for connection 1bfde25664e371fa030464f41991bb25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: ee868a6cb3bd60c386ff, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 78.558µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:19 client -> Sending packet 2 (73 bytes) for connection 1bfde25664e371fa030464f41991bb25, Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: ee868a6cb3bd60c386ff, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 09:40:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:19 client Short Header{DestConnectionID: ee868a6cb3bd60c386ff, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:19 client Connection 1bfde25664e371fa030464f41991bb25 closed. 2025/04/30 09:40:19 Requesting https://server4:443/yaaajezsvj. 2025/04/30 09:40:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:19 Increased send buffer size to 14336 kiB 2025/04/30 09:40:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:19 Created qlog file: /logs/qlog/e69bce7da91d3b43cb31535190500095ff45.sqlog 2025/04/30 09:40:19 client Starting new connection to server4 ([::]:39297 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e69bce7da91d3b43cb31535190500095ff45, version v1 2025/04/30 09:40:19 Adding connection ID (empty). 2025/04/30 09:40:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:19 client -> Sending packet 0 (1280 bytes) for connection e69bce7da91d3b43cb31535190500095ff45, Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: e69bce7da91d3b43cb31535190500095ff45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:19 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a29f5ecb19d557662a3a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:19 client Received first packet. Switching destination connection ID to: a29f5ecb19d557662a3a 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:19 client newly acked packets (1): [0] 2025/04/30 09:40:19 client updated RTT: 34.816859ms (σ: 17.408429ms) 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 2: 774 bytes. Remaining: 322 bytes. 2025/04/30 09:40:19 client <- Reading packet 0 (774 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a29f5ecb19d557662a3a, PacketNumber: 0, PacketNumberLen: 1, Length: 755, Version: v1} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 09:40:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e69bce7da91d3b43cb31535190500095ff45, InitialSourceConnectionID: a29f5ecb19d557662a3a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:19 client Dropping %!s(logging.PacketType=5) packet (322 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e69bce7da91d3b43cb31535190500095ff45 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: a29f5ecb19d557662a3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: a29f5ecb19d557662a3a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:19 client Dropping Initial keys. 2025/04/30 09:40:19 client -> Sending packet 1 (45 bytes) for connection e69bce7da91d3b43cb31535190500095ff45, Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: a29f5ecb19d557662a3a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client -> Sending packet 0 (48 bytes) for connection e69bce7da91d3b43cb31535190500095ff45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: a29f5ecb19d557662a3a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:19 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a29f5ecb19d557662a3a, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:19 client Peer doesn't await address validation any longer. 2025/04/30 09:40:19 client newly acked packets (1): [0] 2025/04/30 09:40:19 client updated RTT: 34.589ms (σ: 13.508ms) 2025/04/30 09:40:19 client Canceling loss detection timer. 2025/04/30 09:40:19 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:19 client Dropping Handshake keys. 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 16d572b4fa2d252599db, StatelessResetToken: 0xb55d4ca75d71c218ae4e972578042dc9} 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 197b400919d8b8baa89b, StatelessResetToken: 0xa5a6dbbe669216c351ae68f9427de1d5} 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f5c2ee876ff4c478779, StatelessResetToken: 0xa2a88e7a44bf419dc2a28885a35f1b21} 2025/04/30 09:40:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:19 client -> Sending packet 1 (39 bytes) for connection e69bce7da91d3b43cb31535190500095ff45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 16d572b4fa2d252599db, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 182.844µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:19 client <- Reading packet 3 (207 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 182, Data length: 139, Offset + Data length: 321} 2025/04/30 09:40:19 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d860100a99d253e28b579cc1090d3e44b6eb47acaab9ced838308d891ecb2d3c9691f210db363f4} 2025/04/30 09:40:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:19 client -> Sending packet 2 (39 bytes) for connection e69bce7da91d3b43cb31535190500095ff45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 16d572b4fa2d252599db, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 62.427µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.176ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client newly acked packets (1): [0] 2025/04/30 09:40:19 client updated RTT: 34.46ms (σ: 10.388ms) 2025/04/30 09:40:19 client ECN capability confirmed. 2025/04/30 09:40:19 client <- Reading packet 5 (48 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c7ce41ee00a49ef4d18e, StatelessResetToken: 0x618d53e070ea4af966a60c08048b46aa} 2025/04/30 09:40:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:19 client Sending ACK because the ACK timer expired. 