2025/04/30 10:10:31 Requesting https://server4:443/ytcwaykyub. 2025/04/30 10:10:31 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:31 Increased send buffer size to 14336 kiB 2025/04/30 10:10:31 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:31 Created qlog file: /logs/qlog/8cc40c3f621e99c5f9d01be97b5b13ec57b0.sqlog 2025/04/30 10:10:31 client Starting new connection to server4 ([::]:43996 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8cc40c3f621e99c5f9d01be97b5b13ec57b0, version v1 2025/04/30 10:10:31 Adding connection ID (empty). 2025/04/30 10:10:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:31 client -> Sending packet 0 (1280 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, Initial 2025/04/30 10:10:31 client Long Header{Type: Initial, DestConnectionID: 8cc40c3f621e99c5f9d01be97b5b13ec57b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:31 client -> Sending packet 1 (1280 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, Initial 2025/04/30 10:10:31 client Long Header{Type: Initial, DestConnectionID: 8cc40c3f621e99c5f9d01be97b5b13ec57b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:31 client -> Sending packet 2 (1280 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, Initial 2025/04/30 10:10:31 client Long Header{Type: Initial, DestConnectionID: 8cc40c3f621e99c5f9d01be97b5b13ec57b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:31 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:31 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:31 client Received first packet. Switching destination connection ID to: 0000000000000004d43a0db83c90ce92519c1d1a 2025/04/30 10:10:31 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:31 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:31 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8cc40c3f621e99c5f9d01be97b5b13ec57b0, InitialSourceConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xe8bb48604e525cec32730a50295e239a} 2025/04/30 10:10:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0 2025/04/30 10:10:31 client Long Header{Type: Initial, DestConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:31 client Dropping Initial keys. 2025/04/30 10:10:31 client -> Sending packet 1 (110 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, Handshake 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:31 client Short Header{DestConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:31 client -> Sending packet 1 (42 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:31 client Short Header{DestConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 17, Data length: 0, Offset + Data length: 17} 2025/04/30 10:10:31 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:31 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:10:31 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:31 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:31 client -> Sending packet 2 (52 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, Handshake 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004d43a0db83c90ce92519c1d1a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:31 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:31 client Dropping Handshake keys. 2025/04/30 10:10:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004fa8081b04c28a3df101f9bdf, StatelessResetToken: 0x34413556236ee2047cf7cde36726ff3b} 2025/04/30 10:10:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004f415812db4d92ce07423187d, StatelessResetToken: 0x0ab58e37ebc8134f8a3d65661f7be74e} 2025/04/30 10:10:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000000411dcb17db29fa090c09e0703, StatelessResetToken: 0x3768ea69bf8d0afae5d4e148e4350eec} 2025/04/30 10:10:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:31 client -> Sending packet 2 (1366 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:31 client Short Header{DestConnectionID: 0000000000000004fa8081b04c28a3df101f9bdf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.PingFrame{} 2025/04/30 10:10:31 client -> Sending packet 3 (46 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:31 client Short Header{DestConnectionID: 0000000000000004fa8081b04c28a3df101f9bdf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 184.006µs} 2025/04/30 10:10:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:31 client <- Reading packet 1 (1061 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:31 client newly acked packets (1): [0] 2025/04/30 10:10:31 client updated RTT: 33.92269ms (σ: 16.961345ms) 2025/04/30 10:10:31 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:31 client <- &wire.StopSendingFrame{StreamID:0, ErrorCode:0x100} 2025/04/30 10:10:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:31 client -> Sending packet 4 (49 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:31 client Short Header{DestConnectionID: 0000000000000004fa8081b04c28a3df101f9bdf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 129.716µs} 2025/04/30 10:10:31 client -> &wire.ResetStreamFrame{StreamID: 0, ErrorCode: 0x100, FinalSize: 17} 2025/04/30 10:10:31 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:31 client -> Sending packet 5 (42 bytes) for connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:31 client Short Header{DestConnectionID: 0000000000000004fa8081b04c28a3df101f9bdf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:31 client Connection 8cc40c3f621e99c5f9d01be97b5b13ec57b0 closed. 2025/04/30 10:10:31 Requesting https://server4:443/evcrqsdrmc. 2025/04/30 10:10:31 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:31 Increased send buffer size to 14336 kiB 2025/04/30 10:10:31 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:31 Created qlog file: /logs/qlog/6aa1de313f12dc323f9aa2eb19c3aa4f5cf640.sqlog 2025/04/30 10:10:31 client Starting new connection to server4 ([::]:45477 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, version v1 2025/04/30 10:10:31 Adding connection ID (empty). 2025/04/30 10:10:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:31 client -> Sending packet 0 (1280 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, Initial 2025/04/30 10:10:31 client Long Header{Type: Initial, DestConnectionID: 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:31 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:31 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000047283eb45628c39d0ba428416, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:31 client Received first packet. Switching destination connection ID to: 00000000000000047283eb45628c39d0ba428416 2025/04/30 10:10:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:31 client newly acked packets (1): [0] 2025/04/30 10:10:31 client updated RTT: 33.941996ms (σ: 16.970998ms) 2025/04/30 10:10:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:31 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:31 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000047283eb45628c39d0ba428416, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 10:10:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, InitialSourceConnectionID: 00000000000000047283eb45628c39d0ba428416, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1a98fbda98070509c24a44ab235a7164} 2025/04/30 10:10:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640 2025/04/30 10:10:31 client Long Header{Type: Initial, DestConnectionID: 00000000000000047283eb45628c39d0ba428416, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: 00000000000000047283eb45628c39d0ba428416, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:31 client Dropping Initial keys. 2025/04/30 10:10:31 client -> Sending packet 1 (110 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, Handshake 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: 00000000000000047283eb45628c39d0ba428416, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:31 client Short Header{DestConnectionID: 00000000000000047283eb45628c39d0ba428416, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:31 client -> Sending packet 2 (86 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, Handshake 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: 00000000000000047283eb45628c39d0ba428416, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:31 client -> Sending packet 3 (86 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, Handshake 2025/04/30 10:10:31 client Long Header{Type: Handshake, DestConnectionID: 00000000000000047283eb45628c39d0ba428416, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:31 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:31 client Dropping Handshake keys. 2025/04/30 10:10:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004d5b189722989ff693b788173, StatelessResetToken: 0xc1195fa693021e9b0aceedce4d05e021} 2025/04/30 10:10:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004c131e7842ac33b0730007d7a, StatelessResetToken: 0xd459e8379abde7ed37849fa87bd5ca29} 2025/04/30 10:10:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000000469e4084e0b85b473d83dd641, StatelessResetToken: 0xf6bd6962c56805815762acfdd2b7c749} 2025/04/30 10:10:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:31 client -> Sending packet 2 (65 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:31 client Short Header{DestConnectionID: 0000000000000004d5b189722989ff693b788173, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 106.881µs} 2025/04/30 10:10:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:31 client -> Sending packet 3 (60 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:31 client Short Header{DestConnectionID: 0000000000000004d5b189722989ff693b788173, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:32 client <- Reading packet 3 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:32 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:32 client <- &wire.PingFrame{} 2025/04/30 10:10:32 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:32 client -> Sending packet 4 (46 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:32 client Short Header{DestConnectionID: 0000000000000004d5b189722989ff693b788173, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 101.201µs} 2025/04/30 10:10:32 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:32 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:32 client <- &wire.PingFrame{} 2025/04/30 10:10:32 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:32 client -> Sending packet 5 (1366 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:32 client Short Header{DestConnectionID: 0000000000000004d5b189722989ff693b788173, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.PingFrame{} 2025/04/30 10:10:32 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:32 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:32 client <- &wire.PingFrame{} 2025/04/30 10:10:32 client -> Sending packet 6 (48 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:32 client Short Header{DestConnectionID: 0000000000000004d5b189722989ff693b788173, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 242.591µs} 2025/04/30 10:10:32 client <- Reading packet 7 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:32 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:32 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:32 client newly acked packets (2): [3 5] 2025/04/30 10:10:32 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:32 client Canceling loss detection timer. 2025/04/30 10:10:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000000423e4a70684f06e5f456cf401, StatelessResetToken: 0x6f4004982eb0f6d7e270cfd810f3fcd5} 2025/04/30 10:10:32 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:32 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:32 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:32 client -> Sending packet 7 (42 bytes) for connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:32 client Short Header{DestConnectionID: 0000000000000004d5b189722989ff693b788173, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:32 client Connection 6aa1de313f12dc323f9aa2eb19c3aa4f5cf640 closed. 2025/04/30 10:10:32 Requesting https://server4:443/mpnjtdlvlc. 2025/04/30 10:10:32 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:32 Increased send buffer size to 14336 kiB 2025/04/30 10:10:32 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:32 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:32 Created qlog file: /logs/qlog/c4823bef2bf7bfe73c99.sqlog 2025/04/30 10:10:32 client Starting new connection to server4 ([::]:46227 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c4823bef2bf7bfe73c99, version v1 2025/04/30 10:10:32 Adding connection ID (empty). 2025/04/30 10:10:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:32 client -> Sending packet 0 (1280 bytes) for connection c4823bef2bf7bfe73c99, Initial 2025/04/30 10:10:32 client Long Header{Type: Initial, DestConnectionID: c4823bef2bf7bfe73c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:32 client -> Sending packet 1 (1280 bytes) for connection c4823bef2bf7bfe73c99, Initial 2025/04/30 10:10:32 client Long Header{Type: Initial, DestConnectionID: c4823bef2bf7bfe73c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:32 client -> Sending packet 2 (1280 bytes) for connection c4823bef2bf7bfe73c99, Initial 2025/04/30 10:10:32 client Long Header{Type: Initial, DestConnectionID: c4823bef2bf7bfe73c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:32 client -> Sending packet 3 (1280 bytes) for connection c4823bef2bf7bfe73c99, Initial 2025/04/30 10:10:32 client Long Header{Type: Initial, DestConnectionID: c4823bef2bf7bfe73c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:32 client -> Sending packet 4 (1280 bytes) for connection c4823bef2bf7bfe73c99, Initial 2025/04/30 10:10:32 client Long Header{Type: Initial, DestConnectionID: c4823bef2bf7bfe73c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:32 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:10:32 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:10:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000042a5d678552d2a3df294ca9d4, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:10:32 client Received first packet. Switching destination connection ID to: 00000000000000042a5d678552d2a3df294ca9d4 2025/04/30 10:10:32 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:10:32 client newly acked packets (1): [4] 2025/04/30 10:10:32 client updated RTT: 34.324147ms (σ: 17.162073ms) 2025/04/30 10:10:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:32 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:32 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:32 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:10:32 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:10:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000042a5d678552d2a3df294ca9d4, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:10:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:10:32 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:32 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c4823bef2bf7bfe73c99, InitialSourceConnectionID: 00000000000000042a5d678552d2a3df294ca9d4, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x3a0ca481275d1aee410974692e1cfb34} 2025/04/30 10:10:32 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c4823bef2bf7bfe73c99 2025/04/30 10:10:32 client Long Header{Type: Initial, DestConnectionID: 00000000000000042a5d678552d2a3df294ca9d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:32 client Long Header{Type: Handshake, DestConnectionID: 00000000000000042a5d678552d2a3df294ca9d4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:32 client Dropping Initial keys. 2025/04/30 10:10:32 client -> Sending packet 1 (110 bytes) for connection c4823bef2bf7bfe73c99, Handshake 2025/04/30 10:10:32 client Long Header{Type: Handshake, DestConnectionID: 00000000000000042a5d678552d2a3df294ca9d4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:32 client Short Header{DestConnectionID: 00000000000000042a5d678552d2a3df294ca9d4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:32 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:32 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:32 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:32 client Dropping Handshake keys. 2025/04/30 10:10:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004c6bd1118d620ae1788df9518, StatelessResetToken: 0xe27864d3eac2f37e14e36700fb93f3c3} 2025/04/30 10:10:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004961be6bc2e0e127a9ea9acf0, StatelessResetToken: 0x337eaa4f7913bb502c6bb8b5d962bacc} 2025/04/30 10:10:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004d17542510ca7ca9bd5e36c48, StatelessResetToken: 0x3cce66d98144062b26b7258dd0f8e00b} 2025/04/30 10:10:32 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:32 client -> Sending packet 1 (46 bytes) for connection c4823bef2bf7bfe73c99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:32 client Short Header{DestConnectionID: 0000000000000004c6bd1118d620ae1788df9518, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.727µs} 2025/04/30 10:10:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:32 client <- Reading packet 2 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:32 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:32 client <- &wire.PingFrame{} 2025/04/30 10:10:32 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:32 client -> Sending packet 2 (46 bytes) for connection c4823bef2bf7bfe73c99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:32 client Short Header{DestConnectionID: 0000000000000004c6bd1118d620ae1788df9518, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 91.773µs} 2025/04/30 10:10:32 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:32 client -> Sending packet 4 (58 bytes) for connection c4823bef2bf7bfe73c99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:32 client Short Header{DestConnectionID: 0000000000000004c6bd1118d620ae1788df9518, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:32 client Skipping packet number 3 2025/04/30 10:10:32 client -> Sending packet 5 (41 bytes) for connection c4823bef2bf7bfe73c99, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:32 client Short Header{DestConnectionID: 0000000000000004c6bd1118d620ae1788df9518, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:33 client <- Reading packet 4 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:33 client newly acked packets (1): [4] 2025/04/30 10:10:33 client updated RTT: 34.044ms (σ: 13.43ms) 2025/04/30 10:10:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:33 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:33 client -> Sending packet 6 (48 bytes) for connection c4823bef2bf7bfe73c99, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004c6bd1118d620ae1788df9518, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 120.206µs} 2025/04/30 10:10:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:33 client -> Sending packet 7 (42 bytes) for connection c4823bef2bf7bfe73c99, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004c6bd1118d620ae1788df9518, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:33 client Connection c4823bef2bf7bfe73c99 closed. 2025/04/30 10:10:33 Requesting https://server4:443/yttzewefsh. 2025/04/30 10:10:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:33 Increased send buffer size to 14336 kiB 2025/04/30 10:10:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:33 Created qlog file: /logs/qlog/862f4a7a04b8d7c1a46bb69a2f26a756.sqlog 2025/04/30 10:10:33 client Starting new connection to server4 ([::]:53550 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 862f4a7a04b8d7c1a46bb69a2f26a756, version v1 2025/04/30 10:10:33 Adding connection ID (empty). 2025/04/30 10:10:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:33 client -> Sending packet 0 (1280 bytes) for connection 862f4a7a04b8d7c1a46bb69a2f26a756, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 862f4a7a04b8d7c1a46bb69a2f26a756, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:33 client -> Sending packet 1 (1280 bytes) for connection 862f4a7a04b8d7c1a46bb69a2f26a756, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 862f4a7a04b8d7c1a46bb69a2f26a756, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:33 client -> Sending packet 2 (1280 bytes) for connection 862f4a7a04b8d7c1a46bb69a2f26a756, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 862f4a7a04b8d7c1a46bb69a2f26a756, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:10:33 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000000423bbeb4e8bdcfdf2d4535f0f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:10:33 client Received first packet. Switching destination connection ID to: 000000000000000423bbeb4e8bdcfdf2d4535f0f 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:10:33 client newly acked packets (1): [2] 2025/04/30 10:10:33 client updated RTT: 34.088002ms (σ: 17.044001ms) 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:10:33 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000423bbeb4e8bdcfdf2d4535f0f, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 862f4a7a04b8d7c1a46bb69a2f26a756, InitialSourceConnectionID: 000000000000000423bbeb4e8bdcfdf2d4535f0f, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xbee0a402746858008eb64272517a552d} 2025/04/30 10:10:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 862f4a7a04b8d7c1a46bb69a2f26a756 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 000000000000000423bbeb4e8bdcfdf2d4535f0f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 000000000000000423bbeb4e8bdcfdf2d4535f0f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:33 client Dropping Initial keys. 2025/04/30 10:10:33 client -> Sending packet 1 (52 bytes) for connection 862f4a7a04b8d7c1a46bb69a2f26a756, Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 000000000000000423bbeb4e8bdcfdf2d4535f0f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:33 client -> Sending packet 0 (58 bytes) for connection 862f4a7a04b8d7c1a46bb69a2f26a756, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 000000000000000423bbeb4e8bdcfdf2d4535f0f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:33 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:33 client Dropping Handshake keys. 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004fb7d5aafeb3915af6e132479, StatelessResetToken: 0xd0e146a05773ad5ea4779f8f0b5b70c3} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000047e767f28491b5fa644c3e56c, StatelessResetToken: 0x4a6d9d67019c2c7fc842d929f1d59784} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004a53ef4c6e0f64aa75214ce80, StatelessResetToken: 0x58d8051fcefe74af6be439216ccf4303} 2025/04/30 10:10:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:33 client -> Sending packet 1 (46 bytes) for connection 862f4a7a04b8d7c1a46bb69a2f26a756, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004fb7d5aafeb3915af6e132479, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 91.773µs} 2025/04/30 10:10:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:33 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client newly acked packets (1): [0] 2025/04/30 10:10:33 client updated RTT: 34.062ms (σ: 12.833ms) 2025/04/30 10:10:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:33 client -> Sending packet 2 (42 bytes) for connection 862f4a7a04b8d7c1a46bb69a2f26a756, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004fb7d5aafeb3915af6e132479, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:33 client Connection 862f4a7a04b8d7c1a46bb69a2f26a756 closed. 2025/04/30 10:10:33 Requesting https://server4:443/ylnqinuneq. 2025/04/30 10:10:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:33 Increased send buffer size to 14336 kiB 2025/04/30 10:10:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:33 Created qlog file: /logs/qlog/39064eaf5a91883c7be9b3d1f814e530746a95.sqlog 2025/04/30 10:10:33 client Starting new connection to server4 ([::]:40681 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 39064eaf5a91883c7be9b3d1f814e530746a95, version v1 2025/04/30 10:10:33 Adding connection ID (empty). 2025/04/30 10:10:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:33 client -> Sending packet 0 (1280 bytes) for connection 39064eaf5a91883c7be9b3d1f814e530746a95, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 39064eaf5a91883c7be9b3d1f814e530746a95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:33 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004633dd9c5082aee2f48c53b75, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:33 client Received first packet. Switching destination connection ID to: 0000000000000004633dd9c5082aee2f48c53b75 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client newly acked packets (1): [0] 2025/04/30 10:10:33 client updated RTT: 33.928026ms (σ: 16.964013ms) 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:33 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004633dd9c5082aee2f48c53b75, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:10:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 39064eaf5a91883c7be9b3d1f814e530746a95, InitialSourceConnectionID: 0000000000000004633dd9c5082aee2f48c53b75, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x7b81595766f30d313af4046b90bcc208} 2025/04/30 10:10:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 39064eaf5a91883c7be9b3d1f814e530746a95 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 0000000000000004633dd9c5082aee2f48c53b75, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004633dd9c5082aee2f48c53b75, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:33 client Dropping Initial keys. 2025/04/30 10:10:33 client -> Sending packet 1 (52 bytes) for connection 39064eaf5a91883c7be9b3d1f814e530746a95, Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004633dd9c5082aee2f48c53b75, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client -> Sending packet 0 (58 bytes) for connection 39064eaf5a91883c7be9b3d1f814e530746a95, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004633dd9c5082aee2f48c53b75, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:33 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:33 client Dropping Handshake keys. 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004552cf2d66717466577ad04bf, StatelessResetToken: 0x41549c4c8a3908bb75e9a466dcf689e5} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000000427bab00e2c9cadb412ea86ed, StatelessResetToken: 0xaf6d6f679749fe457506db5a52148c02} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004c72e68d52b745cc6f48aa380, StatelessResetToken: 0x11b9b9ee33831c1f26797ef8775cf904} 2025/04/30 10:10:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:33 client -> Sending packet 1 (46 bytes) for connection 39064eaf5a91883c7be9b3d1f814e530746a95, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004552cf2d66717466577ad04bf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 133.822µs} 2025/04/30 10:10:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:33 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client newly acked packets (1): [0] 2025/04/30 10:10:33 client updated RTT: 33.884ms (σ: 12.809ms) 2025/04/30 10:10:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:33 client -> Sending packet 2 (42 bytes) for connection 39064eaf5a91883c7be9b3d1f814e530746a95, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004552cf2d66717466577ad04bf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:33 client Connection 39064eaf5a91883c7be9b3d1f814e530746a95 closed. 2025/04/30 10:10:33 Requesting https://server4:443/vbfndhmbxb. 2025/04/30 10:10:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:33 Increased send buffer size to 14336 kiB 2025/04/30 10:10:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:33 Created qlog file: /logs/qlog/e475430c70ae16a3df11e81159.sqlog 2025/04/30 10:10:33 client Starting new connection to server4 ([::]:54235 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e475430c70ae16a3df11e81159, version v1 2025/04/30 10:10:33 Adding connection ID (empty). 2025/04/30 10:10:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:33 client -> Sending packet 0 (1280 bytes) for connection e475430c70ae16a3df11e81159, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: e475430c70ae16a3df11e81159, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:33 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:33 client Received first packet. Switching destination connection ID to: 00000000000000044354dbf7d7faa085cf28a6ea 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client newly acked packets (1): [0] 2025/04/30 10:10:33 client updated RTT: 33.835849ms (σ: 16.917924ms) 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:33 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:10:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e475430c70ae16a3df11e81159, InitialSourceConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x55270fbd0e63fefa9c37a6c25afc5302} 2025/04/30 10:10:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e475430c70ae16a3df11e81159 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:33 client Dropping Initial keys. 2025/04/30 10:10:33 client -> Sending packet 1 (52 bytes) for connection e475430c70ae16a3df11e81159, Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client -> Sending packet 0 (58 bytes) for connection e475430c70ae16a3df11e81159, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:33 client -> Sending packet 2 (86 bytes) for connection e475430c70ae16a3df11e81159, Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:33 client -> Sending packet 3 (86 bytes) for connection e475430c70ae16a3df11e81159, Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044354dbf7d7faa085cf28a6ea, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:33 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:33 client Dropping Handshake keys. 