2025/04/30 17:12:07 Requesting https://server4:443/ggurixnawf. 2025/04/30 17:12:07 Increased receive buffer size to 14336 kiB 2025/04/30 17:12:07 Increased send buffer size to 14336 kiB 2025/04/30 17:12:07 Setting DF for IPv4 and IPv6. 2025/04/30 17:12:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 17:12:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 17:12:07 Created qlog file: /logs/qlog/3ade4ab0e24886c9460971d541d8.sqlog 2025/04/30 17:12:07 client Starting new connection to server4 ([::]:46884 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3ade4ab0e24886c9460971d541d8, version v1 2025/04/30 17:12:07 Adding connection ID (empty). 2025/04/30 17:12:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 17:12:07 client -> Sending packet 0 (1280 bytes) for connection 3ade4ab0e24886c9460971d541d8, Initial 2025/04/30 17:12:07 client Long Header{Type: Initial, DestConnectionID: 3ade4ab0e24886c9460971d541d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 17:12:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 17:12:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:12:07 client -> Sending packet 1 (1280 bytes) for connection 3ade4ab0e24886c9460971d541d8, Initial 2025/04/30 17:12:07 client Long Header{Type: Initial, DestConnectionID: 3ade4ab0e24886c9460971d541d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 17:12:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 17:12:07 client -> Sending packet 2 (1280 bytes) for connection 3ade4ab0e24886c9460971d541d8, Initial 2025/04/30 17:12:07 client Long Header{Type: Initial, DestConnectionID: 3ade4ab0e24886c9460971d541d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 17:12:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 17:12:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 17:12:07 client -> Sending packet 3 (1280 bytes) for connection 3ade4ab0e24886c9460971d541d8, Initial 2025/04/30 17:12:07 client Long Header{Type: Initial, DestConnectionID: 3ade4ab0e24886c9460971d541d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 17:12:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 17:12:07 client -> Sending packet 4 (1280 bytes) for connection 3ade4ab0e24886c9460971d541d8, Initial 2025/04/30 17:12:07 client Long Header{Type: Initial, DestConnectionID: 3ade4ab0e24886c9460971d541d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 17:12:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 17:12:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 17:12:08 client -> Sending packet 5 (1280 bytes) for connection 3ade4ab0e24886c9460971d541d8, Initial 2025/04/30 17:12:08 client Long Header{Type: Initial, DestConnectionID: 3ade4ab0e24886c9460971d541d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 17:12:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 17:12:08 client -> Sending packet 6 (1280 bytes) for connection 3ade4ab0e24886c9460971d541d8, Initial 2025/04/30 17:12:08 client Long Header{Type: Initial, DestConnectionID: 3ade4ab0e24886c9460971d541d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 17:12:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 17:12:08 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 17:12:08 client <- Reading packet 0 (136 bytes) for connection (empty), Initial 2025/04/30 17:12:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 17:12:08 client Received first packet. Switching destination connection ID to: 24d83b86993961454b42 2025/04/30 17:12:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:12:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 17:12:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:12:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:12:08 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 17:12:08 client <- Reading packet 0 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 0, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:12:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:12:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3ade4ab0e24886c9460971d541d8, InitialSourceConnectionID: 24d83b86993961454b42, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 17:12:08 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:08 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ade4ab0e24886c9460971d541d8 2025/04/30 17:12:08 client Long Header{Type: Initial, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1184, Version: v1} 2025/04/30 17:12:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 17:12:08 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 17:12:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:12:08 client Dropping Initial keys. 2025/04/30 17:12:08 client -> Sending packet 1 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:08 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 17:12:08 client -> Sending packet 0 (48 bytes) for connection 3ade4ab0e24886c9460971d541d8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:12:08 client Short Header{DestConnectionID: 24d83b86993961454b42, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:12:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 17:12:09 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 1, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:09 client -> Sending packet 2 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 17:12:09 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 2, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:09 client -> Sending packet 3 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 17:12:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:12:09 client -> Sending packet 4 (76 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:12:09 client -> Sending packet 5 (76 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:12:09 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 1: 139 bytes. Remaining: 1093 bytes. 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=0) packet (139 bytes) because we already dropped the keys. 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 322 bytes. 