2025/04/30 09:40:19 client -> Sending packet 3 (40 bytes) for connection e69bce7da91d3b43cb31535190500095ff45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 16d572b4fa2d252599db, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.256148ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client <- Reading packet 7 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.PingFrame{} 2025/04/30 09:40:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:19 client -> Sending packet 4 (41 bytes) for connection e69bce7da91d3b43cb31535190500095ff45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 16d572b4fa2d252599db, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 101.261µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:19 client -> Sending packet 5 (32 bytes) for connection e69bce7da91d3b43cb31535190500095ff45, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 16d572b4fa2d252599db, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:19 client Connection e69bce7da91d3b43cb31535190500095ff45 closed. 2025/04/30 09:40:19 Requesting https://server4:443/idfuwbehfr. 2025/04/30 09:40:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:19 Increased send buffer size to 14336 kiB 2025/04/30 09:40:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:19 Created qlog file: /logs/qlog/58deeee6c5e29f44204adb59a92ca93d43dd0d16.sqlog 2025/04/30 09:40:19 client Starting new connection to server4 ([::]:41978 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 58deeee6c5e29f44204adb59a92ca93d43dd0d16, version v1 2025/04/30 09:40:19 Adding connection ID (empty). 2025/04/30 09:40:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:19 client -> Sending packet 0 (1280 bytes) for connection 58deeee6c5e29f44204adb59a92ca93d43dd0d16, Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: 58deeee6c5e29f44204adb59a92ca93d43dd0d16, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:19 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3bf11e0d2786c717a455, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:19 client Received first packet. Switching destination connection ID to: 3bf11e0d2786c717a455 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:19 client newly acked packets (1): [0] 2025/04/30 09:40:19 client updated RTT: 34.846275ms (σ: 17.423137ms) 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 2: 776 bytes. Remaining: 320 bytes. 2025/04/30 09:40:19 client <- Reading packet 0 (776 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3bf11e0d2786c717a455, PacketNumber: 0, PacketNumberLen: 1, Length: 757, Version: v1} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 09:40:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 58deeee6c5e29f44204adb59a92ca93d43dd0d16, InitialSourceConnectionID: 3bf11e0d2786c717a455, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:19 client Dropping %!s(logging.PacketType=5) packet (320 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 58deeee6c5e29f44204adb59a92ca93d43dd0d16 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: 3bf11e0d2786c717a455, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: 3bf11e0d2786c717a455, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:19 client Dropping Initial keys. 2025/04/30 09:40:19 client -> Sending packet 1 (45 bytes) for connection 58deeee6c5e29f44204adb59a92ca93d43dd0d16, Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: 3bf11e0d2786c717a455, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client -> Sending packet 0 (48 bytes) for connection 58deeee6c5e29f44204adb59a92ca93d43dd0d16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 3bf11e0d2786c717a455, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:19 client <- Reading packet 1 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3bf11e0d2786c717a455, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:19 client Peer doesn't await address validation any longer. 2025/04/30 09:40:19 client newly acked packets (1): [0] 2025/04/30 09:40:19 client updated RTT: 34.631ms (σ: 13.496ms) 2025/04/30 09:40:19 client Canceling loss detection timer. 2025/04/30 09:40:19 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:19 client Dropping Handshake keys. 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 51b8ca2d320f55221239, StatelessResetToken: 0x4199a5a78659c9a4930b38d7c97ede6a} 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a4623e4915b4187c3f38, StatelessResetToken: 0x03a904129a72555a664f3e3015bd6f9c} 2025/04/30 09:40:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2802b0b6539dba5a9725, StatelessResetToken: 0x05cc09c22540a90eda7cd6f217fe6fc5} 2025/04/30 09:40:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:19 client -> Sending packet 1 (39 bytes) for connection 58deeee6c5e29f44204adb59a92ca93d43dd0d16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 51b8ca2d320f55221239, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 193.293µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:19 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:19 client -> Sending packet 2 (39 bytes) for connection 58deeee6c5e29f44204adb59a92ca93d43dd0d16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 51b8ca2d320f55221239, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56.045µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:19 client -> Sending packet 3 (32 bytes) for connection 58deeee6c5e29f44204adb59a92ca93d43dd0d16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 51b8ca2d320f55221239, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:19 client Connection 58deeee6c5e29f44204adb59a92ca93d43dd0d16 closed. 2025/04/30 09:40:19 Requesting https://server4:443/fxhbfcchbh. 2025/04/30 09:40:19 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:19 Increased send buffer size to 14336 kiB 2025/04/30 09:40:19 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:19 Created qlog file: /logs/qlog/da2fb44df2ef14c20d22.sqlog 2025/04/30 09:40:19 client Starting new connection to server4 ([::]:43388 -> 193.167.100.100:443), source connection ID (empty), destination connection ID da2fb44df2ef14c20d22, version v1 2025/04/30 09:40:19 Adding connection ID (empty). 