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004cbb73198c8001e9628a5ae38, StatelessResetToken: 0xf09a477aa56a108f94d947cb12f85e10} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004915ecb5ae8c0c4a3ecda4a69, StatelessResetToken: 0x1299ffb3ce65d583326cc8c39551c13b} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004665efd946cf4ef49c26a72f2, StatelessResetToken: 0xb47a88eef0313be9cd098f1c4428a83b} 2025/04/30 10:10:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:33 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:33 client -> Sending packet 2 (65 bytes) for connection e475430c70ae16a3df11e81159, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004cbb73198c8001e9628a5ae38, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 130.024µs} 2025/04/30 10:10:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:33 client -> Sending packet 3 (60 bytes) for connection e475430c70ae16a3df11e81159, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004cbb73198c8001e9628a5ae38, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:33 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000043d5cf6161c37eb2bb1fc9a21, StatelessResetToken: 0xf65c45a2e64c1bd7b72a8f888855dc9e} 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:33 client -> Sending packet 4 (42 bytes) for connection e475430c70ae16a3df11e81159, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004cbb73198c8001e9628a5ae38, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:33 client Connection e475430c70ae16a3df11e81159 closed. 2025/04/30 10:10:33 Requesting https://server4:443/enifozqgyn. 2025/04/30 10:10:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:33 Increased send buffer size to 14336 kiB 2025/04/30 10:10:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:33 Created qlog file: /logs/qlog/8692ec7be748b0352b.sqlog 2025/04/30 10:10:33 client Starting new connection to server4 ([::]:37252 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8692ec7be748b0352b, version v1 2025/04/30 10:10:33 Adding connection ID (empty). 2025/04/30 10:10:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:33 client -> Sending packet 0 (1280 bytes) for connection 8692ec7be748b0352b, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 8692ec7be748b0352b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:10:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:33 client -> Sending packet 1 (1280 bytes) for connection 8692ec7be748b0352b, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 8692ec7be748b0352b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:10:33 client -> Sending packet 2 (1280 bytes) for connection 8692ec7be748b0352b, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 8692ec7be748b0352b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:33 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000041115bf05996873b3ca931c9b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:33 client Received first packet. Switching destination connection ID to: 00000000000000041115bf05996873b3ca931c9b 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:33 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000041115bf05996873b3ca931c9b, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:10:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8692ec7be748b0352b, InitialSourceConnectionID: 00000000000000041115bf05996873b3ca931c9b, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf251d6bd057402c028409431292dd716} 2025/04/30 10:10:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8692ec7be748b0352b 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 00000000000000041115bf05996873b3ca931c9b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 00000000000000041115bf05996873b3ca931c9b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:33 client Dropping Initial keys. 2025/04/30 10:10:33 client -> Sending packet 1 (52 bytes) for connection 8692ec7be748b0352b, Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 00000000000000041115bf05996873b3ca931c9b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:33 client -> Sending packet 0 (58 bytes) for connection 8692ec7be748b0352b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 00000000000000041115bf05996873b3ca931c9b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:33 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:33 client Dropping Handshake keys. 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004f1db73f0742480c379d72e82, StatelessResetToken: 0x61fd6f972ea654a30992373e5bb15ce9} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000045716b71185bfc0ebc46e919e, StatelessResetToken: 0xe72bc7e2ddfde5016cb7ba7380e5d1fa} 2025/04/30 10:10:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000044a30996f5d01c2b88652c9cb, StatelessResetToken: 0xf7a078832997ffd09c6fd52e6c14d0ba} 2025/04/30 10:10:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:33 client -> Sending packet 1 (1366 bytes) for connection 8692ec7be748b0352b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004f1db73f0742480c379d72e82, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.PingFrame{} 2025/04/30 10:10:33 client -> Sending packet 2 (46 bytes) for connection 8692ec7be748b0352b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004f1db73f0742480c379d72e82, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 152.767µs} 2025/04/30 10:10:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:33 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client newly acked packets (1): [0] 2025/04/30 10:10:33 client updated RTT: 33.645365ms (σ: 16.822682ms) 2025/04/30 10:10:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:33 client -> Sending packet 3 (42 bytes) for connection 8692ec7be748b0352b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004f1db73f0742480c379d72e82, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:33 client Connection 8692ec7be748b0352b closed. 2025/04/30 10:10:33 Requesting https://server4:443/sqpbvavleg. 2025/04/30 10:10:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:33 Increased send buffer size to 14336 kiB 2025/04/30 10:10:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:33 Created qlog file: /logs/qlog/f788c5d69305e78b44bf5cac35e724d913a7.sqlog 2025/04/30 10:10:33 client Starting new connection to server4 ([::]:53831 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f788c5d69305e78b44bf5cac35e724d913a7, version v1 2025/04/30 10:10:33 Adding connection ID (empty). 2025/04/30 10:10:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:33 client -> Sending packet 0 (1280 bytes) for connection f788c5d69305e78b44bf5cac35e724d913a7, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: f788c5d69305e78b44bf5cac35e724d913a7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:33 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c451b1a9ab3750352caeb025, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:33 client Received first packet. Switching destination connection ID to: 0000000000000004c451b1a9ab3750352caeb025 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client newly acked packets (1): [0] 2025/04/30 10:10:33 client updated RTT: 34.28665ms (σ: 17.143325ms) 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:33 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c451b1a9ab3750352caeb025, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f788c5d69305e78b44bf5cac35e724d913a7, InitialSourceConnectionID: 0000000000000004c451b1a9ab3750352caeb025, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x24cd0a2fa3e919d6d2c20c77b4228942} 2025/04/30 10:10:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f788c5d69305e78b44bf5cac35e724d913a7 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: 0000000000000004c451b1a9ab3750352caeb025, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c451b1a9ab3750352caeb025, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:33 client Dropping Initial keys. 2025/04/30 10:10:33 client -> Sending packet 1 (52 bytes) for connection f788c5d69305e78b44bf5cac35e724d913a7, Handshake 2025/04/30 10:10:33 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c451b1a9ab3750352caeb025, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client -> Sending packet 0 (58 bytes) for connection f788c5d69305e78b44bf5cac35e724d913a7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004c451b1a9ab3750352caeb025, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:33 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:33 client Peer doesn't await address validation any longer. 2025/04/30 10:10:33 client newly acked packets (1): [0] 2025/04/30 10:10:33 client updated RTT: 34.229ms (σ: 12.97ms) 2025/04/30 10:10:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:33 client Canceling loss detection timer. 2025/04/30 10:10:33 client Dropping Handshake keys. 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:33 client -> Sending packet 1 (44 bytes) for connection f788c5d69305e78b44bf5cac35e724d913a7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004c451b1a9ab3750352caeb025, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 124.013µs} 2025/04/30 10:10:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:33 client -> Sending packet 2 (42 bytes) for connection f788c5d69305e78b44bf5cac35e724d913a7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:33 client Short Header{DestConnectionID: 0000000000000004c451b1a9ab3750352caeb025, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:33 client Connection f788c5d69305e78b44bf5cac35e724d913a7 closed. 2025/04/30 10:10:33 Requesting https://server4:443/nacqcjqdnh. 2025/04/30 10:10:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:33 Increased send buffer size to 14336 kiB 2025/04/30 10:10:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:33 Created qlog file: /logs/qlog/aaa587e3f9f0cacf12461ee3e834df48ae43.sqlog 2025/04/30 10:10:33 client Starting new connection to server4 ([::]:47367 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aaa587e3f9f0cacf12461ee3e834df48ae43, version v1 2025/04/30 10:10:33 Adding connection ID (empty). 2025/04/30 10:10:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:33 client -> Sending packet 0 (1280 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43, Initial 2025/04/30 10:10:33 client Long Header{Type: Initial, DestConnectionID: aaa587e3f9f0cacf12461ee3e834df48ae43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:10:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:34 client -> Sending packet 1 (1280 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43, Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: aaa587e3f9f0cacf12461ee3e834df48ae43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:10:34 client -> Sending packet 2 (1280 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43, Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: aaa587e3f9f0cacf12461ee3e834df48ae43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:10:34 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:34 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f5dc7c137ddd1c447c5ff3ea, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:34 client Received first packet. Switching destination connection ID to: 0000000000000004f5dc7c137ddd1c447c5ff3ea 2025/04/30 10:10:34 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:34 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f5dc7c137ddd1c447c5ff3ea, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aaa587e3f9f0cacf12461ee3e834df48ae43, InitialSourceConnectionID: 0000000000000004f5dc7c137ddd1c447c5ff3ea, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5dd8c9698a42cd6f26a8a7f10bd188eb} 2025/04/30 10:10:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 0000000000000004f5dc7c137ddd1c447c5ff3ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f5dc7c137ddd1c447c5ff3ea, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:34 client Dropping Initial keys. 2025/04/30 10:10:34 client -> Sending packet 1 (52 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43, Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f5dc7c137ddd1c447c5ff3ea, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client -> Sending packet 0 (58 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004f5dc7c137ddd1c447c5ff3ea, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:34 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:34 client Dropping Handshake keys. 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004c224e42a5920e115af66a264, StatelessResetToken: 0x2d19fb1b4971f7af9676359725b08a94} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004217ea159ddbd1099c9c8c27f, StatelessResetToken: 0x5fa5b6d7c9aa69b029fba7c3599a0762} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004fe26e787b28418e787bddd74, StatelessResetToken: 0x62faf1b52aa32e4d4d1118f4459c87dd} 2025/04/30 10:10:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:34 client -> Sending packet 1 (1366 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004c224e42a5920e115af66a264, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.PingFrame{} 2025/04/30 10:10:34 client -> Sending packet 2 (46 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004c224e42a5920e115af66a264, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 176.803µs} 2025/04/30 10:10:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:34 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client newly acked packets (1): [0] 2025/04/30 10:10:34 client updated RTT: 33.934896ms (σ: 16.967448ms) 2025/04/30 10:10:34 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:34 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:34 client -> Sending packet 3 (42 bytes) for connection aaa587e3f9f0cacf12461ee3e834df48ae43, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004c224e42a5920e115af66a264, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:34 client Connection aaa587e3f9f0cacf12461ee3e834df48ae43 closed. 2025/04/30 10:10:34 Requesting https://server4:443/ahhiqdudtw. 2025/04/30 10:10:34 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:34 Increased send buffer size to 14336 kiB 2025/04/30 10:10:34 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:34 Created qlog file: /logs/qlog/43985fbf53c5f0b6.sqlog 2025/04/30 10:10:34 client Starting new connection to server4 ([::]:41124 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 43985fbf53c5f0b6, version v1 2025/04/30 10:10:34 Adding connection ID (empty). 2025/04/30 10:10:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:34 client -> Sending packet 0 (1280 bytes) for connection 43985fbf53c5f0b6, Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 43985fbf53c5f0b6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:34 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:34 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000049845d7795d3792d9d1948c81, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:34 client Received first packet. Switching destination connection ID to: 00000000000000049845d7795d3792d9d1948c81 2025/04/30 10:10:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client newly acked packets (1): [0] 2025/04/30 10:10:34 client updated RTT: 33.85829ms (σ: 16.929145ms) 2025/04/30 10:10:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:34 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000049845d7795d3792d9d1948c81, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 10:10:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 43985fbf53c5f0b6, InitialSourceConnectionID: 00000000000000049845d7795d3792d9d1948c81, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x44aba16680c3400e2d3c089e5eb99a09} 2025/04/30 10:10:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 43985fbf53c5f0b6 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 00000000000000049845d7795d3792d9d1948c81, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 00000000000000049845d7795d3792d9d1948c81, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:34 client Dropping Initial keys. 2025/04/30 10:10:34 client -> Sending packet 1 (110 bytes) for connection 43985fbf53c5f0b6, Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 00000000000000049845d7795d3792d9d1948c81, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client Short Header{DestConnectionID: 00000000000000049845d7795d3792d9d1948c81, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:34 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:34 client Dropping Handshake keys. 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004bbb7c30b43f5ff1c46582d81, StatelessResetToken: 0x109645f0ea3d19a2330a43a4594aaa3e} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000041b7f40f55d43beb55ddbcf66, StatelessResetToken: 0x026f17938e0d56858d5cf3f043a23ead} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000049a19335f12a7eb17ebb72d5e, StatelessResetToken: 0x12d72af16eb27ce924c7ccce0c3bb3f5} 2025/04/30 10:10:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:34 client -> Sending packet 1 (46 bytes) for connection 43985fbf53c5f0b6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004bbb7c30b43f5ff1c46582d81, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 93.966µs} 2025/04/30 10:10:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:34 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client newly acked packets (2): [0 1] 2025/04/30 10:10:34 client updated RTT: 33.488ms (σ: 13.436ms) 2025/04/30 10:10:34 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:34 client Canceling loss detection timer. 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000000004c45e88cc472d98da5f4695ab, StatelessResetToken: 0xb3a1d0c7fe0495a0aafce0a3011e1a03} 2025/04/30 10:10:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:34 client Ignoring all packets below 1. 2025/04/30 10:10:34 client -> Sending packet 2 (44 bytes) for connection 43985fbf53c5f0b6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004bbb7c30b43f5ff1c46582d81, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 106.66µs} 2025/04/30 10:10:34 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.PingFrame{} 2025/04/30 10:10:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:34 client -> Sending packet 3 (46 bytes) for connection 43985fbf53c5f0b6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004bbb7c30b43f5ff1c46582d81, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 93.086µs} 2025/04/30 10:10:34 client <- Reading packet 5 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:34 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:34 client -> Sending packet 4 (42 bytes) for connection 43985fbf53c5f0b6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004bbb7c30b43f5ff1c46582d81, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:34 client Connection 43985fbf53c5f0b6 closed. 2025/04/30 10:10:34 Requesting https://server4:443/qgctykvzla. 2025/04/30 10:10:34 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:34 Increased send buffer size to 14336 kiB 2025/04/30 10:10:34 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:34 Created qlog file: /logs/qlog/07ea402cd766f8798df0110b3d847115.sqlog 2025/04/30 10:10:34 client Starting new connection to server4 ([::]:39768 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 07ea402cd766f8798df0110b3d847115, version v1 2025/04/30 10:10:34 Adding connection ID (empty). 2025/04/30 10:10:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:34 client -> Sending packet 0 (1280 bytes) for connection 07ea402cd766f8798df0110b3d847115, Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 07ea402cd766f8798df0110b3d847115, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:10:34 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:34 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:34 client Received first packet. Switching destination connection ID to: 00000000000000046ddb24f772028c91ebdbcd52 2025/04/30 10:10:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client newly acked packets (1): [0] 2025/04/30 10:10:34 client updated RTT: 34.024628ms (σ: 17.012314ms) 2025/04/30 10:10:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:34 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 10:10:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 07ea402cd766f8798df0110b3d847115, InitialSourceConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xb69e48e92e693c568895314d98493da4} 2025/04/30 10:10:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 07ea402cd766f8798df0110b3d847115 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:34 client Dropping Initial keys. 2025/04/30 10:10:34 client -> Sending packet 1 (52 bytes) for connection 07ea402cd766f8798df0110b3d847115, Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client -> Sending packet 0 (58 bytes) for connection 07ea402cd766f8798df0110b3d847115, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:34 client -> Sending packet 2 (86 bytes) for connection 07ea402cd766f8798df0110b3d847115, Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:34 client -> Sending packet 3 (86 bytes) for connection 07ea402cd766f8798df0110b3d847115, Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 00000000000000046ddb24f772028c91ebdbcd52, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:34 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:34 client Dropping Handshake keys. 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004592dce1defb623b333f00e5d, StatelessResetToken: 0xa523c62af18539b77bf898ba9313e655} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004b58f510160e40670161eea73, StatelessResetToken: 0x79ac685282b54ccaf49a205896d6de51} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000042960b655e132f7655395c536, StatelessResetToken: 0xf06e6e4bec867c21a15d145075a086d6} 2025/04/30 10:10:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:34 client -> Sending packet 2 (65 bytes) for connection 07ea402cd766f8798df0110b3d847115, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004592dce1defb623b333f00e5d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.82µs} 2025/04/30 10:10:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:34 client -> Sending packet 3 (60 bytes) for connection 07ea402cd766f8798df0110b3d847115, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004592dce1defb623b333f00e5d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:34 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000000402aa885a4c274251883b5f51, StatelessResetToken: 0xd142611ab40099af3ebae0abdfd9957d} 2025/04/30 10:10:34 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:34 client -> Sending packet 4 (42 bytes) for connection 07ea402cd766f8798df0110b3d847115, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004592dce1defb623b333f00e5d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:34 client Connection 07ea402cd766f8798df0110b3d847115 closed. 2025/04/30 10:10:34 Requesting https://server4:443/oeelfhkbxk. 2025/04/30 10:10:34 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:34 Increased send buffer size to 14336 kiB 2025/04/30 10:10:34 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:34 Created qlog file: /logs/qlog/8d5be649d5ecc2d187f140cc25454f4839.sqlog 2025/04/30 10:10:34 client Starting new connection to server4 ([::]:39470 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8d5be649d5ecc2d187f140cc25454f4839, version v1 2025/04/30 10:10:34 Adding connection ID (empty). 2025/04/30 10:10:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:34 client -> Sending packet 0 (1280 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 8d5be649d5ecc2d187f140cc25454f4839, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:34 client -> Sending packet 1 (1280 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 8d5be649d5ecc2d187f140cc25454f4839, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:34 client -> Sending packet 2 (1280 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 8d5be649d5ecc2d187f140cc25454f4839, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:34 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:34 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000047f2b0dd6a3aad72067b45a76, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:34 client Received first packet. Switching destination connection ID to: 00000000000000047f2b0dd6a3aad72067b45a76 2025/04/30 10:10:34 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:34 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000047f2b0dd6a3aad72067b45a76, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 10:10:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8d5be649d5ecc2d187f140cc25454f4839, InitialSourceConnectionID: 00000000000000047f2b0dd6a3aad72067b45a76, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x2332b32f76cad4c8098dd4897808f403} 2025/04/30 10:10:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839 2025/04/30 10:10:34 client Long Header{Type: Initial, DestConnectionID: 00000000000000047f2b0dd6a3aad72067b45a76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 00000000000000047f2b0dd6a3aad72067b45a76, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:34 client Dropping Initial keys. 2025/04/30 10:10:34 client -> Sending packet 1 (110 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, Handshake 2025/04/30 10:10:34 client Long Header{Type: Handshake, DestConnectionID: 00000000000000047f2b0dd6a3aad72067b45a76, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:34 client Short Header{DestConnectionID: 00000000000000047f2b0dd6a3aad72067b45a76, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:34 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:34 client Dropping Handshake keys. 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, StatelessResetToken: 0x7004caf81d83fe3ce86f011c426a9375} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004ca1b6946bf431dbd9ab7c1fd, StatelessResetToken: 0x06a8d83147fe7c1f87773c9a9249930b} 2025/04/30 10:10:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000042c2294445e7c091a122c07ca, StatelessResetToken: 0xac4862d46c2c5b665403393af028c027} 2025/04/30 10:10:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:34 client -> Sending packet 1 (1366 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.PingFrame{} 2025/04/30 10:10:34 client -> Sending packet 2 (46 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:34 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 128.281µs} 2025/04/30 10:10:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:35 client -> Sending packet 4 (58 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:35 client Skipping packet number 3 2025/04/30 10:10:35 client -> Sending packet 5 (41 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:35 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.PingFrame{} 2025/04/30 10:10:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:35 client -> Sending packet 6 (46 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 81.594µs} 2025/04/30 10:10:35 client <- Reading packet 5 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.PingFrame{} 2025/04/30 10:10:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:35 client -> Sending packet 7 (48 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 63.749µs} 2025/04/30 10:10:35 client <- Reading packet 7 (65 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (3): [1 4 5] 2025/04/30 10:10:35 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:35 client Canceling loss detection timer. 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000000406159f14be335b62d5355fd1, StatelessResetToken: 0x9d685dddbdf1cb9276a686cb0596a417} 2025/04/30 10:10:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:35 client -> Sending packet 8 (1409 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.PingFrame{} 2025/04/30 10:10:35 client -> Sending packet 9 (50 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 172.364µs} 2025/04/30 10:10:35 client <- Reading packet 8 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [8] 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:35 client -> Sending packet 10 (1430 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.PingFrame{} 2025/04/30 10:10:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:35 client -> Sending packet 11 (42 bytes) for connection 8d5be649d5ecc2d187f140cc25454f4839, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ea6931c1be8e232952cc19ed, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:35 client Connection 8d5be649d5ecc2d187f140cc25454f4839 closed. 2025/04/30 10:10:35 Requesting https://server4:443/dnugnqrxyi. 2025/04/30 10:10:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:35 Increased send buffer size to 14336 kiB 2025/04/30 10:10:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:35 Created qlog file: /logs/qlog/8fea883e8a222329.sqlog 2025/04/30 10:10:35 client Starting new connection to server4 ([::]:59432 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8fea883e8a222329, version v1 2025/04/30 10:10:35 Adding connection ID (empty). 2025/04/30 10:10:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:35 client -> Sending packet 0 (1280 bytes) for connection 8fea883e8a222329, Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 8fea883e8a222329, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:35 client -> Sending packet 1 (1280 bytes) for connection 8fea883e8a222329, Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 8fea883e8a222329, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:35 client -> Sending packet 2 (1280 bytes) for connection 8fea883e8a222329, Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 8fea883e8a222329, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:35 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ebb0074054c50a7946f42e0e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:35 client Received first packet. Switching destination connection ID to: 0000000000000004ebb0074054c50a7946f42e0e 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:35 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ebb0074054c50a7946f42e0e, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:10:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8fea883e8a222329, InitialSourceConnectionID: 0000000000000004ebb0074054c50a7946f42e0e, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x3a366f9eabbde63ac658076f16c95b59} 2025/04/30 10:10:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8fea883e8a222329 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 0000000000000004ebb0074054c50a7946f42e0e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ebb0074054c50a7946f42e0e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:35 client Dropping Initial keys. 2025/04/30 10:10:35 client -> Sending packet 1 (52 bytes) for connection 8fea883e8a222329, Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ebb0074054c50a7946f42e0e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:35 client -> Sending packet 0 (58 bytes) for connection 8fea883e8a222329, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004ebb0074054c50a7946f42e0e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:35 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:35 client Dropping Handshake keys. 