2025/04/30 17:12:09 client <- Reading packet 3 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 3, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=5) packet (322 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:09 client -> Sending packet 6 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 17:12:09 client <- Reading packet 4 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 4, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:09 client -> Sending packet 7 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:09 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 17:12:09 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 17:12:09 client <- Reading packet 5 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 5, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:09 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:09 client -> Sending packet 8 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:09 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 17:12:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:12:09 client -> Sending packet 9 (76 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:12:09 client -> Sending packet 10 (76 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:09 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:12:10 client Parsed a coalesced packet. Part 1: 139 bytes. Remaining: 1093 bytes. 2025/04/30 17:12:10 client Dropping %!s(logging.PacketType=0) packet (139 bytes) because we already dropped the keys. 2025/04/30 17:12:10 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 322 bytes. 2025/04/30 17:12:10 client <- Reading packet 6 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 6, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:10 client Dropping %!s(logging.PacketType=5) packet (322 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:10 client -> Sending packet 11 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:10 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 17:12:10 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 17:12:10 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 17:12:10 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 17:12:10 client <- Reading packet 7 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 7, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:10 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:10 client -> Sending packet 12 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:10 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 17:12:10 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1096 bytes. 2025/04/30 17:12:10 client Dropping %!s(logging.PacketType=0) packet (136 bytes) because we already dropped the keys. 2025/04/30 17:12:10 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 325 bytes. 2025/04/30 17:12:10 client <- Reading packet 8 (771 bytes) for connection (empty), Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 8, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 17:12:10 client Dropping %!s(logging.PacketType=5) packet (325 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 17:12:10 client -> Sending packet 13 (45 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 17:12:10 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 17:12:10 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 17:12:10 client -> Sending packet 14 (76 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:12:10 client -> Sending packet 15 (76 bytes) for connection 3ade4ab0e24886c9460971d541d8, Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: 24d83b86993961454b42, SrcConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:12:10 client Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1291 bytes. 2025/04/30 17:12:10 client <- Reading packet 9 (41 bytes) for connection (empty), Handshake 2025/04/30 17:12:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24d83b86993961454b42, PacketNumber: 9, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:12:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:12:10 client Peer doesn't await address validation any longer. 2025/04/30 17:12:10 client <- Reading packet 0 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:12:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 17:12:10 client Dropping Handshake keys. 2025/04/30 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 70cf431f7afbe5a4158d, StatelessResetToken: 0x37d46c093f23c1b707d3b3db356adf06} 2025/04/30 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fb9e23bebf0da29968bb, StatelessResetToken: 0xd28dcf2601ab5d64c4590c9e7648bd9d} 2025/04/30 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d6796196d0891c520a49, StatelessResetToken: 0x718c6831f610dace35143189dc31e498} 2025/04/30 17:12:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:12:10 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:12:10 client -> Sending packet 2 (55 bytes) for connection 3ade4ab0e24886c9460971d541d8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:12:10 client Short Header{DestConnectionID: 70cf431f7afbe5a4158d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:12:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 145.582µs} 2025/04/30 17:12:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 17:12:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:12:10 client -> Sending packet 3 (50 bytes) for connection 3ade4ab0e24886c9460971d541d8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:12:10 client Short Header{DestConnectionID: 70cf431f7afbe5a4158d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:12:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 17:12:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:12:10 client -> Sending packet 4 (1366 bytes) for connection 3ade4ab0e24886c9460971d541d8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:12:10 client Short Header{DestConnectionID: 70cf431f7afbe5a4158d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:12:10 client -> &wire.PingFrame{} 2025/04/30 17:12:10 client <- Reading packet 1 (1332 bytes) for connection (empty), 1-RTT 2025/04/30 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:12:10 client <- &wire.PingFrame{} 2025/04/30 17:12:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 281, Offset + Data length: 281} 2025/04/30 17:12:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 17:12:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 17:12:10 client -> Sending packet 5 (32 bytes) for connection 3ade4ab0e24886c9460971d541d8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:12:10 client Short Header{DestConnectionID: 70cf431f7afbe5a4158d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:12:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:12:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 17:12:10 client Connection 3ade4ab0e24886c9460971d541d8 closed.