2025/04/30 09:40:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:19 client -> Sending packet 0 (1280 bytes) for connection da2fb44df2ef14c20d22, Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: da2fb44df2ef14c20d22, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:19 client -> Sending packet 1 (1280 bytes) for connection da2fb44df2ef14c20d22, Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: da2fb44df2ef14c20d22, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:19 client -> Sending packet 2 (1280 bytes) for connection da2fb44df2ef14c20d22, Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: da2fb44df2ef14c20d22, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:19 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17b81d7e551218ee87ee, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:19 client Received first packet. Switching destination connection ID to: 17b81d7e551218ee87ee 2025/04/30 09:40:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:19 client <- Reading packet 1 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17b81d7e551218ee87ee, PacketNumber: 1, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: da2fb44df2ef14c20d22, InitialSourceConnectionID: 17b81d7e551218ee87ee, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:19 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection da2fb44df2ef14c20d22 2025/04/30 09:40:19 client Long Header{Type: Initial, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:19 client Dropping Initial keys. 2025/04/30 09:40:19 client -> Sending packet 1 (45 bytes) for connection da2fb44df2ef14c20d22, Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:19 client -> Sending packet 0 (48 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:19 client Short Header{DestConnectionID: 17b81d7e551218ee87ee, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:19 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 09:40:19 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 329 bytes. 2025/04/30 09:40:19 client <- Reading packet 2 (767 bytes) for connection (empty), Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17b81d7e551218ee87ee, PacketNumber: 2, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 09:40:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 09:40:19 client Dropping %!s(logging.PacketType=5) packet (329 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:19 client -> Sending packet 2 (45 bytes) for connection da2fb44df2ef14c20d22, Handshake 2025/04/30 09:40:19 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:40:20 client -> Sending packet 3 (76 bytes) for connection da2fb44df2ef14c20d22, Handshake 2025/04/30 09:40:20 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:20 client -> Sending packet 4 (76 bytes) for connection da2fb44df2ef14c20d22, Handshake 2025/04/30 09:40:20 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:40:20 client -> Sending packet 5 (76 bytes) for connection da2fb44df2ef14c20d22, Handshake 2025/04/30 09:40:20 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:20 client -> Sending packet 6 (76 bytes) for connection da2fb44df2ef14c20d22, Handshake 2025/04/30 09:40:20 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:20 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:20 client <- &wire.PingFrame{} 2025/04/30 09:40:20 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:20 client -> Sending packet 1 (37 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:20 client Short Header{DestConnectionID: 17b81d7e551218ee87ee, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 109.446µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:20 client <- Reading packet 2 (372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:20 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/04/30 09:40:20 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010077ce5fdf363c6a00cb09114b315316443233059bd77224b680a5e59682be398e9f15d49e} 2025/04/30 09:40:20 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:40:20 client <- Reading packet 3 (1372 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:20 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:20 client <- &wire.PingFrame{} 2025/04/30 09:40:20 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:40:20 client -> Sending packet 2 (37 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:20 client Short Header{DestConnectionID: 17b81d7e551218ee87ee, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:20 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 75.642µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:40:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 09:40:21 client -> Sending packet 7 (76 bytes) for connection da2fb44df2ef14c20d22, Handshake 2025/04/30 09:40:21 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:21 client -> Sending packet 8 (76 bytes) for connection da2fb44df2ef14c20d22, Handshake 2025/04/30 09:40:21 client Long Header{Type: Handshake, DestConnectionID: 17b81d7e551218ee87ee, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:21 client <- Reading packet 5 (463 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:21 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:21 client Dropping Handshake keys. 2025/04/30 09:40:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7071dce7d3b9c2b3599d, StatelessResetToken: 0xc765658a9f797fad5dc931e8af8f585b} 2025/04/30 09:40:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: afe48ada16eb142cd8c4, StatelessResetToken: 0x19fd4cb7a3e7559434bb583be01aa227} 2025/04/30 09:40:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22fdfc46cd2567ce1428, StatelessResetToken: 0xb2248f254371c9e04b9b69c8dc65c1a8} 2025/04/30 09:40:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 305, Offset + Data length: 305} 2025/04/30 09:40:21 client <- &wire.NewTokenFrame{Token: 