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000046e927f537484862d0057fb9b, StatelessResetToken: 0x552ec8a05c66b46c8177b158eb97fceb} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004f7361df42e99d562c0e91a30, StatelessResetToken: 0xb66acf1ac218e69234a92aeb24905a8b} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004c3b6d73ecc81286c97cce5d0, StatelessResetToken: 0xd2a3fec81b28dda47e7397c0c47dc805} 2025/04/30 10:10:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:35 client -> Sending packet 1 (1366 bytes) for connection 8fea883e8a222329, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000046e927f537484862d0057fb9b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.PingFrame{} 2025/04/30 10:10:35 client -> Sending packet 2 (46 bytes) for connection 8fea883e8a222329, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000046e927f537484862d0057fb9b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 150.172µs} 2025/04/30 10:10:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:35 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [0] 2025/04/30 10:10:35 client updated RTT: 33.663459ms (σ: 16.831729ms) 2025/04/30 10:10:35 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:35 client -> Sending packet 3 (42 bytes) for connection 8fea883e8a222329, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000046e927f537484862d0057fb9b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:35 client Connection 8fea883e8a222329 closed. 2025/04/30 10:10:35 Requesting https://server4:443/zmlwottwrj. 2025/04/30 10:10:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:35 Increased send buffer size to 14336 kiB 2025/04/30 10:10:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:35 Created qlog file: /logs/qlog/12ac70c894254c6c0dc3437bc5ce20.sqlog 2025/04/30 10:10:35 client Starting new connection to server4 ([::]:33741 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 12ac70c894254c6c0dc3437bc5ce20, version v1 2025/04/30 10:10:35 Adding connection ID (empty). 2025/04/30 10:10:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:35 client -> Sending packet 0 (1280 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20, Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 12ac70c894254c6c0dc3437bc5ce20, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000044630274fba284e5a6c999877, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:35 client Received first packet. Switching destination connection ID to: 00000000000000044630274fba284e5a6c999877 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [0] 2025/04/30 10:10:35 client updated RTT: 33.951647ms (σ: 16.975823ms) 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000044630274fba284e5a6c999877, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 12ac70c894254c6c0dc3437bc5ce20, InitialSourceConnectionID: 00000000000000044630274fba284e5a6c999877, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xc0e82b8b9d417db71e12846d4dde0b00} 2025/04/30 10:10:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 00000000000000044630274fba284e5a6c999877, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044630274fba284e5a6c999877, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:35 client Dropping Initial keys. 2025/04/30 10:10:35 client -> Sending packet 1 (52 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20, Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044630274fba284e5a6c999877, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client -> Sending packet 0 (58 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000044630274fba284e5a6c999877, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:35 client -> Sending packet 2 (86 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20, Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044630274fba284e5a6c999877, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:35 client -> Sending packet 3 (86 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20, Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044630274fba284e5a6c999877, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:35 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:35 client Dropping Handshake keys. 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000041da611c5ae76f8f0c3fe6846, StatelessResetToken: 0x1c930f23bc0fe74d5b15e790592626f8} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000043a642d75ec5b970e21c941ef, StatelessResetToken: 0xe02157ea033e4187df4b97fe36f203c4} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000049df3c2e9e0b49dd42112d2f5, StatelessResetToken: 0x56d49119e40475902271da079c2e4966} 2025/04/30 10:10:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:35 client -> Sending packet 2 (65 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000041da611c5ae76f8f0c3fe6846, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96.431µs} 2025/04/30 10:10:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:35 client -> Sending packet 3 (60 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000041da611c5ae76f8f0c3fe6846, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:35 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000000004f596a0adcc8f98906a0eec43, StatelessResetToken: 0xa12a16f50cb38dba76d4a68a5623c8ae} 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:35 client -> Sending packet 4 (42 bytes) for connection 12ac70c894254c6c0dc3437bc5ce20, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000041da611c5ae76f8f0c3fe6846, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:35 client Connection 12ac70c894254c6c0dc3437bc5ce20 closed. 2025/04/30 10:10:35 Requesting https://server4:443/qcjxrpzlvf. 2025/04/30 10:10:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:35 Increased send buffer size to 14336 kiB 2025/04/30 10:10:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:35 Created qlog file: /logs/qlog/ee0fc109892f072a6e7c75.sqlog 2025/04/30 10:10:35 client Starting new connection to server4 ([::]:32832 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ee0fc109892f072a6e7c75, version v1 2025/04/30 10:10:35 Adding connection ID (empty). 2025/04/30 10:10:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:35 client -> Sending packet 0 (1280 bytes) for connection ee0fc109892f072a6e7c75, Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: ee0fc109892f072a6e7c75, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004a0febdfd18b71a24387888d2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:35 client Received first packet. Switching destination connection ID to: 0000000000000004a0febdfd18b71a24387888d2 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [0] 2025/04/30 10:10:35 client updated RTT: 33.92957ms (σ: 16.964785ms) 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004a0febdfd18b71a24387888d2, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:10:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ee0fc109892f072a6e7c75, InitialSourceConnectionID: 0000000000000004a0febdfd18b71a24387888d2, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x7076f9af1742df5804e599d60e37e927} 2025/04/30 10:10:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ee0fc109892f072a6e7c75 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 0000000000000004a0febdfd18b71a24387888d2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004a0febdfd18b71a24387888d2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:35 client Dropping Initial keys. 2025/04/30 10:10:35 client -> Sending packet 1 (110 bytes) for connection ee0fc109892f072a6e7c75, Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004a0febdfd18b71a24387888d2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004a0febdfd18b71a24387888d2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:35 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:35 client Dropping Handshake keys. 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000000475b0cc184f475dc99d00dafd, StatelessResetToken: 0x35c80f6e17f2411b78de36f1d2db937d} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000043e461caaf4e5701770a26413, StatelessResetToken: 0xf92380baa7d6fa601bf59ad9ce9e237a} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000000491e3a03153857d4c4999a234, StatelessResetToken: 0x45d33b33b441042df50f49c3a8b5bd96} 2025/04/30 10:10:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:35 client -> Sending packet 1 (46 bytes) for connection ee0fc109892f072a6e7c75, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 000000000000000475b0cc184f475dc99d00dafd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.767µs} 2025/04/30 10:10:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:35 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [0] 2025/04/30 10:10:35 client updated RTT: 33.899ms (σ: 12.782ms) 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:35 client -> Sending packet 2 (42 bytes) for connection ee0fc109892f072a6e7c75, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 000000000000000475b0cc184f475dc99d00dafd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:35 client Connection ee0fc109892f072a6e7c75 closed. 2025/04/30 10:10:35 Requesting https://server4:443/jcojptzojj. 2025/04/30 10:10:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:35 Increased send buffer size to 14336 kiB 2025/04/30 10:10:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:35 Created qlog file: /logs/qlog/0fb76cf770837615.sqlog 2025/04/30 10:10:35 client Starting new connection to server4 ([::]:34710 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0fb76cf770837615, version v1 2025/04/30 10:10:35 Adding connection ID (empty). 2025/04/30 10:10:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:35 client -> Sending packet 0 (1280 bytes) for connection 0fb76cf770837615, Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 0fb76cf770837615, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000000416d76a728c0d98fdddf8de23, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:35 client Received first packet. Switching destination connection ID to: 000000000000000416d76a728c0d98fdddf8de23 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [0] 2025/04/30 10:10:35 client updated RTT: 34.032774ms (σ: 17.016387ms) 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000416d76a728c0d98fdddf8de23, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:10:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0fb76cf770837615, InitialSourceConnectionID: 000000000000000416d76a728c0d98fdddf8de23, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x360f4bac8ec620516f13c5429044385a} 2025/04/30 10:10:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0fb76cf770837615 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 000000000000000416d76a728c0d98fdddf8de23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 000000000000000416d76a728c0d98fdddf8de23, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:35 client Dropping Initial keys. 2025/04/30 10:10:35 client -> Sending packet 1 (52 bytes) for connection 0fb76cf770837615, Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 000000000000000416d76a728c0d98fdddf8de23, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client -> Sending packet 0 (58 bytes) for connection 0fb76cf770837615, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 000000000000000416d76a728c0d98fdddf8de23, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:35 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:35 client Dropping Handshake keys. 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000048fdc5406bb1b268848d234c3, StatelessResetToken: 0x90499b82b7a8d32186ba0797882836c5} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000047414a7b0d31f427a80f4e299, StatelessResetToken: 0x351ba4eccad41476a7cfd27931c9045b} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004117e5ee43c010a0c690c439a, StatelessResetToken: 0xa73546513d5c15c27962e9079037f180} 2025/04/30 10:10:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:35 client -> Sending packet 1 (46 bytes) for connection 0fb76cf770837615, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000048fdc5406bb1b268848d234c3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 89.348µs} 2025/04/30 10:10:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:35 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (2): [0 1] 2025/04/30 10:10:35 client updated RTT: 33.651ms (σ: 13.522ms) 2025/04/30 10:10:35 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:35 client Canceling loss detection timer. 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000000424e426d3699d2eab3f84d6b7, StatelessResetToken: 0x0f05f52da79db40a8eb526d19f76cee0} 2025/04/30 10:10:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:35 client Ignoring all packets below 1. 2025/04/30 10:10:35 client -> Sending packet 2 (44 bytes) for connection 0fb76cf770837615, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000048fdc5406bb1b268848d234c3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 122.049µs} 2025/04/30 10:10:35 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.PingFrame{} 2025/04/30 10:10:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:35 client -> Sending packet 3 (46 bytes) for connection 0fb76cf770837615, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000048fdc5406bb1b268848d234c3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 97.634µs} 2025/04/30 10:10:35 client <- Reading packet 5 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:35 client -> Sending packet 4 (42 bytes) for connection 0fb76cf770837615, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000048fdc5406bb1b268848d234c3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:35 client Connection 0fb76cf770837615 closed. 2025/04/30 10:10:35 Requesting https://server4:443/nuozcbpfwh. 2025/04/30 10:10:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:35 Increased send buffer size to 14336 kiB 2025/04/30 10:10:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:35 Created qlog file: /logs/qlog/b70faa4166aa99052499455a033ae57e.sqlog 2025/04/30 10:10:35 client Starting new connection to server4 ([::]:44547 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b70faa4166aa99052499455a033ae57e, version v1 2025/04/30 10:10:35 Adding connection ID (empty). 2025/04/30 10:10:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:35 client -> Sending packet 0 (1280 bytes) for connection b70faa4166aa99052499455a033ae57e, Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: b70faa4166aa99052499455a033ae57e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000043cf7c1e3e6ce348486b6c946, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:35 client Received first packet. Switching destination connection ID to: 00000000000000043cf7c1e3e6ce348486b6c946 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [0] 2025/04/30 10:10:35 client updated RTT: 33.911059ms (σ: 16.955529ms) 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000043cf7c1e3e6ce348486b6c946, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b70faa4166aa99052499455a033ae57e, InitialSourceConnectionID: 00000000000000043cf7c1e3e6ce348486b6c946, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xb07f1724db008427e9f11357abf2550f} 2025/04/30 10:10:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b70faa4166aa99052499455a033ae57e 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 00000000000000043cf7c1e3e6ce348486b6c946, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 00000000000000043cf7c1e3e6ce348486b6c946, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:35 client Dropping Initial keys. 2025/04/30 10:10:35 client -> Sending packet 1 (110 bytes) for connection b70faa4166aa99052499455a033ae57e, Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 00000000000000043cf7c1e3e6ce348486b6c946, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client Short Header{DestConnectionID: 00000000000000043cf7c1e3e6ce348486b6c946, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:35 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:35 client Dropping Handshake keys. 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004779146f1a1c4bbef88d3f411, StatelessResetToken: 0x973a9378fd7ea711f73c07771df0c692} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004d20969138cacc0ea114c66ca, StatelessResetToken: 0x7cdd5b9b460b11566492a7068c94aeef} 2025/04/30 10:10:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000041ed31283f46432d5fc0a6004, StatelessResetToken: 0x14730208f1979d44bd8f9fec995ff7a4} 2025/04/30 10:10:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:35 client -> Sending packet 1 (46 bytes) for connection b70faa4166aa99052499455a033ae57e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004779146f1a1c4bbef88d3f411, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 99.287µs} 2025/04/30 10:10:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:35 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [0] 2025/04/30 10:10:35 client updated RTT: 33.85ms (σ: 12.836ms) 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:35 client -> Sending packet 2 (42 bytes) for connection b70faa4166aa99052499455a033ae57e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004779146f1a1c4bbef88d3f411, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:35 client Connection b70faa4166aa99052499455a033ae57e closed. 2025/04/30 10:10:35 Requesting https://server4:443/jbqzvtyyrc. 2025/04/30 10:10:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:35 Increased send buffer size to 14336 kiB 2025/04/30 10:10:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:35 Created qlog file: /logs/qlog/a8e5f83de81833b8.sqlog 2025/04/30 10:10:35 client Starting new connection to server4 ([::]:51780 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a8e5f83de81833b8, version v1 2025/04/30 10:10:35 Adding connection ID (empty). 2025/04/30 10:10:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:35 client -> Sending packet 0 (1280 bytes) for connection a8e5f83de81833b8, Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: a8e5f83de81833b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004eee6bb52853fbe3807855da9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:35 client Received first packet. Switching destination connection ID to: 0000000000000004eee6bb52853fbe3807855da9 2025/04/30 10:10:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client newly acked packets (1): [0] 2025/04/30 10:10:35 client updated RTT: 33.862683ms (σ: 16.931341ms) 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:35 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004eee6bb52853fbe3807855da9, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:10:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a8e5f83de81833b8, InitialSourceConnectionID: 0000000000000004eee6bb52853fbe3807855da9, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x938373fd749969c6610367a3aca05b89} 2025/04/30 10:10:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a8e5f83de81833b8 2025/04/30 10:10:35 client Long Header{Type: Initial, DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:35 client Dropping Initial keys. 2025/04/30 10:10:35 client -> Sending packet 1 (52 bytes) for connection a8e5f83de81833b8, Handshake 2025/04/30 10:10:35 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:35 client -> Sending packet 0 (58 bytes) for connection a8e5f83de81833b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:35 client Short Header{DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:36 client -> Sending packet 2 (86 bytes) for connection a8e5f83de81833b8, Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:36 client -> Sending packet 3 (86 bytes) for connection a8e5f83de81833b8, Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:10:36 client -> Sending packet 4 (86 bytes) for connection a8e5f83de81833b8, Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:36 client -> Sending packet 5 (86 bytes) for connection a8e5f83de81833b8, Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:36 client <- Reading packet 2 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.PingFrame{} 2025/04/30 10:10:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:36 client -> Sending packet 1 (44 bytes) for connection a8e5f83de81833b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 76.194µs} 2025/04/30 10:10:36 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.PingFrame{} 2025/04/30 10:10:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:36 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.PingFrame{} 2025/04/30 10:10:36 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:10:36 client -> Sending packet 2 (44 bytes) for connection a8e5f83de81833b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 0000000000000004eee6bb52853fbe3807855da9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 65.724µs} 2025/04/30 10:10:36 client <- Reading packet 5 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:36 client Dropping Handshake keys. 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004a53b7667b3e52d580ccf9ba4, StatelessResetToken: 0x0da0b7d6caaf02088535c2ab8eb15a11} 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004e129c7c8aa3116887b222a4d, StatelessResetToken: 0x811cfb84db57b2e0e4341304f8bba9f9} 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004aa37d39543e4e49229c10b29, StatelessResetToken: 0x4dc942cdfbf561efd61d3dbcbcbf963e} 2025/04/30 10:10:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:36 client -> Sending packet 4 (65 bytes) for connection a8e5f83de81833b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 0000000000000004a53b7667b3e52d580ccf9ba4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 111.349µs} 2025/04/30 10:10:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:36 client -> Sending packet 5 (60 bytes) for connection a8e5f83de81833b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 0000000000000004a53b7667b3e52d580ccf9ba4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:36 client <- Reading packet 6 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000049c6f87350b51237d36f6f800, StatelessResetToken: 0x40ddeaa47da9f86bf988769e2cbf1ee6} 2025/04/30 10:10:36 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:36 client -> Sending packet 6 (42 bytes) for connection a8e5f83de81833b8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 0000000000000004a53b7667b3e52d580ccf9ba4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:36 client Connection a8e5f83de81833b8 closed. 2025/04/30 10:10:36 Requesting https://server4:443/auvoenbqrt. 2025/04/30 10:10:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:36 Increased send buffer size to 14336 kiB 2025/04/30 10:10:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:36 Created qlog file: /logs/qlog/036ab7378c8f606705.sqlog 2025/04/30 10:10:36 client Starting new connection to server4 ([::]:40810 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 036ab7378c8f606705, version v1 2025/04/30 10:10:36 Adding connection ID (empty). 2025/04/30 10:10:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:36 client -> Sending packet 0 (1280 bytes) for connection 036ab7378c8f606705, Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: 036ab7378c8f606705, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:36 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:36 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000000421c2c21e50fc4eca0b75bfaa, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:36 client Received first packet. Switching destination connection ID to: 000000000000000421c2c21e50fc4eca0b75bfaa 2025/04/30 10:10:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:36 client newly acked packets (1): [0] 2025/04/30 10:10:36 client updated RTT: 33.870161ms (σ: 16.93508ms) 2025/04/30 10:10:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:36 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000421c2c21e50fc4eca0b75bfaa, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:10:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 036ab7378c8f606705, InitialSourceConnectionID: 000000000000000421c2c21e50fc4eca0b75bfaa, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x29dc71ca8cdfe7bb4ad9d8dda5ea7811} 2025/04/30 10:10:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 036ab7378c8f606705 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: 000000000000000421c2c21e50fc4eca0b75bfaa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 000000000000000421c2c21e50fc4eca0b75bfaa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:36 client Dropping Initial keys. 2025/04/30 10:10:36 client -> Sending packet 1 (52 bytes) for connection 036ab7378c8f606705, Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 000000000000000421c2c21e50fc4eca0b75bfaa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:36 client -> Sending packet 0 (58 bytes) for connection 036ab7378c8f606705, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 000000000000000421c2c21e50fc4eca0b75bfaa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:36 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:36 client Dropping Handshake keys. 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000000493fb7e8b8e049b6394a059da, StatelessResetToken: 0xb01040fb857dd04cd8eea61f06147c61} 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004dec21fce0e90169e5871922f, StatelessResetToken: 0xfe9b17e85e880fd0f1bfd2f638250c0a} 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000043883de04238d21ce36f77108, StatelessResetToken: 0x77f780017d36e4050fd96eb2adc3b029} 2025/04/30 10:10:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:36 client -> Sending packet 1 (46 bytes) for connection 036ab7378c8f606705, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 000000000000000493fb7e8b8e049b6394a059da, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 111.039µs} 2025/04/30 10:10:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:36 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:36 client newly acked packets (1): [0] 2025/04/30 10:10:36 client updated RTT: 33.866ms (σ: 12.707ms) 2025/04/30 10:10:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:36 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:36 client -> Sending packet 2 (42 bytes) for connection 036ab7378c8f606705, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 000000000000000493fb7e8b8e049b6394a059da, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:36 client Connection 036ab7378c8f606705 closed. 2025/04/30 10:10:36 Requesting https://server4:443/gtxnshliba. 2025/04/30 10:10:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:36 Increased send buffer size to 14336 kiB 2025/04/30 10:10:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:36 Created qlog file: /logs/qlog/db20628d1d3e1a7c306857d77474d491d00515.sqlog 2025/04/30 10:10:36 client Starting new connection to server4 ([::]:59807 -> 193.167.100.100:443), source connection ID (empty), destination connection ID db20628d1d3e1a7c306857d77474d491d00515, version v1 2025/04/30 10:10:36 Adding connection ID (empty). 2025/04/30 10:10:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:36 client -> Sending packet 0 (1280 bytes) for connection db20628d1d3e1a7c306857d77474d491d00515, Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: db20628d1d3e1a7c306857d77474d491d00515, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:36 client -> Sending packet 1 (1280 bytes) for connection db20628d1d3e1a7c306857d77474d491d00515, Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: db20628d1d3e1a7c306857d77474d491d00515, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:36 client -> Sending packet 2 (1280 bytes) for connection db20628d1d3e1a7c306857d77474d491d00515, Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: db20628d1d3e1a7c306857d77474d491d00515, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:36 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:36 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:36 client Received first packet. Switching destination connection ID to: 00000000000000045cd9e5ad819fc322ecc58ae9 2025/04/30 10:10:36 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:36 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:10:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: db20628d1d3e1a7c306857d77474d491d00515, InitialSourceConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xa130a052f00836c613bc07b18ddbbffd} 2025/04/30 10:10:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection db20628d1d3e1a7c306857d77474d491d00515 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:36 client Dropping Initial keys. 2025/04/30 10:10:36 client -> Sending packet 1 (52 bytes) for connection db20628d1d3e1a7c306857d77474d491d00515, Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:36 client -> Sending packet 0 (58 bytes) for connection db20628d1d3e1a7c306857d77474d491d00515, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:36 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:36 client Peer doesn't await address validation any longer. 2025/04/30 10:10:36 client newly acked packets (1): [0] 2025/04/30 10:10:36 client updated RTT: 33.329751ms (σ: 16.664875ms) 2025/04/30 10:10:36 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:36 client Canceling loss detection timer. 2025/04/30 10:10:36 client Dropping Handshake keys. 2025/04/30 10:10:36 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:36 client -> Sending packet 1 (44 bytes) for connection db20628d1d3e1a7c306857d77474d491d00515, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112.623µs} 2025/04/30 10:10:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:36 client -> Sending packet 2 (42 bytes) for connection db20628d1d3e1a7c306857d77474d491d00515, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 00000000000000045cd9e5ad819fc322ecc58ae9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:36 client Connection db20628d1d3e1a7c306857d77474d491d00515 closed. 2025/04/30 10:10:36 Requesting https://server4:443/ilgvrfffxt. 2025/04/30 10:10:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:36 Increased send buffer size to 14336 kiB 2025/04/30 10:10:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:36 Created qlog file: /logs/qlog/10377dfafecba4203794e0f30006759a04.sqlog 2025/04/30 10:10:36 client Starting new connection to server4 ([::]:51150 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 10377dfafecba4203794e0f30006759a04, version v1 2025/04/30 10:10:36 Adding connection ID (empty). 2025/04/30 10:10:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:36 client -> Sending packet 0 (1280 bytes) for connection 10377dfafecba4203794e0f30006759a04, Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: 10377dfafecba4203794e0f30006759a04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:36 client -> Sending packet 1 (1280 bytes) for connection 10377dfafecba4203794e0f30006759a04, Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: 10377dfafecba4203794e0f30006759a04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:36 client -> Sending packet 2 (1280 bytes) for connection 10377dfafecba4203794e0f30006759a04, Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: 10377dfafecba4203794e0f30006759a04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:36 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:36 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000048a2baf39b0e708bd2cac1ab5, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:36 client Received first packet. Switching destination connection ID to: 00000000000000048a2baf39b0e708bd2cac1ab5 2025/04/30 10:10:36 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:36 client newly acked packets (1): [2] 2025/04/30 10:10:36 client updated RTT: 35.038582ms (σ: 17.519291ms) 2025/04/30 10:10:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:36 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000048a2baf39b0e708bd2cac1ab5, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 10377dfafecba4203794e0f30006759a04, InitialSourceConnectionID: 00000000000000048a2baf39b0e708bd2cac1ab5, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x05129afa0599cac5d984a644dac88360} 2025/04/30 10:10:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 10377dfafecba4203794e0f30006759a04 2025/04/30 10:10:36 client Long Header{Type: Initial, DestConnectionID: 00000000000000048a2baf39b0e708bd2cac1ab5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 00000000000000048a2baf39b0e708bd2cac1ab5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:36 client Dropping Initial keys. 2025/04/30 10:10:36 client -> Sending packet 1 (52 bytes) for connection 10377dfafecba4203794e0f30006759a04, Handshake 2025/04/30 10:10:36 client Long Header{Type: Handshake, DestConnectionID: 00000000000000048a2baf39b0e708bd2cac1ab5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:36 client -> Sending packet 0 (58 bytes) for connection 10377dfafecba4203794e0f30006759a04, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 00000000000000048a2baf39b0e708bd2cac1ab5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:36 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:36 client Dropping Handshake keys. 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004652f4ae3848acf399335f551, StatelessResetToken: 0xf8b8b62089cbf5c78939da0a60888424} 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000000498d67e0af21009fc2494eff6, StatelessResetToken: 0x03da7e11d83d0d4d88b15de137a93e10} 2025/04/30 10:10:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004ec67c2e5df2c4bc527b03307, StatelessResetToken: 0x8fa70291c30d4a3ac34b15a59a1aded5} 2025/04/30 10:10:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:36 client -> Sending packet 1 (46 bytes) for connection 10377dfafecba4203794e0f30006759a04, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:36 client Short Header{DestConnectionID: 0000000000000004652f4ae3848acf399335f551, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.566µs} 2025/04/30 10:10:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:37 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:37 client newly acked packets (2): [0 1] 2025/04/30 10:10:37 client updated RTT: 34.53ms (σ: 14.154ms) 2025/04/30 10:10:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:37 client Canceling loss detection timer. 2025/04/30 10:10:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000049c1a9264e61aefbe9648b4e6, StatelessResetToken: 0x6d8e441c19b9385445b64d078987480b} 2025/04/30 10:10:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:37 client Ignoring all packets below 1. 2025/04/30 10:10:37 client -> Sending packet 2 (44 bytes) for connection 10377dfafecba4203794e0f30006759a04, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004652f4ae3848acf399335f551, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 123.392µs} 2025/04/30 10:10:37 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:37 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:37 client -> Sending packet 3 (42 bytes) for connection 10377dfafecba4203794e0f30006759a04, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004652f4ae3848acf399335f551, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:37 client Connection 10377dfafecba4203794e0f30006759a04 closed. 2025/04/30 10:10:37 Requesting https://server4:443/cxqqmzvqch. 2025/04/30 10:10:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:37 Increased send buffer size to 14336 kiB 2025/04/30 10:10:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:37 Created qlog file: /logs/qlog/f364828af6229828d6f011b7719e00fb.sqlog 2025/04/30 10:10:37 client Starting new connection to server4 ([::]:42160 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f364828af6229828d6f011b7719e00fb, version v1 2025/04/30 10:10:37 Adding connection ID (empty). 2025/04/30 10:10:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:37 client -> Sending packet 0 (1280 bytes) for connection f364828af6229828d6f011b7719e00fb, Initial 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: f364828af6229828d6f011b7719e00fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:37 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:37 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:37 client Received first packet. Switching destination connection ID to: 0000000000000004bf0845419cdfeddfc05471c5 2025/04/30 10:10:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:37 client newly acked packets (1): [0] 2025/04/30 10:10:37 client updated RTT: 33.90873ms (σ: 16.954365ms) 2025/04/30 10:10:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:37 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:37 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f364828af6229828d6f011b7719e00fb, InitialSourceConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x7885c225b754b60fc1619840177c6952} 2025/04/30 10:10:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f364828af6229828d6f011b7719e00fb 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:37 client Dropping Initial keys. 2025/04/30 10:10:37 client -> Sending packet 1 (52 bytes) for connection f364828af6229828d6f011b7719e00fb, Handshake 2025/04/30 10:10:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:37 client -> Sending packet 0 (58 bytes) for connection f364828af6229828d6f011b7719e00fb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:37 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:37 client Peer doesn't await address validation any longer. 2025/04/30 10:10:37 client newly acked packets (1): [0] 2025/04/30 10:10:37 client updated RTT: 33.898ms (σ: 12.735ms) 2025/04/30 10:10:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:37 client Canceling loss detection timer. 2025/04/30 10:10:37 client Dropping Handshake keys. 2025/04/30 10:10:37 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:37 client -> Sending packet 1 (44 bytes) for connection f364828af6229828d6f011b7719e00fb, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 109.146µs} 2025/04/30 10:10:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:37 client -> Sending packet 2 (42 bytes) for connection f364828af6229828d6f011b7719e00fb, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004bf0845419cdfeddfc05471c5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:37 client Connection f364828af6229828d6f011b7719e00fb closed. 2025/04/30 10:10:37 Requesting https://server4:443/aeiilbfrwd. 2025/04/30 10:10:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:37 Increased send buffer size to 14336 kiB 2025/04/30 10:10:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:37 Created qlog file: /logs/qlog/239c497146a726c6eb7fd3.sqlog 2025/04/30 10:10:37 client Starting new connection to server4 ([::]:36603 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 239c497146a726c6eb7fd3, version v1 2025/04/30 10:10:37 Adding connection ID (empty). 2025/04/30 10:10:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:37 client -> Sending packet 0 (1280 bytes) for connection 239c497146a726c6eb7fd3, Initial 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: 239c497146a726c6eb7fd3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:37 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:37 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004aac271b8c1a0fc81fbeb3cfd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:37 client Received first packet. Switching destination connection ID to: 0000000000000004aac271b8c1a0fc81fbeb3cfd 2025/04/30 10:10:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:37 client newly acked packets (1): [0] 2025/04/30 10:10:37 client updated RTT: 33.847306ms (σ: 16.923653ms) 2025/04/30 10:10:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:37 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:37 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004aac271b8c1a0fc81fbeb3cfd, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 239c497146a726c6eb7fd3, InitialSourceConnectionID: 0000000000000004aac271b8c1a0fc81fbeb3cfd, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xe4432885e5319eebd3875f4049c8da60} 2025/04/30 10:10:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 239c497146a726c6eb7fd3 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: 0000000000000004aac271b8c1a0fc81fbeb3cfd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004aac271b8c1a0fc81fbeb3cfd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:37 client Dropping Initial keys. 2025/04/30 10:10:37 client -> Sending packet 1 (110 bytes) for connection 239c497146a726c6eb7fd3, Handshake 2025/04/30 10:10:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004aac271b8c1a0fc81fbeb3cfd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004aac271b8c1a0fc81fbeb3cfd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:37 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:37 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:37 client Dropping Handshake keys. 2025/04/30 10:10:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004e365420a895f9ac44f55c81e, StatelessResetToken: 0xb4c3511d0599f36f0f2c204a5e06191d} 2025/04/30 10:10:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004bf0b034abeadbfa0c0a20597, StatelessResetToken: 0x9e7e952b53f212e18db1b5ff1c2a6773} 2025/04/30 10:10:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004d4c91bb7402f43e66d6136af, StatelessResetToken: 0xab18bb9a0fe138a0d9ae909f6152d7ff} 2025/04/30 10:10:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:37 client -> Sending packet 1 (46 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 117.481µs} 2025/04/30 10:10:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:37 client <- Reading packet 1 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:37 client newly acked packets (1): [1] 2025/04/30 10:10:37 client updated RTT: 33.474ms (σ: 13.436ms) 2025/04/30 10:10:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:37 client lost packet 0 (time threshold) 2025/04/30 10:10:37 client Canceling loss detection timer. 2025/04/30 10:10:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000000004932bae9cdb2f376c4127a21b, StatelessResetToken: 0xd0d0f26df0fb715f4069999ff951524a} 2025/04/30 10:10:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:37 client Ignoring all packets below 1. 2025/04/30 10:10:37 client -> Sending packet 2 (63 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 130.215µs} 2025/04/30 10:10:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:37 client -> Sending packet 4 (58 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:37 client -> Sending packet 5 (58 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:37 client <- Reading packet 5 (26 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25ms} 2025/04/30 10:10:37 client newly acked packets (1): [5] 2025/04/30 10:10:37 client updated RTT: 36.231ms (σ: 15.591ms) 2025/04/30 10:10:37 client Canceling loss detection timer. 2025/04/30 10:10:37 client -> Sending packet 6 (1366 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.PingFrame{} 2025/04/30 10:10:37 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.PingFrame{} 2025/04/30 10:10:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:37 client <- Reading packet 8 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.PingFrame{} 2025/04/30 10:10:37 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:10:37 client -> Sending packet 7 (48 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 63.75µs} 2025/04/30 10:10:37 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.PingFrame{} 2025/04/30 10:10:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:37 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.PingFrame{} 2025/04/30 10:10:37 client -> Sending packet 8 (50 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 111.44µs} 2025/04/30 10:10:37 client <- Reading packet 14 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.PingFrame{} 2025/04/30 10:10:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:37 client -> Sending packet 9 (52 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 1, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 69.15µs} 2025/04/30 10:10:37 client <- Reading packet 15 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:37 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:37 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:10:37 client newly acked packets (1): [6] 2025/04/30 10:10:37 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:37 client -> Sending packet 10 (1409 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.PingFrame{} 2025/04/30 10:10:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:37 client -> Sending packet 11 (42 bytes) for connection 239c497146a726c6eb7fd3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:37 client Short Header{DestConnectionID: 0000000000000004e365420a895f9ac44f55c81e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:37 client Connection 239c497146a726c6eb7fd3 closed. 2025/04/30 10:10:37 Requesting https://server4:443/hlovrmbwls. 2025/04/30 10:10:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:37 Increased send buffer size to 14336 kiB 2025/04/30 10:10:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:37 Created qlog file: /logs/qlog/6f6512207b661bcccddf7dffbe24.sqlog 2025/04/30 10:10:37 client Starting new connection to server4 ([::]:39360 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6f6512207b661bcccddf7dffbe24, version v1 2025/04/30 10:10:37 Adding connection ID (empty). 2025/04/30 10:10:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:37 client -> Sending packet 0 (1280 bytes) for connection 6f6512207b661bcccddf7dffbe24, Initial 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: 6f6512207b661bcccddf7dffbe24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:37 client -> Sending packet 1 (1280 bytes) for connection 6f6512207b661bcccddf7dffbe24, Initial 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: 6f6512207b661bcccddf7dffbe24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:37 client -> Sending packet 2 (1280 bytes) for connection 6f6512207b661bcccddf7dffbe24, Initial 2025/04/30 10:10:37 client Long Header{Type: Initial, DestConnectionID: 6f6512207b661bcccddf7dffbe24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:38 client -> Sending packet 3 (1280 bytes) for connection 6f6512207b661bcccddf7dffbe24, Initial 2025/04/30 10:10:38 client Long Header{Type: Initial, DestConnectionID: 6f6512207b661bcccddf7dffbe24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:38 client -> Sending packet 4 (1280 bytes) for connection 6f6512207b661bcccddf7dffbe24, Initial 2025/04/30 10:10:38 client Long Header{Type: Initial, DestConnectionID: 6f6512207b661bcccddf7dffbe24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:10:39 client -> Sending packet 5 (1280 bytes) for connection 6f6512207b661bcccddf7dffbe24, Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: 6f6512207b661bcccddf7dffbe24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:39 client -> Sending packet 6 (1280 bytes) for connection 6f6512207b661bcccddf7dffbe24, Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: 6f6512207b661bcccddf7dffbe24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:39 client Parsed a coalesced packet. Part 1: 150 bytes. Remaining: 1050 bytes. 2025/04/30 10:10:39 client <- Reading packet 3 (150 bytes) for connection (empty), Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 120, Version: v1} 2025/04/30 10:10:39 client Received first packet. Switching destination connection ID to: 0000000000000004ef74db07ac94d6aa5d3241b3 2025/04/30 10:10:39 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:39 client newly acked packets (1): [6] 2025/04/30 10:10:39 client updated RTT: 34.182771ms (σ: 17.091385ms) 2025/04/30 10:10:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Parsed a coalesced packet. Part 2: 1050 bytes. Remaining: 0 bytes. 2025/04/30 10:10:39 client <- Reading packet 3 (1050 bytes) for connection (empty), Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, PacketNumber: 3, PacketNumberLen: 1, Length: 1021, Version: v1} 2025/04/30 10:10:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:10:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6f6512207b661bcccddf7dffbe24, InitialSourceConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x6f4ae42fbcaefa1da9d17e52225e232a} 2025/04/30 10:10:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6f6512207b661bcccddf7dffbe24 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:39 client Dropping Initial keys. 2025/04/30 10:10:39 client -> Sending packet 1 (110 bytes) for connection 6f6512207b661bcccddf7dffbe24, Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:10:39 client Short Header{DestConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:39 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:39 client -> Sending packet 2 (86 bytes) for connection 6f6512207b661bcccddf7dffbe24, Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:39 client -> Sending packet 3 (86 bytes) for connection 6f6512207b661bcccddf7dffbe24, Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ef74db07ac94d6aa5d3241b3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:39 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:39 client Dropping Handshake keys. 2025/04/30 10:10:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004a82eda24c8f28c23bdd2416e, StatelessResetToken: 0x39283d97e95e910ee285795a7303105c} 2025/04/30 10:10:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004ec9d599ae74f533e87fcb1a8, StatelessResetToken: 0x75a89a71aeb0fda7cffd8a7043526eb1} 2025/04/30 10:10:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004bf2ba9c72c17ceca7eb329f0, StatelessResetToken: 0xaa0c77ba702695f783eb8d9d95939d32} 2025/04/30 10:10:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:39 client -> Sending packet 2 (65 bytes) for connection 6f6512207b661bcccddf7dffbe24, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:39 client Short Header{DestConnectionID: 0000000000000004a82eda24c8f28c23bdd2416e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 127.349µs} 2025/04/30 10:10:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:39 client -> Sending packet 3 (60 bytes) for connection 6f6512207b661bcccddf7dffbe24, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:39 client Short Header{DestConnectionID: 0000000000000004a82eda24c8f28c23bdd2416e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:39 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:39 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000044e07b7b004ed5ad964cf5ac1, StatelessResetToken: 0x7559315a5bfcb8795d85fdadf8383a75} 2025/04/30 10:10:39 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:39 client -> Sending packet 4 (42 bytes) for connection 6f6512207b661bcccddf7dffbe24, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:39 client Short Header{DestConnectionID: 0000000000000004a82eda24c8f28c23bdd2416e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:39 client Connection 6f6512207b661bcccddf7dffbe24 closed. 2025/04/30 10:10:39 Requesting https://server4:443/jexljtlpzz. 2025/04/30 10:10:39 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:39 Increased send buffer size to 14336 kiB 2025/04/30 10:10:39 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:39 Created qlog file: /logs/qlog/204ef0f7075748a0f3e715d6.sqlog 2025/04/30 10:10:39 client Starting new connection to server4 ([::]:35194 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 204ef0f7075748a0f3e715d6, version v1 2025/04/30 10:10:39 Adding connection ID (empty). 2025/04/30 10:10:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:39 client -> Sending packet 0 (1280 bytes) for connection 204ef0f7075748a0f3e715d6, Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: 204ef0f7075748a0f3e715d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:39 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:39 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c16a4e65b2ff262472cde404, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:39 client Received first packet. Switching destination connection ID to: 0000000000000004c16a4e65b2ff262472cde404 2025/04/30 10:10:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:39 client newly acked packets (1): [0] 2025/04/30 10:10:39 client updated RTT: 34.084931ms (σ: 17.042465ms) 2025/04/30 10:10:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:39 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c16a4e65b2ff262472cde404, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 204ef0f7075748a0f3e715d6, InitialSourceConnectionID: 0000000000000004c16a4e65b2ff262472cde404, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x588cd901e7cfef33d7425cab02d2698c} 2025/04/30 10:10:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 204ef0f7075748a0f3e715d6 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: 0000000000000004c16a4e65b2ff262472cde404, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c16a4e65b2ff262472cde404, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:39 client Dropping Initial keys. 2025/04/30 10:10:39 client -> Sending packet 1 (52 bytes) for connection 204ef0f7075748a0f3e715d6, Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c16a4e65b2ff262472cde404, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:39 client -> Sending packet 0 (58 bytes) for connection 204ef0f7075748a0f3e715d6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:39 client Short Header{DestConnectionID: 0000000000000004c16a4e65b2ff262472cde404, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:39 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:39 client Peer doesn't await address validation any longer. 2025/04/30 10:10:39 client newly acked packets (1): [0] 2025/04/30 10:10:39 client updated RTT: 34.021ms (σ: 12.906ms) 2025/04/30 10:10:39 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:39 client Canceling loss detection timer. 2025/04/30 10:10:39 client Dropping Handshake keys. 2025/04/30 10:10:39 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:39 client -> Sending packet 1 (44 bytes) for connection 204ef0f7075748a0f3e715d6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:39 client Short Header{DestConnectionID: 0000000000000004c16a4e65b2ff262472cde404, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 113.222µs} 2025/04/30 10:10:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:39 client -> Sending packet 2 (42 bytes) for connection 204ef0f7075748a0f3e715d6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:39 client Short Header{DestConnectionID: 0000000000000004c16a4e65b2ff262472cde404, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:39 client Connection 204ef0f7075748a0f3e715d6 closed. 2025/04/30 10:10:39 Requesting https://server4:443/htlejxkibm. 2025/04/30 10:10:39 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:39 Increased send buffer size to 14336 kiB 2025/04/30 10:10:39 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:39 Created qlog file: /logs/qlog/e0198512e482fa5c.sqlog 2025/04/30 10:10:39 client Starting new connection to server4 ([::]:45987 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e0198512e482fa5c, version v1 2025/04/30 10:10:39 Adding connection ID (empty). 2025/04/30 10:10:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:39 client -> Sending packet 0 (1280 bytes) for connection e0198512e482fa5c, Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: e0198512e482fa5c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:39 client -> Sending packet 1 (1280 bytes) for connection e0198512e482fa5c, Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: e0198512e482fa5c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:39 client -> Sending packet 2 (1280 bytes) for connection e0198512e482fa5c, Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: e0198512e482fa5c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:39 client -> Sending packet 3 (1280 bytes) for connection e0198512e482fa5c, Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: e0198512e482fa5c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:39 client -> Sending packet 4 (1280 bytes) for connection e0198512e482fa5c, Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: e0198512e482fa5c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:39 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:10:39 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:10:39 client Received first packet. Switching destination connection ID to: 0000000000000004c1a7c0715f56ab2f6e391ef1 2025/04/30 10:10:39 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:10:39 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:10:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:10:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e0198512e482fa5c, InitialSourceConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x7e2d7f3a9eff07228bb43e5b7aba4b9c} 2025/04/30 10:10:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e0198512e482fa5c 2025/04/30 10:10:39 client Long Header{Type: Initial, DestConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:39 client Dropping Initial keys. 2025/04/30 10:10:39 client -> Sending packet 1 (52 bytes) for connection e0198512e482fa5c, Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:39 client -> Sending packet 0 (58 bytes) for connection e0198512e482fa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:39 client Short Header{DestConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:39 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:10:39 client Dropping %!s(logging.PacketType=0) packet (148 bytes) because we already dropped the keys. 2025/04/30 10:10:39 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:10:39 client <- Reading packet 2 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, PacketNumber: 2, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:10:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:10:39 client -> Sending packet 2 (52 bytes) for connection e0198512e482fa5c, Handshake 2025/04/30 10:10:39 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c1a7c0715f56ab2f6e391ef1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:40 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:40 client Dropping Handshake keys. 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000044844abc6f6622e1a1ef4d291, StatelessResetToken: 0x31fe0b210ffff076642b2cf632efc9bd} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004d7487ededd6c516edd6e99cb, StatelessResetToken: 0x91af23e5d90a73c9f45f24a4c3d966d7} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000048fee5862a7bc1f4beb6cf0ba, StatelessResetToken: 0xfbd5bbb0a8e596e87aef82e50390a7c0} 2025/04/30 10:10:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:40 client -> Sending packet 1 (1366 bytes) for connection e0198512e482fa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 00000000000000044844abc6f6622e1a1ef4d291, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.PingFrame{} 2025/04/30 10:10:40 client -> Sending packet 2 (46 bytes) for connection e0198512e482fa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 00000000000000044844abc6f6622e1a1ef4d291, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 139.834µs} 2025/04/30 10:10:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:40 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client newly acked packets (1): [0] 2025/04/30 10:10:40 client updated RTT: 34.217326ms (σ: 17.108663ms) 2025/04/30 10:10:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:40 client -> Sending packet 3 (42 bytes) for connection e0198512e482fa5c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 00000000000000044844abc6f6622e1a1ef4d291, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:40 client Connection e0198512e482fa5c closed. 