0xad9a8b8d86010077ce5fdf363c6a00cb09114b315316443233059bd77224b680a5e59682be398e9f15d49e} 2025/04/30 09:40:21 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:21 client -> Sending packet 4 (60 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:21 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:21 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 146.225µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:40:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:21 client -> Sending packet 5 (50 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:21 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:21 client -> Sending packet 6 (1366 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:21 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:21 client -> &wire.PingFrame{} 2025/04/30 09:40:21 client <- Reading packet 7 (1422 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:21 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:21 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:21 client <- &wire.PingFrame{} 2025/04/30 09:40:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7071dce7d3b9c2b3599d, StatelessResetToken: 0xc765658a9f797fad5dc931e8af8f585b} 2025/04/30 09:40:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: afe48ada16eb142cd8c4, StatelessResetToken: 0x19fd4cb7a3e7559434bb583be01aa227} 2025/04/30 09:40:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22fdfc46cd2567ce1428, StatelessResetToken: 0xb2248f254371c9e04b9b69c8dc65c1a8} 2025/04/30 09:40:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 59277f3a888e58cc9c8e, StatelessResetToken: 0x38f226004742f51e88cabe053ca3bd1f} 2025/04/30 09:40:21 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:21 client -> Sending packet 7 (41 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:21 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:21 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 119.424µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:40:21 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 09:40:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:40:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:40:21 client -> Sending packet 9 (50 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:21 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:21 client -> Sending packet 10 (50 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:21 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:21 client <- Reading packet 11 (28 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:21 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:21 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 4}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:40:21 client newly acked packets (1): [6] 2025/04/30 09:40:21 client ECN capability confirmed. 2025/04/30 09:40:21 client -> Sending packet 11 (1409 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:21 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:21 client -> &wire.PingFrame{} 2025/04/30 09:40:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:40:22 client -> Sending packet 13 (50 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:22 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:22 client -> Sending packet 14 (50 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:22 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:22 client <- Reading packet 12 (30 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:22 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:22 client <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 4, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 4}}, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:40:22 client newly acked packets (1): [14] 2025/04/30 09:40:22 client updated RTT: 31.030785ms (σ: 15.515392ms) 2025/04/30 09:40:22 client lost packet 11 (time threshold) 2025/04/30 09:40:22 client Canceling loss detection timer. 2025/04/30 09:40:22 client -> Sending packet 15 (1387 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:22 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.PingFrame{} 2025/04/30 09:40:22 client <- Reading packet 14 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:22 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:22 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:22 client <- Reading packet 15 (21 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:22 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:22 client <- &wire.PingFrame{} 2025/04/30 09:40:22 client -> Sending packet 16 (45 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:22 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 1, AckRanges: {{Largest: 15, Smallest: 14}, {Largest: 12, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 96.141µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 09:40:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:22 client -> Sending packet 17 (32 bytes) for connection da2fb44df2ef14c20d22, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:22 client Short Header{DestConnectionID: 7071dce7d3b9c2b3599d, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:22 client Connection da2fb44df2ef14c20d22 closed. 2025/04/30 09:40:22 Requesting https://server4:443/hmwcekdgrf. 2025/04/30 09:40:22 Increased receive buffer size to 14336 kiB 2025/04/30 09:40:22 Increased send buffer size to 14336 kiB 2025/04/30 09:40:22 Setting DF for IPv4 and IPv6. 2025/04/30 09:40:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:40:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:40:22 Created qlog file: /logs/qlog/af68e4fa24148b9e.sqlog 2025/04/30 09:40:22 client Starting new connection to server4 ([::]:40770 -> 193.167.100.100:443), source connection ID (empty), destination connection ID af68e4fa24148b9e, version v1 2025/04/30 09:40:22 Adding connection ID (empty). 