2025/04/30 10:10:40 Requesting https://server4:443/aizzlygspk. 2025/04/30 10:10:40 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:40 Increased send buffer size to 14336 kiB 2025/04/30 10:10:40 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:40 Created qlog file: /logs/qlog/3810d0e7658397a4.sqlog 2025/04/30 10:10:40 client Starting new connection to server4 ([::]:46613 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3810d0e7658397a4, version v1 2025/04/30 10:10:40 Adding connection ID (empty). 2025/04/30 10:10:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:40 client -> Sending packet 0 (1280 bytes) for connection 3810d0e7658397a4, Initial 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: 3810d0e7658397a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:40 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:40 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:40 client Received first packet. Switching destination connection ID to: 000000000000000471a44c29f8cbff39daa3f8cc 2025/04/30 10:10:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client newly acked packets (1): [0] 2025/04/30 10:10:40 client updated RTT: 33.898221ms (σ: 16.94911ms) 2025/04/30 10:10:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:40 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:10:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3810d0e7658397a4, InitialSourceConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x3e775c4e905dda0857071d355d46271b} 2025/04/30 10:10:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3810d0e7658397a4 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:40 client Dropping Initial keys. 2025/04/30 10:10:40 client -> Sending packet 1 (110 bytes) for connection 3810d0e7658397a4, Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client Short Header{DestConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:40 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:40 client -> Sending packet 2 (86 bytes) for connection 3810d0e7658397a4, Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:40 client -> Sending packet 3 (86 bytes) for connection 3810d0e7658397a4, Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:40 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.PingFrame{} 2025/04/30 10:10:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:40 client -> Sending packet 1 (44 bytes) for connection 3810d0e7658397a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 101.261µs} 2025/04/30 10:10:40 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.PingFrame{} 2025/04/30 10:10:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:40 client Sending ACK because the ACK timer expired. 2025/04/30 10:10:40 client -> Sending packet 2 (45 bytes) for connection 3810d0e7658397a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 000000000000000471a44c29f8cbff39daa3f8cc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.235166ms} 2025/04/30 10:10:40 client <- Reading packet 5 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:40 client Dropping Handshake keys. 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000000452e7a6a90499fc111e243034, StatelessResetToken: 0xe2211dca81850b7c9432eeb2785bcf3e} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000048ccefdcc9614f8834ee7b335, StatelessResetToken: 0x036226f05b5803884a0cb871b046f497} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004e27ca4dea41f7eedaa0aa5bb, StatelessResetToken: 0x9b6c2c3c1551924e584d826f3dd288b5} 2025/04/30 10:10:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:40 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:40 client -> Sending packet 4 (65 bytes) for connection 3810d0e7658397a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 000000000000000452e7a6a90499fc111e243034, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 105.83µs} 2025/04/30 10:10:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:40 client -> Sending packet 5 (60 bytes) for connection 3810d0e7658397a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 000000000000000452e7a6a90499fc111e243034, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:40 client <- Reading packet 6 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000000004975bf3821d72560aa77c5538, StatelessResetToken: 0x2ee95586415d1b07e976068fd85ab906} 2025/04/30 10:10:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:40 client -> Sending packet 6 (42 bytes) for connection 3810d0e7658397a4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 000000000000000452e7a6a90499fc111e243034, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:40 client Connection 3810d0e7658397a4 closed. 2025/04/30 10:10:40 Requesting https://server4:443/ccjmofwajy. 2025/04/30 10:10:40 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:40 Increased send buffer size to 14336 kiB 2025/04/30 10:10:40 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:40 Created qlog file: /logs/qlog/8cabd59bcc8acdedebc71fef79ed.sqlog 2025/04/30 10:10:40 client Starting new connection to server4 ([::]:52943 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8cabd59bcc8acdedebc71fef79ed, version v1 2025/04/30 10:10:40 Adding connection ID (empty). 2025/04/30 10:10:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:40 client -> Sending packet 0 (1280 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, Initial 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: 8cabd59bcc8acdedebc71fef79ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:40 client -> Sending packet 1 (1280 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, Initial 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: 8cabd59bcc8acdedebc71fef79ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:40 client -> Sending packet 2 (1280 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, Initial 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: 8cabd59bcc8acdedebc71fef79ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:40 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:40 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f0e6d285944fe616071e103d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:40 client Received first packet. Switching destination connection ID to: 0000000000000004f0e6d285944fe616071e103d 2025/04/30 10:10:40 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:40 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f0e6d285944fe616071e103d, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 10:10:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8cabd59bcc8acdedebc71fef79ed, InitialSourceConnectionID: 0000000000000004f0e6d285944fe616071e103d, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x83d9dc5ba1e6a89b31b051638e1a666c} 2025/04/30 10:10:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8cabd59bcc8acdedebc71fef79ed 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: 0000000000000004f0e6d285944fe616071e103d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f0e6d285944fe616071e103d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:40 client Dropping Initial keys. 2025/04/30 10:10:40 client -> Sending packet 1 (52 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f0e6d285944fe616071e103d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:40 client -> Sending packet 0 (58 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 0000000000000004f0e6d285944fe616071e103d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:40 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:40 client -> Sending packet 2 (86 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f0e6d285944fe616071e103d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:40 client -> Sending packet 3 (86 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f0e6d285944fe616071e103d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:40 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:40 client Dropping Handshake keys. 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004bd2c5007ae9fef1149e81ed5, StatelessResetToken: 0x0f795f2a48bda540d2aab1230d2fd22a} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004baa9438c6bc0a7596536f1b6, StatelessResetToken: 0x2652a9e4ecb0b8e3bebfd5618cc47703} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004ffddf4fe23db2919f1a378fe, StatelessResetToken: 0x1b327dc90447b13c4fd9bb9c96ef78de} 2025/04/30 10:10:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:40 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:40 client -> Sending packet 2 (65 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 0000000000000004bd2c5007ae9fef1149e81ed5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 89.408µs} 2025/04/30 10:10:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:40 client -> Sending packet 3 (60 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 0000000000000004bd2c5007ae9fef1149e81ed5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:40 client -> Sending packet 4 (1366 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 0000000000000004bd2c5007ae9fef1149e81ed5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.PingFrame{} 2025/04/30 10:10:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:40 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000041b2fc0bf36950982db7efe67, StatelessResetToken: 0x8314944376462d8e21d4dd33cea5ceed} 2025/04/30 10:10:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:40 client -> Sending packet 5 (42 bytes) for connection 8cabd59bcc8acdedebc71fef79ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 0000000000000004bd2c5007ae9fef1149e81ed5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:40 client Connection 8cabd59bcc8acdedebc71fef79ed closed. 2025/04/30 10:10:40 Requesting https://server4:443/rkyicfzdsq. 2025/04/30 10:10:40 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:40 Increased send buffer size to 14336 kiB 2025/04/30 10:10:40 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:40 Created qlog file: /logs/qlog/e4caa471e3471b1085981ade9780996ce0ee0c54.sqlog 2025/04/30 10:10:40 client Starting new connection to server4 ([::]:44159 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e4caa471e3471b1085981ade9780996ce0ee0c54, version v1 2025/04/30 10:10:40 Adding connection ID (empty). 2025/04/30 10:10:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:40 client -> Sending packet 0 (1280 bytes) for connection e4caa471e3471b1085981ade9780996ce0ee0c54, Initial 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: e4caa471e3471b1085981ade9780996ce0ee0c54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:40 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:40 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004b9586d0ce9783afaafe016ea, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:40 client Received first packet. Switching destination connection ID to: 0000000000000004b9586d0ce9783afaafe016ea 2025/04/30 10:10:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client newly acked packets (1): [0] 2025/04/30 10:10:40 client updated RTT: 34.00129ms (σ: 17.000645ms) 2025/04/30 10:10:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:40 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004b9586d0ce9783afaafe016ea, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:10:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e4caa471e3471b1085981ade9780996ce0ee0c54, InitialSourceConnectionID: 0000000000000004b9586d0ce9783afaafe016ea, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x751e96a1d7ed941a76716d12745bb9a5} 2025/04/30 10:10:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e4caa471e3471b1085981ade9780996ce0ee0c54 2025/04/30 10:10:40 client Long Header{Type: Initial, DestConnectionID: 0000000000000004b9586d0ce9783afaafe016ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004b9586d0ce9783afaafe016ea, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:40 client Dropping Initial keys. 2025/04/30 10:10:40 client -> Sending packet 1 (110 bytes) for connection e4caa471e3471b1085981ade9780996ce0ee0c54, Handshake 2025/04/30 10:10:40 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004b9586d0ce9783afaafe016ea, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client Short Header{DestConnectionID: 0000000000000004b9586d0ce9783afaafe016ea, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:40 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:40 client Dropping Handshake keys. 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000000458ef22d489c5473ed9af7326, StatelessResetToken: 0xb36e85b00d4304a8d1ca5f082883c59a} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004d45e9f17fac75786c9f75cef, StatelessResetToken: 0xff5498e8eb33e54d3823bcd46a2b8918} 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000000437c2fad5d2a738e17d957b2a, StatelessResetToken: 0x32053e3c807dff35c75d11f921c99cbe} 2025/04/30 10:10:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:40 client -> Sending packet 1 (46 bytes) for connection e4caa471e3471b1085981ade9780996ce0ee0c54, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 000000000000000458ef22d489c5473ed9af7326, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.905µs} 2025/04/30 10:10:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:40 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:40 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:40 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:40 client newly acked packets (2): [0 1] 2025/04/30 10:10:40 client updated RTT: 33.63ms (σ: 13.49ms) 2025/04/30 10:10:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:40 client Canceling loss detection timer. 2025/04/30 10:10:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000040da787f1076bcd7985fee0f4, StatelessResetToken: 0xa23d88f6755b9c5adfd6a7ea1f775c23} 2025/04/30 10:10:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:40 client Ignoring all packets below 1. 2025/04/30 10:10:40 client -> Sending packet 2 (44 bytes) for connection e4caa471e3471b1085981ade9780996ce0ee0c54, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:40 client Short Header{DestConnectionID: 000000000000000458ef22d489c5473ed9af7326, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 126.087µs} 2025/04/30 10:10:41 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:41 client -> Sending packet 3 (42 bytes) for connection e4caa471e3471b1085981ade9780996ce0ee0c54, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 000000000000000458ef22d489c5473ed9af7326, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:41 client Connection e4caa471e3471b1085981ade9780996ce0ee0c54 closed. 2025/04/30 10:10:41 Requesting https://server4:443/cwvkjldsep. 2025/04/30 10:10:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:41 Increased send buffer size to 14336 kiB 2025/04/30 10:10:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:41 Created qlog file: /logs/qlog/597949214580626e367a68a004d57d4c850b.sqlog 2025/04/30 10:10:41 client Starting new connection to server4 ([::]:43674 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 597949214580626e367a68a004d57d4c850b, version v1 2025/04/30 10:10:41 Adding connection ID (empty). 2025/04/30 10:10:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:41 client -> Sending packet 0 (1280 bytes) for connection 597949214580626e367a68a004d57d4c850b, Initial 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: 597949214580626e367a68a004d57d4c850b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:41 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:41 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ca60595fd132d12d75cd418f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:41 client Received first packet. Switching destination connection ID to: 0000000000000004ca60595fd132d12d75cd418f 2025/04/30 10:10:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:41 client newly acked packets (1): [0] 2025/04/30 10:10:41 client updated RTT: 33.886839ms (σ: 16.943419ms) 2025/04/30 10:10:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:41 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:41 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ca60595fd132d12d75cd418f, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 597949214580626e367a68a004d57d4c850b, InitialSourceConnectionID: 0000000000000004ca60595fd132d12d75cd418f, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x2f5fedb4957cbb5a80e8f5bd8882b693} 2025/04/30 10:10:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 597949214580626e367a68a004d57d4c850b 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: 0000000000000004ca60595fd132d12d75cd418f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ca60595fd132d12d75cd418f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:41 client Dropping Initial keys. 2025/04/30 10:10:41 client -> Sending packet 1 (52 bytes) for connection 597949214580626e367a68a004d57d4c850b, Handshake 2025/04/30 10:10:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ca60595fd132d12d75cd418f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:41 client -> Sending packet 0 (58 bytes) for connection 597949214580626e367a68a004d57d4c850b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004ca60595fd132d12d75cd418f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:41 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:41 client Dropping Handshake keys. 2025/04/30 10:10:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004fed6a0faa444f33bb7a8cfc9, StatelessResetToken: 0xb1521e83346bf5e7129c5eb13c9620f3} 2025/04/30 10:10:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000041dd2ac72a161129b9273cac3, StatelessResetToken: 0x28e421ca7d03e12cd10bbc77596d007a} 2025/04/30 10:10:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000048c764cf4552a6449caac5518, StatelessResetToken: 0x6b399d565302658c3156eccd443cc967} 2025/04/30 10:10:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:41 client -> Sending packet 1 (46 bytes) for connection 597949214580626e367a68a004d57d4c850b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004fed6a0faa444f33bb7a8cfc9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 128.512µs} 2025/04/30 10:10:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:41 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:41 client newly acked packets (2): [0 1] 2025/04/30 10:10:41 client updated RTT: 33.519ms (σ: 13.44ms) 2025/04/30 10:10:41 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:41 client Canceling loss detection timer. 2025/04/30 10:10:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000043adf8267006c3ae1e5303eff, StatelessResetToken: 0xe43d1d3bd7f6e571d49688da68f15e64} 2025/04/30 10:10:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:41 client Ignoring all packets below 1. 2025/04/30 10:10:41 client -> Sending packet 2 (44 bytes) for connection 597949214580626e367a68a004d57d4c850b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004fed6a0faa444f33bb7a8cfc9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 127.71µs} 2025/04/30 10:10:41 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.PingFrame{} 2025/04/30 10:10:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:41 client -> Sending packet 3 (46 bytes) for connection 597949214580626e367a68a004d57d4c850b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004fed6a0faa444f33bb7a8cfc9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 70.472µs} 2025/04/30 10:10:41 client <- Reading packet 5 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:41 client -> Sending packet 4 (42 bytes) for connection 597949214580626e367a68a004d57d4c850b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004fed6a0faa444f33bb7a8cfc9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:41 client Connection 597949214580626e367a68a004d57d4c850b closed. 2025/04/30 10:10:41 Requesting https://server4:443/jqlifutpcc. 2025/04/30 10:10:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:41 Increased send buffer size to 14336 kiB 2025/04/30 10:10:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:41 Created qlog file: /logs/qlog/b2bbec93d1909608cf5a06ef.sqlog 2025/04/30 10:10:41 client Starting new connection to server4 ([::]:32843 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b2bbec93d1909608cf5a06ef, version v1 2025/04/30 10:10:41 Adding connection ID (empty). 2025/04/30 10:10:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:41 client -> Sending packet 0 (1280 bytes) for connection b2bbec93d1909608cf5a06ef, Initial 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: b2bbec93d1909608cf5a06ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:41 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:41 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000040373e86b4bb20e5b012bf611, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:41 client Received first packet. Switching destination connection ID to: 00000000000000040373e86b4bb20e5b012bf611 2025/04/30 10:10:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:41 client newly acked packets (1): [0] 2025/04/30 10:10:41 client updated RTT: 34.10759ms (σ: 17.053795ms) 2025/04/30 10:10:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:41 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:41 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000040373e86b4bb20e5b012bf611, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:10:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b2bbec93d1909608cf5a06ef, InitialSourceConnectionID: 00000000000000040373e86b4bb20e5b012bf611, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xff0a31e967adc37c4d7d038bcb4e517f} 2025/04/30 10:10:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b2bbec93d1909608cf5a06ef 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: 00000000000000040373e86b4bb20e5b012bf611, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:41 client Long Header{Type: Handshake, DestConnectionID: 00000000000000040373e86b4bb20e5b012bf611, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:41 client Dropping Initial keys. 2025/04/30 10:10:41 client -> Sending packet 1 (110 bytes) for connection b2bbec93d1909608cf5a06ef, Handshake 2025/04/30 10:10:41 client Long Header{Type: Handshake, DestConnectionID: 00000000000000040373e86b4bb20e5b012bf611, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:41 client Short Header{DestConnectionID: 00000000000000040373e86b4bb20e5b012bf611, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:41 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:41 client -> Sending packet 2 (86 bytes) for connection b2bbec93d1909608cf5a06ef, Handshake 2025/04/30 10:10:41 client Long Header{Type: Handshake, DestConnectionID: 00000000000000040373e86b4bb20e5b012bf611, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:41 client -> Sending packet 3 (86 bytes) for connection b2bbec93d1909608cf5a06ef, Handshake 2025/04/30 10:10:41 client Long Header{Type: Handshake, DestConnectionID: 00000000000000040373e86b4bb20e5b012bf611, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:41 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:41 client Dropping Handshake keys. 2025/04/30 10:10:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004a08db4e78f1100abdaa5a8c7, StatelessResetToken: 0x09d9985044ffccb37d36b4285f18b8d3} 2025/04/30 10:10:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004ab17ebafa67aba8fb31de8d5, StatelessResetToken: 0xb852348489106566f30e4d6df4f5c8a1} 2025/04/30 10:10:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004f55461264a19821539600edb, StatelessResetToken: 0x2cbff5a90c3251886b37d8e0ec272494} 2025/04/30 10:10:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:41 client -> Sending packet 2 (65 bytes) for connection b2bbec93d1909608cf5a06ef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004a08db4e78f1100abdaa5a8c7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 115.788µs} 2025/04/30 10:10:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:41 client -> Sending packet 3 (60 bytes) for connection b2bbec93d1909608cf5a06ef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004a08db4e78f1100abdaa5a8c7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:41 client <- Reading packet 2 (24 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25ms} 2025/04/30 10:10:41 client newly acked packets (1): [3] 2025/04/30 10:10:41 client updated RTT: 36.961ms (σ: 18.498ms) 2025/04/30 10:10:41 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:41 client Canceling loss detection timer. 2025/04/30 10:10:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:41 client <- Reading packet 3 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.PingFrame{} 2025/04/30 10:10:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:41 client Sending ACK because the ACK timer expired. 2025/04/30 10:10:41 client -> Sending packet 4 (47 bytes) for connection b2bbec93d1909608cf5a06ef, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004a08db4e78f1100abdaa5a8c7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.268522ms} 2025/04/30 10:10:41 client <- Reading packet 4 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:41 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000043487687497be6c70592ce887, StatelessResetToken: 0xb0d4389fe41f8ed5d4a30ecd9df4c557} 2025/04/30 10:10:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:41 client -> Sending packet 5 (42 bytes) for connection b2bbec93d1909608cf5a06ef, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:41 client Short Header{DestConnectionID: 0000000000000004a08db4e78f1100abdaa5a8c7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:41 client Connection b2bbec93d1909608cf5a06ef closed. 2025/04/30 10:10:41 Requesting https://server4:443/abyfskjhzl. 2025/04/30 10:10:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:41 Increased send buffer size to 14336 kiB 2025/04/30 10:10:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:41 Created qlog file: /logs/qlog/b5a7b0b15ec08d63567abf60d026dbd11f086799.sqlog 2025/04/30 10:10:41 client Starting new connection to server4 ([::]:55664 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b5a7b0b15ec08d63567abf60d026dbd11f086799, version v1 2025/04/30 10:10:41 Adding connection ID (empty). 2025/04/30 10:10:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:41 client -> Sending packet 0 (1280 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, Initial 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: b5a7b0b15ec08d63567abf60d026dbd11f086799, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:41 client -> Sending packet 1 (1280 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, Initial 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: b5a7b0b15ec08d63567abf60d026dbd11f086799, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:41 client -> Sending packet 2 (1280 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, Initial 2025/04/30 10:10:41 client Long Header{Type: Initial, DestConnectionID: b5a7b0b15ec08d63567abf60d026dbd11f086799, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:42 client -> Sending packet 3 (1280 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: b5a7b0b15ec08d63567abf60d026dbd11f086799, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:42 client -> Sending packet 4 (1280 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: b5a7b0b15ec08d63567abf60d026dbd11f086799, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:42 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004cc01e4822756cac04cb404ce, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:42 client Received first packet. Switching destination connection ID to: 0000000000000004cc01e4822756cac04cb404ce 2025/04/30 10:10:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:42 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004cc01e4822756cac04cb404ce, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 10:10:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b5a7b0b15ec08d63567abf60d026dbd11f086799, InitialSourceConnectionID: 0000000000000004cc01e4822756cac04cb404ce, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x9dd26ae2d98a3a8f97ac9a131baeb8d1} 2025/04/30 10:10:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 0000000000000004cc01e4822756cac04cb404ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004cc01e4822756cac04cb404ce, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:42 client Dropping Initial keys. 2025/04/30 10:10:42 client -> Sending packet 1 (52 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004cc01e4822756cac04cb404ce, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:42 client -> Sending packet 0 (58 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 0000000000000004cc01e4822756cac04cb404ce, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:42 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:42 client Dropping Handshake keys. 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000000460d4ca9715458e1abec4e1ac, StatelessResetToken: 0xc699aa4202e06dfc00a563f0e9065ec8} 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000044441fa9752f2174de8beecf4, StatelessResetToken: 0x3135e2bd3705d960aa0ceaa6587dffd3} 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000044797b2ad9661d56647cb7c7f, StatelessResetToken: 0xdda7a9e33f09f0b5fd54821831e462ca} 2025/04/30 10:10:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:42 client -> Sending packet 1 (1366 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 000000000000000460d4ca9715458e1abec4e1ac, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.PingFrame{} 2025/04/30 10:10:42 client -> Sending packet 2 (46 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 000000000000000460d4ca9715458e1abec4e1ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 173.316µs} 2025/04/30 10:10:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:42 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client newly acked packets (1): [0] 2025/04/30 10:10:42 client updated RTT: 33.994779ms (σ: 16.997389ms) 2025/04/30 10:10:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:42 client -> Sending packet 3 (42 bytes) for connection b5a7b0b15ec08d63567abf60d026dbd11f086799, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 000000000000000460d4ca9715458e1abec4e1ac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:42 client Connection b5a7b0b15ec08d63567abf60d026dbd11f086799 closed. 2025/04/30 10:10:42 Requesting https://server4:443/qhzcgkdbyj. 2025/04/30 10:10:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:42 Increased send buffer size to 14336 kiB 2025/04/30 10:10:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:42 Created qlog file: /logs/qlog/94228976e3281eb5945c.sqlog 2025/04/30 10:10:42 client Starting new connection to server4 ([::]:46998 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 94228976e3281eb5945c, version v1 2025/04/30 10:10:42 Adding connection ID (empty). 2025/04/30 10:10:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:42 client -> Sending packet 0 (1280 bytes) for connection 94228976e3281eb5945c, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 94228976e3281eb5945c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:10:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:42 client -> Sending packet 1 (1280 bytes) for connection 94228976e3281eb5945c, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 94228976e3281eb5945c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:10:42 client -> Sending packet 2 (1280 bytes) for connection 94228976e3281eb5945c, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 94228976e3281eb5945c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:42 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:42 client Received first packet. Switching destination connection ID to: 0000000000000004ef6a7d69e3735b2ba4e38754 2025/04/30 10:10:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:42 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 94228976e3281eb5945c, InitialSourceConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x4b6b8b31aa48a67ca39a8c4c7bb58f98} 2025/04/30 10:10:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 94228976e3281eb5945c 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:42 client Dropping Initial keys. 2025/04/30 10:10:42 client -> Sending packet 1 (110 bytes) for connection 94228976e3281eb5945c, Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:42 client Short Header{DestConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:42 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:42 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:42 client -> Sending packet 2 (52 bytes) for connection 94228976e3281eb5945c, Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004ef6a7d69e3735b2ba4e38754, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:42 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:42 client Dropping Handshake keys. 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000000490d17c27494351bfc30085f6, StatelessResetToken: 0xcc48ba8d626db822f972659f2563c019} 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000044aeb7c27766ccd9153ae0622, StatelessResetToken: 0x49efbc4fb006cf2e23e4694494dba443} 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004ea8a2102187bf5317c412c2b, StatelessResetToken: 0x9eee71b3db5be803640abd23186c6d6c} 2025/04/30 10:10:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:42 client -> Sending packet 1 (1366 bytes) for connection 94228976e3281eb5945c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 000000000000000490d17c27494351bfc30085f6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.PingFrame{} 2025/04/30 10:10:42 client -> Sending packet 2 (46 bytes) for connection 94228976e3281eb5945c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 000000000000000490d17c27494351bfc30085f6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 147.347µs} 2025/04/30 10:10:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:42 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client newly acked packets (1): [0] 2025/04/30 10:10:42 client updated RTT: 33.964156ms (σ: 16.982078ms) 2025/04/30 10:10:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:42 client -> Sending packet 3 (42 bytes) for connection 94228976e3281eb5945c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 000000000000000490d17c27494351bfc30085f6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:42 client Connection 94228976e3281eb5945c closed. 2025/04/30 10:10:42 Requesting https://server4:443/yzjokpelot. 2025/04/30 10:10:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:42 Increased send buffer size to 14336 kiB 2025/04/30 10:10:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:42 Created qlog file: /logs/qlog/6d28e506303975f45e.sqlog 2025/04/30 10:10:42 client Starting new connection to server4 ([::]:36883 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6d28e506303975f45e, version v1 2025/04/30 10:10:42 Adding connection ID (empty). 2025/04/30 10:10:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:42 client -> Sending packet 0 (1280 bytes) for connection 6d28e506303975f45e, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 6d28e506303975f45e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:42 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004cef5084cf492a314bc698dc2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:42 client Received first packet. Switching destination connection ID to: 0000000000000004cef5084cf492a314bc698dc2 2025/04/30 10:10:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client newly acked packets (1): [0] 2025/04/30 10:10:42 client updated RTT: 33.900957ms (σ: 16.950478ms) 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:42 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004cef5084cf492a314bc698dc2, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:10:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6d28e506303975f45e, InitialSourceConnectionID: 0000000000000004cef5084cf492a314bc698dc2, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x3f77bacdea031bdcbb96214e54e61af3} 2025/04/30 10:10:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d28e506303975f45e 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 0000000000000004cef5084cf492a314bc698dc2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004cef5084cf492a314bc698dc2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:42 client Dropping Initial keys. 2025/04/30 10:10:42 client -> Sending packet 1 (52 bytes) for connection 6d28e506303975f45e, Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004cef5084cf492a314bc698dc2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client -> Sending packet 0 (58 bytes) for connection 6d28e506303975f45e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 0000000000000004cef5084cf492a314bc698dc2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:42 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:42 client Dropping Handshake keys. 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000000469af1a5762cbcf1f55415e4d, StatelessResetToken: 0x7c6edfdd69f5052ac9a2803ec8dfba5b} 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004a155dd759560f651525a09ff, StatelessResetToken: 0x82f646f4a39e77bb9680dc277cd3983a} 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000041fc10909ad9c4ab8e2bebc6f, StatelessResetToken: 0x2b7f3bf5445f3f8a9996e46356c39b3e} 2025/04/30 10:10:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:42 client -> Sending packet 1 (46 bytes) for connection 6d28e506303975f45e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 000000000000000469af1a5762cbcf1f55415e4d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 125.516µs} 2025/04/30 10:10:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:42 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client newly acked packets (1): [0] 2025/04/30 10:10:42 client updated RTT: 33.868ms (σ: 12.775ms) 2025/04/30 10:10:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:42 client -> Sending packet 2 (42 bytes) for connection 6d28e506303975f45e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 000000000000000469af1a5762cbcf1f55415e4d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:42 client Connection 6d28e506303975f45e closed. 2025/04/30 10:10:42 Requesting https://server4:443/nltvpkhobr. 2025/04/30 10:10:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:42 Increased send buffer size to 14336 kiB 2025/04/30 10:10:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:42 Created qlog file: /logs/qlog/4525bc7c3f686de33d.sqlog 2025/04/30 10:10:42 client Starting new connection to server4 ([::]:57257 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4525bc7c3f686de33d, version v1 2025/04/30 10:10:42 Adding connection ID (empty). 2025/04/30 10:10:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:42 client -> Sending packet 0 (1280 bytes) for connection 4525bc7c3f686de33d, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 4525bc7c3f686de33d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:42 client -> Sending packet 1 (1280 bytes) for connection 4525bc7c3f686de33d, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 4525bc7c3f686de33d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:42 client -> Sending packet 2 (1280 bytes) for connection 4525bc7c3f686de33d, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 4525bc7c3f686de33d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:42 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000049032d0b5493164c7e976f88b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:42 client Received first packet. Switching destination connection ID to: 00000000000000049032d0b5493164c7e976f88b 2025/04/30 10:10:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:42 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000049032d0b5493164c7e976f88b, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:10:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4525bc7c3f686de33d, InitialSourceConnectionID: 00000000000000049032d0b5493164c7e976f88b, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xd5cd5312769412310b45c20e7a5c8ffa} 2025/04/30 10:10:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4525bc7c3f686de33d 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: 00000000000000049032d0b5493164c7e976f88b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 00000000000000049032d0b5493164c7e976f88b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:42 client Dropping Initial keys. 2025/04/30 10:10:42 client -> Sending packet 1 (52 bytes) for connection 4525bc7c3f686de33d, Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 00000000000000049032d0b5493164c7e976f88b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client -> Sending packet 0 (58 bytes) for connection 4525bc7c3f686de33d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 00000000000000049032d0b5493164c7e976f88b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:42 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:10:42 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:42 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000049032d0b5493164c7e976f88b, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:10:42 client -> Sending packet 2 (52 bytes) for connection 4525bc7c3f686de33d, Handshake 2025/04/30 10:10:42 client Long Header{Type: Handshake, DestConnectionID: 00000000000000049032d0b5493164c7e976f88b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:42 client Dropping Handshake keys. 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000045367d277f0307b74c4128fe0, StatelessResetToken: 0xc1fff73543e44e5cb6bca42601b218b5} 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000046c858165bf0e4313a92c7b92, StatelessResetToken: 0x4d7322bcb1faaae31721aa4cec173b47} 2025/04/30 10:10:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000041fa370a31a1effdd315c2e49, StatelessResetToken: 0x096234aac73918b32da32017ba96d174} 2025/04/30 10:10:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:42 client -> Sending packet 1 (1366 bytes) for connection 4525bc7c3f686de33d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 00000000000000045367d277f0307b74c4128fe0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.PingFrame{} 2025/04/30 10:10:42 client -> Sending packet 2 (46 bytes) for connection 4525bc7c3f686de33d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 00000000000000045367d277f0307b74c4128fe0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 183.265µs} 2025/04/30 10:10:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:42 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:42 client newly acked packets (1): [0] 2025/04/30 10:10:42 client updated RTT: 33.59276ms (σ: 16.79638ms) 2025/04/30 10:10:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:42 client -> Sending packet 3 (42 bytes) for connection 4525bc7c3f686de33d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:42 client Short Header{DestConnectionID: 00000000000000045367d277f0307b74c4128fe0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:42 client Connection 4525bc7c3f686de33d closed. 2025/04/30 10:10:42 Requesting https://server4:443/ntttwggxdm. 2025/04/30 10:10:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:42 Increased send buffer size to 14336 kiB 2025/04/30 10:10:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:42 Created qlog file: /logs/qlog/b48bb2b85d8b927bdf0dd56cfcb461.sqlog 2025/04/30 10:10:42 client Starting new connection to server4 ([::]:36275 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b48bb2b85d8b927bdf0dd56cfcb461, version v1 2025/04/30 10:10:42 Adding connection ID (empty). 2025/04/30 10:10:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:42 client -> Sending packet 0 (1280 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, Initial 2025/04/30 10:10:42 client Long Header{Type: Initial, DestConnectionID: b48bb2b85d8b927bdf0dd56cfcb461, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:10:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:10:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:43 client -> Sending packet 1 (1280 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: b48bb2b85d8b927bdf0dd56cfcb461, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:10:43 client -> Sending packet 2 (1280 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: b48bb2b85d8b927bdf0dd56cfcb461, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:10:43 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:10:43 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004278153774c65f148c35b29d3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:10:43 client Received first packet. Switching destination connection ID to: 0000000000000004278153774c65f148c35b29d3 2025/04/30 10:10:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:10:43 client newly acked packets (1): [2] 2025/04/30 10:10:43 client updated RTT: 34.22478ms (σ: 17.11239ms) 2025/04/30 10:10:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:43 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:10:43 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:10:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004278153774c65f148c35b29d3, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:10:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b48bb2b85d8b927bdf0dd56cfcb461, InitialSourceConnectionID: 0000000000000004278153774c65f148c35b29d3, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xa841373ad0bd74b9f11e7dcfe47f1bd0} 2025/04/30 10:10:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: 0000000000000004278153774c65f148c35b29d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:43 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004278153774c65f148c35b29d3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:43 client Dropping Initial keys. 2025/04/30 10:10:43 client -> Sending packet 1 (52 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, Handshake 2025/04/30 10:10:43 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004278153774c65f148c35b29d3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:43 client -> Sending packet 0 (58 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 0000000000000004278153774c65f148c35b29d3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:43 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:43 client Dropping Handshake keys. 2025/04/30 10:10:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000044caf56377b237079ee8d0572, StatelessResetToken: 0xbe9848fe0134372562c34cf3cac8b28d} 2025/04/30 10:10:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004db44dcc7f7c63df689076b74, StatelessResetToken: 0x1c39cd00ac545731f3f6a9c3d06db4ba} 2025/04/30 10:10:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000042e0bac6c02daa47ba1e45d72, StatelessResetToken: 0x7541b40dede885e573c3961841f7f6f3} 2025/04/30 10:10:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:43 client -> Sending packet 1 (46 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 00000000000000044caf56377b237079ee8d0572, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 161.263µs} 2025/04/30 10:10:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:43 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:43 client newly acked packets (2): [0 1] 2025/04/30 10:10:43 client updated RTT: 33.829ms (σ: 13.624ms) 2025/04/30 10:10:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:43 client Canceling loss detection timer. 2025/04/30 10:10:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000048e39cd428550ae4edea8e201, StatelessResetToken: 0xec4a8e72e9bc203110894c13736787ef} 2025/04/30 10:10:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:43 client Ignoring all packets below 1. 2025/04/30 10:10:43 client -> Sending packet 2 (44 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 00000000000000044caf56377b237079ee8d0572, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 126.317µs} 2025/04/30 10:10:43 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:43 client <- &wire.PingFrame{} 2025/04/30 10:10:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:43 client -> Sending packet 3 (46 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 00000000000000044caf56377b237079ee8d0572, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 85.571µs} 2025/04/30 10:10:43 client <- Reading packet 5 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:43 client -> Sending packet 4 (42 bytes) for connection b48bb2b85d8b927bdf0dd56cfcb461, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 00000000000000044caf56377b237079ee8d0572, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:43 client Connection b48bb2b85d8b927bdf0dd56cfcb461 closed. 2025/04/30 10:10:43 Requesting https://server4:443/zxjofyguih. 2025/04/30 10:10:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:43 Increased send buffer size to 14336 kiB 2025/04/30 10:10:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:43 Created qlog file: /logs/qlog/2ba63ca03e18521cc3d5e966de3f.sqlog 2025/04/30 10:10:43 client Starting new connection to server4 ([::]:49718 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2ba63ca03e18521cc3d5e966de3f, version v1 2025/04/30 10:10:43 Adding connection ID (empty). 2025/04/30 10:10:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:43 client -> Sending packet 0 (1280 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: 2ba63ca03e18521cc3d5e966de3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:43 client -> Sending packet 1 (1280 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: 2ba63ca03e18521cc3d5e966de3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:43 client -> Sending packet 2 (1280 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: 2ba63ca03e18521cc3d5e966de3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:43 client -> Sending packet 3 (1280 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: 2ba63ca03e18521cc3d5e966de3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:43 client -> Sending packet 4 (1280 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: 2ba63ca03e18521cc3d5e966de3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:43 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:43 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c50a966e335482f575c2ab10, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:43 client Received first packet. Switching destination connection ID to: 0000000000000004c50a966e335482f575c2ab10 2025/04/30 10:10:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:10:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:43 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:43 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c50a966e335482f575c2ab10, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2ba63ca03e18521cc3d5e966de3f, InitialSourceConnectionID: 0000000000000004c50a966e335482f575c2ab10, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf9135c3c9eae415db3000246071fcb50} 2025/04/30 10:10:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2ba63ca03e18521cc3d5e966de3f 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: 0000000000000004c50a966e335482f575c2ab10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:43 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c50a966e335482f575c2ab10, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:43 client Dropping Initial keys. 2025/04/30 10:10:43 client -> Sending packet 1 (52 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, Handshake 2025/04/30 10:10:43 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c50a966e335482f575c2ab10, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:43 client -> Sending packet 0 (58 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 0000000000000004c50a966e335482f575c2ab10, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:43 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:43 client Dropping Handshake keys. 2025/04/30 10:10:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000044fa7f5aee4ecdaec561da08d, StatelessResetToken: 0x3e3c3edbaa35e7254be61e156b743f4c} 2025/04/30 10:10:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004c1fd0e01a75cb3ed51255533, StatelessResetToken: 0x9591e55894c31c937b296aeb11c68def} 2025/04/30 10:10:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000000472d58f2bae34550d47074b6d, StatelessResetToken: 0x6d582890546ce51a8a721e8bdffe1dba} 2025/04/30 10:10:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:43 client -> Sending packet 1 (1366 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 00000000000000044fa7f5aee4ecdaec561da08d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.PingFrame{} 2025/04/30 10:10:43 client -> Sending packet 2 (46 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 00000000000000044fa7f5aee4ecdaec561da08d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 136.146µs} 2025/04/30 10:10:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:43 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:43 client newly acked packets (3): [0 1 2] 2025/04/30 10:10:43 client updated RTT: 32.134652ms (σ: 16.067326ms) 2025/04/30 10:10:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:43 client Canceling loss detection timer. 2025/04/30 10:10:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000000004d02c15d90142134ee2353544, StatelessResetToken: 0x1d4879b3e7d17a94dc8dae0bc3790e20} 2025/04/30 10:10:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:43 client Ignoring all packets below 1. 2025/04/30 10:10:43 client -> Sending packet 3 (44 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 00000000000000044fa7f5aee4ecdaec561da08d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 97.704µs} 2025/04/30 10:10:43 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:10:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:43 client -> Sending packet 4 (42 bytes) for connection 2ba63ca03e18521cc3d5e966de3f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:43 client Short Header{DestConnectionID: 00000000000000044fa7f5aee4ecdaec561da08d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:43 client Connection 2ba63ca03e18521cc3d5e966de3f closed. 2025/04/30 10:10:43 Requesting https://server4:443/ojvmmuwzzu. 2025/04/30 10:10:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:43 Increased send buffer size to 14336 kiB 2025/04/30 10:10:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:43 Created qlog file: /logs/qlog/cbee96d1c4fb18c10e3733159b8576ea.sqlog 2025/04/30 10:10:43 client Starting new connection to server4 ([::]:45391 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cbee96d1c4fb18c10e3733159b8576ea, version v1 2025/04/30 10:10:43 Adding connection ID (empty). 2025/04/30 10:10:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:43 client -> Sending packet 0 (1280 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, Initial 2025/04/30 10:10:43 client Long Header{Type: Initial, DestConnectionID: cbee96d1c4fb18c10e3733159b8576ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:44 client -> Sending packet 1 (1280 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: cbee96d1c4fb18c10e3733159b8576ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:44 client -> Sending packet 2 (1280 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: cbee96d1c4fb18c10e3733159b8576ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:44 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:44 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000000460e82a9086f987a85f48cef4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:44 client Received first packet. Switching destination connection ID to: 000000000000000460e82a9086f987a85f48cef4 2025/04/30 10:10:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:44 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:44 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000460e82a9086f987a85f48cef4, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cbee96d1c4fb18c10e3733159b8576ea, InitialSourceConnectionID: 000000000000000460e82a9086f987a85f48cef4, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x40666926b07ddf126eb5e33c49f40d82} 2025/04/30 10:10:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: 000000000000000460e82a9086f987a85f48cef4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:44 client Long Header{Type: Handshake, DestConnectionID: 000000000000000460e82a9086f987a85f48cef4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:44 client Dropping Initial keys. 2025/04/30 10:10:44 client -> Sending packet 1 (52 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, Handshake 2025/04/30 10:10:44 client Long Header{Type: Handshake, DestConnectionID: 000000000000000460e82a9086f987a85f48cef4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:44 client -> Sending packet 0 (58 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:44 client Short Header{DestConnectionID: 000000000000000460e82a9086f987a85f48cef4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:44 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:44 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:10:44 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:44 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000460e82a9086f987a85f48cef4, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:44 client -> Sending packet 2 (52 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, Handshake 2025/04/30 10:10:44 client Long Header{Type: Handshake, DestConnectionID: 000000000000000460e82a9086f987a85f48cef4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:44 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:44 client Dropping Handshake keys. 2025/04/30 10:10:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000046c5d625effec2f5e5b161b9b, StatelessResetToken: 0xd03ab6624d3c4892d012b2a8e2cc3710} 2025/04/30 10:10:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004f7c69905bb4581daaf1ba205, StatelessResetToken: 0xb3f1de28d3fa643361a0d8cc3b937b51} 2025/04/30 10:10:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000000042ff9a611847a86f1a1171221, StatelessResetToken: 0xe70ee85e4ed305ab4a2849636b6b67f8} 2025/04/30 10:10:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:44 client -> Sending packet 1 (1366 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:44 client Short Header{DestConnectionID: 00000000000000046c5d625effec2f5e5b161b9b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.PingFrame{} 2025/04/30 10:10:44 client -> Sending packet 2 (46 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:44 client Short Header{DestConnectionID: 00000000000000046c5d625effec2f5e5b161b9b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 140.634µs} 2025/04/30 10:10:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:44 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:44 client newly acked packets (1): [0] 2025/04/30 10:10:44 client updated RTT: 33.944463ms (σ: 16.972231ms) 2025/04/30 10:10:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:44 client -> Sending packet 3 (42 bytes) for connection cbee96d1c4fb18c10e3733159b8576ea, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:44 client Short Header{DestConnectionID: 00000000000000046c5d625effec2f5e5b161b9b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:44 client Connection cbee96d1c4fb18c10e3733159b8576ea closed. 2025/04/30 10:10:44 Requesting https://server4:443/ypkiptamlf. 2025/04/30 10:10:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:44 Increased send buffer size to 14336 kiB 2025/04/30 10:10:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:44 Created qlog file: /logs/qlog/114357aa29b80e1d6d82b9377af6.sqlog 2025/04/30 10:10:44 client Starting new connection to server4 ([::]:43210 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 114357aa29b80e1d6d82b9377af6, version v1 2025/04/30 10:10:44 Adding connection ID (empty). 