2025/04/30 09:40:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:40:22 client -> Sending packet 0 (1280 bytes) for connection af68e4fa24148b9e, Initial 2025/04/30 09:40:22 client Long Header{Type: Initial, DestConnectionID: af68e4fa24148b9e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:40:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:40:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:40:22 client -> Sending packet 1 (1280 bytes) for connection af68e4fa24148b9e, Initial 2025/04/30 09:40:22 client Long Header{Type: Initial, DestConnectionID: af68e4fa24148b9e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:40:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:40:22 client -> Sending packet 2 (1280 bytes) for connection af68e4fa24148b9e, Initial 2025/04/30 09:40:22 client Long Header{Type: Initial, DestConnectionID: af68e4fa24148b9e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:40:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:40:22 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 09:40:22 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 09:40:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5c5ebbb289ff9f0b299a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 09:40:22 client Received first packet. Switching destination connection ID to: 5c5ebbb289ff9f0b299a 2025/04/30 09:40:22 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 09:40:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:40:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:22 client Parsed a coalesced packet. Part 2: 764 bytes. Remaining: 332 bytes. 2025/04/30 09:40:22 client <- Reading packet 0 (764 bytes) for connection (empty), Handshake 2025/04/30 09:40:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5c5ebbb289ff9f0b299a, PacketNumber: 0, PacketNumberLen: 1, Length: 745, Version: v1} 2025/04/30 09:40:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 09:40:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:40:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: af68e4fa24148b9e, InitialSourceConnectionID: 5c5ebbb289ff9f0b299a, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 09:40:22 client Dropping %!s(logging.PacketType=5) packet (332 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 09:40:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection af68e4fa24148b9e 2025/04/30 09:40:22 client Long Header{Type: Initial, DestConnectionID: 5c5ebbb289ff9f0b299a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 09:40:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:22 client Long Header{Type: Handshake, DestConnectionID: 5c5ebbb289ff9f0b299a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:40:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:40:22 client Dropping Initial keys. 2025/04/30 09:40:22 client -> Sending packet 1 (93 bytes) for connection af68e4fa24148b9e, Handshake 2025/04/30 09:40:22 client Long Header{Type: Handshake, DestConnectionID: 5c5ebbb289ff9f0b299a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:40:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:22 client Short Header{DestConnectionID: 5c5ebbb289ff9f0b299a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:40:22 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 09:40:22 client <- Reading packet 2 (41 bytes) for connection (empty), Handshake 2025/04/30 09:40:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5c5ebbb289ff9f0b299a, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 09:40:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:40:22 client Peer doesn't await address validation any longer. 2025/04/30 09:40:22 client newly acked packets (1): [0] 2025/04/30 09:40:22 client updated RTT: 33.527086ms (σ: 16.763543ms) 2025/04/30 09:40:22 client Canceling loss detection timer. 2025/04/30 09:40:22 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:22 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:40:22 client Dropping Handshake keys. 2025/04/30 09:40:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6cf255ab8ac013a3d222, StatelessResetToken: 0x284cec98fac045f28606566d4bcd2fac} 2025/04/30 09:40:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 21d765aab2e81dd8ade6, StatelessResetToken: 0x4e4dd96da1ac24a18e216363f40d8283} 2025/04/30 09:40:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1230fcfbe6db4ebfd58f, StatelessResetToken: 0xc885dcf2f2b5dceb59ff304cb2087b39} 2025/04/30 09:40:22 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:40:22 client -> Sending packet 1 (39 bytes) for connection af68e4fa24148b9e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:22 client Short Header{DestConnectionID: 6cf255ab8ac013a3d222, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 167.184µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:40:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:40:22 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 09:40:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:40:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:40:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 182, Offset + Data length: 182} 2025/04/30 09:40:22 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:40:22 client -> Sending packet 2 (39 bytes) for connection af68e4fa24148b9e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:22 client Short Header{DestConnectionID: 6cf255ab8ac013a3d222, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88.016µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:40:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:40:22 client -> Sending packet 3 (32 bytes) for connection af68e4fa24148b9e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:40:22 client Short Header{DestConnectionID: 6cf255ab8ac013a3d222, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:40:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:40:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:40:22 client Connection af68e4fa24148b9e closed.