2025/04/30 10:10:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:44 client -> Sending packet 0 (1280 bytes) for connection 114357aa29b80e1d6d82b9377af6, Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: 114357aa29b80e1d6d82b9377af6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:44 client -> Sending packet 1 (1280 bytes) for connection 114357aa29b80e1d6d82b9377af6, Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: 114357aa29b80e1d6d82b9377af6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:44 client -> Sending packet 2 (1280 bytes) for connection 114357aa29b80e1d6d82b9377af6, Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: 114357aa29b80e1d6d82b9377af6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:44 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:44 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004985815fe0536be8d892f90d6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:44 client Received first packet. Switching destination connection ID to: 0000000000000004985815fe0536be8d892f90d6 2025/04/30 10:10:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:44 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:44 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004985815fe0536be8d892f90d6, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:10:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 114357aa29b80e1d6d82b9377af6, InitialSourceConnectionID: 0000000000000004985815fe0536be8d892f90d6, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5b4f12b0fcd21b4884a6cb6843595613} 2025/04/30 10:10:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 114357aa29b80e1d6d82b9377af6 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: 0000000000000004985815fe0536be8d892f90d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:44 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004985815fe0536be8d892f90d6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:44 client Dropping Initial keys. 2025/04/30 10:10:44 client -> Sending packet 1 (110 bytes) for connection 114357aa29b80e1d6d82b9377af6, Handshake 2025/04/30 10:10:44 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004985815fe0536be8d892f90d6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:44 client Short Header{DestConnectionID: 0000000000000004985815fe0536be8d892f90d6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:44 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:44 client Dropping Handshake keys. 2025/04/30 10:10:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004414f41f543df485e066b29eb, StatelessResetToken: 0x4de119639e5f74a4b2d35c258b5f6233} 2025/04/30 10:10:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004f106bdefd1bca981d130dc3b, StatelessResetToken: 0x24efb1f7d2070e346c97cf5c9d34d912} 2025/04/30 10:10:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000000482777f53321252300affe0e9, StatelessResetToken: 0xcae339f62d9ad01f3cedb9ec40fc6d82} 2025/04/30 10:10:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:44 client -> Sending packet 1 (1366 bytes) for connection 114357aa29b80e1d6d82b9377af6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:44 client Short Header{DestConnectionID: 0000000000000004414f41f543df485e066b29eb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.PingFrame{} 2025/04/30 10:10:44 client -> Sending packet 2 (46 bytes) for connection 114357aa29b80e1d6d82b9377af6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:44 client Short Header{DestConnectionID: 0000000000000004414f41f543df485e066b29eb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 157.506µs} 2025/04/30 10:10:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:44 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:44 client newly acked packets (3): [0 1 2] 2025/04/30 10:10:44 client updated RTT: 32.242117ms (σ: 16.121058ms) 2025/04/30 10:10:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:44 client Canceling loss detection timer. 2025/04/30 10:10:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000000004c0a40f852d51fe2ecc668310, StatelessResetToken: 0x1283a99d844b009e8d55aa76c2bca5ad} 2025/04/30 10:10:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:44 client Ignoring all packets below 1. 2025/04/30 10:10:44 client -> Sending packet 3 (44 bytes) for connection 114357aa29b80e1d6d82b9377af6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:44 client Short Header{DestConnectionID: 0000000000000004414f41f543df485e066b29eb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 132.289µs} 2025/04/30 10:10:44 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:44 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:10:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:44 client -> Sending packet 4 (42 bytes) for connection 114357aa29b80e1d6d82b9377af6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:44 client Short Header{DestConnectionID: 0000000000000004414f41f543df485e066b29eb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:44 client Connection 114357aa29b80e1d6d82b9377af6 closed. 2025/04/30 10:10:44 Requesting https://server4:443/yjzlmzfike. 2025/04/30 10:10:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:44 Increased send buffer size to 14336 kiB 2025/04/30 10:10:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:44 Created qlog file: /logs/qlog/6a1dfd5cd87b57bd83073de2ef387600f9b6f5.sqlog 2025/04/30 10:10:44 client Starting new connection to server4 ([::]:38927 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, version v1 2025/04/30 10:10:44 Adding connection ID (empty). 2025/04/30 10:10:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:44 client -> Sending packet 0 (1280 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:10:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:44 client -> Sending packet 1 (1280 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:10:44 client -> Sending packet 2 (1280 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, Initial 2025/04/30 10:10:44 client Long Header{Type: Initial, DestConnectionID: 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:10:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:45 client -> Sending packet 3 (1280 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:10:45 client -> Sending packet 4 (1280 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:10:45 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:10:45 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c94a00f026795f49986bebe6, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:10:45 client Received first packet. Switching destination connection ID to: 0000000000000004c94a00f026795f49986bebe6 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:10:45 client newly acked packets (1): [4] 2025/04/30 10:10:45 client updated RTT: 34.041406ms (σ: 17.020703ms) 2025/04/30 10:10:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:10:45 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004c94a00f026795f49986bebe6, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:10:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:10:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, InitialSourceConnectionID: 0000000000000004c94a00f026795f49986bebe6, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf3be02355a9fc44a6d7a95da1bf95b3e} 2025/04/30 10:10:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 0000000000000004c94a00f026795f49986bebe6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c94a00f026795f49986bebe6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:45 client Dropping Initial keys. 2025/04/30 10:10:45 client -> Sending packet 1 (110 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, Handshake 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004c94a00f026795f49986bebe6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:45 client Short Header{DestConnectionID: 0000000000000004c94a00f026795f49986bebe6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:45 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:45 client Dropping Handshake keys. 2025/04/30 10:10:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000000464da64d4e9e4a402776e973c, StatelessResetToken: 0xd254733f99fe72873a16d6ecf222d416} 2025/04/30 10:10:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004b259304feeedd0ca90fdfd7b, StatelessResetToken: 0xdce751a3807d55356a81a6d7cf5d8b9c} 2025/04/30 10:10:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004cb8ebb470244bb1503073ade, StatelessResetToken: 0x7d8ce3d9b2a021ff4e08e6c98b0badf9} 2025/04/30 10:10:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:45 client -> Sending packet 1 (46 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 000000000000000464da64d4e9e4a402776e973c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 114.355µs} 2025/04/30 10:10:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:45 client -> Sending packet 3 (58 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 000000000000000464da64d4e9e4a402776e973c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:45 client Skipping packet number 2 2025/04/30 10:10:45 client -> Sending packet 4 (41 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 000000000000000464da64d4e9e4a402776e973c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:45 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:45 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:10:45 client newly acked packets (1): [3] 2025/04/30 10:10:45 client updated RTT: 33.689ms (σ: 13.469ms) 2025/04/30 10:10:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:45 client <- Reading packet 8 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:45 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:45 client <- &wire.PingFrame{} 2025/04/30 10:10:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:45 client -> Sending packet 5 (1366 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 000000000000000464da64d4e9e4a402776e973c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.PingFrame{} 2025/04/30 10:10:45 client -> Sending packet 6 (48 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 000000000000000464da64d4e9e4a402776e973c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 162.463µs} 2025/04/30 10:10:45 client <- Reading packet 9 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:45 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:10:45 client newly acked packets (2): [4 5] 2025/04/30 10:10:45 client Canceling loss detection timer. 2025/04/30 10:10:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000000473ff77f69f2fda3d337a3ab4, StatelessResetToken: 0x5e4073897d0e0cd3dd876cc5895db7a8} 2025/04/30 10:10:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:45 client -> Sending packet 7 (42 bytes) for connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 000000000000000464da64d4e9e4a402776e973c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:45 client Connection 6a1dfd5cd87b57bd83073de2ef387600f9b6f5 closed. 2025/04/30 10:10:45 Requesting https://server4:443/iyssjylicy. 2025/04/30 10:10:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:45 Increased send buffer size to 14336 kiB 2025/04/30 10:10:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:45 Created qlog file: /logs/qlog/aeb1e5cb6d0614bce9.sqlog 2025/04/30 10:10:45 client Starting new connection to server4 ([::]:40665 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aeb1e5cb6d0614bce9, version v1 2025/04/30 10:10:45 Adding connection ID (empty). 2025/04/30 10:10:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:45 client -> Sending packet 0 (1280 bytes) for connection aeb1e5cb6d0614bce9, Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: aeb1e5cb6d0614bce9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:10:45 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:45 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f60d517a444cba1195bb90d8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:45 client Received first packet. Switching destination connection ID to: 0000000000000004f60d517a444cba1195bb90d8 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client newly acked packets (1): [0] 2025/04/30 10:10:45 client updated RTT: 33.919817ms (σ: 16.959908ms) 2025/04/30 10:10:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:45 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f60d517a444cba1195bb90d8, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:10:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aeb1e5cb6d0614bce9, InitialSourceConnectionID: 0000000000000004f60d517a444cba1195bb90d8, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5777a26034cefb5c646c74ecfc7367d5} 2025/04/30 10:10:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection aeb1e5cb6d0614bce9 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 0000000000000004f60d517a444cba1195bb90d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f60d517a444cba1195bb90d8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:45 client Dropping Initial keys. 2025/04/30 10:10:45 client -> Sending packet 1 (52 bytes) for connection aeb1e5cb6d0614bce9, Handshake 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f60d517a444cba1195bb90d8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client -> Sending packet 0 (58 bytes) for connection aeb1e5cb6d0614bce9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 0000000000000004f60d517a444cba1195bb90d8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:45 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:45 client Dropping Handshake keys. 2025/04/30 10:10:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004f85b2098739a8abfaff4d5ea, StatelessResetToken: 0xaaad5bb8fbf78a4e2c8e64cb787f14ab} 2025/04/30 10:10:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004cb437a5091e1920fbe77e7f7, StatelessResetToken: 0x3ae8bf43eaaa3578437ae0b32576d32c} 2025/04/30 10:10:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004a1697edbb51e29228fcd1402, StatelessResetToken: 0x377927e0fd46f97aba7bc7a93c971d9b} 2025/04/30 10:10:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:45 client -> Sending packet 1 (46 bytes) for connection aeb1e5cb6d0614bce9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 0000000000000004f85b2098739a8abfaff4d5ea, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 158.538µs} 2025/04/30 10:10:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:45 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client newly acked packets (1): [0] 2025/04/30 10:10:45 client updated RTT: 33.937ms (σ: 12.755ms) 2025/04/30 10:10:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:45 client -> Sending packet 2 (42 bytes) for connection aeb1e5cb6d0614bce9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 0000000000000004f85b2098739a8abfaff4d5ea, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:45 client Connection aeb1e5cb6d0614bce9 closed. 2025/04/30 10:10:45 Requesting https://server4:443/jboaaaczau. 2025/04/30 10:10:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:45 Increased send buffer size to 14336 kiB 2025/04/30 10:10:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:45 Created qlog file: /logs/qlog/1edb658b8461f680a7d1c0.sqlog 2025/04/30 10:10:45 client Starting new connection to server4 ([::]:44949 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1edb658b8461f680a7d1c0, version v1 2025/04/30 10:10:45 Adding connection ID (empty). 2025/04/30 10:10:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:45 client -> Sending packet 0 (1280 bytes) for connection 1edb658b8461f680a7d1c0, Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 1edb658b8461f680a7d1c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:10:45 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:45 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000044567f21c1ae4164065157f90, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:45 client Received first packet. Switching destination connection ID to: 00000000000000044567f21c1ae4164065157f90 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client newly acked packets (1): [0] 2025/04/30 10:10:45 client updated RTT: 33.973369ms (σ: 16.986684ms) 2025/04/30 10:10:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:45 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000044567f21c1ae4164065157f90, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1edb658b8461f680a7d1c0, InitialSourceConnectionID: 00000000000000044567f21c1ae4164065157f90, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf3d7c323664acfd3ed7558645f3f0cfa} 2025/04/30 10:10:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1edb658b8461f680a7d1c0 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 00000000000000044567f21c1ae4164065157f90, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044567f21c1ae4164065157f90, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:45 client Dropping Initial keys. 2025/04/30 10:10:45 client -> Sending packet 1 (52 bytes) for connection 1edb658b8461f680a7d1c0, Handshake 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044567f21c1ae4164065157f90, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client -> Sending packet 0 (58 bytes) for connection 1edb658b8461f680a7d1c0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 00000000000000044567f21c1ae4164065157f90, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:45 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client Peer doesn't await address validation any longer. 2025/04/30 10:10:45 client newly acked packets (1): [0] 2025/04/30 10:10:45 client updated RTT: 33.917ms (σ: 12.85ms) 2025/04/30 10:10:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:45 client Canceling loss detection timer. 2025/04/30 10:10:45 client Dropping Handshake keys. 2025/04/30 10:10:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:45 client -> Sending packet 1 (44 bytes) for connection 1edb658b8461f680a7d1c0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 00000000000000044567f21c1ae4164065157f90, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 101.942µs} 2025/04/30 10:10:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:45 client -> Sending packet 2 (42 bytes) for connection 1edb658b8461f680a7d1c0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 00000000000000044567f21c1ae4164065157f90, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:45 client Connection 1edb658b8461f680a7d1c0 closed. 2025/04/30 10:10:45 Requesting https://server4:443/sfrklvztad. 2025/04/30 10:10:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:45 Increased send buffer size to 14336 kiB 2025/04/30 10:10:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:45 Created qlog file: /logs/qlog/67b8a607354d4f3b97440ffa6c423c7eee8fb9.sqlog 2025/04/30 10:10:45 client Starting new connection to server4 ([::]:49547 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 67b8a607354d4f3b97440ffa6c423c7eee8fb9, version v1 2025/04/30 10:10:45 Adding connection ID (empty). 2025/04/30 10:10:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:45 client -> Sending packet 0 (1280 bytes) for connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9, Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 67b8a607354d4f3b97440ffa6c423c7eee8fb9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:45 client -> Sending packet 1 (1280 bytes) for connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9, Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 67b8a607354d4f3b97440ffa6c423c7eee8fb9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:45 client -> Sending packet 2 (1280 bytes) for connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9, Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 67b8a607354d4f3b97440ffa6c423c7eee8fb9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:45 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:45 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004032fa2b1db97610d086bea24, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:45 client Received first packet. Switching destination connection ID to: 0000000000000004032fa2b1db97610d086bea24 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:45 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004032fa2b1db97610d086bea24, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:10:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 67b8a607354d4f3b97440ffa6c423c7eee8fb9, InitialSourceConnectionID: 0000000000000004032fa2b1db97610d086bea24, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xcbbe275661e7b460dd87ae38a47b3997} 2025/04/30 10:10:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 0000000000000004032fa2b1db97610d086bea24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004032fa2b1db97610d086bea24, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:45 client Dropping Initial keys. 2025/04/30 10:10:45 client -> Sending packet 1 (52 bytes) for connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9, Handshake 2025/04/30 10:10:45 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004032fa2b1db97610d086bea24, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:45 client -> Sending packet 0 (58 bytes) for connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 0000000000000004032fa2b1db97610d086bea24, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:45 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:45 client Peer doesn't await address validation any longer. 2025/04/30 10:10:45 client newly acked packets (1): [0] 2025/04/30 10:10:45 client updated RTT: 33.803558ms (σ: 16.901779ms) 2025/04/30 10:10:45 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:45 client Canceling loss detection timer. 2025/04/30 10:10:45 client Dropping Handshake keys. 2025/04/30 10:10:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:45 client -> Sending packet 1 (44 bytes) for connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 0000000000000004032fa2b1db97610d086bea24, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 106.5µs} 2025/04/30 10:10:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:45 client -> Sending packet 2 (42 bytes) for connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:45 client Short Header{DestConnectionID: 0000000000000004032fa2b1db97610d086bea24, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:45 client Connection 67b8a607354d4f3b97440ffa6c423c7eee8fb9 closed. 2025/04/30 10:10:45 Requesting https://server4:443/tuseiykcwf. 2025/04/30 10:10:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:45 Increased send buffer size to 14336 kiB 2025/04/30 10:10:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:45 Created qlog file: /logs/qlog/849ca5157834527a7a5268.sqlog 2025/04/30 10:10:45 client Starting new connection to server4 ([::]:43662 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 849ca5157834527a7a5268, version v1 2025/04/30 10:10:45 Adding connection ID (empty). 2025/04/30 10:10:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:45 client -> Sending packet 0 (1280 bytes) for connection 849ca5157834527a7a5268, Initial 2025/04/30 10:10:45 client Long Header{Type: Initial, DestConnectionID: 849ca5157834527a7a5268, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:46 client -> Sending packet 1 (1280 bytes) for connection 849ca5157834527a7a5268, Initial 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: 849ca5157834527a7a5268, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:46 client -> Sending packet 2 (1280 bytes) for connection 849ca5157834527a7a5268, Initial 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: 849ca5157834527a7a5268, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:46 client -> Sending packet 3 (1280 bytes) for connection 849ca5157834527a7a5268, Initial 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: 849ca5157834527a7a5268, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:46 client -> Sending packet 4 (1280 bytes) for connection 849ca5157834527a7a5268, Initial 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: 849ca5157834527a7a5268, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:10:46 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:46 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:46 client Received first packet. Switching destination connection ID to: 0000000000000004472ba80e8e3891be89b3eb0f 2025/04/30 10:10:46 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:10:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:46 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:46 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 849ca5157834527a7a5268, InitialSourceConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5ae796a3be6a30c9418ffa4d114f5ec8} 2025/04/30 10:10:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 849ca5157834527a7a5268 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:46 client Dropping Initial keys. 2025/04/30 10:10:46 client -> Sending packet 1 (52 bytes) for connection 849ca5157834527a7a5268, Handshake 2025/04/30 10:10:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:46 client -> Sending packet 0 (58 bytes) for connection 849ca5157834527a7a5268, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:46 client Short Header{DestConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:46 client -> Sending packet 2 (86 bytes) for connection 849ca5157834527a7a5268, Handshake 2025/04/30 10:10:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:46 client -> Sending packet 3 (86 bytes) for connection 849ca5157834527a7a5268, Handshake 2025/04/30 10:10:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004472ba80e8e3891be89b3eb0f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:46 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:46 client Dropping Handshake keys. 2025/04/30 10:10:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004dce554ae7c2c0e59346b9521, StatelessResetToken: 0xcb1b5415622d251cd4c9783178fa28ca} 2025/04/30 10:10:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000043c18ce9e24cb22e91fda2d34, StatelessResetToken: 0x1960028f9e316fb21996cf05fab9442c} 2025/04/30 10:10:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004c39b454c62dc32062764d6f8, StatelessResetToken: 0x2cf74539d9e00d9aa905d3b63cd1b260} 2025/04/30 10:10:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:46 client -> Sending packet 2 (65 bytes) for connection 849ca5157834527a7a5268, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:46 client Short Header{DestConnectionID: 0000000000000004dce554ae7c2c0e59346b9521, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 137.418µs} 2025/04/30 10:10:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:46 client -> Sending packet 3 (60 bytes) for connection 849ca5157834527a7a5268, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:46 client Short Header{DestConnectionID: 0000000000000004dce554ae7c2c0e59346b9521, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:46 client -> Sending packet 4 (1366 bytes) for connection 849ca5157834527a7a5268, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:46 client Short Header{DestConnectionID: 0000000000000004dce554ae7c2c0e59346b9521, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:46 client -> &wire.PingFrame{} 2025/04/30 10:10:46 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000000004b0f0d5d8af2c9fc7d28a1a4a, StatelessResetToken: 0x4a0da1f1a5e6e44ec297111fb2d1865f} 2025/04/30 10:10:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:46 client <- Reading packet 2 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:46 client newly acked packets (2): [3 4] 2025/04/30 10:10:46 client updated RTT: 32.620809ms (σ: 16.310404ms) 2025/04/30 10:10:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:46 client Canceling loss detection timer. 2025/04/30 10:10:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:46 client -> Sending packet 5 (42 bytes) for connection 849ca5157834527a7a5268, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:46 client Short Header{DestConnectionID: 0000000000000004dce554ae7c2c0e59346b9521, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:46 client Connection 849ca5157834527a7a5268 closed. 2025/04/30 10:10:46 Requesting https://server4:443/tevhemubqn. 2025/04/30 10:10:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:46 Increased send buffer size to 14336 kiB 2025/04/30 10:10:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:46 Created qlog file: /logs/qlog/412cb5ad7e643e7845268b8fb337a916e9a9e7.sqlog 2025/04/30 10:10:46 client Starting new connection to server4 ([::]:37690 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 412cb5ad7e643e7845268b8fb337a916e9a9e7, version v1 2025/04/30 10:10:46 Adding connection ID (empty). 2025/04/30 10:10:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:46 client -> Sending packet 0 (1280 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7, Initial 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: 412cb5ad7e643e7845268b8fb337a916e9a9e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:10:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:46 client -> Sending packet 1 (1280 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7, Initial 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: 412cb5ad7e643e7845268b8fb337a916e9a9e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:10:46 client -> Sending packet 2 (1280 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7, Initial 2025/04/30 10:10:46 client Long Header{Type: Initial, DestConnectionID: 412cb5ad7e643e7845268b8fb337a916e9a9e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:10:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:10:47 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:47 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000000463bf12eaf4a914fb524a29c2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:47 client Received first packet. Switching destination connection ID to: 000000000000000463bf12eaf4a914fb524a29c2 2025/04/30 10:10:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:47 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000463bf12eaf4a914fb524a29c2, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:10:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 412cb5ad7e643e7845268b8fb337a916e9a9e7, InitialSourceConnectionID: 000000000000000463bf12eaf4a914fb524a29c2, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x84e93aec07fd59f5421553fefd40e7b3} 2025/04/30 10:10:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 000000000000000463bf12eaf4a914fb524a29c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: 000000000000000463bf12eaf4a914fb524a29c2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:47 client Dropping Initial keys. 2025/04/30 10:10:47 client -> Sending packet 1 (52 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7, Handshake 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: 000000000000000463bf12eaf4a914fb524a29c2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:47 client -> Sending packet 0 (58 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 000000000000000463bf12eaf4a914fb524a29c2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:47 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:47 client Dropping Handshake keys. 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004739fcba55f9994ca35027ff0, StatelessResetToken: 0x1d7001b22129999801e0ccf0794eb60e} 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004ffeebeefb58d6e4483a0e61d, StatelessResetToken: 0xc3f388adc75b74d1d982143de9c4168b} 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000000407889c6ba44d495208dc5e1f, StatelessResetToken: 0x05971009c7b9330b879fa5134fcbc335} 2025/04/30 10:10:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:47 client -> Sending packet 1 (1366 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 0000000000000004739fcba55f9994ca35027ff0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.PingFrame{} 2025/04/30 10:10:47 client -> Sending packet 2 (46 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 0000000000000004739fcba55f9994ca35027ff0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 137.548µs} 2025/04/30 10:10:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:47 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:47 client newly acked packets (1): [0] 2025/04/30 10:10:47 client updated RTT: 33.856432ms (σ: 16.928216ms) 2025/04/30 10:10:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:47 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:47 client -> Sending packet 3 (42 bytes) for connection 412cb5ad7e643e7845268b8fb337a916e9a9e7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 0000000000000004739fcba55f9994ca35027ff0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:47 client Connection 412cb5ad7e643e7845268b8fb337a916e9a9e7 closed. 2025/04/30 10:10:47 Requesting https://server4:443/xhqycphfrr. 2025/04/30 10:10:47 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:47 Increased send buffer size to 14336 kiB 2025/04/30 10:10:47 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:47 Created qlog file: /logs/qlog/05c794297b5c399fb3f9.sqlog 2025/04/30 10:10:47 client Starting new connection to server4 ([::]:40263 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 05c794297b5c399fb3f9, version v1 2025/04/30 10:10:47 Adding connection ID (empty). 2025/04/30 10:10:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:47 client -> Sending packet 0 (1280 bytes) for connection 05c794297b5c399fb3f9, Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 05c794297b5c399fb3f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:10:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:47 client -> Sending packet 1 (1280 bytes) for connection 05c794297b5c399fb3f9, Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 05c794297b5c399fb3f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:10:47 client -> Sending packet 2 (1280 bytes) for connection 05c794297b5c399fb3f9, Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 05c794297b5c399fb3f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:10:47 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:47 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000000419085cb5b7a26db773e6372a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:47 client Received first packet. Switching destination connection ID to: 000000000000000419085cb5b7a26db773e6372a 2025/04/30 10:10:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:47 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000419085cb5b7a26db773e6372a, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:10:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 05c794297b5c399fb3f9, InitialSourceConnectionID: 000000000000000419085cb5b7a26db773e6372a, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xd55fde35314819dd7b964178b86649e8} 2025/04/30 10:10:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 05c794297b5c399fb3f9 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 000000000000000419085cb5b7a26db773e6372a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: 000000000000000419085cb5b7a26db773e6372a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:47 client Dropping Initial keys. 2025/04/30 10:10:47 client -> Sending packet 1 (110 bytes) for connection 05c794297b5c399fb3f9, Handshake 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: 000000000000000419085cb5b7a26db773e6372a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:47 client Short Header{DestConnectionID: 000000000000000419085cb5b7a26db773e6372a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:47 client -> Sending packet 2 (86 bytes) for connection 05c794297b5c399fb3f9, Handshake 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: 000000000000000419085cb5b7a26db773e6372a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:47 client -> Sending packet 3 (86 bytes) for connection 05c794297b5c399fb3f9, Handshake 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: 000000000000000419085cb5b7a26db773e6372a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:47 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:47 client Dropping Handshake keys. 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000045f8a6bd511445f5708df5b7d, StatelessResetToken: 0x1fcae03baef7b452efc70673cc818f80} 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004d55a8ab9401ad5fb3abfc868, StatelessResetToken: 0x9758f37b6670a3523a949e0274e9ed47} 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004878f46337c480a45cdc4f892, StatelessResetToken: 0x4f8377b9e638f53d40a81b994b0e441d} 2025/04/30 10:10:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:47 client -> Sending packet 2 (65 bytes) for connection 05c794297b5c399fb3f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 00000000000000045f8a6bd511445f5708df5b7d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 112.692µs} 2025/04/30 10:10:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:47 client -> Sending packet 3 (60 bytes) for connection 05c794297b5c399fb3f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 00000000000000045f8a6bd511445f5708df5b7d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:47 client -> Sending packet 4 (1366 bytes) for connection 05c794297b5c399fb3f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 00000000000000045f8a6bd511445f5708df5b7d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.PingFrame{} 2025/04/30 10:10:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:47 client <- Reading packet 2 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:47 client newly acked packets (2): [3 4] 2025/04/30 10:10:47 client updated RTT: 32.277003ms (σ: 16.138501ms) 2025/04/30 10:10:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:47 client Canceling loss detection timer. 2025/04/30 10:10:47 client <- Reading packet 3 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:47 client <- &wire.PingFrame{} 2025/04/30 10:10:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:47 client Sending ACK because the ACK timer expired. 2025/04/30 10:10:47 client -> Sending packet 5 (47 bytes) for connection 05c794297b5c399fb3f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 00000000000000045f8a6bd511445f5708df5b7d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.251454ms} 2025/04/30 10:10:47 client <- Reading packet 4 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:47 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000000494069227c58c5084daadd80e, StatelessResetToken: 0x8905e5c4c8a5889040c11dd1f9be41b0} 2025/04/30 10:10:47 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:47 client -> Sending packet 6 (42 bytes) for connection 05c794297b5c399fb3f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 00000000000000045f8a6bd511445f5708df5b7d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:47 client Connection 05c794297b5c399fb3f9 closed. 2025/04/30 10:10:47 Requesting https://server4:443/jsjnimmzia. 2025/04/30 10:10:47 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:47 Increased send buffer size to 14336 kiB 2025/04/30 10:10:47 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:47 Created qlog file: /logs/qlog/109bd9d0d335e9706d5c3695.sqlog 2025/04/30 10:10:47 client Starting new connection to server4 ([::]:33758 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 109bd9d0d335e9706d5c3695, version v1 2025/04/30 10:10:47 Adding connection ID (empty). 2025/04/30 10:10:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:47 client -> Sending packet 0 (1280 bytes) for connection 109bd9d0d335e9706d5c3695, Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 109bd9d0d335e9706d5c3695, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:47 client -> Sending packet 1 (1280 bytes) for connection 109bd9d0d335e9706d5c3695, Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 109bd9d0d335e9706d5c3695, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:47 client -> Sending packet 2 (1280 bytes) for connection 109bd9d0d335e9706d5c3695, Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 109bd9d0d335e9706d5c3695, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:47 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:47 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000040a1718c729acab80a0027ebf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:47 client Received first packet. Switching destination connection ID to: 00000000000000040a1718c729acab80a0027ebf 2025/04/30 10:10:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:47 client newly acked packets (1): [2] 2025/04/30 10:10:47 client updated RTT: 35.195811ms (σ: 17.597905ms) 2025/04/30 10:10:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:47 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000040a1718c729acab80a0027ebf, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 109bd9d0d335e9706d5c3695, InitialSourceConnectionID: 00000000000000040a1718c729acab80a0027ebf, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x467f188d5b77f1ee93c8b59abc3adb5e} 2025/04/30 10:10:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 109bd9d0d335e9706d5c3695 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 00000000000000040a1718c729acab80a0027ebf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: 00000000000000040a1718c729acab80a0027ebf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:47 client Dropping Initial keys. 2025/04/30 10:10:47 client -> Sending packet 1 (52 bytes) for connection 109bd9d0d335e9706d5c3695, Handshake 2025/04/30 10:10:47 client Long Header{Type: Handshake, DestConnectionID: 00000000000000040a1718c729acab80a0027ebf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:47 client -> Sending packet 0 (58 bytes) for connection 109bd9d0d335e9706d5c3695, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 00000000000000040a1718c729acab80a0027ebf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:47 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:47 client Dropping Handshake keys. 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000046276d34e42cef709a19dd140, StatelessResetToken: 0xf56449729949dbf737a365c9d860e98b} 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004724426a638fac46c0524e1e1, StatelessResetToken: 0x9a9408c3370b92eed39562089e0ae822} 2025/04/30 10:10:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004518197f6bd67d61999e02167, StatelessResetToken: 0x9adbce2821af9a252be6cf987dcae888} 2025/04/30 10:10:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:47 client -> Sending packet 1 (46 bytes) for connection 109bd9d0d335e9706d5c3695, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 00000000000000046276d34e42cef709a19dd140, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.923µs} 2025/04/30 10:10:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:47 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:47 client newly acked packets (1): [0] 2025/04/30 10:10:47 client updated RTT: 35.002ms (σ: 13.583ms) 2025/04/30 10:10:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:47 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:47 client -> Sending packet 2 (42 bytes) for connection 109bd9d0d335e9706d5c3695, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:47 client Short Header{DestConnectionID: 00000000000000046276d34e42cef709a19dd140, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:47 client Connection 109bd9d0d335e9706d5c3695 closed. 2025/04/30 10:10:47 Requesting https://server4:443/scoqfulrbu. 2025/04/30 10:10:47 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:47 Increased send buffer size to 14336 kiB 2025/04/30 10:10:47 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:47 Created qlog file: /logs/qlog/66f61c32d320ac3cdd4242.sqlog 2025/04/30 10:10:47 client Starting new connection to server4 ([::]:50867 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 66f61c32d320ac3cdd4242, version v1 2025/04/30 10:10:47 Adding connection ID (empty). 2025/04/30 10:10:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:47 client -> Sending packet 0 (1280 bytes) for connection 66f61c32d320ac3cdd4242, Initial 2025/04/30 10:10:47 client Long Header{Type: Initial, DestConnectionID: 66f61c32d320ac3cdd4242, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:10:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:48 client -> Sending packet 1 (1280 bytes) for connection 66f61c32d320ac3cdd4242, Initial 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: 66f61c32d320ac3cdd4242, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:10:48 client -> Sending packet 2 (1280 bytes) for connection 66f61c32d320ac3cdd4242, Initial 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: 66f61c32d320ac3cdd4242, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:10:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:48 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f778ae619ca1262eddcd4180, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:48 client Received first packet. Switching destination connection ID to: 0000000000000004f778ae619ca1262eddcd4180 2025/04/30 10:10:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:48 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:48 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f778ae619ca1262eddcd4180, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 66f61c32d320ac3cdd4242, InitialSourceConnectionID: 0000000000000004f778ae619ca1262eddcd4180, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x731cabafbedf7b1d204b541abfab7de3} 2025/04/30 10:10:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 66f61c32d320ac3cdd4242 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: 0000000000000004f778ae619ca1262eddcd4180, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f778ae619ca1262eddcd4180, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:48 client Dropping Initial keys. 2025/04/30 10:10:48 client -> Sending packet 1 (110 bytes) for connection 66f61c32d320ac3cdd4242, Handshake 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f778ae619ca1262eddcd4180, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:48 client Short Header{DestConnectionID: 0000000000000004f778ae619ca1262eddcd4180, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:48 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:10:48 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:48 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000000004f778ae619ca1262eddcd4180, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:48 client -> Sending packet 2 (52 bytes) for connection 66f61c32d320ac3cdd4242, Handshake 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f778ae619ca1262eddcd4180, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:10:48 client -> Sending packet 3 (86 bytes) for connection 66f61c32d320ac3cdd4242, Handshake 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f778ae619ca1262eddcd4180, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:48 client -> Sending packet 4 (86 bytes) for connection 66f61c32d320ac3cdd4242, Handshake 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000000004f778ae619ca1262eddcd4180, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:48 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:48 client <- &wire.PingFrame{} 2025/04/30 10:10:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:48 client -> Sending packet 1 (44 bytes) for connection 66f61c32d320ac3cdd4242, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:48 client Short Header{DestConnectionID: 0000000000000004f778ae619ca1262eddcd4180, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 126.278µs} 2025/04/30 10:10:48 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:48 client Dropping Handshake keys. 2025/04/30 10:10:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000000004e7ffb238d3e31521dd5184d7, StatelessResetToken: 0xa5c5b8ce786491f61a2affda3c7f4504} 2025/04/30 10:10:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000000040a5200769edfa7bc97080d11, StatelessResetToken: 0x57c609f28487f9e5d3ee815ef3734fcb} 2025/04/30 10:10:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000000004b832371a49c80160159ed6e7, StatelessResetToken: 0x09fb35b7dce47f08f850fbed0a5225fa} 2025/04/30 10:10:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:48 client -> Sending packet 3 (65 bytes) for connection 66f61c32d320ac3cdd4242, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:48 client Short Header{DestConnectionID: 0000000000000004e7ffb238d3e31521dd5184d7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 99.537µs} 2025/04/30 10:10:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:48 client -> Sending packet 4 (60 bytes) for connection 66f61c32d320ac3cdd4242, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:48 client Short Header{DestConnectionID: 0000000000000004e7ffb238d3e31521dd5184d7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:48 client -> Sending packet 5 (1366 bytes) for connection 66f61c32d320ac3cdd4242, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:48 client Short Header{DestConnectionID: 0000000000000004e7ffb238d3e31521dd5184d7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.PingFrame{} 2025/04/30 10:10:48 client <- Reading packet 3 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000000046b39cabaf443fedb26d88ef3, StatelessResetToken: 0x670eba5adfefe31f79ac4137815a953a} 2025/04/30 10:10:48 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:48 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:48 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:48 client newly acked packets (2): [4 5] 2025/04/30 10:10:48 client updated RTT: 32.644461ms (σ: 16.32223ms) 2025/04/30 10:10:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:48 client Canceling loss detection timer. 2025/04/30 10:10:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:48 client -> Sending packet 6 (42 bytes) for connection 66f61c32d320ac3cdd4242, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:48 client Short Header{DestConnectionID: 0000000000000004e7ffb238d3e31521dd5184d7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:48 client Connection 66f61c32d320ac3cdd4242 closed. 2025/04/30 10:10:48 Requesting https://server4:443/lqhahcsera. 2025/04/30 10:10:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:48 Increased send buffer size to 14336 kiB 2025/04/30 10:10:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:48 Created qlog file: /logs/qlog/d2989d699c0f362502b37ca2c11b.sqlog 2025/04/30 10:10:48 client Starting new connection to server4 ([::]:48178 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d2989d699c0f362502b37ca2c11b, version v1 2025/04/30 10:10:48 Adding connection ID (empty). 2025/04/30 10:10:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:48 client -> Sending packet 0 (1280 bytes) for connection d2989d699c0f362502b37ca2c11b, Initial 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: d2989d699c0f362502b37ca2c11b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:10:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:48 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000000449e1d6624d73dd1fd7162729, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:48 client Received first packet. Switching destination connection ID to: 000000000000000449e1d6624d73dd1fd7162729 2025/04/30 10:10:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:48 client newly acked packets (1): [0] 2025/04/30 10:10:48 client updated RTT: 33.934814ms (σ: 16.967407ms) 2025/04/30 10:10:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:48 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:48 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000000449e1d6624d73dd1fd7162729, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:10:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d2989d699c0f362502b37ca2c11b, InitialSourceConnectionID: 000000000000000449e1d6624d73dd1fd7162729, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x051d95988e5d835fb7de749fe8df38b6} 2025/04/30 10:10:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d2989d699c0f362502b37ca2c11b 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: 000000000000000449e1d6624d73dd1fd7162729, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: 000000000000000449e1d6624d73dd1fd7162729, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:48 client Dropping Initial keys. 2025/04/30 10:10:48 client -> Sending packet 1 (52 bytes) for connection d2989d699c0f362502b37ca2c11b, Handshake 2025/04/30 10:10:48 client Long Header{Type: Handshake, DestConnectionID: 000000000000000449e1d6624d73dd1fd7162729, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:48 client -> Sending packet 0 (58 bytes) for connection d2989d699c0f362502b37ca2c11b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:48 client Short Header{DestConnectionID: 000000000000000449e1d6624d73dd1fd7162729, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:48 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:48 client Dropping Handshake keys. 2025/04/30 10:10:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000000042c50a9f863d1b0913d38f930, StatelessResetToken: 0xe8452cb0aa0a9b2afc486da30783617a} 2025/04/30 10:10:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000000004fce75a5883e557463cb6d23d, StatelessResetToken: 0x246cb4e042521f137e4751f92010a26f} 2025/04/30 10:10:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000000497efa8cf69fb033ca45fa352, StatelessResetToken: 0x51ec82711bb0376bab01f61db0c625c3} 2025/04/30 10:10:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:48 client -> Sending packet 1 (46 bytes) for connection d2989d699c0f362502b37ca2c11b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:48 client Short Header{DestConnectionID: 00000000000000042c50a9f863d1b0913d38f930, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 127.3µs} 2025/04/30 10:10:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:48 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:48 client newly acked packets (1): [0] 2025/04/30 10:10:48 client updated RTT: 33.918ms (σ: 12.756ms) 2025/04/30 10:10:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:48 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:48 client -> Sending packet 2 (42 bytes) for connection d2989d699c0f362502b37ca2c11b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:48 client Short Header{DestConnectionID: 00000000000000042c50a9f863d1b0913d38f930, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:48 client Connection d2989d699c0f362502b37ca2c11b closed. 2025/04/30 10:10:48 Requesting https://server4:443/agocgntdlo. 2025/04/30 10:10:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:48 Increased send buffer size to 14336 kiB 2025/04/30 10:10:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:48 Created qlog file: /logs/qlog/f71d3f06eeb24a6e9d36bafda048ffb69011bb1b.sqlog 2025/04/30 10:10:48 client Starting new connection to server4 ([::]:43314 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, version v1 2025/04/30 10:10:48 Adding connection ID (empty). 2025/04/30 10:10:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:48 client -> Sending packet 0 (1280 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Initial 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:48 client -> Sending packet 1 (1280 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Initial 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:48 client -> Sending packet 2 (1280 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Initial 2025/04/30 10:10:48 client Long Header{Type: Initial, DestConnectionID: f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:49 client -> Sending packet 3 (1280 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Initial 2025/04/30 10:10:49 client Long Header{Type: Initial, DestConnectionID: f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:49 client -> Sending packet 4 (1280 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Initial 2025/04/30 10:10:49 client Long Header{Type: Initial, DestConnectionID: f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:10:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:49 client <- Reading packet 2 (49 bytes) for connection (empty), Initial 2025/04/30 10:10:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:10:49 client Received first packet. Switching destination connection ID to: 00000000000000044b9ecc9e546b33170e6d95a8 2025/04/30 10:10:49 client <- &wire.PingFrame{} 2025/04/30 10:10:49 client -> Sending packet 5 (1280 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Initial 2025/04/30 10:10:49 client Long Header{Type: Initial, DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:49 client <- Reading packet 3 (49 bytes) for connection (empty), Initial 2025/04/30 10:10:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:10:49 client <- &wire.PingFrame{} 2025/04/30 10:10:49 client -> Sending packet 6 (1280 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Initial 2025/04/30 10:10:49 client Long Header{Type: Initial, DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:49 client Queueing packet (48 bytes) for later decryption 2025/04/30 10:10:49 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 10:10:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 10:10:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:49 client -> Sending packet 7 (1280 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Initial 2025/04/30 10:10:49 client Long Header{Type: Initial, DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:10:49 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:49 client <- Reading packet 2 (48 bytes) for connection (empty), Handshake 2025/04/30 10:10:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:10:49 client <- &wire.PingFrame{} 2025/04/30 10:10:49 client -> Sending packet 0 (52 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Handshake 2025/04/30 10:10:49 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:49 client Dropping Initial keys. 2025/04/30 10:10:50 client <- Reading packet 6 (48 bytes) for connection (empty), Handshake 2025/04/30 10:10:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, PacketNumber: 6, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:10:50 client <- &wire.PingFrame{} 2025/04/30 10:10:50 client -> Sending packet 1 (54 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Handshake 2025/04/30 10:10:50 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 10:10:50 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:10:50 client <- Reading packet 7 (781 bytes) for connection (empty), Handshake 2025/04/30 10:10:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, PacketNumber: 7, PacketNumberLen: 1, Length: 752, Version: v1} 2025/04/30 10:10:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 10:10:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, InitialSourceConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x914823cea3ff23b1b950765a9c7bd11f} 2025/04/30 10:10:50 client -> Sending packet 2 (93 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, Handshake 2025/04/30 10:10:50 client Long Header{Type: Handshake, DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 64, Version: v1} 2025/04/30 10:10:50 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:10:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:50 client -> Sending packet 0 (58 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:50 client Short Header{DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:50 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:50 client Peer doesn't await address validation any longer. 2025/04/30 10:10:50 client newly acked packets (1): [0] 2025/04/30 10:10:50 client updated RTT: 33.110974ms (σ: 16.555487ms) 2025/04/30 10:10:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:50 client Canceling loss detection timer. 2025/04/30 10:10:50 client Dropping Handshake keys. 2025/04/30 10:10:50 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:50 client -> Sending packet 1 (44 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:50 client Short Header{DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 110.437µs} 2025/04/30 10:10:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:50 client -> Sending packet 2 (42 bytes) for connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:50 client Short Header{DestConnectionID: 00000000000000044b9ecc9e546b33170e6d95a8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:50 client Connection f71d3f06eeb24a6e9d36bafda048ffb69011bb1b closed.